


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 116 matches
- 2016
- Mohamed Amoud, Ounsa Roudiès
:
MaPE-K-Based Approach for Security @ Runtime. SwSTE 2016: 138-140 - Mira Balaban, Igal Khitron, Michael Kifer:
Multilevel Modeling and Reasoning with FOML. SwSTE 2016: 61-70 - Ariel Bar, Bracha Shapira
, Lior Rokach, Moshe Unger:
Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis. SwSTE 2016: 28-36 - Daniel M. Berry, Krzysztof Czarnecki, Michal Antkiewicz, Mohamed AbdelRazik:
The Problem of the Lack of Benefit of a Document to Its Producer (PotLoBoaDtiP). SwSTE 2016: 37-42 - Andreas Borgwart, Haya Schulmann, Michael Waidner
:
Towards Automated Measurements of Internet's Naming Infrastructure. SwSTE 2016: 117-124 - Reuven Gallant:
Thinking Fast: Patterns of Cognitive Error in Software Engineering Education and Practice. SwSTE 2016: 43-50 - Ziv Goldfeld, Paul Cuff, Haim H. Permuter
:
Semantic-Security Capacity for the Physical Layer via Information Theory. SwSTE 2016: 17-27 - Yaron Gonen, Ehud Gudes:
An Improved MapReduce Algorithm for Mining Closed Frequent Itemsets. SwSTE 2016: 77-83 - Rea Lavi, Dov Dori, Yehudit Judy Dori:
Implementing an International Standard for Manufacturing System Lifecycle Management Using Object-Process Methodology. SwSTE 2016: 71-76 - Oded Margalit:
Using Computer Programming Competition for Cyber Education. SwSTE 2016: 104-107 - Amir Menczel, Gera Weiss, Dror Fried:
On Modeling, Complexities, and Automatic Configuration of Wireless Industrial Control Networks. SwSTE 2016: 125-134 - Peng Peng
, Paulo S. C. Alencar, Donald D. Cowan:
A Software Framework for PCa-Based Face Recognition. SwSTE 2016: 7-16 - Ivens Portugal, Paulo S. C. Alencar, Donald D. Cowan:
A Preliminary Survey on Domain-Specific Languages for Machine Learning in Big Data. SwSTE 2016: 108-110 - Sergey Rubinshtein, Rami Puzis
:
Modeling and Reconstruction of Multi-stage Attacks. SwSTE 2016: 135-137 - Liron Schiff, Stefan Schmid
:
Study the Past If You Would Define the Future: Implementing Secure Multi-party SDN Updates. SwSTE 2016: 111-116 - Sivan Toledo, Oren Kishon, Yotam Orchan, Adi Shohat, Ran Nathan
:
Lessons and Experiences from the Design, Implementation, and Deployment of a Wildlife Tracking System. SwSTE 2016: 51-60 - Asher Wilk:
Cyber Security Education and Law. SwSTE 2016: 94-103 - 2016 IEEE International Conference on Software Science, Technology and Engineering, SWSTE 2016, Beer Sheva, Israel, June 23-24, 2016. IEEE 2016, ISBN 978-1-5090-1018-9 [contents]
- 2014
- Donald D. Cowan, Paulo S. C. Alencar, Fred McGarry:
Perspectives on Open Data: Issues and Opportunties. SwSTE 2014: 24-33 - Alex Frid
, Hananel Hazan
, Dan Hilu, Larry M. Manevitz, Lorraine O. Ramig, Shimon Sapir:
Computational Diagnosis of Parkinson's Disease Directly from Natural Speech Using Machine Learning Techniques. SwSTE 2014: 50-53 - Alex Frid
, Hananel Hazan
, Larry M. Manevitz:
Towards Classifying Human Phonemes without Encodings via Spatiotemporal Liquid State Machines: Extended Abstract. SwSTE 2014: 63-64 - Leah Goldin, Reuven Gallant, Iaakov Exman:
Software Proactive Reengineering for System Resilience to Misuse. SwSTE 2014: 10-18 - Yoram Haddad, Mickael Marrache, Samuel Melloul, David Schwartz:
Session Peering Provisioning Framework Analysis. SwSTE 2014: 34-41 - Dorit Hutzler, Esther David, Mireille Avigal, Rina Azoulay:
Learning Methods for Rating the Difficulty of Reading Comprehension Questions. SwSTE 2014: 54-62 - Shmuela Jacobs, Niva Wengrowicz, Dov Dori:
Defining Object-Process Methodology in Web Ontology Language for Semantic Mediation. SwSTE 2014: 87-95 - Guy Leshem, Esther David, Michal Chalamish, Dana Shapira
:
Reputation Prediction of Anomaly Detection Algorithms for Reliable System. SwSTE 2014: 19-23 - Gertrude Neuman Levine:
Incorporating Service Degradations into a Security Plan. SwSTE 2014: 1-9 - Cyril Mauger
, Daniel M. Berry:
Lessons Learned from and for Requirements Engineering and Building Construction: A Case Study of Requirements Engineering for a Synagogue Kitchen with Use Cases and Scenarios. SwSTE 2014: 67-76 - Luisa Mich
:
Evaluating Website Quality by Addressing Quality Gaps: A Modular Process. SwSTE 2014: 42-49 - Yaniv Mordecai, Ori Orhof, Dov Dori:
Modeling Software Agent Awareness of Physical-Informatical Essence Duality. SwSTE 2014: 77-86
skipping 86 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-03-13 08:35 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint