default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2009
- Rami Al-Motlak, Jerzy W. Rozenblit, Faisal Momen:
A Distributed Computing Framework for Parallelization of Coevolution in Multi-sided Conflicts. ECBS 2009: 215-224 - Nasreddine Aoumeur, Kamel Barkaoui, Gunter Saake:
Validating and Dynamically Adapting and Composing Features in Concurrent Product-Lines Applications. ECBS 2009: 138-146 - Jung Ho Bae, Heung Seok Chae:
An Automatic Approach to Generating State Diagram from Contract-Based Class. ECBS 2009: 323-331 - Stephan Bode, Anja Fischer, Winfried E. Kühnhauser, Matthias Riebisch:
Software Architectural Design Meets Security Engineering. ECBS 2009: 109-118 - Robert Brcina, Stephan Bode, Matthias Riebisch:
Optimisation Process for Maintaining Evolvability during Software Evolution. ECBS 2009: 196-205 - S. Campos, Julio C. V. Neves, Luis E. Zárate, Mark A. J. Song:
Distributed BMC: A Depth-First Approach to Explore Clause Symmetry. ECBS 2009: 89-94 - Philippa Conmy, Iain Bate:
Semi-Automated Safety Analysis for Field Programmable Gate Arrays. ECBS 2009: 166-175 - Damian Dechev, Peter Pirkelbauer, Nicolas Rouquette, Bjarne Stroustrup:
Semantically Enhanced Containers for Concurrent Real-Time Systems. ECBS 2009: 48-57 - Damian Dechev, Bjarne Stroustrup:
Model-Based Product-Oriented Certification. ECBS 2009: 295-304 - Jessica Díaz, Agustín Yagüe, Juan Garbajosa:
A Systematic Process for Implementing Gateways for Test Tools. ECBS 2009: 58-66 - Brian Dougherty, Jules White, Chris Thompson, Douglas C. Schmidt:
Automating Hardware and Software Evolution Analysis. ECBS 2009: 265-274 - Abhishek Dubey:
Algorithms for Synthesizing Safe Sets of Operation for Embedded Systems. ECBS 2009: 149-155 - Abhishek Dubey, Derek Riley, Sherif Abdelwahed, Ted Bapty:
Modeling and Analysis of Probabilistic Timed Systems. ECBS 2009: 69-78 - Chuan Feng, Jerzy W. Rozenblit, Allan J. Hamilton, Andrzej Wytyczak-Partyka:
Defining Spatial Regions in Computer-Assisted Laparoscopic Surgical Training. ECBS 2009: 176-183 - Mathias Fritzsche, Hugo Bruneliere, Bert Vanhooff, Yolande Berbers, Frédéric Jouault, Wasif Gilani:
Applying Megamodelling to Model Driven Performance Engineering. ECBS 2009: 244-253 - Jacob Gulotta, Diyang Chu, Ximing Yu, Hussain Al-Helal, Tapasya Patki, Jason Hansen, Maribel Hudson, Jonathan Sprinkle:
Using Integrative Models in an Advanced Heterogeneous System Simulation. ECBS 2009: 3-10 - Markus Herrmannsdoerfer, Sabine Rittmann, Bernhard Schätz:
Structured Formalization of Service-Oriented Specifications. ECBS 2009: 227-236 - Benjamin Hummel:
A Semantic Model for Computer-Based Spatio-temporal Systems. ECBS 2009: 156-165 - Hamdy Ibrahim, Behrouz H. Far, Armin Eberlein:
Tradeoff and Sensitivity Analysis of a Hybrid Model for Ranking Commercial Off-the-Shelf Products. ECBS 2009: 119-127 - Michael C. Jaeger, Ludger Fiege:
Viewpoints in the Smart Home Product Line. ECBS 2009: 332-339 - Yosr Jarraya, Mourad Debbabi, Jamal Bentahar:
On the Meaning of SysML Activity Diagrams. ECBS 2009: 95-105 - Fahad Javed, Naveed Arshad:
A Penny Saved is a Penny Earned: Applying Optimization Techniques to Power Management. ECBS 2009: 128-137 - Meiko Jensen, Sven Feja:
A Security Modeling Approach for Web-Service-Based Business Processes. ECBS 2009: 340-347 - Babak Mohammadizadeh Khoshroo, Hassan Rashidi:
Towards a Framework for Agile Management Based on Chaos and Complex System Theories. ECBS 2009: 291-292 - Thomas Leveque, Jacky Estublier, Germán Vega:
Extensibility and Modularity for Model Driven Engineering Environments. ECBS 2009: 305-314 - Allan I. McInnes:
Using CSP to Model and Analyze TinyOS Applications. ECBS 2009: 79-88 - Martin Monperrus, Antoine Beugnard, Joël Champeau:
A Definition of "Abstraction Level" for Metamodels. ECBS 2009: 315-320 - Miroslav Popovic, Ilija Basicevic, Vladislav Vrtunski:
A Task Tree Executor: New Runtime for Parallelized Legacy Software. ECBS 2009: 41-47 - Tomasz Porzucek, Stephan Kluth, Flavius Copaciu, Werner Zorn:
Modeling and Evaluation Framework for FMC-QE. ECBS 2009: 237-243 - Muhammad Rashid, Bernard Pottier:
Application Capturing and Performance Estimation in an Holistic Design Environment. ECBS 2009: 21-30
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-15 08:12 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint