default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 78 matches
- 2005
- Luciano Baresi, Sam Guinea:
An Introduction to Self-Healing Web Services. ICECCS 2005: 4 - Mohammad Zib Beiroumi, Villy Bæk Iversen:
Recovery Method Based on Communicating Extended Finite State Machine (CEFSM) for Mobile Communications. ICECCS 2005: 384-393 - Pierfrancesco Bellini, Ivan Bruno, Paolo Nesi, Davide Rogai:
Comparing Fault-Proneness Estimation Models. ICECCS 2005: 205-214 - Jean Bézivin, Frédéric Jouault, David Touzet:
Principles, Standards and Tools for Model Engineering. ICECCS 2005: 28-29 - Yuting Chen, Shaoying Liu, Fumiko Nagoya:
A Framework for SOFL-Based Program Review. ICECCS 2005: 6-7 - Wen Chen, Feiyu Lei, Weinong Wang:
A General Model for Non-Markovian Stochastic Decision Discrete-Event Systems. ICECCS 2005: 132-137 - Haopeng Chen, Yao Shen, Jianwei Jiang:
Extended SOFL Features for the Modeling of Middleware-Based Transaction Management. ICECCS 2005: 16-17 - Robert Colvin, Lindsay Groves:
Formal Verification of an Array-Based Nonblocking Queue. ICECCS 2005: 507-516 - Trung T. Dinh-Trong, Nilesh Kawane, Sudipto Ghosh, Robert B. France, Anneliese Amschler Andrews:
A Tool-Supported Approach to Testing UML Design Models. ICECCS 2005: 519-528 - Jin Song Dong, D. Dan:
Software Engineering Approaches to Semantic Web. ICECCS 2005: 2 - Jin Song Dong, Roger Duke, Ping Hao:
Integrating Object-Z with Timed Automata. ICECCS 2005: 488-497 - Viktoria Felmetsger, Giovanni Vigna:
Exploiting OS-Level Mechanisms to Implement Mobile Code Security. ICECCS 2005: 234-243 - Juan Miguel Gómez, Giner Alor-Hernández, José Oscar Olmedo-Aguirre, Christoph Bussler:
A B2B Conversational Architecture for Semantic Web Services Based on BPIMS-WS. ICECCS 2005: 252-259 - Cesar Gonzalez-Perez:
Tools for an Extended Object Modelling Environment. ICECCS 2005: 20-23 - Oystein Hallaraker, Giovanni Vigna:
Detecting Malicious JavaScript Code in Mozilla. ICECCS 2005: 85-94 - Abdelwahab Hamou-Lhadj, Timothy C. Lethbridge:
Measuring Various Properties of Execution Traces to Help Build Better Trace Analysis Tools. ICECCS 2005: 559-568 - Siv Hilde Houmb, Geri Georg, Robert B. France, James M. Bieman, Jan Jürjens:
Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development. ICECCS 2005: 195-204 - Zhihong Huo, Huajing Fang:
Robust H-infinity Filter Design for Networked Control System with Random Time Delays. ICECCS 2005: 333-340 - Jianmin Jiang, Jinzhao Wu:
The Preservation of Interleaving Equivalences. ICECCS 2005: 580-589 - Wenpin Jiao, Hong Mei:
Dynamic Architectural Connectors in Cooperative Software Systems. ICECCS 2005: 477-486 - Jan Jürjens, Markus Lehrhuber, Guido Wimmel:
Model-Based Design and Analysis of Permission-Based Security. ICECCS 2005: 224-233 - Dae-Kyoo Kim:
Evaluating Conformance of UML Models to Design Patterns. ICECCS 2005: 30-31 - Jun Kong, Kang Zhang, Jing Dong:
Grammar-Specified Model-Driven Architectures. ICECCS 2005: 24-25 - Alexander Lau, Rudolph E. Seviora:
Design Patterns for Software Health Monitoring. ICECCS 2005: 467-476 - Ching-Cheng Lee, Sudeshna Ghosh:
A Component-Based Approach for JavaCard Runtime System Development. ICECCS 2005: 274-282 - Xiaoshan Li, Zhiming Liu, Jifeng He:
Consistency Checking of UML Requirements. ICECCS 2005: 411-420 - Jun Li, Fumin Yang, Yansheng Lu:
A Feasible Schedulability Analysis for Fault-Tolerant Hard Real-Time Systems. ICECCS 2005: 176-183 - Hui Liang:
Regression Testing of Classes Based on TCOZ Specification. ICECCS 2005: 450-457 - Zhi-gang Liao, Zeng-zhi Li, Yan Chen, Tao Zhan:
A Study of Secure Communications between Mobile Objects. ICECCS 2005: 377-383 - Jing Liu, Huaikou Miao:
A Strategy for Component-Based Modeling and Refinement. ICECCS 2005: 26-27
skipping 48 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-20 23:33 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint