default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 65 matches
- 1998
- Mauricio Amaral de Almeida, Hakim Lounis, Walcélio L. Melo:
An Investigation on the Use of Machine Learned Models for Estimating Correction Costs. ICSE 1998: 473-476 - Nicolas Anquetil, Timothy Lethbridge:
Extracting Concepts from File Names: A New File Clustering Criterion. ICSE 1998: 84-93 - Annie I. Antón, Colin Potts:
The Use of Goals to Surface Requirements for Evolving Systems. ICSE 1998: 157-166 - Mikio Aoyama:
Agile Software Process and Its Experience. ICSE 1998: 3-12 - Alain April, Alain Abran, Ettore Merlo:
Process Assurance Audits: Lessons Learned. ICSE 1998: 482-485 - Martin Arnold, Peter Pedross:
Software Size Measurement and Productivity Rating in a Large-Scale Software Development Department. ICSE 1998: 490-493 - Mario Baldi, Gian Pietro Picco:
Evaluating the Tradeoffs of Mobile Code Design Paradigms in Network Management Applications. ICSE 1998: 146-155 - Elisa L. A. Baniassad, Gail C. Murphy:
Conceptual Module Querying for Software Reengineering. ICSE 1998: 64-73 - Aaron B. Binkley, Stephen R. Schach:
Validation of the Coupling Dependency Metric as a Predictor of Run-Time Failures and Maintenance Measures. ICSE 1998: 452-455 - Barry W. Boehm, Alexander Egyed:
Software Requirements Negotiation: Some Lessons Learned. ICSE 1998: 503-506 - Lionel C. Briand, Khaled El Emam, Frank Bomarius:
COBRA: A Hybrid Method for Software Cost Estimation, Benchmarking, and Risk Assessment. ICSE 1998: 390-399 - Lionel C. Briand, Khaled El Emam, Oliver Laitenberger, Thomas Fussbroich:
Using Simulation to Build Inspection Efficiency Benchmarks for Development Projects. ICSE 1998: 340-349 - Edwin C. Chan, John Boyland, William L. Scherlis:
Promises: Limited Specifications for Analysis and Manipulation. ICSE 1998: 167-176 - Tyng-Ruey Chuang, Yue-Sun Kuo, Chien-Min Wang:
Non-Intrusive Object Introspection in C++: Architecture and Application. ICSE 1998: 312-321 - Bradford K. Clark, Sunita Devnani-Chulani, Barry W. Boehm:
Calibrating the COCOMO II Post-Architecture Model. ICSE 1998: 477-480 - Gianpaolo Cugola, Elisabetta Di Nitto, Alfonso Fuggetta:
Exploiting an Event-Based Infrastructure to Develop Complex Distributed Systems. ICSE 1998: 261-270 - Elif Demirörs, Onur Demirörs, Oguz Dikenelli, Billur Keskin:
Process Improvement Towards ISO 9001 Certification in a Small Software Organization. ICSE 1998: 435-438 - Premkumar T. Devanbu, Philip W. L. Fong, Stuart G. Stubblebine:
Techniques for Trusted Software Engineering. ICSE 1998: 126-135 - Grégory Duval:
Specification and Verification of an Object Request Broker. ICSE 1998: 43-52 - Wolfgang Eixelsberger, Michaela Ogris, Harald C. Gall, Berndt Bellay:
Software Architecture Recovery of a Program Family. ICSE 1998: 508-511 - Fabrizio Fioravanti, Paolo Nesi, Sandro Perlini:
Assessment of System Evolution Through Characterization. ICSE 1998: 456-459 - Fumiko Fujiwara, Takushi Goto, Sadao Araki:
Examples of Applying Software Estimate Tool. ICSE 1998: 469-472 - Joseph Gil, Stuart Kent:
Three Dimensional Software Modeling. ICSE 1998: 105-114 - Todd L. Graves, Mary Jean Harrold, Jung-Min Kim, Adam A. Porter, Gregg Rothermel:
An Empirical Study of Regression Test Selection Techniques. ICSE 1998: 188-197 - Volker Gruhn, Monika Schneider:
Workflow Management Based on Process Model Repositories. ICSE 1998: 379-388 - Volker Gruhn, Juri Urbainczyk:
Software Process Modeling and Enactment: An Experience Report Related to Problem Tracking in an Industrial Project. ICSE 1998: 13-21 - Noriko Hanakawa, Shuji Morisaki, Ken-ichi Matsumoto:
A Learning Curve Based Simulation Model for Software Development. ICSE 1998: 350-359 - Mary Jean Harrold, Ning Ci:
Reuse-Driven Interprocedural Slicing. ICSE 1998: 74-83 - James D. Herbsleb, Rebecca E. Grinter:
Conceptual Simplicity Meets Organizational Complexity: Case Study of a Corporate Metrics Program. ICSE 1998: 271-280 - David M. Hilbert, David F. Redmiles:
An Approach to Large-Scale Collection of Application Usage Data Over the Internet. ICSE 1998: 136-145
skipping 35 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-22 01:36 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint