default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2012
- Ansuman Banerjee, Sasthi C. Ghosh, Nilanjan Banerjee:
Pack your sack for the cloud. ISEC 2012: 157-16 - Sidharth Bihary, Jagadish Koneti, Suman Roy:
Process conformance using CSP. ISEC 2012: 139-142 - Lionel C. Briand:
Research-based innovation in model-driven software engineering: lessons learned from high impact projects. ISEC 2012: 147 - Srinivas Chemboli, Clive Boughton:
Omnispective analysis and reasoning: a framework for managing intellectual concerns in scientific workflows. ISEC 2012: 143-146 - Bharti Chimdyalwar:
Survey of array out of bound access checkers for C code. ISEC 2012: 45-48 - Anirban Roy Choudhury, A. K. Bhattacharjee:
RED: a tool for runtime error detection in C programs using abstract interpretation. ISEC 2012: 37-40 - Tony Clark, Balbir S. Barn:
A common basis for modelling service-oriented and event-driven architecture. ISEC 2012: 23-32 - Subhajit Datta, Nishant Kumar, Santonu Sarkar:
The social network of software engineering research. ISEC 2012: 61-70 - Alpana Dubey:
Towards adopting ODC in automation application development projects. ISEC 2012: 153-156 - Srinivasa Gopal, Meenakshi D'Souza:
Improving estimation accuracy by using case based reasoning and a combined estimation approach. ISEC 2012: 75-78 - Karan Gupta, Anita Goel:
Tagging requirements for web application. ISEC 2012: 81-90 - Sudhanshu Gupta, Gogate Vaibhav Vinayak, Atul Gupta:
Software failure analysis in requirement phase. ISEC 2012: 101-104 - Pankaj Jalote:
Engaging practitioners in software engineering research. ISEC 2012: 79 - Bojan Jovicic, Vladan Devedzic, Dragan Djuric, Ramo Sendelj:
Agile ERP systems development: a technical perspective. ISEC 2012: 71-74 - Devdatt Kawathekar, Easwara Moorthy, Namitha Chandrappa:
Impact of FMEA on improving software reliability of an ultrasound system designed for emerging market countries. ISEC 2012: 149-152 - Raghavan Komondoor, K. Vasanta Lakshmi, Deva P. Seetharam, Sudha Balodia:
Packet flow analysis in IP networks using data-flow analysis. ISEC 2012: 49-52 - Raghavan Komondoor, V. Krishna Nandivada, Saurabh Sinha, John Field:
Identifying services from legacy batch applications. ISEC 2012: 13-22 - Vitomir Kovanovic, Dragan Djuric:
Highway: a domain specific language for enterprise application integration. ISEC 2012: 33-36 - Sangeeta Lal, Ashish Sureka:
A static technique for fault localization using character n-gram based information retrieval model. ISEC 2012: 109-118 - Nenad Medvidovic:
Software architecture challenges and opportunities for the 21st century: dynamism, mobility, autonomy, services, grids, and clouds. ISEC 2012: 1 - Shinpei Ogata, Saeko Matsuura:
Training of requirements analysis modeling with UML-based prototype generation tool. ISEC 2012: 105-108 - Prasanth RV, Bram Hoefnagel:
Unveiling the unknown: gauging stakeholder perception. ISEC 2012: 91-96 - Hitesh Sajnani, Ravindra Naik, Cristina Videira Lopes:
Easing software evolution: change-data and domain-driven approach. ISEC 2012: 119-123 - Santonu Sarkar, Mageri Filali Maltouf:
Identifying hotspots in a program for data parallel architecture: an early experience. ISEC 2012: 131-137 - Santonu Sarkar, Vibhu Saujanya Sharma, Rajiv Agarwal:
Creating design from requirements and use cases: bridging the gap between requirement and detailed design. ISEC 2012: 3-12 - Ajit Ashok Shenvi:
Is process compliance a driver for project success? ISEC 2012: 53-59 - Mahesh Shirole, Mounika Kommuri, Rajeev Kumar:
Transition sequence exploration of UML activity diagram using evolutionary algorithm. ISEC 2012: 97-100 - Ankita Singh:
Need of controlled cleanup of runtime callable wrappers in .net. ISEC 2012: 41-44 - Kalyanasundaram Somasundaram, Gail C. Murphy:
Automatic categorization of bug reports using latent Dirichlet allocation. ISEC 2012: 125-130 - Sanjeev K. Aggarwal, T. V. Prabhakar, Vasudeva Varma, Srinivas Padmanabhuni:
Proceeding of the 5th Annual India Software Engineering Conference, ISEC 2012, Kanpur, India, February 22-25, 2012. ACM 2012, ISBN 978-1-4503-1142-7 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-02 21:46 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint