default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 144 matches
- 2013
- Tamer Abdou, Peter Grogono, Pankaj Kamthan:
Managing Corrective Actions to Closure in Open Source Software Test Process. SEKE 2013: 306-311 - Sadra Abedinzadeh, Samira Sadaoui:
ScubAA: A Human Plausible Reasoning Approach to Agent Trust Management. SEKE 2013: -A-2 - Sébastien Adam, Ghizlane El-Boussaidi:
A multi-dimensional approach for analyzing software artifacts. SEKE 2013: 650-655 - Lokesh Agrawal, Durga Toshniwal:
Smart Phone Based Indoor Pedestrian Localization System (S). SEKE 2013: 283-286 - Hamdi A. Al-Jamimi, Moataz A. Ahmed:
Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (S). SEKE 2013: 727-730 - Ra'Fat Al-Msie'deen, Abdelhak-Djamel Seriai, Marianne Huchard, Christelle Urtado, Sylvain Vauttier, Hamzeh Eyal Salman:
Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing. SEKE 2013: 244-249 - S. M. Didar Al Alam, Günther Ruhe, Dietmar Pfahl:
Decision Support for Re-planning of Software Product Releases (S). SEKE 2013: 89-94 - Emil Alégroth:
Random Visual GUI Testing: Proof of Concept. SEKE 2013: 178-183 - André Almeida, Everton Cavalcante, Thaís Batista, Nélio Cacho, Frederico Lopes, Flávia Coimbra Delicato, Paulo F. Pires:
Dynamic Adaptation of Cloud Computing Applications. SEKE 2013: 67-72 - Bandar Alshammari, Colin J. Fidge, Diane Corney:
Security Metrics for Java Bytecode Programs (S). SEKE 2013: 394-399 - Aleem Khalid Alvi, Robin Dawes:
Image Steganography Using Fuzzy Domain Transformation and Pixel Classification. SEKE 2013: 277-282 - Rafael T. Anchiêta, Rogério Figueredo de Sousa, Raimundo Santos Moura:
Using NLP Techniques for Identifying GUI Prototypes and UML Diagrams From Use Cases. SEKE 2013: 48-53 - Sandro Santos Andrade, Raimundo José de Araújo Macêdo:
Architectural Design Spaces for Feedback Control Concerns in Self-Adaptive Systems (S). SEKE 2013: 741-746 - Sandro Santos Andrade, Raimundo José de Araújo Macêdo:
DuSE-MT: From Design Spaces to Automated Software Architecture Design. SEKE 2013: -A-6 - Wesley Klewerton Guez Assunção, Silvia Regina Vergilio:
Class Diagram Retrieval with Particle Swarm Optimization. SEKE 2013: 632-637 - Saulius Astromskis, Andrea Janes, Alberto Sillitti, Giancarlo Succi:
Andon for Dentists (S). SEKE 2013: 147-152 - Hazeline U. Asuncion, Macneil Shonle, Robert Porter, Karen Potts, Nathan Duncan, William Joseph Matthies Jr.:
Using Change Entries to Collect Software Project Information. SEKE 2013: 184-189 - Nada Bajnaid, Rachid Benlamri, Algirdas Pakstas, Shahram Salekzamankhani:
Software Quality Assurance Ontology from Development to Evaluation (S). SEKE 2013: 689-694 - Ellen Francine Barbosa, Maria Lydia Fioravanti, Elisa Yumi Nakagawa, José Carlos Maldonado:
Towards the Establishment of a Reference Architecture for Developing Learning Environments. SEKE 2013: 350-355 - Fábio Paulo Basso, Cláudia Maria Lima Werner, Raquel M. Pillat, Toacy C. Oliveira:
How do You Execute Reuse Tasks Among Tools? SEKE 2013: 721-726 - Youness Bazhar, Yamine Aït Ameur, Stéphane Jean:
BeMoRe: a Repository for Handling Models Behaviors. SEKE 2013: 262-267 - Alvine Boaye Belle, Ghizlane El-Boussaidi, Christian Desrosiers, Hafedh Mili:
The Layered Architecture revisited: Is it an Optimization Problem? SEKE 2013: 344-349 - Lydia Bouzar-Benlabiod, Salem Benferhat, Thouraya Bouabana-Tebibel:
An efficient QCL-based alert correlation process. SEKE 2013: 388-393 - Frederico M. Bublitz, Lenardo Chaves e Silva, Elthon A. S. Oliveira, Saulo Oliveira Dornellas Luiz, Hyggo Oliveira de Almeida, Angelo Perkusich:
A Petri Net Model Specification for Delivering Adaptable Ads through Digital Signage in Pervasive Environments. SEKE 2013: 405-410 - André de Oliveira Bueno, Júnia Coutinho Anacleto:
Releasing the OMCS-Br Knowledgebase to Facilitate Insertion of Culture in Applications: Brazilian Experience (S). SEKE 2013: 137-140 - Corentin Burnay, Ivan Jureta, Stéphane Faulkner:
Context Factors: What they are and why they matter for Requirements Problems. SEKE 2013: 30-35 - Patricia Dousseau Cabral, Ricardo Pereira e Silva, Roberto Silvino da Cunha:
Framework for digital voting systems (S). SEKE 2013: 715-720 - Gül Çalikli, Ayse Bener:
The Impact of Confirmation Bias on the Release-based Defect Prediction of Developer Groups. SEKE 2013: 461-466 - Daniel H. Carmo, Sérgio T. Carvalho, Leonardo Gresta Paulino Murta, Orlando Loques:
Runtime Monitoring and Auditing of Self-Adaptive Systems (S). SEKE 2013: 731-736 - Robert Carreras, Du Zhang, Jinsong Ouyang:
A Machine Learning Based File Archival Tool (S). SEKE 2013: 73-76
skipping 114 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-16 07:40 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint