default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 153 matches
- 2005
- Marwan Abi-Antoun, Jonathan Aldrich
, David Garlan, Bradley R. Schmerl, Nagi H. Nahas, Tony Tseng:
Modeling and implementing software architecture with acme and archJava. ICSE 2005: 676-677 - Tariq Al-Naeem, Ian Gorton, Muhammad Ali Babar, Fethi A. Rabhi, Boualem Benatallah
:
A quality-driven systematic approach for architecting distributed software applications. ICSE 2005: 244-253 - Zakarya A. Alzamil:
Towards an effective software engineering course project. ICSE 2005: 631-632 - James H. Andrews, Lionel C. Briand, Yvan Labiche:
Is mutation an appropriate tool for testing experiments? ICSE 2005: 402-411 - James H. Andrews, Lori L. Pollock:
Third international workshop on dynamic analysis(WODA 2005). ICSE 2005: 693 - Taweesup Apiwattanapong, Alessandro Orso, Mary Jean Harrold:
Efficient and precise dynamic impact analysis using execute-after sequences. ICSE 2005: 432-441 - Joanne M. Atlee, Richard J. LeBlanc, Timothy Lethbridge, Ann E. Kelley Sobel, J. Barrie Thompson:
Software engineering 2004: ACM/IEEE-CS guidelines for undergraduate programs in software engineering. ICSE 2005: 623-624 - Dzintars Avots, Michael Dalton, V. Benjamin Livshits, Monica S. Lam:
Improving software security with a C pointer analysis. ICSE 2005: 332-341 - Peter Ayton:
Extending the discipline: how software can help or hinder human decision making (and vice-versa). ICSE 2005: 36 - Hamid Abdul Basit, Damith C. Rajapakse, Stan Jarzabek:
Beyond templates: a study of clones in the STL and some general implications. ICSE 2005: 451-459 - Maurice H. ter Beek, Mieke Massink
, Diego Latella
, Stefania Gnesi, Alessandro Forghieri, Maurizio Sebastianis:
A case study on the automated verification of groupware protocols. ICSE 2005: 596-603 - Stefan Berner, Roland Weber, Rudolf K. Keller:
Observations and lessons learned from automated testing. ICSE 2005: 571-579 - Kenneth D. Blaha, Alvaro E. Monge, Dean Sanders, Beth Simon, Tammy VanDeGrift:
Do students recognize ambiguity in software design? a multi-national, multi-institutional report. ICSE 2005: 615-616 - Barry W. Boehm, A. Winsor Brown, Richard Turner:
Spiral development of software-intensive systems of systems. ICSE 2005: 706-707 - Yves Bontemps, Alexander Egyed:
4th international workshop on scenarios and state machines: models, algorithms and tools (SCESM'05). ICSE 2005: 697 - Eric Brechner:
Journey of enlightenment: the evolution of development at Microsoft. ICSE 2005: 39-42 - Danilo Bruschi, Bart De Win, Mattia Monga
:
Software engineering for secure systems. ICSE 2005: 681 - Renée C. Bryce, Charles J. Colbourn, Myra B. Cohen:
A framework of greedy methods for constructing interaction test suites. ICSE 2005: 146-155 - David Budgen
, Pearl Brereton, Barbara A. Kitchenham, Stephen G. Linkman:
International workshop on realising evidence-based software engineering. ICSE 2005: 687 - Sven Burmester, Holger Giese, Martin Hirsch, Daniela Schilling, Matthias Tichy:
The fujaba real-time tool suite: model-driven development of safety-critical, real-time systems. ICSE 2005: 670-671 - Luca Cardelli:
Transitions in programming models: 2. ICSE 2005: 2 - Robert Chatley, Sebastián Uchitel, Jeff Kramer, Jeff Magee:
Fluent-based web animation: exploring goals for requirements validation. ICSE 2005: 674-675 - Wei-Ngan Chin, Siau-Cheng Khoo, Shengchao Qin
, Corneliu Popeea, Huu Hai Nguyen:
Verifying safety policies with size properties and alias controls. ICSE 2005: 186-195 - Lawrence Chung, Xavier Franch
, Neil A. M. Maiden:
Models and processes for the evaluation of off-the-shelf components - MPEC'05. ICSE 2005: 696 - William Chung, William H. Harrison, Vincent J. Kruskal, Harold Ossher, Stanley M. Sutton Jr., Peri L. Tarr, Matthew Chapman, Andrew Clement, Helen Hawkins, Sian January:
The concern manipulation environment. ICSE 2005: 666-667 - Paolo Ciancarini:
On the education of future software engineers. ICSE 2005: 649-650 - Jane Cleland-Huang, Mark Denne:
Financially informed requirements prioritization. ICSE 2005: 710-711 - Jane Cleland-Huang, Raffaella Settimi, Oussama Ben Khadra, Eugenia Berezhanskaya, Selvia Christina:
Goal-centric traceability for managing non-functional requirements. ICSE 2005: 362-371 - Holger Cleve, Andreas Zeller
:
Locating causes of program failures. ICSE 2005: 342-351 - William R. Cook, Siddhartha Rai:
Safe query objects: statically typed objects as remotely executable queries. ICSE 2005: 97-106
skipping 123 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-08-15 03:26 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint