default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 113 matches
- 2018
- Dirk Beyer, Thomas Lemberger:
CPA-SymExec: efficient symbolic execution in CPAchecker. ASE 2018: 900-903 - Dirk Beyer, Karlheinz Friedberger:
Domain-independent multi-threaded software model checking. ASE 2018: 634-644 - Bo Jiang, Ye Liu, W. K. Chan:
ContractFuzzer: fuzzing smart contracts for vulnerability detection. ASE 2018: 259-269 - Raja Ben Abdessalem, Annibale Panichella, Shiva Nejati, Lionel C. Briand, Thomas Stifter:
Testing autonomous cars for feature interaction failures using many-objective search. ASE 2018: 143-154 - Paola R. G. Accioly, Paulo Borba, Guilherme Cavalcanti:
Understanding Semi-structured merge conflict characteristics in open-source Java projects (journal-first abstract). ASE 2018: 955 - Vahid Alizadeh, Marouane Kessentini:
Reducing interactive refactoring effort via clustering-based multi-objective search. ASE 2018: 464-474 - Nada Almasri, Luay Tahat, Bogdan Korel:
Automatically quantifying the impact of a change in systems (journal-first abstract). ASE 2018: 952 - Nipun Arora, Jonathan Bell, Franjo Ivancic, Gail E. Kaiser, Baishakhi Ray:
Replay without recording of production bugs for service oriented applications. ASE 2018: 452-463 - Mohammad Bajammal, Davood Mazinanian, Ali Mesbah:
Generating reusable web components from mockups. ASE 2018: 601-611 - Liang Bao, Xin Liu, Ziheng Xu, Baoyin Fang:
AutoConfig: automatic configuration tuning for distributed message systems. ASE 2018: 29-40 - Nataniel P. Borges Jr., Jenny Hotzkow, Andreas Zeller:
DroidMate-2: a platform for Android test generation. ASE 2018: 916-919 - Julien Brunel, David Chemouil, Alcino Cunha, Nuno Macedo:
The electrum analyzer: model checking relational first-order temporal specifications. ASE 2018: 884-887 - Alexandra Bugariu, Valentin Wüstholz, Maria Christakis, Peter Müller:
Automatically testing implementations of numerical abstract domains. ASE 2018: 768-778 - Jialun Cao, Yongjian Li, Jun Pang:
L-CMP: an automatic learning-based parameterized verification tool. ASE 2018: 892-895 - Mikaela Cashman, Myra B. Cohen, Priya Ranjan, Robert W. Cottingham:
Navigating the maze: the impact of configurability in bioinformatics software. ASE 2018: 757-767 - Sooyoung Cha, Seonho Lee, Hakjoo Oh:
Template-guided concolic testing via online learning. ASE 2018: 408-418 - Jianhui Chen, Fei He:
Control flow-guided SMT solving for program verification. ASE 2018: 351-361 - Boyuan Chen, Jian Song, Peng Xu, Xing Hu, Zhen Ming (Jack) Jiang:
An automated approach to estimating code coverage measures via execution logs. ASE 2018: 305-316 - Qingying Chen, Minghui Zhou:
A neural framework for retrieval and summarization of source code. ASE 2018: 826-831 - Jane Cleland-Huang:
Automated requirements engineering challenges with examples from small unmanned aerial systems (keynote). ASE 2018: 3 - Roberto Di Cosmo:
Software heritage: collecting, preserving, and sharing all our source code (keynote). ASE 2018: 1-2 - Renzo Degiovanni, Facundo Molina, Germán Regis, Nazareno Aguirre:
A genetic algorithm for goal-conflict identification. ASE 2018: 520-531 - Julien Delplanque:
Software engineering techniques applied to relational databases. ASE 2018: 948-951 - Rokiatou Diarra:
Towards automatic restrictification of CUDA kernel arguments. ASE 2018: 928-931 - Wensheng Dou, Shi Han, Liang Xu, Dongmei Zhang, Jun Wei:
Expandable group identification in spreadsheets. ASE 2018: 498-508 - Oscar Soria Dustmann, Klaus Wehrle, Cristian Cadar:
PARTI: a multi-interval theory solver for symbolic execution. ASE 2018: 430-440 - Ameni Ben Fadhel, Domenico Bianculli, Lionel C. Briand:
Model-driven run-time enforcement of complex role-based access control policies. ASE 2018: 248-258 - Davide Falessi, Massimiliano Di Penta, Gerardo Canfora, Giovanni Cantone:
Estimating the number of remaining links in traceability recovery (journal-first abstract). ASE 2018: 953 - Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu:
Efficiently manifesting asynchronous programming errors in Android apps. ASE 2018: 486-497 - Mikhail Y. R. Gadelha, Felipe R. Monteiro, Jeremy Morse, Lucas C. Cordeiro, Bernd Fischer, Denis A. Nicole:
ESBMC 5.0: an industrial-strength C model checker. ASE 2018: 888-891
skipping 83 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-26 13:07 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint