메뉴 건너뛰기




Volumn , Issue , 2011, Pages 65-66

Determining the provenance of software artifacts

Author keywords

Bertillonage; Code evolution; Code fingerprints; Provenance

Indexed keywords

BERTILLONAGE; CODE CLONE; CODE EVOLUTION; CODE FINGERPRINTS; MANUAL EXAMINATION; POSITION PAPERS; PROVENANCE; SEARCH SPACES; SOFTWARE ARTIFACTS; SOFTWARE CLONE DETECTION; SOFTWARE CLONES;

EID: 79959557630     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1985404.1985418     Document Type: Conference Paper
Times cited : (11)

References (9)
  • 2
    • 84979020988 scopus 로고    scopus 로고
    • Comprehending reality - Practical barriers to industrial adoption of software maintenance automation
    • IWPC-03
    • J. R. Cordy. Comprehending reality - practical barriers to industrial adoption of software maintenance automation. In Proc. of the 2003 IEEE Intl. Workshop of Program Comprehension, IWPC-03, pages 196-206, 2003.
    • (2003) Proc. of the 2003 IEEE Intl. Workshop of Program Comprehension , pp. 196-206
    • Cordy, J.R.1
  • 7
    • 56749132226 scopus 로고    scopus 로고
    • Cloning considered harmful considered harmful: Patterns of cloning in software
    • 10.1007/s10664-008-9076-6
    • C. Kapser and M. Godfrey. Cloning considered harmful considered harmful: patterns of cloning in software. Empirical Software Engineering, 13:645-692, 2008. 10.1007/s10664-008-9076-6.
    • (2008) Empirical Software Engineering , vol.13 , pp. 645-692
    • Kapser, C.1    Godfrey, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.