Author:
Butler Simon,Wermelinger Michel,Yu Yijun,Sharp Helen
Cited by
57 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The broken windows theory applies to technical debt;Empirical Software Engineering;2024-05-24
2. Teachers' Beliefs and Practices on the Naming of Variables in Introductory Python Programming Courses;Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training;2024-04-14
3. AdaptivePaste: Intelligent Copy-Paste in IDE;Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2023-11-30
4. Just-In-Time Method Name Updating With Heuristics and Neural Model;2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security (QRS);2023-10-22
5. Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java;Journal of Systems and Software;2023-08