Author:
Baxter I.D.,Yahin A.,Moura L.,Sant'Anna M.,Bier L.
Cited by
480 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Revealing Hidden Threats: An Empirical Study of Library Misuse in Smart Contracts;Proceedings of the 46th IEEE/ACM International Conference on Software Engineering;2024-02-06
2. Beyond Accuracy: An Empirical Study on Unit Testing in Open-source Deep Learning Projects;ACM Transactions on Software Engineering and Methodology;2023-12-20
3. Associations between Computational Thinking and Figural, Verbal Creativity;Thinking Skills and Creativity;2023-12
4. Scalable Program Clone Search through Spectral Analysis;Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2023-11-30
5. C³: Code Clone-Based Identification of Duplicated Components;Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2023-11-30