XIAO: tuning code clones at hands of engineers in practice. Dang, Y., Zhang, D., Ge, S., Chu, C., Qiu, Y., & Xie, T. In Proceedings of the 28th Annual Computer Security Applications Conference, pages 369--378, 2012. ACM. bibtex @InProceedings{dang2012xiao,
Title = {XIAO: tuning code clones at hands of engineers in practice},
Author = {Dang, Yingnong and Zhang, Dongmei and Ge, Song and Chu, Chengyun and Qiu, Yingjun and Xie, Tao},
Booktitle = {Proceedings of the 28th Annual Computer Security Applications Conference},
Year = {2012},
Organization = {ACM},
Pages = {369--378}
}
Downloads: 0
{"_id":"gYcY2WithebBBHA3o","bibbaseid":"dang-zhang-ge-chu-qiu-xie-xiaotuningcodeclonesathandsofengineersinpractice-2012","downloads":0,"creationDate":"2016-08-10T09:55:06.698Z","title":"XIAO: tuning code clones at hands of engineers in practice","author_short":["Dang, Y.","Zhang, D.","Ge, S.","Chu, C.","Qiu, Y.","Xie, T."],"year":2012,"bibtype":"inproceedings","biburl":"https://raw.githubusercontent.com/wiki/amitsealami/academia/files/1044_syllabusPaper.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"XIAO: tuning code clones at hands of engineers in practice","author":[{"propositions":[],"lastnames":["Dang"],"firstnames":["Yingnong"],"suffixes":[]},{"propositions":[],"lastnames":["Zhang"],"firstnames":["Dongmei"],"suffixes":[]},{"propositions":[],"lastnames":["Ge"],"firstnames":["Song"],"suffixes":[]},{"propositions":[],"lastnames":["Chu"],"firstnames":["Chengyun"],"suffixes":[]},{"propositions":[],"lastnames":["Qiu"],"firstnames":["Yingjun"],"suffixes":[]},{"propositions":[],"lastnames":["Xie"],"firstnames":["Tao"],"suffixes":[]}],"booktitle":"Proceedings of the 28th Annual Computer Security Applications Conference","year":"2012","organization":"ACM","pages":"369--378","bibtex":"@InProceedings{dang2012xiao,\n Title = {XIAO: tuning code clones at hands of engineers in practice},\n Author = {Dang, Yingnong and Zhang, Dongmei and Ge, Song and Chu, Chengyun and Qiu, Yingjun and Xie, Tao},\n Booktitle = {Proceedings of the 28th Annual Computer Security Applications Conference},\n Year = {2012},\n Organization = {ACM},\n Pages = {369--378}\n}\n\n","author_short":["Dang, Y.","Zhang, D.","Ge, S.","Chu, C.","Qiu, Y.","Xie, T."],"key":"dang2012xiao","id":"dang2012xiao","bibbaseid":"dang-zhang-ge-chu-qiu-xie-xiaotuningcodeclonesathandsofengineersinpractice-2012","role":"author","urls":{},"downloads":0},"search_terms":["xiao","tuning","code","clones","hands","engineers","practice","dang","zhang","ge","chu","qiu","xie"],"keywords":[],"authorIDs":[],"dataSources":["bnKwJ2FBxNZts9PRc"]}