Proceedings Sixth IEEE International Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 2006. bibtex @book{
title = {Proceedings Sixth IEEE International Conference on Source Code Analysis and Manipulation (SCAM)},
type = {book},
year = {2006},
identifiers = {[object Object]},
publisher = {IEEE},
editors = {[object Object],[object Object]},
id = {35991680-fa97-324a-b1fe-114e38ae7429},
created = {2013-02-15T10:27:42.000Z},
file_attached = {false},
profile_id = {6670f279-692b-3eed-bc36-b89af19ad6e0},
last_modified = {2016-07-03T12:24:43.000Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {true},
hidden = {false},
citation_key = {scam06a},
source_type = {proceedings},
bibtype = {book},
author = {}
}
Downloads: 0
{"_id":"Cm8uJcugCkgx5zzRy","bibbaseid":"proceedingssixthieeeinternationalconferenceonsourcecodeanalysisandmanipulationscam-2006","downloads":0,"creationDate":"2015-08-12T16:27:09.782Z","title":"Proceedings Sixth IEEE International Conference on Source Code Analysis and Manipulation (SCAM)","author_short":[],"year":2006,"bibtype":"book","biburl":null,"bibdata":{"title":"Proceedings Sixth IEEE International Conference on Source Code Analysis and Manipulation (SCAM)","type":"book","year":"2006","identifiers":"[object Object]","publisher":"IEEE","editors":"[object Object],[object Object]","id":"35991680-fa97-324a-b1fe-114e38ae7429","created":"2013-02-15T10:27:42.000Z","file_attached":false,"profile_id":"6670f279-692b-3eed-bc36-b89af19ad6e0","last_modified":"2016-07-03T12:24:43.000Z","read":false,"starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"scam06a","source_type":"proceedings","bibtype":"book","author":[],"bibtex":"@book{\n title = {Proceedings Sixth IEEE International Conference on Source Code Analysis and Manipulation (SCAM)},\n type = {book},\n year = {2006},\n identifiers = {[object Object]},\n publisher = {IEEE},\n editors = {[object Object],[object Object]},\n id = {35991680-fa97-324a-b1fe-114e38ae7429},\n created = {2013-02-15T10:27:42.000Z},\n file_attached = {false},\n profile_id = {6670f279-692b-3eed-bc36-b89af19ad6e0},\n last_modified = {2016-07-03T12:24:43.000Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {scam06a},\n source_type = {proceedings},\n bibtype = {book},\n author = {}\n}","author_short":[],"bibbaseid":"proceedingssixthieeeinternationalconferenceonsourcecodeanalysisandmanipulationscam-2006","role":"author","urls":{},"downloads":0},"search_terms":["proceedings","sixth","ieee","international","conference","source","code","analysis","manipulation","scam"],"keywords":[],"authorIDs":[]}