Last update: Sun Apr 28 02:05:21 MDT 2019
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Basit:2009:DMA,
author = "H. A. Basit and S. Jarzabek",
title = "A Data Mining Approach for Detecting Higher-Level
Clones in Software",
journal = j-IEEE-TRANS-SOFTW-ENG,
volume = "35",
number = "4",
pages = "497--514",
month = jul # "\slash " # aug,
year = "2009",
CODEN = "IESEDJ",
DOI = "https://doi.org/10.1109/TSE.2009.16",
ISSN = "0098-5589 (print), 1939-3520 (electronic)",
ISSN-L = "0098-5589",
bibdate = "Thu Feb 1 11:00:42 MST 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2000.bib",
URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4796208",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Software Engineering",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}
Related entries
- approach,
26(1)15,
26(4)315,
26(4)362,
26(6)484,
26(12)1147,
26(12)1168,
27(3)228,
27(4)337,
28(11)1085,
29(1)63,
29(2)116,
29(9)782,
30(12)993,
31(1)52,
31(3)226,
31(7)551,
31(8)643,
31(12)1028,
32(3)140,
32(7)503,
32(10)831,
32(11)849,
32(12)952,
33(3)157,
33(12)800,
34(3)377,
34(5)633,
34(5)667,
35(4)515,
35(5)638,
35(6)825
- clone,
28(7)654,
31(10)804,
33(9)577,
33(9)608
- data,
26(3)227,
26(6)567,
26(10)959,
27(1)1,
27(3)193,
27(9)788,
27(10)890,
27(11)987,
27(11)999,
27(12)1085,
28(7)625,
28(10)997,
29(4)290,
30(6)403,
30(11)754,
30(12)993,
31(2)116,
31(3)187,
31(12)1074,
32(11)849,
32(12)931,
32(12)988,
33(1)2,
33(9)635,
33(9)637,
34(1)50,
35(4)484,
35(4)534
- detecting,
31(11)955,
33(5)330
- mining,
30(9)574,
30(10)712,
31(6)426,
31(6)429,
31(6)466,
32(2)69,
33(1)2,
33(9)635,
33(9)637,
34(5)579,
34(5)651