共 50 条
- [41] A metric-based approach to identifying refactoring opportunities for merging code clones in a Java']Java software system [J]. JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION-RESEARCH AND PRACTICE, 2008, 20 (06): : 435 - 461
- [42] MINIMUM COST ROUTING BASED RESTORATION IN MULTI-GRANULARITIES TRANSLUCENT WSON [J]. PROCEEDINGS OF THE 2010 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, AIAI2010, 2010, : 85 - 89
- [43] Detecting malicious Java']JavaScript code in Mozilla [J]. ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 85 - 94
- [44] Annotation-based Parallelization of Java']Java Code [J]. 2017 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2017, : 775 - 784
- [45] Recommendation Based on Java']Java Code Analysis and Search [J]. FUZZY SYSTEMS AND DATA MINING VI, 2020, 331 : 514 - 521
- [46] Model-based generation of Java']Java code [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 2811 - 2817
- [47] A JAVA']JAVA Code Generation Method based on XUML [J]. 2019 INTERNATIONAL CONFERENCE ON ADVANCED ELECTRONIC MATERIALS, COMPUTERS AND MATERIALS ENGINEERING (AEMCME 2019), 2019, 563
- [48] Detecting Vulnerable Java']Java Classes Based on the Analysis of Java']Java Library Call Graph [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1872 - 1879
- [49] You Look so Different: Finding Structural Clones and Subclones in Java']Java Source Code [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2021), 2021, : 70 - 80