Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Journal Article
%1 journals/smr/CeccatoLC14
%A Ceccato, Mariano
%A Li, Zheng
%A Cordy, James R.
%D 2014
%J Journal of Software: Evolution and Process
%K dblp
%N 6
%P 531-532
%T Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012.
%U http://dblp.uni-trier.de/db/journals/smr/smr26.html#CeccatoLC14
%V 26
@article{journals/smr/CeccatoLC14,
added-at = {2018-12-05T00:00:00.000+0100},
author = {Ceccato, Mariano and Li, Zheng and Cordy, James R.},
biburl = {https://puma.ub.uni-stuttgart.de/bibtex/245249d8619d923d1e79db3b682133f02/dblp},
ee = {https://doi.org/10.1002/smr.1655},
interhash = {9b8de32f2b8cc24649a6b19ae20e0304},
intrahash = {45249d8619d923d1e79db3b682133f02},
journal = {Journal of Software: Evolution and Process},
keywords = {dblp},
number = 6,
pages = {531-532},
timestamp = {2019-09-27T07:38:18.000+0200},
title = {Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012.},
url = {http://dblp.uni-trier.de/db/journals/smr/smr26.html#CeccatoLC14},
volume = 26,
year = 2014
}