Your selections:
Understanding and predicting incident mitigation time
- Wang, Weijing, Chen, Junjie, Yang, Lin, Zhang, Hongyu, Wang, Zan
DreamLoc: A Deep Relevance Matching-Based Framework for bug Localization
- Qi, Binhang, Sun, Hailong, Yuan, Wei, Zhang, Hongyu, Meng, Xiangxin
Multi-level analysis of IEC 61131-3 languages to detect clones
- Jnanamurthy, H. K., Jetley, Raoul, Henskens, Frans, Paul, David, Wallis, Mark, Sudarsan, S. D.
Analysis of industrial control system software to detect semantic clones
- HK, Jnanamurthy, Jetley, Raoul, Henskens, Frans, Paul, David, Wallis, Mark, SD, Sudarsan
- Hogavanaghatta Kumaraswamy, Jnanamurthy, Henskens, Frans, Paul, David, Wallis, Mark
Predicting bug-fixing time: an empirical study of commercial software projects
- Zhang, Hongyu, Gong, Liang, Versteeg, Steve
Learning to rank duplicate bug reports
Are you sure you would like to clear your session, including search history and login status?