共 9 条
[1]
[Anonymous], 2010, Statistical Machine Translation
[2]
Chow K., 1996, ICSM 96
[3]
Dagenais B, 2008, ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, P481, DOI 10.1145/1368088.1368154
[4]
Henkel J, 2005, PROC INT CONF SOFTW, P274
[5]
Meng S., 2012, ICSE 12
[6]
Graph-based Mining of Multiple Object Usage Patterns
[J].
7TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING,
2009,
:383-392
[7]
Nita Marius, 2010, P 32 ACM IEEE INT C, V1, P205
[8]
A Method for Spatially Explicit Assessment of Potential Risks of Food Insecurity
[J].
INTERNATIONAL CONFERENCE ON AGRICULTURAL RISK AND FOOD SECURITY 2010,
2010, 1
:325-333
[9]
Zhong Hao, 2010, P 32 ACM IEEE INT C, V1, P195, DOI [DOI 10.1145/1806799.1806831, 10.1145/1806799.1806831]