共 41 条
[32]
Mauro T., 2019, NGINX ADOPTING MICRO
[33]
Mayrand J, 1996, INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, P244, DOI 10.1109/ICSM.1996.565012
[34]
SPACE-ECONOMICAL SUFFIX TREE CONSTRUCTION ALGORITHM
[J].
JOURNAL OF THE ACM,
1976, 23 (02)
:262-272
[35]
Ren J, 2018, 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING (ICSIP), P7, DOI 10.1109/SIPROCESS.2018.8600485
[36]
SourcererCC: Scaling Code Clone Detection to Big-Code
[J].
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE),
2016,
:1157-1168
[37]
Sulaiman N. H., 2012, 2012 IEEE Symposium on Humanities, Science and Engineering Research (SHUSER), P659, DOI 10.1109/SHUSER.2012.6268901
[39]
On Automated Role-Based Access Control Assessment in Enterprise Systems
[J].
INFORMATION SCIENCE AND APPLICATIONS,
2020, 621
:375-385
[40]
Walker Andrew, 2020, ACM SIGAPP APPL COMP, V19, P28, DOI DOI 10.1145/3381307.3381310