Citations
The paper
has been cited by the following works.
- R.G. Shirey, K.M.
Hopkinson, K.E. Stewart, D.D. Hodson, and B.J. Borghetti.
Analysis of implementations to secure git for use as an encrypted distributed
version control system.
In 48th Annual Hawaii International Conference on System Sciences, HICSS
2015, volume 2015-March, pages 5310–5319. IEEE Computer Society,
2015.
(doi:10.1109/HICSS.2015.625)
- K. Tabata, H. Tanno,
and M. Oinuma.
Helping testers by fault-prone functionality prediction.
In 10th Asia-Pacific Symposium on Information and Telecommunication
Technologies, APSITT 2015, pages 94–96. Institute of Electrical and
Electronics Engineers Inc., 2015.
(doi:10.1109/APSITT.2015.7217084)
- C. Vitolo,
Y. Elkhatib, D. Reusser, C.J.A. Macleod, and W. Buytaert.
Web technologies for environmental big data.
Environmental Modelling and Software, 63:185–198, 2015.
(doi:10.1016/j.envsoft.2014.10.007)
- W. Wang,
G. Poo-Caamaño, E. Wilde, and D.M. German.
What is the GIST? understanding the use of public gists on GitHub.
In 12th Working Conference on Mining Software Repositories, MSR
2015, volume 2015-August, pages 314–323. IEEE Computer Society, 2015.
(doi:10.1109/MSR.2015.36)
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.