Sign in

What the Fork? Finding Hidden Code Clones in npm.

Elizabeth WyssLorenzo De CarliDrew Davidson
Published in: ICSE (2022)
Keyphrases
  • information technology
  • software engineering
  • data collection
  • integrity constraints
  • database technology