Login / Signup

Checking enforcement of integrity constraints in database applications based on code patterns.

Hongyu ZhangHee Beng Kuan TanLu ZhangXi LinXiaoyin WangChun ZhangHong Mei
Published in: J. Syst. Softw. (2011)
Keyphrases