Your selections:
Detecting infeasible branches based on code patterns
- Ding, Sun, Zhang, Hongyu, Tan, Hee Beng Kuan
Checking enforcement of integrity constraints in database applications based on code patterns
- Zhang, Hongyu, Tan, Hee Beng Kuan, Zhang, Lu, Lin, Xi, Wang, Xiaoyin, Zhang, Chun, Mei, Hongen
Are you sure you would like to clear your session, including search history and login status?