Monter d'un niveau |
Gauthier, F., Letarte, D., Lavoie, T., & Merlo, E. (juillet 2011). Extraction and comprehension of moodle's access control model: A case study [Communication écrite]. 9th Annual International Conference on Privacy, Security and Trust, Montréal, Québec. Lien externe
Lavoie, T., & Merlo, E. (juin 2012). An accurate estimation of the Levenshtein distance using metric trees and Manhattan distance [Communication écrite]. 6th International Workshop on Software Clones (IWSC 2012), Zurich, Switzerland. Lien externe
Merlo, E., Lavoie, T., Potvin, P., & Busnel, P. (mai 2013). Large scale multi-language clone analysis in a telecommunication industrial setting [Communication écrite]. 7th International Workshop on Software Clones (IWSC 2013), San Francisco, CA, USA. Lien externe
Merlo, E., & Lavoie, T. (octobre 2009). Computing structural types of clone syntactic blocks [Communication écrite]. 16th Working Conference on Reverse Engineering, Lille, France. Lien externe