Theoretical Analysis of git bisect

Saved in:
Bibliographic Details
Published inLecture notes in computer science
Format Book Chapter
LanguageEnglish
Online AccessGet full text
ISSN1611-3349
0302-9743
DOI10.1007/978-3-031-20624-5_10

Cover

BookMark eNotz71OwzAUhmEPZSiFO2CIxGw49onteKwq_qRKLGW2jmOnteQmVRKEcjdcC1dGCp3e7dP3XLNF27WRsTsBDwLAPFpTceSAgkvQsuTKCViwpdBCcMTSLtn97hC7Po6pplysW8rTkIaia36-92ksfBpiPd6wq4byEG8vXbGP56fd5pVv31_eNustP6DEkXtFEkhghcEG9Gg9aBV0GYyAxqoIMZYeQJLUvibTWDPHS1t5bUONCldM_e9-tieavihnd-rTkfppvu3OIDeDHLoZ5P5A7gzCX6YPQ_U
ContentType Book Chapter
DBID ABOKW
UNPAY
DOI 10.1007/978-3-031-20624-5_10
DatabaseName Unpaywall for CDI: Monographs and Miscellaneous Content
Unpaywall
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10.1007/978-3-031-20624-5_10
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ABOKW
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
UNPAY
VI1
~02
ID FETCH-LOGICAL-h323t-b5a20a1383d9d3b39b065d64d710f95e0ee4b002a26bca7f97bcab298b69dc353
IEDL.DBID UNPAY
ISSN 1611-3349
0302-9743
IngestDate Wed Aug 20 05:45:09 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-h323t-b5a20a1383d9d3b39b065d64d710f95e0ee4b002a26bca7f97bcab298b69dc353
OpenAccessLink https://proxy.k.utb.cz/login?url=https://www.researchsquare.com/article/rs-2621606/latest.pdf
ParticipantIDs unpaywall_primary_10_1007_978_3_031_20624_5_10
PublicationTitle Lecture notes in computer science
Score 2.0450218
SourceID unpaywall
SourceType Open Access Repository
Title Theoretical Analysis of git bisect
URI https://www.researchsquare.com/article/rs-2621606/latest.pdf
UnpaywallVersion acceptedVersion
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LSgMxFA21XQgu6hMVlQHdpo-8pgE3IpYiWFy0UBcy5GnFMq3tFNGv8Vv8Mm-cGS3udJVVwuXMTXKSuecEoTMnmDQxF1hr08JMKIGl4RRzSmINOWIECwLnm77oDdn1iI8q6LzUwoSyysLmZrx4BpTyK6UCxuZ8gYkgbWDdzUngYhC19WuoJjgw8SqqDfu3F3f5jwOCZVFfL4JTH2VyRTmXFwVAQkOWCMIwT4KEdn2ZztTri5pMVvaYbh3dl9HlpSVPjWWmG-btl3Hjf8PfRBtB1xAFwQFguYUqLt1G9fJVh6iY5DvodPCjbYxKz5Jo6j_eHx6zSD8uYIncRcPu1eCyh4unFPCYEpphzRVpqTYcR620VFOpgXpYwSwQDC-5aznHwn6tiNBGxV7G0GgiO1pIayine6iaTlO3jyIlhSdeWGKVZsY75ZSm3sUdFwsY2BygxjeMySy3zEhKc2TAPaEJ4J584Z4E3A__2uEIVbP50h0DG8j0SfHRPwFCBrU_
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LSgMxFA21XQgu6hMVlQHdpo-8pgE3IpYiWFy0UBcy5GnFMq3tFNGv8Vv8Mm-cGS3udJVVwuXMTXKSuecEoTMnmDQxF1hr08JMKIGl4RRzSmINOWIECwLnm77oDdn1iI8q6LzUwoSyysLmZrx4BpTyK6UCxuZ8gYkgbWDdzUngYhC19WuoJjgw8SqqDfu3F3f5jwOCZVFfL4JTH2VyRTmXFwVAQkOWCMIwT4KEdn2ZztTri5pMVvaYbh3dl9HlpSVPjWWmG-btl3Hjf8PfRBtB1xAFwQFguYUqLt1G9fJVh6iY5DvodPCjbYxKz5Jo6j_eHx6zSD8uYIncRcPu1eCyh4unFPCYEpphzRVpqTYcR620VFOpgXpYwSwQDC-5aznHwn6tiNBGxV7G0GgiO1pIayine6iaTlO3jyIlhSdeWGKVZsY75ZSm3sUdFwsY2BygxjeMySy3zEhKc2TAPaEJ4J584Z4E3A__2uEIVbP50h0DG8j0SfHRPwFCBrU_
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Lecture+notes+in+computer+science&rft.atitle=Theoretical+Analysis+of%C2%A0git+bisect&rft.issn=1611-3349&rft_id=info:doi/10.1007%2F978-3-031-20624-5_10&rft.externalDocID=10.1007%2F978-3-031-20624-5_10
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1611-3349&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1611-3349&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1611-3349&client=summon