共 21 条
[1]
ABRAHAM ITTAI, ONLINE DETECTION E E
[2]
Suggesting Accurate Method and Class Names
[J].
2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS,
2015,
:38-49
[3]
Learning Natural Coding Conventions
[J].
22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014),
2014,
:281-293
[4]
[Anonymous], 2013, P 9 JOINT M EUR SOFT
[5]
[Anonymous], 1999, FDN STAT NATURAL LAN
[6]
[Anonymous], CONSULTED
[7]
A Survey of Attacks on Ethereum Smart Contracts (SoK)
[J].
PRINCIPLES OF SECURITY AND TRUST (POST 2017),
2017, 10204
:164-186
[8]
Formal Verification of Smart Contracts Short Paper
[J].
PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS'16),
2016,
:91-96
[9]
ConsenSys, 2018, SOL PARS JAV
[10]
Ethereum Foundation, 2018, SOL CONTR OR PROGR L