共 80 条
[71]
Smaragdakis Y, 2011, LECT NOTES COMPUT SC, V6702, P245
[72]
Report: Datalog with Recursive Aggregation for Incremental Program Analyses (Extended Abstract)
[J].
ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE,
2020, (325)
[73]
Torlak Emina, 2013, ACM S NEW ID PROGR R, P135, DOI [DOI 10.1145/2509578.2509586, DOI 10.1145/2509578]
[74]
SECURIFY: Practical Security Analysis of Smart Contracts
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:67-82
[75]
Uhler Richard, 2013, Computer Aided Verification. 25th International Conference, CAV 2013. Proceedings. LNCS 8044, P678, DOI 10.1007/978-3-642-39799-8_45
[77]
NEGATION AS FAILURE USING TIGHT DERIVATIONS FOR GENERAL LOGIC PROGRAMS
[J].
JOURNAL OF LOGIC PROGRAMMING,
1989, 6 (1-2)
:109-133
[79]
Whaley J, 2005, LECT NOTES COMPUT SC, V3780, P97