共 28 条
[1]
Ernst G(2015)KIV: overview and verifyThis competition Int. J. Softw. Tools Technol. Transf. 17 677-694
[2]
Pfähler J(2014)Rigorous examination of reactive systems Int. J. Softw. Tools Technol. Transf. 16 457-464
[3]
Schellhorn G(2015)Verifythis 2012 Int. J. Softw. Tools Technol. Transf. 17 647-657
[4]
Haneberg D(1979)A technique for implementing backtrack algorithms and its application Inf. Process. Lett. 8 174-175
[5]
Reif W(2015)Frama-C: a software analysis perspective Formal Asp. Comput. 27 573-609
[6]
Howar F(2013)Secure distributed programming with value-dependent types J. Funct. Program. 23 402-451
[7]
Isberner M(2008)A parallel extended GCD algorithm J. Discret. Algorithms 6 526-538
[8]
Merten M(undefined)undefined undefined undefined undefined-undefined
[9]
Steffen B(undefined)undefined undefined undefined undefined-undefined
[10]
Beyer D(undefined)undefined undefined undefined undefined-undefined