共 18 条
[1]
[2]
Sel-fprotecting mobile agents obfuscationtechnique evaluation report..Lee B;Larry D;..2002,
[3]
Software Complexity.Crosstalk..McCabe;Thomas J;Arthur H;.Journal of Defense Software Engineering.1994, 12
[4]
编译原理.[M].陈意云;张昱[编著];.高等教育出版社.2003,
[5]
Flow-insensitive type qualifiers
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
2006, 28 (06)
:1035-1087
[6]
Operator Algebras and the Operational Semantics of Probabilistic Languages.[J].Alessandra Di Pierro.Electronic Notes in Theoretical Computer Science.2006,
[8]
Constructive design of a hierarchy of semantics of a transition system by abstract interpretation.[J].Patrick Cousot.Theoretical Computer Science.2002, 1
[9]
Computable Banach spaces via domain theory.[J].Abbas Edalat;Philipp Sünderhauf.Theoretical Computer Science.1999, 1
[10]
Computer virus-antivirus coevolution.[J].Carey Nachenberg.Communications of the ACM.1997, 1

