Author:
Curatelli Francesco,Mangeruca Leonardo
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Control and Optimization,Computer Networks and Communications,Computer Science Applications,Modeling and Simulation,Control and Systems Engineering
Reference19 articles.
1. Abd-El-Hafiz, S.K. and Basili, V.R. 1996. A knowledge-based approach to the analysis of loops. IEEE Transactions on Software Engineering 22(5): 339–360.
2. Basu, S. and Misra, J. 1975. Proving loop programs. IEEE Transactions on Software Engineering 1(1): 76–86.
3. Bini, D.A., Daddi, F. and Gemignani L. 2004. On the shifted QR iteration applied to companion matrices. Electronic Transactions on Numerical Analysis 8: 137–152.
4. Caplain, M. 1975. Finding invariant assertions for proving programs. In Proceedings of the International Conference on Reliable Software Los Angeles, U.S.A., pp. 165–171.
5. Dunlop, D.D. and Basili, V.R. 1984. A heuristic for deriving loop functions. IEEE Transactions on Software Engineering 10(3): 275–285.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The general model of secure computation system;Proceedings of the 8th International Conference on Security of Information and Networks;2015-09-08
2. A hybrid approach for resource-based comparison of adaptable Java applications;Science of Computer Programming;2013-08