Login / Signup

Implementation and Verification of Implicit-Invocation Systems Using Source Transformation.

Hongyu ZhangJeremy S. BradburyJames R. CordyJürgen Dingel
Published in: SCAM (2005)
Keyphrases