共 50 条
- [41] A secure run of an untrusted program code in the PIVO system 1600, Electrotechnical Society of Slovenia (88): : 54 - 60
- [42] Certifying compilation and run-time code generation Higher-Order and Symbolic Computation, 1999, 12 (04): : 337 - 375
- [43] Harpy: Run-time Code Generation in Haskell HASKELL'07: PROCEEDINGS OF THE ACM SIGPLAN 2007 HASKELL WORKSHOP, 2007, : 94 - 94
- [44] Reusing and Converting Code Clones to Aspects - An Algorithmic Approach 2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 9 - 16
- [47] Chain code histograms for rotation invariance 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 1, 2014, : 190 - 193
- [49] Chain Code Methods for Hexagonal Grids Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University, 2019, 44 (11): : 1700 - 1707