Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 438-441.
Previous Articles Next Articles
ZHANG Guang-mei and LI Jing-xia
[1] Wikipedia.Memory leak.http://en.wikipedia.org/wiki/Memory leak,2012-11-09 [2] Clause J,Orso A.Leakpoint:Pinpointing the Causes of Memory Leaks[C]∥International Conference on Software Engineering,2010.Cape Town,ACM New York,2010:515-224 [3] Distefano D,Filipovi’c I.Memory Leaks Detection in Java by Bi-Abductive Inference[C]∥Fundamental Approaches to Software Engineering,2010.Paphos,Cyprus,2010:278-292 [4] 刘伟.设计模式[M].北京:清华大学出版社,2011:186 [5] Reynolds J C.Separation Logic:A Logic for Shared Mutable Data Structures[C]∥17th IEEE Symposium on Logic in Computer Science,2002.Los Alamitos,IEEE Computer Society,2002:55-74 [6] 黄达明,曾庆凯.基于分离逻辑的程序验证技术[J].软件学报,2009,20(8):2051-2016 [7] Reynolds J C.An Overview of Separation Logic[M]∥Meyer B,Woodcock J.Verified Software:Theories,Tools,Experiments.Berlin Heidelberg,Springer,2008:460-469 [8] http://zh.wikipedia.org/wiki/霍尔逻辑 |
No related articles found! |
|