Latest version: v0.1.2
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
This program evaluates loop programs as described in the lecture 'Grundlagen der theoretischen Informatik 2'.
No known vulnerabilities found