Academic literature on the topic 'Invocation sequence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Invocation sequence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Invocation sequence"

1

Zhao, Yue, Yarang Yang, Bo Tian, and Tianyi Zhang. "An Invocation Chain Test and Evaluation Method for Fog Computing." Wireless Communications and Mobile Computing 2020 (August 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/8812017.

Full text
Abstract:
In this paper, an invocation chain technology is used to test the security of fog computing systems. Atomic attacks based on the attack graph are combined according to the type, time sequence, and causal relationship. Different test sequences have gone through according to the principle of depth-first. In addition, the vulnerability assessment based on an invocation chain is evaluated to verify whether it can detect existing or unknown vulnerability in fog computing systems. Finally, the experimental results show that the invocation chain test and evaluation method based on the attack graph ca
APA, Harvard, Vancouver, ISO, and other styles
2

Stankiewicz, David. "When He would Compose from Fragments a World Perfect at Last: Theology and Poetics in Czeslaw Milosz's "From the Rising of the Sun"." Religion and the Arts 9, no. 3-4 (2005): 284–312. http://dx.doi.org/10.1163/156852905775008840.

Full text
Abstract:
AbstractThis essay considers the place of religious and theological thought in the work of 20th century Nobel Laureate, Czeslaw Milosz (1911–2004). In a manner unique in contemporary world literature, Milosz approached and utilized these realms as a means to formulate and examine questions that are both timely and timeless. Focusing on sections I, II, and VII of the long poem-sequence, "From the Rising of the Sun," (along with discussions of other key poems and texts) the essay explores the dynamic interplay between theological thought and poetic craft in Milosz's work. Section I, "The Unveili
APA, Harvard, Vancouver, ISO, and other styles
3

Narmour, Eugene. "Music Expectation by Cognitive Rule-Mapping." Music Perception 17, no. 3 (2000): 329–98. http://dx.doi.org/10.2307/40285821.

Full text
Abstract:
Iterative rules appear everywhere in music cognition, creating strong expectations. Consequently, denial of rule projection becomes an important compositional strategy, generating numerous possibilities for musical affect. Other rules enter the musical aesthetic through reflexive game playing. Still other kinds are completely constructivist in nature and may be uncongenial to cognition, requiring much training to be recognized, if at all. Cognitive rules are frequently found in contexts of varied repetition (AA), but they are not necessarily bounded by stylistic similarity. Indeed, rules may b
APA, Harvard, Vancouver, ISO, and other styles
4

Ginat, David. "Mathematical operators and ways of reasoning." Mathematical Gazette 89, no. 514 (2005): 7–14. http://dx.doi.org/10.1017/s0025557200176582.

Full text
Abstract:
Given a mathematical operator, how should one reason about the outcome of its repeated invocation? This question is relevant in both mathematics and computer science, where iterative operator invocations are core, algorithmic elements.An initial approach, which one may naturally follow, is to try the operator in diverse situations, observe the results, and suggest a general outcome. Such an approach embodies operational reasoning, where inference derives from ‘behaviours’ of invocation sequences. This may indeed reveal some behavioural characteristics, but is it sufficient for rigorous argumen
APA, Harvard, Vancouver, ISO, and other styles
5

Jurinová, J. "Performance improvement of using lambda expressions with new features of Java 8 vs. other possible variants of iterating over ArrayList in Java." Journal of Applied Mathematics, Statistics and Informatics 14, no. 1 (2018): 103–31. http://dx.doi.org/10.2478/jamsi-2018-0007.

Full text
Abstract:
Abstract A fluent programming is the programming technique where operations return a value that allows the invocation of another operation. With the fluent programming, it is perfectly natural to end up with one huge statement that is the concatenation of as many operations as you like. The Java Development Kit (JDK) streams (added in Java 8) are designed to support fluent programming. Instead of looping over all elements in the sequence repeatedly (once for filter, then again for map, and eventually for toArray), the chain of filtermapper-collector can be applied to each element in just one p
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Qian, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng, Darryl N. Davis, and Changzhen Hu. "Security Feature Measurement for Frequent Dynamic Execution Paths in Software System." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/5716878.

Full text
Abstract:
The scale and complexity of software systems are constantly increasing, imposing new challenges for software fault location and daily maintenance. In this paper, the Security Feature measurement algorithm of Frequent dynamic execution Paths in Software, SFFPS, is proposed to provide a basis for improving the security and reliability of software. First, the dynamic execution of a complex software system is mapped onto a complex network model and sequence model. This, combined with the invocation and dependency relationships between function nodes, fault cumulative effect, and spread effect, can
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Jinfu, Patrick Kwaku Kudjo, Zufa Zhang, et al. "A Modified Similarity Metric for Unit Testing of Object-Oriented Software Based on Adaptive Random Testing." International Journal of Software Engineering and Knowledge Engineering 29, no. 04 (2019): 577–606. http://dx.doi.org/10.1142/s0218194019500244.

Full text
Abstract:
Finding an effective method for testing object-oriented software (OOS) has proven elusive in the software community due to the rapid development of object-oriented programming (OOP) technology. Although significant progress has been made by previous studies, challenges still exist in relation to the object distance measurement of OOS using Adaptive Random Testing (ART). This is partly due to the unique features of OOS such as encapsulation, inheritance and polymorphism. In a previous work, we proposed a new similarity metric called the Object and Method Invocation Sequence Similarity (OMISS) m
APA, Harvard, Vancouver, ISO, and other styles
8

Heritage, John. "The ubiquity of epistemics: A rebuttal to the ‘epistemics of epistemics’ group." Discourse Studies 20, no. 1 (2018): 14–56. http://dx.doi.org/10.1177/1461445617734342.

Full text
Abstract:
In 2016, Discourse Studies published a special issue on the ‘epistemics of epistemics’ comprising six papers, all of which took issue with a strand of my research on how knowledge claims are asserted, implemented and contested through facets of turn design and sequence organization. Apparently coordinated through some years of discussion, the critique is nonetheless somewhat confused and confusing. In this article, I take up some of more prominent elements of the critique: (a) my work is ‘cognitivist’ substituting causal psychological analysis for the classic conversation analytic (CA) focus o
APA, Harvard, Vancouver, ISO, and other styles
9

Goodman, S., A. Crane, M. Krabbendam, A. G. Leslie, and A. Ruffell. "Correlation of depositional sequences in a structurally complex area: the Dalradian of Glenn Fearnach to Glen Shee, Scotland." Transactions of the Royal Society of Edinburgh: Earth Sciences 87, no. 4 (1996): 503–13. http://dx.doi.org/10.1017/s0263593300018162.

Full text
Abstract:
ABSTRACTThe stratigraphy of the Neoproterozoic Dalradian Supergroup has been formalised at group, subgroup and formation level, based largely on mapping in the SW Highlands of Scotland. Elsewhere, there has been a tendency for the lithostratigraphy to be fitted into this framework, implying that the lithostratigraphy represents basin-wide changes in depositional environment. The pitfalls of this ‘layer-cake’ approach are illustrated by interpreting the geology of the Gleann Fearnach to Glen Shee area of the Central Highlands, using the published maps of the adjacent regions. Attempts to correl
APA, Harvard, Vancouver, ISO, and other styles
10

Эйделькинд, Яков. "Song of Songs 8, 13-14: A Commentary." Библия и христианская древность, no. 4(4) (December 16, 2019): 163–202. http://dx.doi.org/10.31802/2658-4476-2019-4-4-163-202.

Full text
Abstract:
Эта статья - развёрнутый комментарий к последним двум стихам Песни песней, которые рассматриваются здесь как отдельное стихотворение и как эпилог книги. Сначала приводится еврейский текст с переводом, затем - построчный комментарий, разбитый на две части: «Примечания к переводу» и «Аппарат и комментарий к тексту». Далее идёт глава «Стихотворная форма» и ряд глав, посвящённых центральным образам стихотворения, его жанру и композиционной роли в Песни песней: «Сад как место действия и как символ», «Серенада», «Серенада и молитва», «Прочь!», «Превращение в оленя», «Песн. 8, 13-14 как эпилог Песни
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Invocation sequence"

1

Dahlberg, Robert. "THE PROGRAM PATHING TRUST MODEL FOR CRITICAL SYSTEM PROCESS AUTHORIZATION." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/237.

Full text
Abstract:
Since computers are relied upon to run critical infrastructures – from nuclear power plants to electronic battlefield simulations – the concept of a “trusted” or tamperproof system has become even more important. Some applications have become so critical that it is imperative that they run as intended, without interference. The consequences of these systems not running as intended could be catastrophic. This research offers a solution for a key element for protecting these critical servers – validating process invocation sequences. The purpose of this research is to increase operating sys
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Invocation sequence"

1

Shim, Yu Jin, TaeGuen Kim, and Eul Gyu Im. "A Study on Similarity Calculation Method for API Invocation Sequences." In Rough Sets and Knowledge Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25754-9_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Christou, Ioannis T., Sofoklis Efremidis, and Aikaterini Roukounaki. "A CASE Tool for Java Mobile Computing Applications." In Advancing the Next-Generation of Mobile Computing. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0119-2.ch014.

Full text
Abstract:
The market for applications developed for mobile devices is growing as the hardware capabilities increase while costs drop. At the same time, the inability to write code once becomes a noticeable problem resulting in the time consuming task of porting an application to a variety of mobile devices, which is true for languages like Java that have been designed to be portable across a range of hardware platforms. As a result, porting a Java application written for one device to another is often a tedious and time-consuming task for developers. This paper presents an intelligent CASE tool that assists the porting of Java mobile applications by automatically generating Java code fragments for the target SDK. SeqFinder automatically generates all minimal method invocation sequences that lead to an object of a specific type, thus relieving the programmer of manually searching the manufacturer-provided SDK Java archives. However, this tool is not applicable only to the Java ME platform and has been used as a fast type-browser for J2SE/J2EE applications.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Invocation sequence"

1

Oyamada, Masafumi, Hideyuki Kawashima, and Hiroyuki Kitagawa. "Efficient Invocation of Transaction Sequences Triggered by Data Streams." In 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. IEEE, 2011. http://dx.doi.org/10.1109/3pgcic.2011.63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ghaleb, Taher Ahmed, Khalid Aljasser, and Musab A. Alturki. "Enhanced Visualization of Method Invocations by Extending Reverse-engineered Sequence Diagrams." In 2020 Working Conference on Software Visualization (VISSOFT). IEEE, 2020. http://dx.doi.org/10.1109/vissoft51673.2020.00010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Salah, M., T. Denton, S. Mancoridis, A. Shokoufandeh, and F. I. Vokolos. "Scenariographer: a tool for reverse engineering class usage scenarios from method invocation sequences." In 21st IEEE International Conference on Software Maintenance (ICSM'05). IEEE, 2005. http://dx.doi.org/10.1109/icsm.2005.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!