Academic literature on the topic 'Invocation sequence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Invocation sequence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Invocation sequence"
Zhao, Yue, Yarang Yang, Bo Tian, and Tianyi Zhang. "An Invocation Chain Test and Evaluation Method for Fog Computing." Wireless Communications and Mobile Computing 2020 (August 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/8812017.
Full textStankiewicz, David. "When He would Compose from Fragments a World Perfect at Last: Theology and Poetics in Czeslaw Milosz's "From the Rising of the Sun"." Religion and the Arts 9, no. 3-4 (2005): 284–312. http://dx.doi.org/10.1163/156852905775008840.
Full textNarmour, Eugene. "Music Expectation by Cognitive Rule-Mapping." Music Perception 17, no. 3 (2000): 329–98. http://dx.doi.org/10.2307/40285821.
Full textGinat, David. "Mathematical operators and ways of reasoning." Mathematical Gazette 89, no. 514 (2005): 7–14. http://dx.doi.org/10.1017/s0025557200176582.
Full textJurinová, J. "Performance improvement of using lambda expressions with new features of Java 8 vs. other possible variants of iterating over ArrayList in Java." Journal of Applied Mathematics, Statistics and Informatics 14, no. 1 (2018): 103–31. http://dx.doi.org/10.2478/jamsi-2018-0007.
Full textWang, Qian, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng, Darryl N. Davis, and Changzhen Hu. "Security Feature Measurement for Frequent Dynamic Execution Paths in Software System." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/5716878.
Full textChen, Jinfu, Patrick Kwaku Kudjo, Zufa Zhang, et al. "A Modified Similarity Metric for Unit Testing of Object-Oriented Software Based on Adaptive Random Testing." International Journal of Software Engineering and Knowledge Engineering 29, no. 04 (2019): 577–606. http://dx.doi.org/10.1142/s0218194019500244.
Full textHeritage, John. "The ubiquity of epistemics: A rebuttal to the ‘epistemics of epistemics’ group." Discourse Studies 20, no. 1 (2018): 14–56. http://dx.doi.org/10.1177/1461445617734342.
Full textGoodman, S., A. Crane, M. Krabbendam, A. G. Leslie, and A. Ruffell. "Correlation of depositional sequences in a structurally complex area: the Dalradian of Glenn Fearnach to Glen Shee, Scotland." Transactions of the Royal Society of Edinburgh: Earth Sciences 87, no. 4 (1996): 503–13. http://dx.doi.org/10.1017/s0263593300018162.
Full textЭйделькинд, Яков. "Song of Songs 8, 13-14: A Commentary." Библия и христианская древность, no. 4(4) (December 16, 2019): 163–202. http://dx.doi.org/10.31802/2658-4476-2019-4-4-163-202.
Full textDissertations / Theses on the topic "Invocation sequence"
Dahlberg, Robert. "THE PROGRAM PATHING TRUST MODEL FOR CRITICAL SYSTEM PROCESS AUTHORIZATION." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/237.
Full textBook chapters on the topic "Invocation sequence"
Shim, Yu Jin, TaeGuen Kim, and Eul Gyu Im. "A Study on Similarity Calculation Method for API Invocation Sequences." In Rough Sets and Knowledge Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25754-9_43.
Full textChristou, Ioannis T., Sofoklis Efremidis, and Aikaterini Roukounaki. "A CASE Tool for Java Mobile Computing Applications." In Advancing the Next-Generation of Mobile Computing. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0119-2.ch014.
Full textConference papers on the topic "Invocation sequence"
Oyamada, Masafumi, Hideyuki Kawashima, and Hiroyuki Kitagawa. "Efficient Invocation of Transaction Sequences Triggered by Data Streams." In 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. IEEE, 2011. http://dx.doi.org/10.1109/3pgcic.2011.63.
Full textGhaleb, Taher Ahmed, Khalid Aljasser, and Musab A. Alturki. "Enhanced Visualization of Method Invocations by Extending Reverse-engineered Sequence Diagrams." In 2020 Working Conference on Software Visualization (VISSOFT). IEEE, 2020. http://dx.doi.org/10.1109/vissoft51673.2020.00010.
Full textSalah, M., T. Denton, S. Mancoridis, A. Shokoufandeh, and F. I. Vokolos. "Scenariographer: a tool for reverse engineering class usage scenarios from method invocation sequences." In 21st IEEE International Conference on Software Maintenance (ICSM'05). IEEE, 2005. http://dx.doi.org/10.1109/icsm.2005.78.
Full text