Academic literature on the topic 'Invocation sequence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Invocation sequence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Invocation sequence"

1

Zhao, Yue, Yarang Yang, Bo Tian, and Tianyi Zhang. "An Invocation Chain Test and Evaluation Method for Fog Computing." Wireless Communications and Mobile Computing 2020 (August 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/8812017.

Full text
Abstract:
In this paper, an invocation chain technology is used to test the security of fog computing systems. Atomic attacks based on the attack graph are combined according to the type, time sequence, and causal relationship. Different test sequences have gone through according to the principle of depth-first. In addition, the vulnerability assessment based on an invocation chain is evaluated to verify whether it can detect existing or unknown vulnerability in fog computing systems. Finally, the experimental results show that the invocation chain test and evaluation method based on the attack graph can evaluate the system risk quantitatively rather than qualitatively by calculating comprehensive probability on all test sequences.
APA, Harvard, Vancouver, ISO, and other styles
2

Stankiewicz, David. "When He would Compose from Fragments a World Perfect at Last: Theology and Poetics in Czeslaw Milosz's "From the Rising of the Sun"." Religion and the Arts 9, no. 3-4 (2005): 284–312. http://dx.doi.org/10.1163/156852905775008840.

Full text
Abstract:
AbstractThis essay considers the place of religious and theological thought in the work of 20th century Nobel Laureate, Czeslaw Milosz (1911–2004). In a manner unique in contemporary world literature, Milosz approached and utilized these realms as a means to formulate and examine questions that are both timely and timeless. Focusing on sections I, II, and VII of the long poem-sequence, "From the Rising of the Sun," (along with discussions of other key poems and texts) the essay explores the dynamic interplay between theological thought and poetic craft in Milosz's work. Section I, "The Unveiling," introduces both the key themes the poem sequence explores (being and time, the meaning of history and individual lives, fall and redemption) as well as key poetic techniques (direct descriptive invocation and nuanced use of verb tense). Section II functions as a poetic embodiment of a particularly Miloszian, unorthodox "Manichaenism," an outlook that finds no basis for human values in the natural order of the world. Embedded in this section is a poetic gesture of hope that is more fully explored in Section VII. In this concluding section Milosz, using a full-range of poetic techniques ranging from the dramatic-narrative to the direct invocation of vanished reality, explores the heterodox theological concept of apokatastasis, or total restoration, as a gesture of profound hope that has theological, ethical, and aesthetic implications.
APA, Harvard, Vancouver, ISO, and other styles
3

Narmour, Eugene. "Music Expectation by Cognitive Rule-Mapping." Music Perception 17, no. 3 (2000): 329–98. http://dx.doi.org/10.2307/40285821.

Full text
Abstract:
Iterative rules appear everywhere in music cognition, creating strong expectations. Consequently, denial of rule projection becomes an important compositional strategy, generating numerous possibilities for musical affect. Other rules enter the musical aesthetic through reflexive game playing. Still other kinds are completely constructivist in nature and may be uncongenial to cognition, requiring much training to be recognized, if at all. Cognitive rules are frequently found in contexts of varied repetition (AA), but they are not necessarily bounded by stylistic similarity. Indeed, rules may be especially relevant in the processing of unfamiliar contexts (AB), where only abstract coding is available. There are many kinds of deduction in music cognition. Typical examples include melodic sequence, partial melodic sequence, and alternating melodic sequence (which produces streaming). These types may coexist in the musical fabric, involving the invocation of both simultaneous and nested rules. Intervallic expansion and reduction in melody also involve higherorder abstractions. Various mirrored forms in music entail rule-mapping as well, although these may be more difficult to perceive than their analogous visual symmetries. Listeners can likewise deduce additivity and subtractivity at work in harmony, tempo, texture, pace, and dynamics. Rhythmic augmentation and diminution, by contrast, rely on multiplication and division. The examples suggest numerous hypotheses for experimental research.
APA, Harvard, Vancouver, ISO, and other styles
4

Ginat, David. "Mathematical operators and ways of reasoning." Mathematical Gazette 89, no. 514 (2005): 7–14. http://dx.doi.org/10.1017/s0025557200176582.

Full text
Abstract:
Given a mathematical operator, how should one reason about the outcome of its repeated invocation? This question is relevant in both mathematics and computer science, where iterative operator invocations are core, algorithmic elements.An initial approach, which one may naturally follow, is to try the operator in diverse situations, observe the results, and suggest a general outcome. Such an approach embodies operational reasoning, where inference derives from ‘behaviours’ of invocation sequences. This may indeed reveal some behavioural characteristics, but is it sufficient for rigorous argumentation of the general outcome? Not quite.
APA, Harvard, Vancouver, ISO, and other styles
5

Jurinová, J. "Performance improvement of using lambda expressions with new features of Java 8 vs. other possible variants of iterating over ArrayList in Java." Journal of Applied Mathematics, Statistics and Informatics 14, no. 1 (2018): 103–31. http://dx.doi.org/10.2478/jamsi-2018-0007.

Full text
Abstract:
Abstract A fluent programming is the programming technique where operations return a value that allows the invocation of another operation. With the fluent programming, it is perfectly natural to end up with one huge statement that is the concatenation of as many operations as you like. The Java Development Kit (JDK) streams (added in Java 8) are designed to support fluent programming. Instead of looping over all elements in the sequence repeatedly (once for filter, then again for map, and eventually for toArray), the chain of filtermapper-collector can be applied to each element in just one pass over the sequence. In this context, we often encounter lambda expressions used to create locally defined anonymous functions. They provide a clear and concise way to represent one method interface using an expression. Oracle claims that use of lambda expressions also improve the collection libraries making it easier to iterate through, filter, and extract data from a collection. In addition, new concurrency features improve performance in multicore environments. There are multiple ways to traverse, iterate, or loop collection in Java. Therefore, to solve one problem, we have several options for solutions that differ by undeniably increasing of the code readability. Searching for answers to the question of whether these new features really bring performance benefits over conventional way, is the subject of this paper.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Qian, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng, Darryl N. Davis, and Changzhen Hu. "Security Feature Measurement for Frequent Dynamic Execution Paths in Software System." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/5716878.

Full text
Abstract:
The scale and complexity of software systems are constantly increasing, imposing new challenges for software fault location and daily maintenance. In this paper, the Security Feature measurement algorithm of Frequent dynamic execution Paths in Software, SFFPS, is proposed to provide a basis for improving the security and reliability of software. First, the dynamic execution of a complex software system is mapped onto a complex network model and sequence model. This, combined with the invocation and dependency relationships between function nodes, fault cumulative effect, and spread effect, can be analyzed. The function node security features of the software complex network are defined and measured according to the degree distribution and global step attenuation factor. Finally, frequent software execution paths are mined and weighted, and security metrics of the frequent paths are obtained and sorted. The experimental results show that SFFPS has good time performance and scalability, and the security features of the important paths in the software can be effectively measured. This study provides a guide for the research of defect propagation, software reliability, and software integration testing.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Jinfu, Patrick Kwaku Kudjo, Zufa Zhang, et al. "A Modified Similarity Metric for Unit Testing of Object-Oriented Software Based on Adaptive Random Testing." International Journal of Software Engineering and Knowledge Engineering 29, no. 04 (2019): 577–606. http://dx.doi.org/10.1142/s0218194019500244.

Full text
Abstract:
Finding an effective method for testing object-oriented software (OOS) has proven elusive in the software community due to the rapid development of object-oriented programming (OOP) technology. Although significant progress has been made by previous studies, challenges still exist in relation to the object distance measurement of OOS using Adaptive Random Testing (ART). This is partly due to the unique features of OOS such as encapsulation, inheritance and polymorphism. In a previous work, we proposed a new similarity metric called the Object and Method Invocation Sequence Similarity (OMISS) metric to facilitate multi-class level testing using ART. In this paper, we broaden the set of models in the metric (OMISS) by considering the method parameter and adding the weight in the metric to develop a new distance metric to improve unit testing of OOS. We used the new distance metric to calculate the distance between the set of objects and the distance between the method sequences of the test cases. Additionally, we integrate the new metric in unit testing with ART and applied it to six open source subject programs. The experimental result shows that the proposed method with method parameter considered in this study is better than previous methods without the method parameter in the case of the single method. Our finding further shows that the proposed unit testing approach is a promising direction for assisting software engineers who seek to improve the failure-detection effectiveness of OOS testing.
APA, Harvard, Vancouver, ISO, and other styles
8

Heritage, John. "The ubiquity of epistemics: A rebuttal to the ‘epistemics of epistemics’ group." Discourse Studies 20, no. 1 (2018): 14–56. http://dx.doi.org/10.1177/1461445617734342.

Full text
Abstract:
In 2016, Discourse Studies published a special issue on the ‘epistemics of epistemics’ comprising six papers, all of which took issue with a strand of my research on how knowledge claims are asserted, implemented and contested through facets of turn design and sequence organization. Apparently coordinated through some years of discussion, the critique is nonetheless somewhat confused and confusing. In this article, I take up some of more prominent elements of the critique: (a) my work is ‘cognitivist’ substituting causal psychological analysis for the classic conversation analytic (CA) focus on the normative accountability of social action, (b) my work devalues and indeed flouts basic tenets of CA methodology such as the ‘next-turn proof procedure’, (c) my analysis of epistemic stance introduces unwarranted themes of conflict and hostility into CA thinking, (d) various concepts that I have introduced involve the invocation of ‘hidden orders’ of social conduct that is inimical to the traditions of our field and (e) that my work rests on an unwarranted ‘informationism’ – the discredited idea that much of human interaction is driven by a need to traffic in information. In this rebuttal, I refute all of these commentaries and correct many other ancillary mistakes of representation and reasoning that inhabit these papers.
APA, Harvard, Vancouver, ISO, and other styles
9

Goodman, S., A. Crane, M. Krabbendam, A. G. Leslie, and A. Ruffell. "Correlation of depositional sequences in a structurally complex area: the Dalradian of Glenn Fearnach to Glen Shee, Scotland." Transactions of the Royal Society of Edinburgh: Earth Sciences 87, no. 4 (1996): 503–13. http://dx.doi.org/10.1017/s0263593300018162.

Full text
Abstract:
ABSTRACTThe stratigraphy of the Neoproterozoic Dalradian Supergroup has been formalised at group, subgroup and formation level, based largely on mapping in the SW Highlands of Scotland. Elsewhere, there has been a tendency for the lithostratigraphy to be fitted into this framework, implying that the lithostratigraphy represents basin-wide changes in depositional environment. The pitfalls of this ‘layer-cake’ approach are illustrated by interpreting the geology of the Gleann Fearnach to Glen Shee area of the Central Highlands, using the published maps of the adjacent regions. Attempts to correlate units into the Braemar area in the NE and into the Pitlochry area in the SW show considerable mismatch between the maps covering these areas, which has in the past led to invocation of geometrically unlikely arrangements of faults and slides to explain the lithostratigraphical distribution.The present study is the result of a different approach adopted during remapping of the Gleann Fearnach to Glen Shee area. Some basin-wide events, here suggested to be associated with key sequence stratigraphic surfaces, were identified. These principally relate to the deposition of Appin Quartzite, Boulder Bed and Ben Lawers Schist precursor sediments. Between these reference units the stratigraphy has been determined by detailed field mapping, and variation from the standard stratigraphy explained in terms of both the position within the depositional sequence and palaeogeography during deposition. This has led to an integrated solution which works on both sedimentological and structural grounds. There are local implications for the stratigraphy and structural geology elsewhere in the Scottish Dalradian, but, more importantly, it is an approach which must be more widely applied in order to make wider correlations beyond the British Dalradian to the rest of the Laurentian margin.
APA, Harvard, Vancouver, ISO, and other styles
10

Эйделькинд, Яков. "Song of Songs 8, 13-14: A Commentary." Библия и христианская древность, no. 4(4) (December 16, 2019): 163–202. http://dx.doi.org/10.31802/2658-4476-2019-4-4-163-202.

Full text
Abstract:
Эта статья - развёрнутый комментарий к последним двум стихам Песни песней, которые рассматриваются здесь как отдельное стихотворение и как эпилог книги. Сначала приводится еврейский текст с переводом, затем - построчный комментарий, разбитый на две части: «Примечания к переводу» и «Аппарат и комментарий к тексту». Далее идёт глава «Стихотворная форма» и ряд глав, посвящённых центральным образам стихотворения, его жанру и композиционной роли в Песни песней: «Сад как место действия и как символ», «Серенада», «Серенада и молитва», «Прочь!», «Превращение в оленя», «Песн. 8, 13-14 как эпилог Песни песней». В «Заключении» подводятся итоги и формулируются вопросы для дальнейшей дискуссии. The two final verses of the Song of Songs are read here as a separate poem, which is shown to depend largely on the tradition of paraclausithyron (ancient serenade). The topoi of this oral genre help explain some features of the poem usually considered to be difficult: the solemn invocation of the girl as «living in the gardens», the presence of the «friends» and, above all, the fact that the girl (contrary to what is said in many commentaries) does not invite the boy, but rather sends him away. Another important aspect of the poem is that it serves as an epilogue to the lyric sequence of Song of Songs. Thus the farewell of the girl to the boy corresponds, on a metapoetic level, to the farewell of the poet to the book and to the audience.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Invocation sequence"

1

Dahlberg, Robert. "THE PROGRAM PATHING TRUST MODEL FOR CRITICAL SYSTEM PROCESS AUTHORIZATION." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/237.

Full text
Abstract:
Since computers are relied upon to run critical infrastructures – from nuclear power plants to electronic battlefield simulations – the concept of a “trusted” or tamperproof system has become even more important. Some applications have become so critical that it is imperative that they run as intended, without interference. The consequences of these systems not running as intended could be catastrophic. This research offers a solution for a key element for protecting these critical servers – validating process invocation sequences. The purpose of this research is to increase operating system security by detecting, validating, and enforcing process invocation sequences within a critical system. If the processes on a critical system are not those that are intended to run or support the critical system, or if a system is able to run processes in an unauthorized sequence, then the system is compromised and cannot be trusted. This research uses a computational theory approach to create a framework for a solution for the process invocation sequence problem. Using the Program Pathing Trust Model, a solution capable of identifying both valid and invalid process invocation sequences is developed.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Invocation sequence"

1

Shim, Yu Jin, TaeGuen Kim, and Eul Gyu Im. "A Study on Similarity Calculation Method for API Invocation Sequences." In Rough Sets and Knowledge Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25754-9_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Christou, Ioannis T., Sofoklis Efremidis, and Aikaterini Roukounaki. "A CASE Tool for Java Mobile Computing Applications." In Advancing the Next-Generation of Mobile Computing. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0119-2.ch014.

Full text
Abstract:
The market for applications developed for mobile devices is growing as the hardware capabilities increase while costs drop. At the same time, the inability to write code once becomes a noticeable problem resulting in the time consuming task of porting an application to a variety of mobile devices, which is true for languages like Java that have been designed to be portable across a range of hardware platforms. As a result, porting a Java application written for one device to another is often a tedious and time-consuming task for developers. This paper presents an intelligent CASE tool that assists the porting of Java mobile applications by automatically generating Java code fragments for the target SDK. SeqFinder automatically generates all minimal method invocation sequences that lead to an object of a specific type, thus relieving the programmer of manually searching the manufacturer-provided SDK Java archives. However, this tool is not applicable only to the Java ME platform and has been used as a fast type-browser for J2SE/J2EE applications.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Invocation sequence"

1

Oyamada, Masafumi, Hideyuki Kawashima, and Hiroyuki Kitagawa. "Efficient Invocation of Transaction Sequences Triggered by Data Streams." In 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. IEEE, 2011. http://dx.doi.org/10.1109/3pgcic.2011.63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ghaleb, Taher Ahmed, Khalid Aljasser, and Musab A. Alturki. "Enhanced Visualization of Method Invocations by Extending Reverse-engineered Sequence Diagrams." In 2020 Working Conference on Software Visualization (VISSOFT). IEEE, 2020. http://dx.doi.org/10.1109/vissoft51673.2020.00010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Salah, M., T. Denton, S. Mancoridis, A. Shokoufandeh, and F. I. Vokolos. "Scenariographer: a tool for reverse engineering class usage scenarios from method invocation sequences." In 21st IEEE International Conference on Software Maintenance (ICSM'05). IEEE, 2005. http://dx.doi.org/10.1109/icsm.2005.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!