Journal articles on the topic 'Invocation sequence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 journal articles for your research on the topic 'Invocation sequence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhao, Yue, Yarang Yang, Bo Tian, and Tianyi Zhang. "An Invocation Chain Test and Evaluation Method for Fog Computing." Wireless Communications and Mobile Computing 2020 (August 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/8812017.
Full textStankiewicz, David. "When He would Compose from Fragments a World Perfect at Last: Theology and Poetics in Czeslaw Milosz's "From the Rising of the Sun"." Religion and the Arts 9, no. 3-4 (2005): 284–312. http://dx.doi.org/10.1163/156852905775008840.
Full textNarmour, Eugene. "Music Expectation by Cognitive Rule-Mapping." Music Perception 17, no. 3 (2000): 329–98. http://dx.doi.org/10.2307/40285821.
Full textGinat, David. "Mathematical operators and ways of reasoning." Mathematical Gazette 89, no. 514 (2005): 7–14. http://dx.doi.org/10.1017/s0025557200176582.
Full textJurinová, J. "Performance improvement of using lambda expressions with new features of Java 8 vs. other possible variants of iterating over ArrayList in Java." Journal of Applied Mathematics, Statistics and Informatics 14, no. 1 (2018): 103–31. http://dx.doi.org/10.2478/jamsi-2018-0007.
Full textWang, Qian, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng, Darryl N. Davis, and Changzhen Hu. "Security Feature Measurement for Frequent Dynamic Execution Paths in Software System." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/5716878.
Full textChen, Jinfu, Patrick Kwaku Kudjo, Zufa Zhang, et al. "A Modified Similarity Metric for Unit Testing of Object-Oriented Software Based on Adaptive Random Testing." International Journal of Software Engineering and Knowledge Engineering 29, no. 04 (2019): 577–606. http://dx.doi.org/10.1142/s0218194019500244.
Full textHeritage, John. "The ubiquity of epistemics: A rebuttal to the ‘epistemics of epistemics’ group." Discourse Studies 20, no. 1 (2018): 14–56. http://dx.doi.org/10.1177/1461445617734342.
Full textGoodman, S., A. Crane, M. Krabbendam, A. G. Leslie, and A. Ruffell. "Correlation of depositional sequences in a structurally complex area: the Dalradian of Glenn Fearnach to Glen Shee, Scotland." Transactions of the Royal Society of Edinburgh: Earth Sciences 87, no. 4 (1996): 503–13. http://dx.doi.org/10.1017/s0263593300018162.
Full textЭйделькинд, Яков. "Song of Songs 8, 13-14: A Commentary." Библия и христианская древность, no. 4(4) (December 16, 2019): 163–202. http://dx.doi.org/10.31802/2658-4476-2019-4-4-163-202.
Full textЭйделькинд, Яков. "Song of Songs 8, 13-14: A Commentary." Библия и христианская древность, no. 4(4) (December 16, 2019): 163–202. http://dx.doi.org/10.31802/2658-4476-2019-4-4-163-202.
Full textClift, Rebecca, and Fadi Helani. "Inshallah: Religious invocations in Arabic topic transition." Language in Society 39, no. 3 (2010): 357–82. http://dx.doi.org/10.1017/s0047404510000199.
Full textWang, Weiping, Jianjian Wei, Shigeng Zhang, and Xi Luo. "LSCDroid: Malware Detection Based on Local Sensitive API Invocation Sequences." IEEE Transactions on Reliability 69, no. 1 (2020): 174–87. http://dx.doi.org/10.1109/tr.2019.2927285.
Full textSiroky, Stuart, Rodion Podorozhny, and Guowei Yang. "Verification of Architectural Constraints on Sequences of Method Invocations." ACM SIGSOFT Software Engineering Notes 40, no. 1 (2015): 1–4. http://dx.doi.org/10.1145/2693208.2693246.
Full textZeng, Kungan, and Incheon Paik. "Semantic Service Clustering With Lightweight BERT-Based Service Embedding Using Invocation Sequences." IEEE Access 9 (2021): 54298–309. http://dx.doi.org/10.1109/access.2021.3069509.
Full textKONG, JUN, DIANXIANG XU, and XIAOQIN ZENG. "UML-BASED MODELING AND ANALYSIS OF SECURITY THREATS." International Journal of Software Engineering and Knowledge Engineering 20, no. 06 (2010): 875–97. http://dx.doi.org/10.1142/s0218194010004980.
Full textClifton, Jonathan, Dorien Van De Mieroop, Prachee Sehgal, and Aneet. "The multimodal enactment of deontic and epistemic authority in Indian meetings." Pragmatics. Quarterly Publication of the International Pragmatics Association (IPrA) 28, no. 3 (2018): 333–60. http://dx.doi.org/10.1075/prag.17011.cli.
Full textChristou, Ioannis T., Sofoklis Efremidis, and Aikaterini Roukounaki. "A CASE Tool for Java Mobile Computing Applications." International Journal of Mobile Computing and Multimedia Communications 2, no. 2 (2010): 34–48. http://dx.doi.org/10.4018/jmcmc.2010040103.
Full textCandela, Leonardo, Valerio Grossi, Paolo Manghi, and Roberto Trasarti. "A workflow language for research e-infrastructures." International Journal of Data Science and Analytics 11, no. 4 (2021): 361–76. http://dx.doi.org/10.1007/s41060-020-00237-x.
Full textFlannery, Denis. "Ernie O'Malley, William Shakespeare's Sonnets, and the Book as Closet Object." Irish University Review 43, no. 1 (2013): 102–18. http://dx.doi.org/10.3366/iur.2013.0058.
Full textDai, Ziying, Xiaoguang Mao, Yan Lei, Yuhua Qi, Rui Wang, and Bin Gu. "Compositional Mining of Multiple Object API Protocols through State Abstraction." Scientific World Journal 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/171647.
Full textDRAPER, BRUCE A., ALLEN R. HANSON, and EDWARD M. RISEMAN. "LEARNING BLACKBOARD-BASED SCHEDULING ALGORITHMS FOR COMPUTER VISION." International Journal of Pattern Recognition and Artificial Intelligence 07, no. 02 (1993): 309–28. http://dx.doi.org/10.1142/s0218001493000169.
Full textCubero, Mercedes, Miguel Jesús Bascón, and Rosario Cubero-Pérez. "“My tutor doesn’t say that”: The legitimized voices in dialogic reflection on teaching practices." Dialogic Pedagogy: An International Online Journal 8 (October 7, 2020). http://dx.doi.org/10.5195/dpj.2020.311.
Full textKarnalim, Oscar, and Mewati Ayub. "The Use of Python Tutor on Programming Laboratory Session: Student Perspectives." Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, October 30, 2017, 327–36. http://dx.doi.org/10.22219/kinetik.v2i4.442.
Full textMolnar, Tamas. "Spectre of the Past, Vision of the Future – Ritual, Reflexivity and the Hope for Renewal in Yann Arthus-Bertrand’s Climate Change Communication Film "Home"." M/C Journal 15, no. 3 (2012). http://dx.doi.org/10.5204/mcj.496.
Full textEgliston, Ben. "Building Skill in Videogames: A Play of Bodies, Controllers and Game-Guides." M/C Journal 20, no. 2 (2017). http://dx.doi.org/10.5204/mcj.1218.
Full textMathur, Suchitra. "From British “Pride” to Indian “Bride”." M/C Journal 10, no. 2 (2007). http://dx.doi.org/10.5204/mcj.2631.
Full textEyssens, Terry. "By the Fox or the Little Eagle: What Remains Not Regional?" M/C Journal 22, no. 3 (2019). http://dx.doi.org/10.5204/mcj.1532.
Full textGoodall, Jane. "Looking Glass Worlds: The Queen and the Mirror." M/C Journal 19, no. 4 (2016). http://dx.doi.org/10.5204/mcj.1141.
Full text