Journal articles on the topic 'Software Dependency Graphs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Software Dependency Graphs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Anugerah, Josie, and Eve Martin-Jones. "The Surprise of Multiple Dependency Graphs." Queue 23, no. 1 (2025): 64–84. https://doi.org/10.1145/3723000.
Full textSikka, Geeta, and Harleen Kaur. "Enriching Module Dependency Graphs for Improved Software Clustering." International Journal of System of Systems Engineering 12, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijsse.2022.10038005.
Full textGautam, Pratiksha, and Hemraj Saini. "Non-Trivial Software Clone Detection Using Program Dependency Graph." International Journal of Open Source Software and Processes 8, no. 2 (2017): 1–24. http://dx.doi.org/10.4018/ijossp.2017040101.
Full textEnevoldsen, Søren, Kim G. Larsen, Anders Mariegaard, and Jiří Srba. "Dependency graphs with applications to verification." International Journal on Software Tools for Technology Transfer 22, no. 5 (2020): 635–54. http://dx.doi.org/10.1007/s10009-020-00578-9.
Full textKorobkin, Dmitriy Mihaylovich, and Sergey Fomenkov. "Image analysis of physical quantities dependencies graphs." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2025, no. 1 (2025): 17–27. https://doi.org/10.24143/2072-9502-2025-1-17-27.
Full textKrasanakis, Emmanouil, and Andreas Symeonidis. "Fast Library Recommendation in Software Dependency Graphs with Symmetric Partially Absorbing Random Walks." Future Internet 14, no. 5 (2022): 124. http://dx.doi.org/10.3390/fi14050124.
Full textAvuthu, Yogeswara Reddy. "Graph Neural Networks (GNN) for Code Dependency Vulnerability Detection." Journal of Artificial Intelligence & Cloud Computing 2, no. 1 (2023): 1–7. http://dx.doi.org/10.47363/jaicc/2023(2)e192.
Full textKOHRING, G. A. "COMPLEX DEPENDENCIES IN LARGE SOFTWARE SYSTEMS." Advances in Complex Systems 12, no. 06 (2009): 565–81. http://dx.doi.org/10.1142/s0219525909002362.
Full textSamodra, Bayu, Vebby Amelya Nora, Fitra Arifiansyah, Gusti Ayu Putri Saptawati Soekidjo, and Muhamad Koyimatu. "DEVELOPMENT OF GRAPH GENERATION TOOLS FOR PYTHON FUNCTION CODE ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 10, no. 3 (2025): 690–97. https://doi.org/10.33480/jitk.v10i3.6177.
Full textManoharan, Sathiamoorthy, and Peter Thanisch. "Assigning dependency graphs onto processor networks." Parallel Computing 17, no. 1 (1991): 63–73. http://dx.doi.org/10.1016/s0167-8191(05)80018-3.
Full textMuller, Stefan K. "Static prediction of parallel computation graphs." Proceedings of the ACM on Programming Languages 6, POPL (2022): 1–31. http://dx.doi.org/10.1145/3498708.
Full textMougouei, Davoud, and David M. W. Powers. "Dependency-aware release planning for software projects using fuzzy graphs and integer programming." Journal of Intelligent & Fuzzy Systems 37, no. 3 (2019): 3693–707. http://dx.doi.org/10.3233/jifs-182810.
Full textPegden, Wesley. "The lefthanded local lemma characterizes chordal dependency graphs." Random Structures & Algorithms 41, no. 4 (2012): 546–56. http://dx.doi.org/10.1002/rsa.20439.
Full textHe, Hao, Bogdan Vasilescu, and Christian Kästner. "Pinning Is Futile: You Need More Than Local Dependency Versioning to Defend against Supply Chain Attacks." Proceedings of the ACM on Software Engineering 2, FSE (2025): 266–89. https://doi.org/10.1145/3715728.
Full textZhai, Pengjun, Xin Huang, Beibei Zhang, and Yu Fang. "Relation Extraction Based on Fusion Dependency Parsing from Chinese EMRs." Scientific Programming 2020 (June 8, 2020): 1–9. http://dx.doi.org/10.1155/2020/8658040.
Full textWu, Baoyuan, Fan Jia, Wei Liu, Bernard Ghanem, and Siwei Lyu. "Multi-label Learning with Missing Labels Using Mixed Dependency Graphs." International Journal of Computer Vision 126, no. 8 (2018): 875–96. http://dx.doi.org/10.1007/s11263-018-1085-3.
Full textKountouris, Apostolos A., Christophe Wolinski, and Jean-Christophe Le Lann. "High-level synthesis using hierarchical conditional dependency graphs in the CODESIS system." Journal of Systems Architecture 47, no. 3-4 (2001): 293–313. http://dx.doi.org/10.1016/s1383-7621(00)00051-5.
Full textZuo, Ke, Huaimin Wang, Quanyuan Wu, and Dongmin Hu. "Connectivity model of wireless networks via dependency links random graphs." Journal of Supercomputing 58, no. 1 (2011): 122–41. http://dx.doi.org/10.1007/s11227-010-0529-5.
Full textNoviyanto, Fiftin, Rozilawati Razali, and Mohd Zakree Ahmad Nazree. "Understanding requirements dependency in requirements prioritization: a systematic literature review." International Journal of Advances in Intelligent Informatics 9, no. 2 (2023): 249. http://dx.doi.org/10.26555/ijain.v9i2.1082.
Full textRyabko, Andriy, Volodymyr Tolmachov, and Tatiana Prokopets. "APPLICATION OF INFORMATION TECHNOLOGIES FOR CONSTRUCTION AND ANALYSIS OF GRAPHS IN THE PROCESS OF STUDY OF GENERAL PHYSICS COURSE." OPEN EDUCATIONAL E-ENVIRONMENT OF MODERN UNIVERSITY, no. 9 (2020): 104–20. http://dx.doi.org/10.28925/2414-0325.2020.9.9.
Full textEbrahimi, Masoumeh, and Masoud Daneshtalab. "A General Methodology on Designing Acyclic Channel Dependency Graphs in Interconnection Networks." IEEE Micro 38, no. 3 (2018): 79–85. http://dx.doi.org/10.1109/mm.2018.032271064.
Full textWu, Zehui, Wenbin Zhang, Yunchao Wang, and Chenyu Yan. "Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis." Security and Communication Networks 2022 (June 24, 2022): 1–19. http://dx.doi.org/10.1155/2022/9642517.
Full textAlbanese, Massimiliano, and Sushil Jajodia. "A Graphical Model to Assess the Impact of Multi-Step Attacks." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 1 (2017): 79–93. http://dx.doi.org/10.1177/1548512917706043.
Full textShi, Yucen, Ying Yin, Mingqian Yu, and Liangyu Chu. "CogCol: Code Graph-Based Contrastive Learning Model for Code Summarization." Electronics 13, no. 10 (2024): 1816. http://dx.doi.org/10.3390/electronics13101816.
Full textLe, Nhat, A. B. Siddique, Fuad Jamour, Samet Oymak, and Vagelis Hristidis. "Generating Predictable and Adaptive Dialog Policies in Single- and Multi-domain Goal-oriented Dialog Systems." International Journal of Semantic Computing 15, no. 04 (2021): 419–39. http://dx.doi.org/10.1142/s1793351x21400109.
Full textUllah, Farhan, Muhammad Rashid Naeem, Abdullah S. Bajahzar, and Fadi Al-Turjman. "IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification." ACM Transactions on Internet Technology 22, no. 2 (2022): 1–17. http://dx.doi.org/10.1145/3418206.
Full textBui, Nghi D. Q., Yijun Yu, and Lingxiao Jiang. "TreeCaps: Tree-Based Capsule Networks for Source Code Processing." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 1 (2021): 30–38. http://dx.doi.org/10.1609/aaai.v35i1.16074.
Full textBarrère, Martín, and Chris Hankin. "Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT." ACM Transactions on Cyber-Physical Systems 5, no. 3 (2021): 1–29. http://dx.doi.org/10.1145/3451169.
Full textBarrère, Martín; Hankin Chris. "Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT." ACM Transactions on Cyber-Physical Systems 5, no. 3 (2021): 1–29. https://doi.org/10.1145/3451169.
Full textZhang, Yu, Da Peng, Xiaofei Liao, et al. "LargeGraph." ACM Transactions on Architecture and Code Optimization 18, no. 4 (2021): 1–24. http://dx.doi.org/10.1145/3477603.
Full textPandhare, Harshad Vijay. "Future of Software Test Automation Using AI/ML." International Journal of Engineering and Computer Science 14, no. 05 (2025): 27159–82. https://doi.org/10.18535/ijecs.v14i05.5139.
Full textRinaldi, Francis, june wunder, Arthur Azevedo de Amorim, and Stefan K. Muller. "Pipelines and Beyond: Graph Types for ADTs with Futures." Proceedings of the ACM on Programming Languages 8, POPL (2024): 482–511. http://dx.doi.org/10.1145/3632859.
Full textRupprecht, Franca Alexandra, François M. Torner, Jörg Seewig, and Achim Ebert. "Dependency Graph Based on User Taxonomy and Related Parameters for more Efficient Collaborative Work." Applied Mechanics and Materials 869 (August 2017): 195–211. http://dx.doi.org/10.4028/www.scientific.net/amm.869.195.
Full textKochkovskaya, S. S. "Development of Modeling Algorithm of the Characteristics of the Steels in the Subsystem of Management of the Production Resources of Steel Production." Mekhatronika, Avtomatizatsiya, Upravlenie 20, no. 10 (2019): 615–22. http://dx.doi.org/10.17587/mau.20.615-622.
Full textZhang, Teng, Yufei Liang, Ganlin Li, Tian Tan, Chang Xu, and Yue Li. "Bridge the Islands: Pointer Analysis for Microservice Systems." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 504–26. https://doi.org/10.1145/3728896.
Full textO., H. REIDEMEISTER, and V. LAGUZA A. "DETERMINATION OF CHARACTERISTICS OF THROTTLING DEVICE FOR PNEUMATIC SPRING." Science and Transport Progress, no. 1(73) (March 13, 2018): 66–76. https://doi.org/10.15802/stp2018/123394.
Full textYang, Yege, and Guiping Li. "Code Vulnerability Detection Based on Graph Neural Network." International Journal of Advanced Network, Monitoring and Controls 10, no. 2 (2025): 62–73. https://doi.org/10.2478/ijanmc-2025-0017.
Full textLahoida, A. I., and L. I. Lahoida. "INVESTIGATION OF THE AMPLITUDE STABILITY RELATION OF A MATHEMATICAL MODEL OF A CENTRIFUGAL PUMP OF A PUMPING UNIT AS AN OBJECT OF CONTROL WITH A DEGREE OF GAS PRESSURE." METHODS AND DEVICES OF QUALITY CONTROL, no. 2(43) (December 24, 2019): 111–19. http://dx.doi.org/10.31471/1993-9981-2019-2(43)-111-119.
Full textXU, DIANXIANG, RICHARD A. VOLZ, THOMAS R. IOERGER, and JOHN YEN. "MODELING AND ANALYZING MULTI-AGENT BEHAVIORS USING PREDICATE/TRANSITION NETS." International Journal of Software Engineering and Knowledge Engineering 13, no. 01 (2003): 103–24. http://dx.doi.org/10.1142/s0218194003001184.
Full textShelest, Mariya. "Average delay estimation for one queueing network model with resource reservation." Information and Control Systems, no. 2 (May 11, 2022): 32–41. http://dx.doi.org/10.31799/1684-8853-2022-2-32-41.
Full textGarg, Shally. "GRAPH NEURAL NETWORKS FOR DEPENDENCY MAPPING AND IMPACT ESTIMATION IN CI/CD WORKFLOWS." International Journal of Core Engineering & Management 6, no. 11 (2021): 439–49. https://doi.org/10.5281/zenodo.15552165.
Full textHassaan, Muhammad Amber, Donald D. Nguyen, and Keshav K. Pingali. "Kinetic Dependence Graphs." ACM SIGPLAN Notices 50, no. 4 (2015): 457–71. http://dx.doi.org/10.1145/2775054.2694363.
Full textBalmas, F. "Displaying dependence graphs: a hierarchical approach." Journal of Software Maintenance and Evolution: Research and Practice 16, no. 3 (2004): 151–85. http://dx.doi.org/10.1002/smr.291.
Full textRay-Yaung Chang, A. Podgurski, and Jiong Yang. "Discovering Neglected Conditions in Software by Mining Dependence Graphs." IEEE Transactions on Software Engineering 34, no. 5 (2008): 579–96. http://dx.doi.org/10.1109/tse.2008.24.
Full textDanilina, Nina, and Anna Korobeynikova. "Features of Assessment and Formation of the Aeration Regime of Residential Development on the Sloping Lands of the Russian Arctic." Buildings 12, no. 10 (2022): 1627. http://dx.doi.org/10.3390/buildings12101627.
Full textDavydenko, Sergey, Evgeny Kostyuchenko, and Sergey Novikov. "Evaluation of the Informativeness of Features in Datasets for Continuous Verification." Informatics and Automation 23, no. 1 (2024): 65–100. http://dx.doi.org/10.15622/ia.23.1.3.
Full textChanda, Chansa Thelma, Phiri Anna, Kalasa Stanley, and Chitondo Lufeyo. "Zambia, A Country with Rich Mineral Resources and Arable Land Yet Poor." International Journal of Novel Research in Humanity and Social Sciences 11, no. 1 (2024): 1–15. https://doi.org/10.5281/zenodo.10513078.
Full textLochbihler, Andreas, and Gregor Snelting. "On temporal path conditions in dependence graphs." Automated Software Engineering 16, no. 2 (2009): 263–90. http://dx.doi.org/10.1007/s10515-009-0050-3.
Full textOttenstein, Kar L. J., and Steven J. Ellcey. "Experience compiling Fortran to program dependence graphs." Software: Practice and Experience 22, no. 1 (1992): 41–62. http://dx.doi.org/10.1002/spe.4380220103.
Full textSnelting, Gregor, Torsten Robschink, and Jens Krinke. "Efficient path conditions in dependence graphs for software safety analysis." ACM Transactions on Software Engineering and Methodology 15, no. 4 (2006): 410–57. http://dx.doi.org/10.1145/1178625.1178628.
Full text