To see the other types of publications on this topic, follow the link: Software Dependency Graphs.

Journal articles on the topic 'Software Dependency Graphs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Software Dependency Graphs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Anugerah, Josie, and Eve Martin-Jones. "The Surprise of Multiple Dependency Graphs." Queue 23, no. 1 (2025): 64–84. https://doi.org/10.1145/3723000.

Full text
Abstract:
It seems like it should be easy to avoid installing vulnerable open source software, but dependency graphs are surprisingly complex. At the time of writing, the latest version of the popular npm tool webpack has millions of potential dependency graphs depending on circumstances during its resolution. The exact graph chosen for a given package can depend on what other software is being built, what kind of system is building it, and even the state of the ecosystem on a given day. As a result, the developer and user of a package may end up with very different dependency graphs, which can lead to
APA, Harvard, Vancouver, ISO, and other styles
2

Sikka, Geeta, and Harleen Kaur. "Enriching Module Dependency Graphs for Improved Software Clustering." International Journal of System of Systems Engineering 12, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijsse.2022.10038005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gautam, Pratiksha, and Hemraj Saini. "Non-Trivial Software Clone Detection Using Program Dependency Graph." International Journal of Open Source Software and Processes 8, no. 2 (2017): 1–24. http://dx.doi.org/10.4018/ijossp.2017040101.

Full text
Abstract:
Code clones are copied fragments that occur at different levels of abstraction and may have different origins in a software system. This article presents an approach which shows the significant parts of source code. Further, by using significant parts of a source code, a control flow graph can be generated. This control flow graph represents the statements of a code/program in the form of basic blocks or nodes and the edges represent the control flow between those basic blocks. A hybrid approach, named the Program Dependence Graph (PDG) is also presented in this article for the detection of no
APA, Harvard, Vancouver, ISO, and other styles
4

Enevoldsen, Søren, Kim G. Larsen, Anders Mariegaard, and Jiří Srba. "Dependency graphs with applications to verification." International Journal on Software Tools for Technology Transfer 22, no. 5 (2020): 635–54. http://dx.doi.org/10.1007/s10009-020-00578-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Korobkin, Dmitriy Mihaylovich, and Sergey Fomenkov. "Image analysis of physical quantities dependencies graphs." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2025, no. 1 (2025): 17–27. https://doi.org/10.24143/2072-9502-2025-1-17-27.

Full text
Abstract:
Physical effects used at the conceptual design stage, described in “primary” sources of information, such as patents, often contain images of dependency graphs linking physical input and output quantities. Analysis of this information and its use to expand the description of a physical effect is a relevant task. The development of a method for analyzing graphic images for classifying dependency graphs of input and output physical quantities is described. This requires forming a labeled array of dependency graphs, as well as conducting computational experiments to identify the most effective ar
APA, Harvard, Vancouver, ISO, and other styles
6

Krasanakis, Emmanouil, and Andreas Symeonidis. "Fast Library Recommendation in Software Dependency Graphs with Symmetric Partially Absorbing Random Walks." Future Internet 14, no. 5 (2022): 124. http://dx.doi.org/10.3390/fi14050124.

Full text
Abstract:
To help developers discover libraries suited to their software projects, automated approaches often start from already employed libraries and recommend more based on co-occurrence patterns in other projects. The most accurate project–library recommendation systems employ Graph Neural Networks (GNNs) that learn latent node representations for link prediction. However, GNNs need to be retrained when dependency graphs are updated, for example, to recommend libraries for new projects, and are thus unwieldy for scalable deployment. To avoid retraining, we propose that recommendations can instead be
APA, Harvard, Vancouver, ISO, and other styles
7

Avuthu, Yogeswara Reddy. "Graph Neural Networks (GNN) for Code Dependency Vulnerability Detection." Journal of Artificial Intelligence & Cloud Computing 2, no. 1 (2023): 1–7. http://dx.doi.org/10.47363/jaicc/2023(2)e192.

Full text
Abstract:
Modern software development relies heavily on third-party libraries and external dependencies, leading to increasingly complex dependency graphs. Managing these dependencies is challenging, as vulnerabilities often arise from indirect or transitive dependencies that are difficult to detect using traditional security tools.
APA, Harvard, Vancouver, ISO, and other styles
8

KOHRING, G. A. "COMPLEX DEPENDENCIES IN LARGE SOFTWARE SYSTEMS." Advances in Complex Systems 12, no. 06 (2009): 565–81. http://dx.doi.org/10.1142/s0219525909002362.

Full text
Abstract:
Two large, open source software systems are analyzed from the vantage point of complex adaptive systems theory. For both systems, the full dependency graphs are constructed and their properties are shown to be consistent with the assumption of stochastic growth. In particular, the afferent links are distributed according to Zipf's law for both systems. Using the small-world criterion for directed graphs, it is shown that contrary to claims in the literature, these software systems do not possess small-world properties. Furthermore, it is argued that the small-world property is not of any parti
APA, Harvard, Vancouver, ISO, and other styles
9

Samodra, Bayu, Vebby Amelya Nora, Fitra Arifiansyah, Gusti Ayu Putri Saptawati Soekidjo, and Muhamad Koyimatu. "DEVELOPMENT OF GRAPH GENERATION TOOLS FOR PYTHON FUNCTION CODE ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 10, no. 3 (2025): 690–97. https://doi.org/10.33480/jitk.v10i3.6177.

Full text
Abstract:
The increasing complexity of programs in software development requires understanding and analysis of code structure, especially in Python, which dominates machine learning and data science applications. Manual static analysis is often time-consuming and prone to errors. Meanwhile, static analysis tools for Python, like PyCG and Code2graph, are still limited to generating call graphs without including dependency and control flow analysis. This research addresses these shortcomings by proposing the development of a web-based tool that integrates the generation of function call graphs, function d
APA, Harvard, Vancouver, ISO, and other styles
10

Manoharan, Sathiamoorthy, and Peter Thanisch. "Assigning dependency graphs onto processor networks." Parallel Computing 17, no. 1 (1991): 63–73. http://dx.doi.org/10.1016/s0167-8191(05)80018-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Muller, Stefan K. "Static prediction of parallel computation graphs." Proceedings of the ACM on Programming Languages 6, POPL (2022): 1–31. http://dx.doi.org/10.1145/3498708.

Full text
Abstract:
Many algorithms for analyzing parallel programs, for example to detect deadlocks or data races or to calculate the execution cost, are based on a model variously known as a cost graph, computation graph or dependency graph, which captures the parallel structure of threads in a program. In modern parallel programs, computation graphs are highly dynamic and depend greatly on the program inputs and execution details. As such, most analyses that use these graphs are either dynamic analyses or are specialized static analyses that gather a subset of dependency information for a specific purpose. Thi
APA, Harvard, Vancouver, ISO, and other styles
12

Mougouei, Davoud, and David M. W. Powers. "Dependency-aware release planning for software projects using fuzzy graphs and integer programming." Journal of Intelligent & Fuzzy Systems 37, no. 3 (2019): 3693–707. http://dx.doi.org/10.3233/jifs-182810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Pegden, Wesley. "The lefthanded local lemma characterizes chordal dependency graphs." Random Structures & Algorithms 41, no. 4 (2012): 546–56. http://dx.doi.org/10.1002/rsa.20439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

He, Hao, Bogdan Vasilescu, and Christian Kästner. "Pinning Is Futile: You Need More Than Local Dependency Versioning to Defend against Supply Chain Attacks." Proceedings of the ACM on Software Engineering 2, FSE (2025): 266–89. https://doi.org/10.1145/3715728.

Full text
Abstract:
Recent high-profile incidents in open-source software have greatly raised practitioner attention on software supply chain attacks. To guard against potential malicious package updates, security practitioners advocate pinning dependency to specific versions rather than floating in version ranges. However, it remains controversial whether pinning carries a meaningful security benefit that outweighs the cost of maintaining outdated and possibly vulnerable dependencies. In this paper, we quantify, through counterfactual analysis and simulations, the security and maintenance impact of version const
APA, Harvard, Vancouver, ISO, and other styles
15

Zhai, Pengjun, Xin Huang, Beibei Zhang, and Yu Fang. "Relation Extraction Based on Fusion Dependency Parsing from Chinese EMRs." Scientific Programming 2020 (June 8, 2020): 1–9. http://dx.doi.org/10.1155/2020/8658040.

Full text
Abstract:
The Electronic Medical Record (EMR) contains a great deal of medical knowledge related to patients, which has been widely used in the construction of medical knowledge graphs. Previous studies mainly focus on the features based on surface semantics of EMRs for relation extraction, such as contextual feature, but the features of sentence structure in Chinese EMRs have been neglected. In this paper, a fusion dependency parsing-based relation extraction method is proposed. Specifically, this paper extends basic features with medical record feature and indicator feature that are applicable to Chin
APA, Harvard, Vancouver, ISO, and other styles
16

Wu, Baoyuan, Fan Jia, Wei Liu, Bernard Ghanem, and Siwei Lyu. "Multi-label Learning with Missing Labels Using Mixed Dependency Graphs." International Journal of Computer Vision 126, no. 8 (2018): 875–96. http://dx.doi.org/10.1007/s11263-018-1085-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kountouris, Apostolos A., Christophe Wolinski, and Jean-Christophe Le Lann. "High-level synthesis using hierarchical conditional dependency graphs in the CODESIS system." Journal of Systems Architecture 47, no. 3-4 (2001): 293–313. http://dx.doi.org/10.1016/s1383-7621(00)00051-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Zuo, Ke, Huaimin Wang, Quanyuan Wu, and Dongmin Hu. "Connectivity model of wireless networks via dependency links random graphs." Journal of Supercomputing 58, no. 1 (2011): 122–41. http://dx.doi.org/10.1007/s11227-010-0529-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Noviyanto, Fiftin, Rozilawati Razali, and Mohd Zakree Ahmad Nazree. "Understanding requirements dependency in requirements prioritization: a systematic literature review." International Journal of Advances in Intelligent Informatics 9, no. 2 (2023): 249. http://dx.doi.org/10.26555/ijain.v9i2.1082.

Full text
Abstract:
Requirement prioritization (RP) is a crucial task in managing requirements as it determines the order of implementation and, thus, the delivery of a software system. Improper RP may cause software project failures due to over budget and schedule as well as a low-quality product. Several factors influence RP. One of which is requirements dependency. Handling inappropriate handling of requirements dependencies can lead to software development failures. If a requirement that serves as a prerequisite for other requirements is given low priority, it affects the overall project completion time. Desp
APA, Harvard, Vancouver, ISO, and other styles
20

Ryabko, Andriy, Volodymyr Tolmachov, and Tatiana Prokopets. "APPLICATION OF INFORMATION TECHNOLOGIES FOR CONSTRUCTION AND ANALYSIS OF GRAPHS IN THE PROCESS OF STUDY OF GENERAL PHYSICS COURSE." OPEN EDUCATIONAL E-ENVIRONMENT OF MODERN UNIVERSITY, no. 9 (2020): 104–20. http://dx.doi.org/10.28925/2414-0325.2020.9.9.

Full text
Abstract:
The article considers the method of using information technology tools for the construction and analysis of graphs in the process of studying the course of general physics. Among the significant number of computer tools for plotting functions, special attention is paid to software that allows to process laboratory tasks results in physics effectively and graphically, to perform calculations and build on their basis graphs of dependencies while solving tasks, to demonstrate models of physical phenomena on lectures. Using the example of laboratory work on the capacitance of the capacitor determi
APA, Harvard, Vancouver, ISO, and other styles
21

Ebrahimi, Masoumeh, and Masoud Daneshtalab. "A General Methodology on Designing Acyclic Channel Dependency Graphs in Interconnection Networks." IEEE Micro 38, no. 3 (2018): 79–85. http://dx.doi.org/10.1109/mm.2018.032271064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Wu, Zehui, Wenbin Zhang, Yunchao Wang, and Chenyu Yan. "Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis." Security and Communication Networks 2022 (June 24, 2022): 1–19. http://dx.doi.org/10.1155/2022/9642517.

Full text
Abstract:
Software-defined network (SDN) controllers, the core of SDN network architecture, need to deal with network events of the whole network, which has huge program state space and complex logic dependency, with security issues related. Vulnerabilities in the SDN controller can paralyze the whole network. Existing controller testing methods are difficult to dig into the hidden logic vulnerability for their ignorance of the complex events interactions among controllers, apps, and data plane inputs. Different from file processing software, network software is driven by events, and the event flow can
APA, Harvard, Vancouver, ISO, and other styles
23

Albanese, Massimiliano, and Sushil Jajodia. "A Graphical Model to Assess the Impact of Multi-Step Attacks." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 1 (2017): 79–93. http://dx.doi.org/10.1177/1548512917706043.

Full text
Abstract:
In the last several decades, networked systems have grown in complexity and sophistication, introducing complex interdependencies amongst their numerous and diverse components. Attackers can leverage such interdependencies to penetrate seemingly well-guarded networks through sophisticated multi-step attacks. Research has shown that explicit and implicit interdependencies exist at various layers of the hardware and software architecture. In particular, dependencies between vulnerabilities and dependencies between applications and services are critical for assessing the impact of multi-step atta
APA, Harvard, Vancouver, ISO, and other styles
24

Shi, Yucen, Ying Yin, Mingqian Yu, and Liangyu Chu. "CogCol: Code Graph-Based Contrastive Learning Model for Code Summarization." Electronics 13, no. 10 (2024): 1816. http://dx.doi.org/10.3390/electronics13101816.

Full text
Abstract:
Summarizing source code by natural language aims to help developers better understand existing code, making software development more efficient. Since source code is highly structured, recent research uses code structure information like Abstract Semantic Tree (AST) to enhance the structure understanding rather than a normal translation task. However, AST can only represent the syntactic relationship of code snippets, which can not reflect high-level relationships like control and data dependency in the program dependency graph. Moreover, researchers treat the AST as the unique structure infor
APA, Harvard, Vancouver, ISO, and other styles
25

Le, Nhat, A. B. Siddique, Fuad Jamour, Samet Oymak, and Vagelis Hristidis. "Generating Predictable and Adaptive Dialog Policies in Single- and Multi-domain Goal-oriented Dialog Systems." International Journal of Semantic Computing 15, no. 04 (2021): 419–39. http://dx.doi.org/10.1142/s1793351x21400109.

Full text
Abstract:
Most existing commercial goal-oriented chatbots are diagram-based; i.e. they follow a rigid dialog flow to fill the slot values needed to achieve a user’s goal. Diagram-based chatbots are predictable, thus their adoption in commercial settings; however, their lack of flexibility may cause many users to leave the conversation before achieving their goal. On the other hand, state-of-the-art research chatbots use Reinforcement Learning (RL) to generate flexible dialog policies. However, such chatbots can be unpredictable, may violate the intended business constraints, and require large training d
APA, Harvard, Vancouver, ISO, and other styles
26

Ullah, Farhan, Muhammad Rashid Naeem, Abdullah S. Bajahzar, and Fadi Al-Turjman. "IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification." ACM Transactions on Internet Technology 22, no. 2 (2022): 1–17. http://dx.doi.org/10.1145/3418206.

Full text
Abstract:
Software piracy is an act of illegal stealing and distributing commercial software either for revenue or identify theft. Pirated applications on Android app stores are harming developers and their users by clone scammers. The scammers usually generate pirated versions of the same applications and publish them in different open-source app stores. There is no centralized system between these app stores to prevent scammers from publishing pirated applications. As most of the app stores are hosted on cloud storage, therefore a cloud-based interaction system can prevent scammers from publishing pir
APA, Harvard, Vancouver, ISO, and other styles
27

Bui, Nghi D. Q., Yijun Yu, and Lingxiao Jiang. "TreeCaps: Tree-Based Capsule Networks for Source Code Processing." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 1 (2021): 30–38. http://dx.doi.org/10.1609/aaai.v35i1.16074.

Full text
Abstract:
Recently program learning techniques have been proposed to process source code based on syntactical structures (e.g., abstract syntax trees) and/or semantic information (e.g., dependency graphs). While graphs may be better than trees at capturing code semantics, constructing the graphs from code inputs through the semantic analysis of multiple viewpoints can lead to inaccurate noises for a specific software engineering task. Compared to graphs, syntax trees are more precisely defined on the grammar and easier to parse; unfortunately, previous tree-based learning techniques have not been able t
APA, Harvard, Vancouver, ISO, and other styles
28

Barrère, Martín, and Chris Hankin. "Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT." ACM Transactions on Cyber-Physical Systems 5, no. 3 (2021): 1–29. http://dx.doi.org/10.1145/3451169.

Full text
Abstract:
Cyber-Physical Systems (CPS) often involve complex networks of interconnected software and hardware components that are logically combined to achieve a common goal or mission; for example, keeping a plane in the air or providing energy to a city. Failures in these components may jeopardise the mission of the system. Therefore, identifying the minimal set of critical CPS components that is most likely to fail, and prevent the global system from accomplishing its mission, becomes essential to ensure reliability. In this article, we present a novel approach to identifying the Most Likely Mission-
APA, Harvard, Vancouver, ISO, and other styles
29

Barrère, Martín; Hankin Chris. "Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT." ACM Transactions on Cyber-Physical Systems 5, no. 3 (2021): 1–29. https://doi.org/10.1145/3451169.

Full text
Abstract:
Cyber-Physical Systems (CPS) often involve complex networks of interconnected software and hardware components that are logically combined to achieve a common goal or mission; for example, keeping a plane in the air or providing energy to a city. Failures in these components may jeopardise the mission of the system. Therefore, identifying the minimal set of critical CPS components that is most likely to fail, and prevent the global system from accomplishing its mission, becomes essential to ensure reliability. In this article, we present a novel approach to identifying the&nbsp;<em>Most Likely
APA, Harvard, Vancouver, ISO, and other styles
30

Zhang, Yu, Da Peng, Xiaofei Liao, et al. "LargeGraph." ACM Transactions on Architecture and Code Optimization 18, no. 4 (2021): 1–24. http://dx.doi.org/10.1145/3477603.

Full text
Abstract:
Many out-of-GPU-memory systems are recently designed to support iterative processing of large-scale graphs. However, these systems still suffer from long time to converge because of inefficient propagation of active vertices’ new states along graph paths. To efficiently support out-of-GPU-memory graph processing, this work designs a system LargeGraph . Different from existing out-of-GPU-memory systems, LargeGraph proposes a dependency-aware data-driven execution approach , which can significantly accelerate active vertices’ state propagations along graph paths with low data access cost and als
APA, Harvard, Vancouver, ISO, and other styles
31

Pandhare, Harshad Vijay. "Future of Software Test Automation Using AI/ML." International Journal of Engineering and Computer Science 14, no. 05 (2025): 27159–82. https://doi.org/10.18535/ijecs.v14i05.5139.

Full text
Abstract:
The exponential growth of software systems and the shift toward agile and DevOps methodologies have placed immense pressure on quality assurance teams to deliver rapid, reliable, and scalable testing solutions. Traditional test automation methods, while effective in some contexts, often struggle with adaptability, maintenance overhead, and limited intelligence in handling dynamic test environments. This paper investigates the transformative role of Artificial Intelligence (AI) and Machine Learning (ML) in shaping the future of software test automation. Through an in-depth analysis of academic
APA, Harvard, Vancouver, ISO, and other styles
32

Rinaldi, Francis, june wunder, Arthur Azevedo de Amorim, and Stefan K. Muller. "Pipelines and Beyond: Graph Types for ADTs with Futures." Proceedings of the ACM on Programming Languages 8, POPL (2024): 482–511. http://dx.doi.org/10.1145/3632859.

Full text
Abstract:
Parallel programs are frequently modeled as dependency or cost graphs, which can be used to detect various bugs, or simply to visualize the parallel structure of the code. However, such graphs reflect just one particular execution and are typically constructed in a post-hoc manner. Graph types , which were introduced recently to mitigate this problem, can be assigned statically to a program by a type system and compactly represent the family of all graphs that could result from the program. Unfortunately, prior work is restricted in its treatment of futures , an increasingly common and especia
APA, Harvard, Vancouver, ISO, and other styles
33

Rupprecht, Franca Alexandra, François M. Torner, Jörg Seewig, and Achim Ebert. "Dependency Graph Based on User Taxonomy and Related Parameters for more Efficient Collaborative Work." Applied Mechanics and Materials 869 (August 2017): 195–211. http://dx.doi.org/10.4028/www.scientific.net/amm.869.195.

Full text
Abstract:
Collaboration, performed by a large group of experts of diverse fields and competences, is a time-demanding and complex process. It is crucial to provide tools to facilitate the identification and manipulation of interdependencies as well as the active collaboration process. Dependency graphs of the participants can help to improve processes, to plan tasks, and to identify potential for more efficient cooperation. Such a dependency graph comprises clear defined entities, which are linked with each other based on defined relationships [1]. In the course of this work, a taxonomy of users in indu
APA, Harvard, Vancouver, ISO, and other styles
34

Kochkovskaya, S. S. "Development of Modeling Algorithm of the Characteristics of the Steels in the Subsystem of Management of the Production Resources of Steel Production." Mekhatronika, Avtomatizatsiya, Upravlenie 20, no. 10 (2019): 615–22. http://dx.doi.org/10.17587/mau.20.615-622.

Full text
Abstract:
The article is devoted to the development of an algorithm for modeling the characteristics of steels in accordance with customer requirements. A mathematical model is presented that takes into account the optimal levels of the main factors and their interaction, providing the required values of the characteristics. The next step in the study of the mathematical model was modeling by means of functional modeling methodology IDEF0. Input and output data, as well as normative documents of model management and mechanisms of this management for building a functional model are defined. The control m
APA, Harvard, Vancouver, ISO, and other styles
35

Zhang, Teng, Yufei Liang, Ganlin Li, Tian Tan, Chang Xu, and Yue Li. "Bridge the Islands: Pointer Analysis for Microservice Systems." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 504–26. https://doi.org/10.1145/3728896.

Full text
Abstract:
Microservice architecture has revolutionized enterprise software, providing scalability and flexibility by decomposing applications into loosely coupled services. However, this paradigm shift introduces unique challenges for pointer analysis, a foundational static analysis crucial for supporting various client analyses. Existing fundamental analyses, primarily designed for monolithic enterprise applications, fall short in handling complex service communications—such as remote procedure call and message-based communication—and essential programming paradigms, like dependency injection and web e
APA, Harvard, Vancouver, ISO, and other styles
36

O., H. REIDEMEISTER, and V. LAGUZA A. "DETERMINATION OF CHARACTERISTICS OF THROTTLING DEVICE FOR PNEUMATIC SPRING." Science and Transport Progress, no. 1(73) (March 13, 2018): 66–76. https://doi.org/10.15802/stp2018/123394.

Full text
Abstract:
<strong>Purpose.</strong>&nbsp;This paper focuses on determination of the dependence of the working medium flow on the capacity of the throttling device, its geometric features and the pressure difference in the pneumatic spring cylinder and in the auxiliary reservoir.&nbsp;<strong>Methodology.</strong>&nbsp;Calculation of the dependence of the working medium and pressure drop is performed in two ways: 1) by numerical simulation of a stationary gas flow through a throttling element; 2) its analytical calculation expression using empirical relationships (control calculation to evaluate the reli
APA, Harvard, Vancouver, ISO, and other styles
37

Yang, Yege, and Guiping Li. "Code Vulnerability Detection Based on Graph Neural Network." International Journal of Advanced Network, Monitoring and Controls 10, no. 2 (2025): 62–73. https://doi.org/10.2478/ijanmc-2025-0017.

Full text
Abstract:
Abstract Deep learning has emerged as a vital approach for identifying and addressing vulnerabilities in software systems. A key challenge in this process lies in effectively representing code and leveraging AI techniques to capture and interpret its semantics and other intrinsic information. This paper employs bidirectional slicing techniques to extract code slices containing control and data dependencies from program dependency graphs, targeting key points of different vulnerabilities. To represent the node features within the slices, code tokens are mapped to integers and transformed into f
APA, Harvard, Vancouver, ISO, and other styles
38

Lahoida, A. I., and L. I. Lahoida. "INVESTIGATION OF THE AMPLITUDE STABILITY RELATION OF A MATHEMATICAL MODEL OF A CENTRIFUGAL PUMP OF A PUMPING UNIT AS AN OBJECT OF CONTROL WITH A DEGREE OF GAS PRESSURE." METHODS AND DEVICES OF QUALITY CONTROL, no. 2(43) (December 24, 2019): 111–19. http://dx.doi.org/10.31471/1993-9981-2019-2(43)-111-119.

Full text
Abstract:
Using the experimental data obtained intheprocesso fchange inthetime of the degree of increase in gas pressure, as well as the performance of the centrifugal supercharger of the gas pumping unit, . Digitization of graphs of change of degree of increase of pressure of gas, and also productivity of the centrifugal supercharger of gas-pumping unitis made with the help of software Graph2Digit. The digitization wasper formed with a sampling period of 0.3 s. The number of values forth edegree of increase of gaspressure, as well as the performance of the centrifugal pump gas pumping unitis 581 each.&
APA, Harvard, Vancouver, ISO, and other styles
39

XU, DIANXIANG, RICHARD A. VOLZ, THOMAS R. IOERGER, and JOHN YEN. "MODELING AND ANALYZING MULTI-AGENT BEHAVIORS USING PREDICATE/TRANSITION NETS." International Journal of Software Engineering and Knowledge Engineering 13, no. 01 (2003): 103–24. http://dx.doi.org/10.1142/s0218194003001184.

Full text
Abstract:
How agents accomplish a goal task in a multi-agent system is usually specified by multi-agent plans built from basic actions (e.g. operators) of which the agents are capable. The plan specification provides the agents with a shared mental model for how they are supposed to collaborate with each other to achieve the common goal. Making sure that the plans are reliable and fit for the purpose for which they are designed is a critical problem with this approach. To address this problem, this paper presents a formal approach to modeling and analyzing multi-agent behaviors using Predicate/Transitio
APA, Harvard, Vancouver, ISO, and other styles
40

Shelest, Mariya. "Average delay estimation for one queueing network model with resource reservation." Information and Control Systems, no. 2 (May 11, 2022): 32–41. http://dx.doi.org/10.31799/1684-8853-2022-2-32-41.

Full text
Abstract:
Introduction: An urgent task of today is to develop new analysis methods for complex information systems that now demand higher standards for maintaining data integrity. One of the important quality characteristics of such systems is average transaction time. However, currently there are almost no mathematical models and speed estimation tools for such systems. Purpose: To develop and analyze a distributed information system model based on queueing networks. Results: A type of information systems that demand higher standards for maintaining data integrity has been described, the corresponding
APA, Harvard, Vancouver, ISO, and other styles
41

Garg, Shally. "GRAPH NEURAL NETWORKS FOR DEPENDENCY MAPPING AND IMPACT ESTIMATION IN CI/CD WORKFLOWS." International Journal of Core Engineering & Management 6, no. 11 (2021): 439–49. https://doi.org/10.5281/zenodo.15552165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Hassaan, Muhammad Amber, Donald D. Nguyen, and Keshav K. Pingali. "Kinetic Dependence Graphs." ACM SIGPLAN Notices 50, no. 4 (2015): 457–71. http://dx.doi.org/10.1145/2775054.2694363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Balmas, F. "Displaying dependence graphs: a hierarchical approach." Journal of Software Maintenance and Evolution: Research and Practice 16, no. 3 (2004): 151–85. http://dx.doi.org/10.1002/smr.291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ray-Yaung Chang, A. Podgurski, and Jiong Yang. "Discovering Neglected Conditions in Software by Mining Dependence Graphs." IEEE Transactions on Software Engineering 34, no. 5 (2008): 579–96. http://dx.doi.org/10.1109/tse.2008.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Danilina, Nina, and Anna Korobeynikova. "Features of Assessment and Formation of the Aeration Regime of Residential Development on the Sloping Lands of the Russian Arctic." Buildings 12, no. 10 (2022): 1627. http://dx.doi.org/10.3390/buildings12101627.

Full text
Abstract:
The urban development of areas in the Arctic zone of the Russian Federation is a relevant and important task to be tackled by contemporary urban planners. This focus is largely explained by the development of the Northern Sea Route (NSR) and its port cities. Last but not least, to develop these cities means to ensure a comfortable living environment for local residents and visiting specialists. However, given the harsh climate in the Arctic zone of the Russian Federation, this task requires a more elaborate approach. Current building techniques, designed for flatlands with relatively comfortab
APA, Harvard, Vancouver, ISO, and other styles
46

Davydenko, Sergey, Evgeny Kostyuchenko, and Sergey Novikov. "Evaluation of the Informativeness of Features in Datasets for Continuous Verification." Informatics and Automation 23, no. 1 (2024): 65–100. http://dx.doi.org/10.15622/ia.23.1.3.

Full text
Abstract:
Continuous verification eliminates the flaws of existing static authentication, e.g. identifiers can be lost or forgotten, and the user logs in the system only once, which may be dangerous not only for areas requiring a high level of security but also for a regular office. Checking the user dynamically during the whole session of work can improve the security of the system, since while working with the system, the user may be exposed to an attacker (to be assaulted for example) or intentionally transfer rights to him. In this case, the machine will not be operated by the user who performed the
APA, Harvard, Vancouver, ISO, and other styles
47

Chanda, Chansa Thelma, Phiri Anna, Kalasa Stanley, and Chitondo Lufeyo. "Zambia, A Country with Rich Mineral Resources and Arable Land Yet Poor." International Journal of Novel Research in Humanity and Social Sciences 11, no. 1 (2024): 1–15. https://doi.org/10.5281/zenodo.10513078.

Full text
Abstract:
<strong>Abstract:</strong> The purpose of the study was to assess the reasons why Zambia, a country endowed with mineral resources and arable land still ranks among the countries with the highest levels of poverty globally and the study sought to investigate whether colonialism, dependency syndrome, governance and other factors impact negatively on her development. The study employed a mixed paradigm and descriptive survey design that sampled Institutions of higher learning, Parliament, Political Parties without representation in Parliament, Government Ministries and Non-Governmental Organizat
APA, Harvard, Vancouver, ISO, and other styles
48

Lochbihler, Andreas, and Gregor Snelting. "On temporal path conditions in dependence graphs." Automated Software Engineering 16, no. 2 (2009): 263–90. http://dx.doi.org/10.1007/s10515-009-0050-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Ottenstein, Kar L. J., and Steven J. Ellcey. "Experience compiling Fortran to program dependence graphs." Software: Practice and Experience 22, no. 1 (1992): 41–62. http://dx.doi.org/10.1002/spe.4380220103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Snelting, Gregor, Torsten Robschink, and Jens Krinke. "Efficient path conditions in dependence graphs for software safety analysis." ACM Transactions on Software Engineering and Methodology 15, no. 4 (2006): 410–57. http://dx.doi.org/10.1145/1178625.1178628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!