Journal articles on the topic 'Code property graph'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Code property graph.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Saenpholphat, Varaporn, and Ping Zhang. "Conditional resolvability in graphs: a survey." International Journal of Mathematics and Mathematical Sciences 2004, no. 38 (2004): 1997–2017. http://dx.doi.org/10.1155/s0161171204311403.
Full textKlavžar, Sandi, Uroš Milutinović, and Ciril Petr. "1-perfect codes in Sierpiński graphs." Bulletin of the Australian Mathematical Society 66, no. 3 (December 2002): 369–84. http://dx.doi.org/10.1017/s0004972700040235.
Full textPilongo, Jupiter, Leonard Mijares Paleta, and Philip Lester P. Benjamin. "Vertex-weighted $(k_{1},k_{2})$ $E$-torsion Graph of Quasi Self-dual Codes." European Journal of Pure and Applied Mathematics 17, no. 2 (April 30, 2024): 1369–84. http://dx.doi.org/10.29020/nybg.ejpam.v17i2.4867.
Full textZhao, Chunhui, Tengfei Tu, Cheng Wang, and Sujuan Qin. "VulPathsFinder: A Static Method for Finding Vulnerable Paths in PHP Applications Based on CPG." Applied Sciences 13, no. 16 (August 14, 2023): 9240. http://dx.doi.org/10.3390/app13169240.
Full textKunz, Immanuel, Konrad Weiss, Angelika Schneider, and Christian Banse. "Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (April 2023): 171–87. http://dx.doi.org/10.56553/popets-2023-0046.
Full textPaiva, José, José Leal, and Álvaro Figueira. "Comparing semantic graph representations of source code: The case of automatic feedback on programming assignments." Computer Science and Information Systems, no. 00 (2024): 4. http://dx.doi.org/10.2298/csis230615004p.
Full textZhang, Ji, Baoming Bai, Xijin Mu, Hengzhou Xu, Zhen Liu, and Huaan Li. "Construction and Decoding of Rate-Compatible Globally Coupled LDPC Codes." Wireless Communications and Mobile Computing 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/4397671.
Full textMa, Hehuan, Yatao Bian, Yu Rong, Wenbing Huang, Tingyang Xu, Weiyang Xie, Geyan Ye, and Junzhou Huang. "Cross-dependent graph neural networks for molecular property prediction." Bioinformatics 38, no. 7 (January 30, 2022): 2003–9. http://dx.doi.org/10.1093/bioinformatics/btac039.
Full textCao, Xiansheng, Junfeng Wang, Peng Wu, and Zhiyang Fang. "VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives." IET Information Security 2024 (March 22, 2024): 1–15. http://dx.doi.org/10.1049/2024/4313185.
Full textFerreira, Mafalda, Miguel Monteiro, Tiago Brito, Miguel E. Coimbra, Nuno Santos, Limin Jia, and José Fragoso Santos. "Efficient Static Vulnerability Analysis for JavaScript with Multiversion Dependency Graphs." Proceedings of the ACM on Programming Languages 8, PLDI (June 20, 2024): 417–41. http://dx.doi.org/10.1145/3656394.
Full textYang, Yixiao, Xiang Chen, and Jiaguang Sun. "Improve Language Modeling for Code Completion Through Learning General Token Repetition of Source Code with Optimized Memory." International Journal of Software Engineering and Knowledge Engineering 29, no. 11n12 (November 2019): 1801–18. http://dx.doi.org/10.1142/s0218194019400229.
Full textKang, Mengjia, Jose A. Alvarado-Guzman, Luke V. Rasmussen, and Justin B. Starren. "Evolution of a Graph Model for the OMOP Common Data Model." Applied Clinical Informatics 15, no. 05 (October 2024): 1056–65. https://doi.org/10.1055/s-0044-1791487.
Full textChen, Yuanyuan, and Jing Chen. "Research on a New Analysis Algorithm of Virtual Trajectory Cryptography Technology for Password Encryption and Decryption Through Base Expanding." Journal of Physics: Conference Series 2179, no. 1 (January 1, 2022): 012032. http://dx.doi.org/10.1088/1742-6596/2179/1/012032.
Full textLaursen, Mathias Rud, Wenyuan Xu, and Anders Møller. "Reducing Static Analysis Unsoundness with Approximate Interpretation." Proceedings of the ACM on Programming Languages 8, PLDI (June 20, 2024): 1165–88. http://dx.doi.org/10.1145/3656424.
Full textDuprat, François, Jean-Luc Ploix, Jean-Marie Aubry, and Théophile Gaudin. "Fast and Accurate Prediction of Refractive Index of Organic Liquids with Graph Machines." Molecules 28, no. 19 (September 26, 2023): 6805. http://dx.doi.org/10.3390/molecules28196805.
Full textNiu, Guanglin, and Bo Li. "Logic and Commonsense-Guided Temporal Knowledge Graph Completion." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 4 (June 26, 2023): 4569–77. http://dx.doi.org/10.1609/aaai.v37i4.25579.
Full textKim, Suyeon, Dongha Lee, SeongKu Kang, Seonghyeon Lee, and Hwanjo Yu. "Learning Topology-Specific Experts for Molecular Property Prediction." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 7 (June 26, 2023): 8291–99. http://dx.doi.org/10.1609/aaai.v37i7.26000.
Full textKo, Jong Won. "Design of MDA Based Model Transformation Profile for Model Verification." Applied Mechanics and Materials 224 (November 2012): 69–72. http://dx.doi.org/10.4028/www.scientific.net/amm.224.69.
Full textCheon, Mookyung, Choongrak Kim, and Iksoo Chang. "Uncovering multiloci-ordering by algebraic property of Laplacian matrix and its Fiedler vector." Bioinformatics 32, no. 6 (November 14, 2015): 801–7. http://dx.doi.org/10.1093/bioinformatics/btv669.
Full textZhang, Feng, Guofan Li, Cong Liu, and Qian Song. "Flowchart-Based Cross-Language Source Code Similarity Detection." Scientific Programming 2020 (December 17, 2020): 1–15. http://dx.doi.org/10.1155/2020/8835310.
Full textMeng, Qingkun, Chao Feng, Bin Zhang, and Chaojing Tang. "Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning." Mathematical Problems in Engineering 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/5452396.
Full textJin, Hongjoo, Jiwon Lee, Sumin Yang, Kijoong Kim, and Dong Hoon Lee. "A Framework to Quantify the Quality of Source Code Obfuscation." Applied Sciences 14, no. 12 (June 10, 2024): 5056. http://dx.doi.org/10.3390/app14125056.
Full textTran, Van Dinh, Alessandro Sperduti, Rolf Backofen, and Fabrizio Costa. "Heterogeneous networks integration for disease–gene prioritization with node kernels." Bioinformatics 36, no. 9 (January 28, 2020): 2649–56. http://dx.doi.org/10.1093/bioinformatics/btaa008.
Full textXu, Chenxin, Siheng Chen, Maosen Li, and Ya Zhang. "Invariant Teacher and Equivariant Student for Unsupervised 3D Human Pose Estimation." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 4 (May 18, 2021): 3013–21. http://dx.doi.org/10.1609/aaai.v35i4.16409.
Full textAdams, Michael D., Eric Griffis, Thomas J. Porter, Sundara Vishnu Satish, Eric Zhao, and Cyrus Omar. "Grove: A Bidirectionally Typed Collaborative Structure Editor Calculus." Proceedings of the ACM on Programming Languages 9, POPL (January 7, 2025): 2176–204. https://doi.org/10.1145/3704909.
Full textButerez, David, Ioana Bica, Ifrah Tariq, Helena Andrés-Terré, and Pietro Liò. "CellVGAE: an unsupervised scRNA-seq analysis workflow with graph attention networks." Bioinformatics 38, no. 5 (December 2, 2021): 1277–86. http://dx.doi.org/10.1093/bioinformatics/btab804.
Full textSkavantzos, Philipp, and Sebastian Link. "Normalizing Property Graphs." Proceedings of the VLDB Endowment 16, no. 11 (July 2023): 3031–43. http://dx.doi.org/10.14778/3611479.3611506.
Full textFan, Kaixuan, and Meng Wang. "DAG-Based Formal Modeling of Spark Applications with MSVL." Information 14, no. 12 (December 12, 2023): 658. http://dx.doi.org/10.3390/info14120658.
Full textPietrusewicz, Krzysztof. "Metamodelling for Design of Mechatronic and Cyber-Physical Systems." Applied Sciences 9, no. 3 (January 22, 2019): 376. http://dx.doi.org/10.3390/app9030376.
Full textHuang, Zhijian, Ziyu Fan, Siyuan Shen, Min Wu, and Lei Deng. "MolMVC: Enhancing molecular representations for drug-related tasks through multi-view contrastive learning." Bioinformatics 40, Supplement_2 (September 1, 2024): ii190—ii197. http://dx.doi.org/10.1093/bioinformatics/btae386.
Full textChub, Iryna, and Kateryna Demchenko. "Optimizing the productivity of solutions built with the help of ReactJS and D3 libraries." Bulletin of Kharkov National Automobile and Highway University 1, no. 104 (April 9, 2024): 15. http://dx.doi.org/10.30977/bul.2219-5548.2024.104.1.15.
Full textKRIEGER, WOLFGANG. "On subshift presentations." Ergodic Theory and Dynamical Systems 37, no. 4 (March 8, 2016): 1253–90. http://dx.doi.org/10.1017/etds.2015.82.
Full textFreedman, Michael H., and Matthew B. Hastings. "Quantum Systems on Non-$k$-Hyperfinite Complexes: a generalization of classical statistical mechanics on expander graphs." Quantum Information and Computation 14, no. 1&2 (January 2014): 144–80. http://dx.doi.org/10.26421/qic14.1-2-9.
Full textJi, Xiujuan, Lei Liu, and Jingwen Zhu. "Code Clone Detection with Hierarchical Attentive Graph Embedding." International Journal of Software Engineering and Knowledge Engineering 31, no. 06 (June 2021): 837–61. http://dx.doi.org/10.1142/s021819402150025x.
Full textUpadhyay, Sarvagya. "Review of Introduction To Property Testing by Oded Goldreich." ACM SIGACT News 51, no. 4 (December 14, 2020): 6–10. http://dx.doi.org/10.1145/3444815.3444818.
Full textMurtaza, M., I. Javaid, and M. Fazil. "Covering codes of a graph associated to a finite vector space." Ukrains’kyi Matematychnyi Zhurnal 72, no. 7 (July 15, 2020): 952–59. http://dx.doi.org/10.37863/umzh.v72i7.652.
Full textLi, Yuanbo, Kris Satya, and Qirun Zhang. "Efficient algorithms for dynamic bidirected Dyck-reachability." Proceedings of the ACM on Programming Languages 6, POPL (January 16, 2022): 1–29. http://dx.doi.org/10.1145/3498724.
Full textPolak, Monika, and Vasyl Ustimenko. "Algorithms for generation of Ramanujan graphs, other Expanders and related LDPC codes." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 15, no. 2 (October 11, 2015): 14. http://dx.doi.org/10.17951/ai.2015.15.2.14-21.
Full textKim, Sein, Namkyeong Lee, Junseok Lee, Dongmin Hyun, and Chanyoung Park. "Heterogeneous Graph Learning for Multi-Modal Medical Data Analysis." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 4 (June 26, 2023): 5141–50. http://dx.doi.org/10.1609/aaai.v37i4.25643.
Full textde Albuquerque, Clarice Dias, Reginaldo Palazzo Jr., and Eduardo Brandani da Silva. "Families of codes of topological quantum codes from tessellations tessellations {4i+2,2i+1}, {4i,4i}, {8i-4,4} and ${12i-6,3}." Quantum Information and Computation 14, no. 15&16 (November 2014): 1424–40. http://dx.doi.org/10.26421/qic14.15-16-8.
Full textOsorio, Maximiliano, Carlos Buil-Aranda, Idafen Santana-Perez, and Daniel Garijo. "DockerPedia: A Knowledge Graph of Software Images and Their Metadata." International Journal of Software Engineering and Knowledge Engineering 32, no. 01 (January 2022): 71–89. http://dx.doi.org/10.1142/s0218194022500036.
Full textDr. Karansinh Rathod. "Perceiving Genre with Special Reference to the Academic Writing." International Peer Reviewed E Journal of English Language & Literature Studies - ISSN: 2583-5963 2, no. 2 (December 10, 2020): 210–41. http://dx.doi.org/10.58213/ell.v2i2.29.
Full textQiang, Weizhong, Shizhen Wang, Hai Jin, and Jiangying Zhong. "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS." Security and Communication Networks 2018 (October 17, 2018): 1–11. http://dx.doi.org/10.1155/2018/3130652.
Full textHammer, Barbara, Alessio Micheli, and Alessandro Sperduti. "Universal Approximation Capability of Cascade Correlation for Structures." Neural Computation 17, no. 5 (May 1, 2005): 1109–59. http://dx.doi.org/10.1162/0899766053491878.
Full textKurtukova, Anna, and Alexander Romanov. "Identification Author of Source Code by Machine Learning Methods." SPIIRAS Proceedings 18, no. 3 (June 4, 2019): 742–66. http://dx.doi.org/10.15622/sp.2019.18.3.741-765.
Full textYan, Zichao, William L. Hamilton, and Mathieu Blanchette. "Graph neural representational learning of RNA secondary structures for predicting RNA-protein interactions." Bioinformatics 36, Supplement_1 (July 1, 2020): i276—i284. http://dx.doi.org/10.1093/bioinformatics/btaa456.
Full textDuprat, François, Jean-Luc Ploix, and Gérard Dreyfus. "Can Graph Machines Accurately Estimate 13C NMR Chemical Shifts of Benzenic Compounds?" Molecules 29, no. 13 (July 1, 2024): 3137. http://dx.doi.org/10.3390/molecules29133137.
Full textJosipović, Lana, Shabnam Sheikhha, Andrea Guerrieri, Paolo Ienne, and Jordi Cortadella. "Buffer Placement and Sizing for High-Performance Dataflow Circuits." ACM Transactions on Reconfigurable Technology and Systems 15, no. 1 (March 31, 2022): 1–32. http://dx.doi.org/10.1145/3477053.
Full textYu, Le, Zihang Liu, Tongyu Zhu, Leilei Sun, Bowen Du, and Weifeng Lv. "Predicting Temporal Sets with Simplified Fully Connected Networks." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 4 (June 26, 2023): 4835–44. http://dx.doi.org/10.1609/aaai.v37i4.25609.
Full textConti, Roberto, Pierluca D’Adamio, Emanuele Galardi, Enrico Meli, Daniele Nocciolini, Luca Pugi, Andrea Rindi, Giulio Lo Presti, and Stefano Rossin. "Control design, simulation and validation of a turbo-machinery auxiliary plant." Proceedings of the Institution of Mechanical Engineers, Part E: Journal of Process Mechanical Engineering 231, no. 4 (April 15, 2016): 849–63. http://dx.doi.org/10.1177/0954408916644003.
Full text