Academic literature on the topic 'Source code management systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Source code management systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Source code management systems"
Yesin, Vitalii, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura, and Kornel Warwas. "Hiding the Source Code of Stored Database Programs." Information 11, no. 12 (December 9, 2020): 576. http://dx.doi.org/10.3390/info11120576.
Full textGothard, A. "Back to the source [automatic code generation]." Information Professional 2, no. 4 (August 1, 2005): 38–42. http://dx.doi.org/10.1049/inp:20050407.
Full textAlthar, Raghavendra Rao, Abdulrahman Alahmadi, Debabrata Samanta, Mohammad Zubair Khan, and Ahmed H. Alahmadi. "Mathematical foundations based statistical modeling of software source code for software system evolution." Mathematical Biosciences and Engineering 19, no. 4 (2022): 3701–19. http://dx.doi.org/10.3934/mbe.2022170.
Full textLawal Abba, Hadiza, Abubakar Roko, Aminu B. Muhammad, Abdulgafar Usman, and Abba Almu. "Enhanced Semantic Similarity Detection of Program Code Using Siamese Neural Network." International Journal of Advanced Networking and Applications 14, no. 02 (2022): 5353–60. http://dx.doi.org/10.35444/ijana.2022.14205.
Full textGanesh, Sundarakrishnan, Francis Palma, and Tobias Olsson. "Are Source Code Metrics “Good Enough” in Predicting Security Vulnerabilities?" Data 7, no. 9 (September 7, 2022): 127. http://dx.doi.org/10.3390/data7090127.
Full textKanellopoulos, Y., C. Makris, and C. Tjortjis. "An improved methodology on information distillation by mining program source code." Data & Knowledge Engineering 61, no. 2 (May 2007): 359–83. http://dx.doi.org/10.1016/j.datak.2006.06.002.
Full textNaga Malleswari, D., and Dr K.Subrahmanyam. "SIS Framework for Risk Assessment Through Quantitative Analysis." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 367. http://dx.doi.org/10.14419/ijet.v7i2.32.15715.
Full textAlawneh, Ali, Iyad M. Alazzam, and Khadijah Shatnawi. "Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques." Big Data and Cognitive Computing 6, no. 4 (December 13, 2022): 156. http://dx.doi.org/10.3390/bdcc6040156.
Full textJadalla, Ameera, and Ashraf Elnagar. "PDE4Java: Plagiarism Detection Engine for Java source code: a clustering approach." International Journal of Business Intelligence and Data Mining 3, no. 2 (2008): 121. http://dx.doi.org/10.1504/ijbidm.2008.020514.
Full textWONG, W. ERIC, and JENNY LI. "REDESIGNING LEGACY SYSTEMS INTO THE OBJECT-ORIENTED PARADIGM." International Journal of Software Engineering and Knowledge Engineering 14, no. 03 (June 2004): 255–76. http://dx.doi.org/10.1142/s0218194004001634.
Full textDissertations / Theses on the topic "Source code management systems"
Hopfner, Marbod. "Source Code Analysis, Management, and Visualization for PROLOG." Doctoral thesis, kostenfrei, 2008. http://www.opus-bayern.de/uni-wuerzburg/volltexte/2009/3630/.
Full textBexell, Andreas. "Software Source Code Readability : A Mapping Study." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20164.
Full textCarlsson, Emil. "Software Developers Use of Source Code Summarization Comments : A qualitative study of software developers practices to understand third party source code libraries." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-46066.
Full textMendes, Rodrigo Cavalcante. "Search and retrieval of source code using the faceted approach." Universidade Federal de Pernambuco, 2008. https://repositorio.ufpe.br/handle/123456789/2097.
Full textSoftware Reuse has been considered a key concept to increase the quality and productivity of the software development by the reuse of existing artifacts, avoiding build new ones from scratch. However, In order to obtain effective benefits from the software reuse is necessary a set of complementary resources such as: education, active management support and the introduction of appropriate process and tools. In fact, resources that provide mechanism to ease the access of reusable components, such as search and retrieval tools, appear as potential instruments in favor of reuse programs adoption in the organizations. One of the challenges of the search and retrieval tools is how to make that existing components returned have a significant relevance. In this sense, the use of the faceted approach rises as a suitable alternative. This approach proposes the creation of a vocabulary supported by attributes, dividing the components into group of classes based on pre-defined keywords, increasing the level of precision and providing a more flexible classification. Thus, this work presents an extension of search and retrieval tool of reusable components, source code in particular, using the faceted classification approach. In addition, also was developed an auxiliary tool to aid the Domain expert to perform his activities using this approach. Finally, an experimental study evaluates the proposed solution
Ekmefjord, Morgan. "Evaluation of the Perforce Source Code Management Tool used in Agile Software Development." Thesis, Uppsala University, Department of Information Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-98334.
Full textFocus in this report is how the Perforce source code management tools can be used in the Extreme Programming methodology and how the different features of Perforce work with the challenges of managing source code while working in an agile way with extreme programming. The study shows how the extreme programming methodology users can use Perforce for their daily operation for paradigms such as continuous integration and 10 minutes build. The bridging between agile methods such as extreme programming and source code management tools are not very clear and in this report some aspects of uniting the two is explained.
Kiendys, Petrus, and Shadi Al-Zara. "Minimumkrav för ett CI-system." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20216.
Full textWhen a group of developers work on the same code base, conflicts may arise regarding the implementation of modules or subsystems that developers individually work on. These conflicts have to be resolved quickly in order for the project to advance at a steady pace. Developers who do not communicate changes or other necessary deviations may find themselves in a situation where new or modified modules or subsystems are impossible or very difficult to integrate into the mainline code-base. This often leads to so called “integration hell” where it could take huge amounts of time to adapt new code into the current state of the code-base. One strategy, which can be deployed to counteract this trend is called “continuous integration”. This practice offers a wide range of advantages when a group of developers collaborates on writing clean and stable code. Continuous integration can be put into practice without the use of any tools as it is a “way to do things” rather than an actual tool. With that said, it is possible to support the practice with a tangible tool called a CI-system.This study aims to give insight into the makings of a CI-system and what it fundamentally consists of and has to be able to do. A study of contemporary research reports regarding the subject and a survey was performed in order to substantiate claims and conclusions. Core characteristics of CI-systems are grouped into “functional requirements” and “non-functional requirements (quality attributes)”. By doing this, it is possible to quantify and categorize various core components and functionalities of a typical CI-system. This study also contains an attachment which provides instructions of how to get started with implementing your own CI-server using the CI-system software ”TeamCity”. The conclusion of this study is that a CI-system is an important tool that enables a more efficient software development process. By making use of CI-systems developers can refine the development process by preventing integration problems, automating some parts of the work process (build, test, feedback, deployment) and quickly finding and solving integration issues.
Kim, John Yongchae. "Resource management techniques for CDMA cellular systems." Diss., Georgia Institute of Technology, 2001. http://hdl.handle.net/1853/13906.
Full textKalkan, Olcay Altınkaya Mustafa Aziz. "Independent component analysis applications in CDMA systems/." [s.l.]: [s.n.], 2004. http://library.iyte.edu.tr/tezler/master/elektronikvehaberlesme/T000473.rar.
Full textHortlund, Andreas. "Security smells in open-source infrastructure as code scripts : A replication study." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-84422.
Full textSama, Sanjana. "An Empirical Study Investigating Source Code Summarization Using Multiple Sources of Information." Youngstown State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1527673352984124.
Full textBooks on the topic "Source code management systems"
Sim, Susan Elliott. Finding Source Code on the Web for Remix and Reuse. New York, NY: Springer New York, 2013.
Find full textFrederick, Jolitz William, ed. Source code secrets: The basic kernel. San Jose, Calif: Peer-to-Peer Communications, 1996.
Find full textPGP source code and internals. Cambridge, Mass: MIT Press, 1995.
Find full textLions, John. Lions' Commentary on UNIX 6th edition with source code. San Jose, Calif: Peer-to-Peer Communications, 1996.
Find full textFree and open source enterprise planning: Systems and strategies. Hershey, PA: Business Science Reference, 2012.
Find full textThought leaders: The source code of exceptional managers and entrepreneurs. New Delhi: Tata McGraw Hill Pub. Co., 2001.
Find full textThought leaders: The source code of exceptional managers and entrepreneurs. New Delhi: Tata McGraw Hill Publishing Company., 2008.
Find full textAndreu, Rafael. Information systems strategic planning: A source of competitive advantage. Oxford: Blackwell NCC, 1992.
Find full textOpen source software: Implementation and management. Amsterdam: Elsevier Digital Press, 2004.
Find full textEltschinger, Cyrill. Source code China: The new global hub of IT outsourcing. Hoboken, N.J: John Wiley & Sons, Inc., 2007.
Find full textBook chapters on the topic "Source code management systems"
Marwedel, Peter. "Optimization." In Embedded Systems, 349–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60910-8_7.
Full textLepiller, Julien, Ruzica Piskac, Martin Schäf, and Mark Santolucito. "Analyzing Infrastructure as Code to Prevent Intra-update Sniping Vulnerabilities." In Tools and Algorithms for the Construction and Analysis of Systems, 105–23. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72013-1_6.
Full textPiper, Ian. "Source-Code Management with Subversion." In Learn Xcode Tools for Mac OS X and iPhone Development, 187–206. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-7220-5_10.
Full textMens, Kim, and Angela Lozano. "Source Code-Based Recommendation Systems." In Recommendation Systems in Software Engineering, 93–130. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45135-5_5.
Full textYadav, Krishna, Rutuja Kamble, Sumit Kale, Yash Pazare, and Pallavi Ahire. "Source Code Obfuscation: Novel Technique and Implementation." In ICT Systems and Sustainability, 197–204. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5987-4_21.
Full textSilva, Clóvis Daniel Souza, Leonardo Ferreira da Costa, Leonardo Sampaio Rocha, and Gerardo Valdísio Rodrigues Viana. "KNN Applied to PDG for Source Code Similarity Classification." In Intelligent Systems, 471–82. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61380-8_32.
Full textGupta, Aakanshi, Bharti Suri, and Bimlesh Wadhwa. "A Detection Tool for Code Bad Smells in Java Source Code." In Advances in Intelligent Systems and Computing, 479–88. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1275-9_39.
Full textJain, Amay Dilip, Ankur Gupta, Diksha Choudhary, Nayan, and Ashish Tiwari. "A Comprehensive Source Code Plagiarism Detection Software." In Advances in Intelligent Systems and Computing, 343–50. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0475-2_30.
Full textLokuciejewski, Paul, and Peter Marwedel. "WCET-Aware Source Code Level Optimizations." In Worst-Case Execution Time Aware Compilation Techniques for Real-Time Systems, 61–129. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-90-481-9929-7_4.
Full textPatel, Smit, and Roopak Sinha. "Combining Holistic Source Code Representation with Siamese Neural Networks for Detecting Code Clones." In Testing Software and Systems, 148–59. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04673-5_12.
Full textConference papers on the topic "Source code management systems"
Majumdar, Rana, Rachna Jain, Shivam Barthwal, and Chetna Choudhary. "Source code management using version control system." In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2017. http://dx.doi.org/10.1109/icrito.2017.8342438.
Full textIlk, Noyan, J. Leon Zhao, and Paul Hofmann. "On Reuse of Source Code Components in Modernizing Enterprise Systems." In 2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises, AMIGE. IEEE, 2008. http://dx.doi.org/10.1109/amige.2008.ecp.65.
Full textAjmal, Omer, M. M. Saad Missen, Tazeen Hashmat, M. Moosa, and Tenvir Ali. "EPlag: A two layer source code plagiarism detection system." In 2013 Eighth International Conference on Digital Information Management (ICDIM). IEEE, 2013. http://dx.doi.org/10.1109/icdim.2013.6693984.
Full textJeong-Hoon Ji, Su-Hyun Park, Gyun Woo, and Hwan-Gue Cho. "Source code management system for E-learning based programming education." In 2007 2nd International Conference on Digital Information Management. IEEE, 2007. http://dx.doi.org/10.1109/icdim.2007.4444250.
Full textJohn, Gordon H., Nigel Reeves, Amy C. Nisbet, Clive R. Williams, and Andrew Garnet. "UK Surplus Source Disposal Programme." In ASME 2009 12th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2009. http://dx.doi.org/10.1115/icem2009-16097.
Full textCho, Dong-Keun, GwangMin Sun, JongWon Choi, Donghyeun Hwang, Hak-Soo Kim, and Tae-Won Hwang. "Verification of Source Term Analysis System for Decommissioning Wastes From a CANDU Reactor." In ASME 2010 13th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2010. http://dx.doi.org/10.1115/icem2010-40202.
Full textFadhil, Hilal Adnan, S. A. Aljunid, and R. B. Ahmad. "New Code Structures Based on Coherent and Incoherent Sources for Spectral Amplitude Coding-OCDMA Systems." In 2009 International Conference on Information Management and Engineering. IEEE, 2009. http://dx.doi.org/10.1109/icime.2009.156.
Full textHerb, Joachim. "A Continuous Integration Platform for the Deterministic Safety Analyses Code System AC2." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-81123.
Full textCepraga, D. G., G. Cambi, M. Frisoni, and D. Ene. "Cemented Containers Radiological Data From a Disused Uranium Mine Low-Level Waste Repository: A Calculated-Experiment Cross-Check for Data Verification and Validation." In ASME 2003 9th International Conference on Radioactive Waste Management and Environmental Remediation. ASMEDC, 2003. http://dx.doi.org/10.1115/icem2003-4516.
Full textWatanabe, Masato, and Motonori Nakagami. "Evaluation of the Activated Radioactivity of Turbine Equipments in BWR." In ASME 2010 13th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2010. http://dx.doi.org/10.1115/icem2010-40294.
Full textReports on the topic "Source code management systems"
Ehrenshaft, A. R., and L. L. Wright. The SRWCP database management system: Users guide, data definitions, and source code. Office of Scientific and Technical Information (OSTI), February 1989. http://dx.doi.org/10.2172/6240075.
Full textSeacord, Robert C., William Dormann, James McCurley, Philip Miller, Robert Stoddard, David Svoboda, and Jefferson Welch. Source Code Analysis Laboratory (SCALe) for Energy Delivery Systems. Fort Belvoir, VA: Defense Technical Information Center, December 2010. http://dx.doi.org/10.21236/ada537058.
Full textHarris, James, James Harris, James Harris, James Harris, James Harris, James Harris, James Harris, et al. Build Guide for the Geophysical Monitoring Systems Common Source Code. Office of Scientific and Technical Information (OSTI), August 2019. http://dx.doi.org/10.2172/1763206.
Full textWagner, D., and M. Foster. Integrated Information Support System (IISS). Volume 3. Configuration Management. Part 17. VAX Installation Guide for Source Code0. Fort Belvoir, VA: Defense Technical Information Center, September 1990. http://dx.doi.org/10.21236/ada250121.
Full textLaramée, R. M. Source code for GlobalDBSystem, data management interfaces for mineral deposit databases, World Minerals Geoscience Database Project. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2015. http://dx.doi.org/10.4095/296953.
Full textUNISYS CORP RESTON VA. Software Technology for Adaptable, Reliable Systems (STARS). Reuse Library Framework Source Code Installation Guide. Version 4.1. Fort Belvoir, VA: Defense Technical Information Center, March 1993. http://dx.doi.org/10.21236/ada284935.
Full textKhan, Mahreen. Evaluating External Government Audit. Institute of Development Studies, September 2022. http://dx.doi.org/10.19088/k4d.2022.140.
Full textCruickshank, Garry, and Don Mardle. Wetback Research: Thermodynamic Flow Characteristics of Passive Thermosyphon Energy Transfer from Independent Heat Source to Remote Storage Using Both Direct and Indirect Systems. Unitec ePress, December 2022. http://dx.doi.org/10.34074/rsrp.094.
Full textRazdan, Rahul. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software. SAE International, April 2021. http://dx.doi.org/10.4271/epr2021009.
Full textMaletta, Giovanna, and Mike Lewis. Post-shipment On-site Inspections and Stockpile Management Assistance: Bridging Gaps. Stockholm International Peace Research Institute, August 2022. http://dx.doi.org/10.55163/ulfp1679.
Full text