Journal articles on the topic 'Source code management systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Source code management systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yesin, Vitalii, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura, and Kornel Warwas. "Hiding the Source Code of Stored Database Programs." Information 11, no. 12 (December 9, 2020): 576. http://dx.doi.org/10.3390/info11120576.
Full textGothard, A. "Back to the source [automatic code generation]." Information Professional 2, no. 4 (August 1, 2005): 38–42. http://dx.doi.org/10.1049/inp:20050407.
Full textAlthar, Raghavendra Rao, Abdulrahman Alahmadi, Debabrata Samanta, Mohammad Zubair Khan, and Ahmed H. Alahmadi. "Mathematical foundations based statistical modeling of software source code for software system evolution." Mathematical Biosciences and Engineering 19, no. 4 (2022): 3701–19. http://dx.doi.org/10.3934/mbe.2022170.
Full textLawal Abba, Hadiza, Abubakar Roko, Aminu B. Muhammad, Abdulgafar Usman, and Abba Almu. "Enhanced Semantic Similarity Detection of Program Code Using Siamese Neural Network." International Journal of Advanced Networking and Applications 14, no. 02 (2022): 5353–60. http://dx.doi.org/10.35444/ijana.2022.14205.
Full textGanesh, Sundarakrishnan, Francis Palma, and Tobias Olsson. "Are Source Code Metrics “Good Enough” in Predicting Security Vulnerabilities?" Data 7, no. 9 (September 7, 2022): 127. http://dx.doi.org/10.3390/data7090127.
Full textKanellopoulos, Y., C. Makris, and C. Tjortjis. "An improved methodology on information distillation by mining program source code." Data & Knowledge Engineering 61, no. 2 (May 2007): 359–83. http://dx.doi.org/10.1016/j.datak.2006.06.002.
Full textNaga Malleswari, D., and Dr K.Subrahmanyam. "SIS Framework for Risk Assessment Through Quantitative Analysis." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 367. http://dx.doi.org/10.14419/ijet.v7i2.32.15715.
Full textAlawneh, Ali, Iyad M. Alazzam, and Khadijah Shatnawi. "Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques." Big Data and Cognitive Computing 6, no. 4 (December 13, 2022): 156. http://dx.doi.org/10.3390/bdcc6040156.
Full textJadalla, Ameera, and Ashraf Elnagar. "PDE4Java: Plagiarism Detection Engine for Java source code: a clustering approach." International Journal of Business Intelligence and Data Mining 3, no. 2 (2008): 121. http://dx.doi.org/10.1504/ijbidm.2008.020514.
Full textWONG, W. ERIC, and JENNY LI. "REDESIGNING LEGACY SYSTEMS INTO THE OBJECT-ORIENTED PARADIGM." International Journal of Software Engineering and Knowledge Engineering 14, no. 03 (June 2004): 255–76. http://dx.doi.org/10.1142/s0218194004001634.
Full textEid, Salma, Soha Makady, and Manal Ismail. "Detecting software performance problems using source code analysis techniques." Egyptian Informatics Journal 21, no. 4 (December 2020): 219–29. http://dx.doi.org/10.1016/j.eij.2020.02.002.
Full textEichinger, Frank, David Kramer, Klemens Böhm, and Wolfgang Karl. "From source code to runtime behaviour: Software metrics help to select the computer architecture." Knowledge-Based Systems 23, no. 4 (May 2010): 343–49. http://dx.doi.org/10.1016/j.knosys.2009.11.014.
Full textBADUROWICZ, Marcin. "DETECTION OF SOURCE CODE IN INTERNET TEXTS USING AUTOMATICALLY GENERATED MACHINE LEARNING MODELS." Applied Computer Science 18, no. 1 (March 30, 2022): 89–98. http://dx.doi.org/10.35784/acs-2022-7.
Full textChen, Boyuan, and Zhen Ming (Jack) Jiang. "A Survey of Software Log Instrumentation." ACM Computing Surveys 54, no. 4 (May 2021): 1–34. http://dx.doi.org/10.1145/3448976.
Full textBukhari, Khulood, and Rana Malek. "Open-source automated insulin delivery systems for the management of type 1 diabetes during pregnancy." BMJ Case Reports 14, no. 9 (September 2021): e243522. http://dx.doi.org/10.1136/bcr-2021-243522.
Full textLecher, Alanna L. "Open-Source Code for Radium-Derived Ocean-Groundwater Modeling: Project Open RaDOM." Hydrology 9, no. 6 (June 14, 2022): 106. http://dx.doi.org/10.3390/hydrology9060106.
Full textWeig, Eric C., and Michael Slone. "SPOKEdb: open-source information management system for oral history." Digital Library Perspectives 34, no. 2 (May 14, 2018): 101–16. http://dx.doi.org/10.1108/dlp-03-2017-0012.
Full textYermolenko, Andrei, and Yuriy Golchevskiy. "Developing Web Content Management Systems – from the Past to the Future." SHS Web of Conferences 110 (2021): 05007. http://dx.doi.org/10.1051/shsconf/202111005007.
Full textDas Neves, D., D. Fenn, and P. Sulcas. "Selection of enterprise resource planning (ERP) systems." South African Journal of Business Management 35, no. 1 (March 31, 2004): 45–52. http://dx.doi.org/10.4102/sajbm.v35i1.651.
Full textLee, Yangsun. "A Study on Intermediate Code Generation for Security Weakness Analysis of Smart Contract Chaincode." Webology 19, no. 1 (January 20, 2022): 4745–60. http://dx.doi.org/10.14704/web/v19i1/web19318.
Full textAbdulsalam, Abeer, and Nazre Abdul Rashid. "Comparative Analysis of Machine Learning Techniques for Splitting Identifiers within Source Code." Webology 17, no. 2 (December 21, 2020): 776–87. http://dx.doi.org/10.14704/web/v17i2/web17066.
Full textSaini, Munish, Sandeep Mehmi, and Kuljit Kaur Chahal. "Understanding Open Source Software Evolution Using Fuzzy Data Mining Algorithm for Time Series Data." Advances in Fuzzy Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/1479692.
Full textKanwal, Jaweria, Onaiza Maqbool, Hamid Abdul Basit, Muddassar Azam Sindhu, and Katsuro Inoue. "Historical perspective of code clone refactorings in evolving software." PLOS ONE 17, no. 12 (December 1, 2022): e0277216. http://dx.doi.org/10.1371/journal.pone.0277216.
Full textZhang, Wangda, Junyoung Kim, Kenneth A. Ross, Eric Sedlar, and Lukas Stadler. "Adaptive code generation for data-intensive analytics." Proceedings of the VLDB Endowment 14, no. 6 (February 2021): 929–42. http://dx.doi.org/10.14778/3447689.3447697.
Full textBoretto, Marco, Wojciech Brylinski, Giovanna Lehmann Miotto, Enrico Gamberini, Roland Sipos, and Viktor Vilhelm Sonesten. "DAQling: an open-source data acquisition framework." EPJ Web of Conferences 245 (2020): 01026. http://dx.doi.org/10.1051/epjconf/202024501026.
Full textMahomodally, A. Fatwimah Humairaa, and Geerish Suddul. "An Enhanced Freelancer Management System with Machine Learning-based Hiring." Shanlax International Journal of Arts, Science and Humanities 9, no. 3 (January 1, 2022): 34–41. http://dx.doi.org/10.34293/sijash.v9i3.4405.
Full textRábová, Ivana, and Michal Hodinka. "Business rules in knowledge management and in information systems – methodology of mining business rules and knowledge." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 59, no. 4 (2011): 267–72. http://dx.doi.org/10.11118/actaun201159040267.
Full textDomingos, Dulce, and Francisco Martins. "Using BPMN to model Internet of Things behavior within business process." International Journal of Information Systems and Project Management 5, no. 4 (January 31, 2022): 39–51. http://dx.doi.org/10.12821/ijispm050403.
Full textLee, Sangwoo, and Jungwon Cho. "Malware Authorship Attribution Model using Runtime Modules based on Automated Analysis." JOIV : International Journal on Informatics Visualization 6, no. 1-2 (May 31, 2022): 214. http://dx.doi.org/10.30630/joiv.6.1-2.941.
Full textYudachev, S. S., P. A. Monakhov, and N. A. Gordienko. "Industry 4.0 Digital Technologies for data collection and control." Glavnyj mekhanik (Chief Mechanic), no. 6 (May 25, 2021): 43–58. http://dx.doi.org/10.33920/pro-2-2106-04.
Full textKovács, Attila, and Kristóf Szabados. "Internal quality evolution of a large test system – an industrial study." Acta Universitatis Sapientiae, Informatica 8, no. 2 (December 1, 2016): 216–40. http://dx.doi.org/10.1515/ausi-2016-0010.
Full textNg, Celeste See-Pui. "Exploring Relationships in Tailoring Option, Task Category, and Effort in ERP Software Maintenance." International Journal of Enterprise Information Systems 9, no. 2 (April 2013): 83–105. http://dx.doi.org/10.4018/jeis.2013040105.
Full textGreiner, Sandra, and Thomas Buchmann. "Round-trip Engineering UML Class Models and Java Models." International Journal of Information System Modeling and Design 7, no. 3 (July 2016): 72–92. http://dx.doi.org/10.4018/ijismd.2016070104.
Full textJacobs, Gabriel, and Cliona O’Neill. "On the reliability (or otherwise) of SIC codes." European Business Review 15, no. 3 (June 1, 2003): 164–69. http://dx.doi.org/10.1108/09555340310474668.
Full textAlthar, Raghavendra Rao, Debabrata Samanta, Manjit Kaur, Abeer Ali Alnuaim, Nouf Aljaffan, and Mohammad Aman Ullah. "Software Systems Security Vulnerabilities Management by Exploring the Capabilities of Language Models Using NLP." Computational Intelligence and Neuroscience 2021 (December 27, 2021): 1–19. http://dx.doi.org/10.1155/2021/8522839.
Full textMaruping, Likoebe M., Sherae L. Daniel, and Marcelo Cataldo. "Developer Centrality and the Impact of Value Congruence and Incongruence on Commitment and Code Contribution Activity in Open Source Software Communities." MIS Quarterly 43, no. 3 (January 1, 2019): 951–76. http://dx.doi.org/10.25300/misq/2019/13928.
Full textYe, Sheng, Jing Wang, Sikandar Ali, Hasan Ali Khattak, Chenhong Guo, and Zhongguo Yang. "Recovering Latent Data Flow from Business Process Model Automatically." Wireless Communications and Mobile Computing 2022 (June 20, 2022): 1–11. http://dx.doi.org/10.1155/2022/7579515.
Full textPendharkar, Parag C. "Scale economies and production function estimation for object-oriented software component and source code documentation size." European Journal of Operational Research 172, no. 3 (August 2006): 1040–50. http://dx.doi.org/10.1016/j.ejor.2004.10.023.
Full textSingh Negi, Dheeraj. "Open source software using New GEN LIB: a case study of international management institutue Bhubaneswar." Library Hi Tech News 31, no. 9 (October 28, 2014): 9–10. http://dx.doi.org/10.1108/lhtn-07-2014-0056.
Full textKumar, Supriya, Matthew Arnold, Glen James, and Rema Padman. "Developing a common data model approach for DISCOVER CKD: A retrospective, global cohort of real-world patients with chronic kidney disease." PLOS ONE 17, no. 9 (September 29, 2022): e0274131. http://dx.doi.org/10.1371/journal.pone.0274131.
Full textVijaykumar, Nandita, Ataberk Olgun, Konstantinos Kanellopoulos, F. Nisa Bostanci, Hasan Hassan, Mehrshad Lotfi, Phillip B. Gibbons, and Onur Mutlu. "MetaSys: A Practical Open-source Metadata Management System to Implement and Evaluate Cross-layer Optimizations." ACM Transactions on Architecture and Code Optimization 19, no. 2 (June 30, 2022): 1–29. http://dx.doi.org/10.1145/3505250.
Full textYadav, Dharmveer Kumar, and Sandip Kumar Dutta. "Test Case Prioritization Using Clustering Approach for Object Oriented Software." International Journal of Information System Modeling and Design 10, no. 3 (July 2019): 92–109. http://dx.doi.org/10.4018/ijismd.2019070106.
Full textSchlurmann, Torsten, Widjo Kongko, Nils Goseberg, Danny Hilman Natawidjaja, and Kerry Sieh. "NEAR-FIELD TSUNAMI HAZARD MAP PADANG, WEST SUMATRA: UTILIZING HIGH RESOLUTION GEOSPATIAL DATA AND RESEASONABLE SOURCE SCENARIOS." Coastal Engineering Proceedings 1, no. 32 (January 19, 2011): 26. http://dx.doi.org/10.9753/icce.v32.management.26.
Full textAli-Hassan, Hossam. "Social Capital in Management Information Systems Literature." Journal of Information Technology Research 6, no. 4 (October 2013): 1–17. http://dx.doi.org/10.4018/jitr.2013100101.
Full textQuan, Wei, Wenwen Fu, Jinli Yan, and Zhigang Sun. "OpenTSN: an open-source project for time-sensitive networking system development." CCF Transactions on Networking 3, no. 1 (August 5, 2020): 51–65. http://dx.doi.org/10.1007/s42045-020-00029-8.
Full textMashingaidze, Sivave. "Ethical intelligence: Espousing African Ubuntu philosophical business approach with Jewish business ethics systems as panacea for corporate failure in Africa." Corporate Ownership and Control 12, no. 1 (2014): 473–89. http://dx.doi.org/10.22495/cocv12i1c5p3.
Full textLi, Tong, Shiheng Wang, David Lillis, and Zhen Yang. "Combining Machine Learning and Logical Reasoning to Improve Requirements Traceability Recovery." Applied Sciences 10, no. 20 (October 16, 2020): 7253. http://dx.doi.org/10.3390/app10207253.
Full textMann, Suman, Nitish Pathak, Neelam Sharma, Raju Kumar, Rabins Porwal, Sheelesh Kr Sharma, and Saw Mon Yee Aung. "Study of Energy-Efficient Optimization Techniques for High-Level Homogeneous Resource Management." Wireless Communications and Mobile Computing 2022 (July 27, 2022): 1–12. http://dx.doi.org/10.1155/2022/1953510.
Full textVorobyova, Anna E., Inna E. Fedyunina, and Ekaterina A. Vinogradova. "LINGUISTIC AND MENTAL ASPECTS OF THE TRANSLATION OF OFFICIAL TEXTS (BASED ON THE OFFICIAL DOCUMENTS OF PRESS SERVICES AND NEWS PORTALS)." Sovremennye issledovaniya sotsialnykh problem 14, no. 4 (December 29, 2022): 372–87. http://dx.doi.org/10.12731/2077-1770-2022-14-4-372-387.
Full textDeswary, Dwi, and Ary Sutanto. "DEVELOPMENT OF MANAGEMENT INFORMATION SYSTEM IN MASTER STUDY PROGRAM ON EDUCATION MANAGEMENT GRADUATE PROGRAM OF JAKARTA STATE UNIVERSITY." IJER - INDONESIAN JOURNAL OF EDUCATIONAL REVIEW 4, no. 1 (July 3, 2017): 44. http://dx.doi.org/10.21009/ijer.04.01.05.
Full text