Search

Your search keyword '"FLOWGRAPHS"' showing total 1,151 results

Search Constraints

Start Over You searched for: Descriptor "FLOWGRAPHS" Remove constraint Descriptor: "FLOWGRAPHS"
1,151 results on '"FLOWGRAPHS"'

Search Results

1. Fast power flow calculation for distribution networks based on graph models and hierarchical forward-backward sweep parallel algorithm.

2. Enhancing Risk Assessment Accuracy: Addressing Organizational Complexity through Graph-Based Models and Correction Factors.

3. On evolution PDEs on co-evolving graphs.

4. Software Weakness Detection in Solidity Smart Contracts Using Control and Data Flow Analysis: A Novel Approach with Graph Neural Networks.

5. Generalised heat kernel invariants of a graph and application to object clustering.

6. Circular flows in mono‐directed signed graphs.

7. SAT-Based Exact Modulo Scheduling Mapping for Resource-Constrained CGRAs.

8. A novel spatial-temporal prediction method for the effects of fish movement on flow field based on hybrid deep neural network.

9. A Framework to Quantify the Quality of Source Code Obfuscation.

10. Simulating inter-city population flows based on graph neural networks.

11. An Efficient Algorithm for All-Pairs Bounded Edge Connectivity.

12. Plot extraction and the visualization of narrative flow.

13. Function-Level Compilation Provenance Identification with Multi-Faceted Neural Feature Distillation and Fusion.

14. CFIEE: An Open-Source Critical Metadata Extraction Tool for RISC-V Hardware-Based CFI Schemes.

15. TITAN: Combining a bidirectional forwarding graph and GCN to detect saturation attack targeted at SDN.

16. Stability of the ball under volume preserving fractional mean curvature flow.

17. Intelligent code search aids edge software development.

18. Recent advances in manufacturing and processing technologies through graph theoretical approach: A survey.

19. Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction.

20. Tracing two decades of carbon emissions using a network approach.

21. A Method for Modeling and Testing Near-Real-Time System Scenarios.

22. Predicting Traffic Flow Using Dynamic Spatial-Temporal Graph Convolution Networks.

23. AFL++: A Vulnerability Discovery and Reproduction Framework.

24. Improving Coverage and Vulnerability Detection in Smart Contract Testing Using Self-Adaptive Learning GA.

25. A novel Multi-Level Refined (MLR) knowledge graph design and chatbot system for healthcare applications.

26. Wideband 4×4 Nolen Matrix with 360° Continuously Tuned Differential Phase and Low In-Band Phase Deviation Error.

27. Energy-efficient and delay-sensitive-based data gathering technique for multi-hop WSN using path-constraint mobile element.

28. Overlaying Control Flow Graphs on P4 Syntax Trees with Gremlin.

29. String Diagram Rewrite Theory I: Rewriting with Frobenius Structure.

30. Constant Sum Group Flows of Graphs.

31. Integrated Attack Tree in Residual Risk Management Framework.

32. LONGCGDROID: ANDROID MALWARE DETECTION THROUGH LONGITUDINAL STUDY FOR MACHINE LEARNING AND DEEP LEARNING.

33. Methods for the graph realization problem.

34. Applying Coding Behavior Features to Student Plagiarism Detection on Programming Assignments.

35. On moduli spaces of roots in algebraic and tropical geometry.

36. Speculation-Free Function Table Construction in LLVM IR for Fine-Grained Control Flow Integrity.

37. Digital Twinning and Optimization of Manufacturing Process Flows.

38. Semantic-Enriched Code Knowledge Graph to Reveal Unknowns in Smart Contract Code Reuse.

39. A Static Detection Method for SQL Injection Vulnerability Based on Program Transformation.

40. An Alternative Static Taint Analysis Framework to Detect PHP Web Shell-Based Web Attacks.

41. Graph-Based Feature Learning for Cross-Project Software Defect Prediction.

42. Graph-Indexed k NN Query Optimization on Road Network.

43. MaGNAS: A Mapping-Aware Graph Neural Architecture Search Framework for Heterogeneous MPSoC Deployment.

44. Binary code similarity analysis based on naming function and common vector space.

45. BejaGNN: behavior-based Java malware detection via graph neural network.

46. Symmetries of the one-dimensional hyperbolic Lagrangian mean curvature flow.

47. Nonabelian flows in networks.

48. Spectral domain graph convolutional deep neural network for predicting unsteady and nonlinear flows.

49. A Hypothesis Testing-based Framework for Software Cross-modal Retrieval in Heterogeneous Semantic Spaces.

50. Traffic Flow Forecasting of Graph Convolutional Network Based on Spatio-Temporal Attention Mechanism.

Catalog

Books, media, physical & digital resources