Programming and Computer Software

Papers
(The median citation count of Programming and Computer Software is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Searching for Taint Vulnerabilities with Svace Static Analysis Tool57
Symbolic Investigation of the Spectral Characteristics of Guided Modes in Smoothly Irregular Waveguides15
Software Project Estimation Using Smooth Curve Methods and Variable Selection and Regularization Methods as an Alternative to Linear Regression Models when the Reference Database Presents a Wedge-shap9
Curve-Based Security Schemes for Automating the Encryption and Signing of Digital Documents in Organizational Environments9
Lower Bounds for the Rank of a Matrix with Zeros and Ones outside the Leading Diagonal9
Automatic Image Style Transfer using an Augmented Style Set8
3D Model Compression with Support of Parallel Processing on the GPU8
Effective Lower Bounds on the Matrix Rank and Their Applications7
Solving the Cauchy Problem for a Three-dimensional Difference Equation in a Parallelepiped7
Elements for Automatic Identification of Fallacies in Mexican Election Campaign Political Speeches7
Symbolic Calculations in the Study of Secular Perturbations in the Many-Body Problem with Variable Masses7
Study of the Problem of Ensuring Security in Storage and Processing of Confidential Data7
Software Implementation of an Algorithm for Automatic Detection of Lineaments and Their Properties in Open-Pit Dumps6
Metrics of Efficiency and Performance when Using Evolutionary Algorithm on Desktop Grids6
Binarization of the Swallow Swarm Optimization for Feature Selection6
Model of Pseudo-Random Sequences Generated by Encryption and Compression Algorithms6
Evaluation of Differential Equation Solutions through Traditional Techniques and Neural Networks in Quantum Simulations6
Human Event Recognition in Smart Classrooms Using Computer Vision: A Systematic Literature Review6
A Survey of Network Traffic Classification Methods Using Machine Learning5
Class Balancing Approaches to Improve for Software Defect Prediction Estimations: A Comparative Study5
RuGECToR: Rule-Based Neural Network Model for Russian Language Grammatical Error Correction5
Building Adaptable Dashboards for Smart Cities: Design and Evaluation5
Bibliographic Review on Data Mining Techniques Used with Weather Data4
How COVID-19 Pandemic affects Software Developers’ Wellbeing, and the Necessity to strengthen Soft Skills4
Specifying Data Quality Requirements through Web Functionalities – MOSQAF4
Complete Decision Procedure for the Theory of Bounded Pointer Arithmetic4
Multiclass U-Net Segmentation of Brain Electron Microscopy Data Using Original and Semi-Synthetic Training Datasets4
A Survey of Programming Language Memory Models4
Twenty Similarity Functions for Two Finite Sequences4
Representation of Traffic Congestion: A Multicriteria Analysis Approach Based on Distances4
Estimating the Complexity of Objects in Images4
Configurable Test System for RTOS4
Hardware Implementation of Code Converters Designed to Reduce the Length of Binary Encoded Words4
A Computational Approach for Evaluating Steady-State Probabilities and Virtual Waiting Time of a Multiprocessor Queuing System3
Description of Paralocks Language Semantics in TLA+3
Computational Aspects of the Horn–Kapranov Parametrization3
Model of a System for Servicing Multiprocessor Tasks without a Queue3
Level Lines of a Polynomial on a Plane3
Using Multilevel Hash Tables to Speed up Rendering3
Multigroup Classification of Firing Pin Impressions with the Use of a Fully Connected Neural Network3
Intuitionistic Fuzzy Recurrence Plots for Classifying Cardiac Arrhythmias Using Deep Learning3
Computer Algebra Calculations in Supersymmetric Electrodynamics3
Real-Time Analytics: Benefits, Limitations, and Tradeoffs3
A Package of Procedures and Functions for Construction and Inversion of Analytic Mappings with Unit Jacobian3
Symbolic-Numerical Implementation of the Model of Adiabatic Guided Modes for Two-Dimensional Irregular Waveguides3
Algorithm for Calculating Correctly Rounded Exponential Function in Double Precision Using Double-Extended Arithmetic3
Explicit Multiobjective Evolutionary Algorithms for Flow Shop Scheduling with Missing Operations3
Adaptive IIR Filter Based on Penalized Spline3
A Method for Improving the Caching Strategy for Computing Systems with Shared Memory2
Scrumlity: An Agile Framework Based on Quality of User Stories2
Combinatorial Reliability Analysis of Multicore Processors2
Classification of Non-functional Requirements Using Convolutional Neural Networks2
Joint Super-resolution and Tissue Patch Classification for Whole Slide Histological Images2
An Algorithm for Detecting Precipitation in Computer Processing of Video Images2
A Usability and Persuasion Evaluation of Mobile Apps for Diabetes Type 22
Specifics of the Development of an On-Board Visualization System for Civil Aircrafts2
New Approach for Online Voting Ensuring Privacy and Verifiability2
A Regression Model for Analysis of User Engagement on Facebook Fan Page for Scientific Dissemination Content2
Asymptotic Expansions of Solutions to the Second Term of the Fourth Painlevé Hierarchy2
Visualization Technologies to Support Decision-Making in City Management2
Usability Evaluation of BCI Software Applications: A systematic review of the literature2
A Taxonomic View of the Fundamental Concepts of Quantum Computing–A Software Engineering Perspective2
Artificial Intelligence (AI) Solution for Plasma Cells Detection2
On the Numerical Solution of the Characteristic Problems for One Class of Quasilinear Equations2
Parallel Approximation of Multidimensional Tensors Using GPUs2
Object Recognition and Coordinate Referencing of an Autonomous Underwater Vehicle to Objects via Video Stream2
Bitcoin Transaction Analysis System2
Noise Dependence on the Number of Rays in Bidirectional Stochastic Ray Tracing with Photon Maps2
Supporting the Architectural Knowledge Condensation in a Co-Localized Agile Environment for Small Entities Using an Ontology2
A Survey of Software Dynamic Analysis Methods2
Detection of Network Attacks in a Heterogeneous Industrial Network Based on Machine Learning2
Development of Multi-Platform Steganographic Software Based on Random-LSB2
Ensuring Interoperable IoT Device-to-Cloud Communication between AWS and Azure Infrastructures2
A Novel Intelligent System for Detection of Type 2 Diabetes with Modified Loss Function and Regularization2
360-Degree Video Based on Regular Dodecahedron: Technology and Methods of Implementation in Virtual Environment Systems2
Improving the Performance of Information Services in Systems Focused on Large, Rarely Modified Data2
Perfect Sets of Paths in the Full Graph of SDN Switches2
SafeComp: Protocol for Certifying Cloud Computations Integrity2
Decomposition of a Finite Quantum System into Subsystems: Symbolic–Numerical Approach2
Mathematical Modeling of Turbulent Mixing in Gas Systems with a Chevron Contact Boundary using NUT3D, BIC3D, EGAK, and MIMOSA Numerical Codes2
Computer-Algebraic Approach to First Differential Approximations: Van der Pol Oscillator2
Optimization of Neural Network Training for Image Recognition Based on Trigonometric Polynomial Approximation2
Usability Evaluation of a Mobile Learning Platform Focused on Learning Monitoring and Customization based on a Laboratory Study1
Symbolic Conversion of Holonomic Functions to Hypergeometric Type Power Series1
Analysis of Deep Neural Networks for Detection of Coronary Artery Stenosis1
Exploring a Web-Based Application to Convert Tamil and Vietnamese Speech to Text without the Effect of Code-Switching and Code-Mixing1
CASR: Analysis of Core Dump Files in Linux and Error Reporting1
Active Learning and Transfer Learning for Document Segmentation1
Exhaustive Use of Information on an Equation with Truncated Coefficients1
NO2 Data Analytics and Visualization Service: Improving Air Quality Insights in Armenia and Belarus1
Aging Properties of Actual and Virtual Waiting Times in the GI|G|1|∞ Queuing Model1
Data Repository in Framework for Computation Pipelining: Model, Architecture, the Implementation Performance Estimates1
Database Management System Verification with Separation Logics1
A Stream X-Machine Tool for Modelling and Generating Test Cases for Chronic Diseases Based on State-Counting Approach1
Cross-Lingual Transfer Learning in Drug-Related Information Extraction from User-Generated Texts1
Algorithms for Planning on Computational Model with Redundancy and Uncertainty1
Automated Creation of Cyber-Physical Museum Exhibits Using a Scientific Visualization System on a Chip1
Analysis of Traces on Discharged Bullets by the Congruent Matching Profile Segments Method and k-Nearest Neighbors1
Polynomial Relations for Bounds on the Exponents in Solutions to Operator Equations1
A Design Science Approach to Modeling the V Gene Annotation Process1
Analytical Review of Confidential Artificial Intelligence: Methods and Algorithms for Deployment in Cloud Computing1
A Method to Order Point Clouds for Visualization on the Ray Tracing Pipeline1
Investigation of RISC-V1
Image Restoration Using Genetic Algorithms1
‘True Concurrency’ Semantics for Time Petri Nets with Weak Time and Persistent Atomic Policies1
KIAM Astrodynamics Toolbox for Spacecraft Orbital Motion Design1
Mining User-Object Interaction Data for Student Modeling in Intelligent Learning Environments1
Constructing Onboard Switched Networks of Minimum Complexity1
Performance Model of Graphics Pipeline for a One-Pass Rendering of 3D Dynamic Scenes1
Symbolic Studies of Maxwell’s Equations in Space-Time Algebra Formalism1
On Implementation of Numerical Methods for Solving Ordinary Differential Equations in Computer Algebra Systems1
Survey of Methods for Automated Code-Reuse Exploit Generation1
Enhancing Android Ransomware Detection Using an Ensemble Machine Learning Classifier1
Supercomputer Environment for Recursive Matrix Algorithms1
Improving a Model for NFR Estimation Using Band Classification and Selection with KNN1
Image Motion Blur Removal Algorithm Based on Generative Adversarial Network1
Domain-Driven Design in Microservices-Based Systems Development: A Systematic Literature Review and Thematic Analysis1
Interprocedural Static Analysis for Finding Bugs in Go Programs1
Intraprocedural Analysis Based on Symbolic Execution for Bug Detection1
Towards Conversational Agents to support Informal Caregivers of People with Dementia: Challenges and Opportunities1
On Linear Cellular Automata1
Requirements and GitHub Issues: An Automated Approach for Quality Requirements Classification1
Tools for Capturing and Processing High-Speed Network Traffic1
Refactoring the Monolith Workflow into Independent Micro-Workflows to Support Stream Processing1
Students’ Systems Thinking Competency Level Detection through Software Cost Estimation Concept Modeling1
On Calculating Partial Sums of Multiple Numerical Series by Methods of Computer Algebra1
Application of Computer Simulation to the Anonymization of Personal Data: State-of-the-Art and Key Points1
Process Improvement in Software Requirements Engineering: A Systematic Mapping Study1
Hidden Monitoring Based on Keystroke Dynamics in Online Examination System1
An Image Hashing Algorithm Based on a Convolutional Neural Network1
Computing Unimodular Matrices of Power Transformations0
Modified Error Detection and Localization in the Residue Number System0
Admissible Ordering on Monomials is Well-Founded: A Constructive Proof0
Enumerator-Arguments As a Language Tool for Defining Loops0
Multiwindow Rendering on a Cockpit Display Using Hardware Acceleration0
Cloud Data Storage and Private Information Retrieval Аlgorithms0
Resonances and Periodic Motions of Atwood’s Machine with Two Oscillating Weights0
Manycore Parallel Simulations of Fishing Nets0
Information Flow Control in Software DB Units Based on Formal Verification0
Regular Memory Structures and Operation Domains of Intelligent Systems0
Ontology-Driven Visual Analytics Software Development0
Unified Processing of Events and Co-routines in Embedded Program0
CGWO: An Improved Grey Wolf Optimization Technique for Test Case Prioritization0
Formal Specification and Verification of Requirements in Architecture and Construction using the EXPRESS Modeling Language0
Verification of Compliance for Multilevel Models in Individual Trace Semantics0
Framework for Development and Execution of Scientific WorkFlows: Designing Service-Oriented Applications0
Comparative Efficiency Analysis of Hashing Algorithms for Use in zk-SNARK Circuits in Distributed Ledgers0
On Binary Solutions to a System of Linear Equations Modulo Three0
p-Adic Representation of Subsets of a Bounded Number Set0
A Model and Method for Detecting Information Campaigns0
Improving Fuzzing Using Input Data Offsets Comparison Information0
Soft and Hard Skills Gained by Students through Real Projects Developed at a University Software Company0
Efficiency Analysis of a Simulation Model of Cloud Computing in the Case of Multiple Server Failures0
Fuzzy Neural Networks That Change Their Configuration0
Building a Scale for Internet Fraud Detection Using Machine Learning0
Effective Implementations of Topic Modeling Algorithms0
Port-Hamiltonian Systems: Structure Recognition and Applications0
A Model and Declarative Language for Specifying Binary Data Formats0
Antipattern Practice for Essence Practice Library0
Quadrature Formula for the Direct Value of the Double-Layer Potential0
Automatic Code Generation of User-centered Serious Games: A Decade in Review0
Scenario of Information Flow Analysis Implementation in PL/SQL Program Units with PLIF Platform0
Runtime Verification of Operating Systems Based on Abstract Models0
Computing Level Lines of a Polynomial on the Plane0
Development of Algorithms and Software for Modeling Controlled Dynamic Systems Using Symbolic Computations and Stochastic Methods0
Interactive Calculation of Light Refraction and Caustics Using a Graphics Processor0
Guest Editorial Special Issue: “Emerging Trends in Advanced Computing and Next-Generation Technologies”0
Augmenting the Training Set of Histological Images with Adversarial Examples0
SPAM: An Enhanced Performance of Security and Privacy-Aware Model over Split Learning in Consumer Electronics0
Experimental Study of Algorithms for Minimization of Binary Decision Diagrams Using Algebraic Representations of Cofactors0
Preventing Vulnerabilities Caused by Optimization of Code with Undefined Behavior0
Supporting Vector Textures in a GPU Photorealistic Rendering System0
Metaclasses in UML and in Programming Languages0
An Extendable Essay on the Sage Computer Algebra System and an Editor for Creating Extendable Essays0
On the Calculation of the Number of Real Roots of a System of Nonalgebraic Equations Using Computer Algebra0
Comparing Two Learning Curves Approaches to Predict the Product Delivery Rate in a Software Factory Contract0
Improving the Analytic Hierarchy Process for Requirements Prioritization Using Evolutionary Computing0
Symbolic Computation of an Arbitrary-Order Resonance Condition in a Hamiltonian System0
Analysis of Behavior-Driven Development: A Thematic Synthesis0
Editorial0
Autonomous Swarm of Low-Cost Commercial Unmanned Aerial Vehicles for Surveillance0
Symbolic Algorithm for Finding Zeros of a System of Holomorphic Functions0
The Use of Functional Programming Library for Parallel Computing on CUDA0
Projective Geometric Algebra in Plane and Its Implementation in the Library Ganja.js0
Hybrid Binarization Method for Historical Handwritten Documents0
Optimization of ProVerif Programs for AKE Protocols0
Mission Preparation for Self-Organizing UAV Swarms on Multiuser Platform0
An Efficient Technology of Real-Time Modeling of Height Field Surface on the Ray Tracing Pipeline0
Strongly Cyclic Vectors0
Influence of Unequilateral Apertures of Digital Filters Laplacian “Trunced Pyramid” and “Double Pyramid” on the Accuracy of Television Measuring Systems0
Formal Verification of Blockchain Based Tender Systems0
Access Control Analysis in Heterogeneous Big Data Management Systems0
Construction of a Minimum Complexity Onboard Switched Network with Time Synchronization0
Guest Editorial Special Issue “Recent Trends on Advanced Computing: The Converging Technologies”0
Implementation of Geometric Algebra in Computer Algebra Systems0
Enhanced S2E for Analysis of Multi-Thread Software0
Analytical-Numerical Implementation of Polyvector Algebra in Julia0
Enhancing Image Recognition with Pre-Defined Convolutional Layers Based on PDEs0
Automation of C Program Deductive Verification without Using Loop Invariants0
3D Scene Reconstruction and Digitization Method for Mixed Reality Systems0
Automotive Post-Collision Control Software System: Requirements and Verification0
Constructing the Internal Voronoi Diagram of Polygonal Figure Using the Sweepline Method0
Construction of Pseudo-Geometric Integrators0
Exploring the Frontier of Software Engineering Education with Chatbots0
Decentralized Conditional Gradient Method on Time-Varying Graphs0
Software Testing in the DevOps Context: A Systematic Mapping Study0
Choice of Activation Function in Convolutional Neural Networks for Person Re-Identification in Video Surveillance Systems0
Dual Representation of Geometry for Ray Tracing Acceleration in Optical Systems with Freeform Surfaces0
Method for Enhancing High-Resolution Image Inpainting with Two-Stage Approach0
Method for Convolutional Neural Network Hardware Implementation Based on a Residue Number System0
Database Migration from ORACLE to PostgreSQL0
Algorithm for Solving the Cauchy Problem for a Two-Dimensional Difference Equation with Initial Data Defined in a “Strip”0
Symbolic-Numerical Implementation of the Galerkin Method for Approximate Solution of the Waveguide Diffraction Problem0
Adaptive Variant of the Frank–Wolfe Algorithm for Convex Optimization Problems0
RaceHunter Dynamic Data Race Detector0
Named Entity Recognition for Code Review Comments0
Optimal Placement of Base Stations in Integrated Design of Wireless Networks0
Algorithm for Finding Singular Points of a General Algebraic Hypersurface0
Requirements Validation in the Information System Software Development Lifecycle: A Software Quality in Use Evaluation0
Automated Assessment of the Progress and “Health” of Projects Based on the OMG Essence Standard0
Development of Algorithmic and Software Support for Symbolic Computations in Problems of Constructing Controlled Compartmental Models of Dynamic Systems0
Development of DSL Compilers for Specialized Processors0
A Universal Algorithm for Discretizing Bichromatic Two-Dimensional Graphic Codes0
Automated Method for Optimum Scale Search when Using Trained Models for Histological Image Analysis0
Typed Unknown Values: A Step towards Solving the Problem of Missing Data Representation in Relational Databases0
Neural Network Method for Detecting Blur in Histological Images0
On Accelerated Coordinate Descent Methods for Searching Equilibria in Two-Stage Transportation Equilibrium Traffic Flow Distribution Model0
Guest Editorial Special Issue “Software Engineering”0
Deep Learning Applications for Intrusion Detection in Network Traffic0
On Calculation of Abelian Differentials0
Efficient Implementation of Fast Hough Transform Using CPCA Coprocessor0
White Balance Correction for Detecting Holograms in Color Images of Black-and-White Photographs0
Method for Checking the Regularity of a Singular Point of a System of Linear Differential Equations with Meromorphic Coefficients0
Determination of Relevant Risk Factors for Breast Cancer Using Feature Selection0
On Computing the Resultant of a Polynomial and an Entire Function0
Structural Coverage Analysis of Entry and Exit Points Required to Achieve the Objectives Defined in DO-178C0
Kotlin from the Point of View of Static Analysis Developer0
Investigation of the Influence of Constant Torque on Equilibrium Orientations of a Satellite Moving in a Circular Orbit with the Use of Computer Algebra Methods0
Self-Organizing Multi-User UAV Swarm Simulation Platform0
Conversion of Point Cloud Data to 3D Models Using PointNet++ and Transformer0
Highly Realistic Visualization of Caustics and Rough Surfaces0
Architecture for Groupware Oriented to Collaborative Medical Activities in the Rehabilitation of Strokes0
A Simple Way to Improve Road Safety by Avoiding Dangerous Sections of the Route0
Searching for Laurent Solutions of Truncated Systems of Linear Differential Equations with the Use of EG-Eliminations0
Exploring Empirical-Theoretical Approaches for Conceptualizing and Specifying Cognitive Solutions in Complex Informally Structured Domains0
Integration of a Degenerate System of ODEs0
Using Dynamic Memory Reallocation in GInv0
Generation of Images with Handwritten Text in Russian0
Progressive Backward Photon Mapping0
Applying Computer Algebra Systems to Study Chaundy-Bullard Identities for the Vector Partition Function with Weight0
0.045687198638916