To see the other types of publications on this topic, follow the link: Software Tools and Techniques.

Dissertations / Theses on the topic 'Software Tools and Techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Software Tools and Techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Lomsak, Daniel. "Toward More Composable Software-Security Policies: Tools and Techniques." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4531.

Full text
Abstract:
Complex software-security policies are dicult to specify, understand, and update. The same is true for complex software in general, but while many tools and techniques exist for decomposing complex general software into simpler reusable modules (packages, classes, functions, aspects, etc.), few tools exist for decomposing complex security policies into simpler reusable modules. The tools that do exist for modularizing policies either encapsulate entire policies as atomic modules that cannot be decomposed or allow ne-grained policy modularization but require expertise to use correctly. This dissertation presents a policy-composition tool called PoliSeer [27, 26] and the PoCo policy-composition software-security language. PoliSeer is a GUI-based tool designed to enable users who are not expert policy engineers to exibly specify, visualize, modify, and enforce complex runtime policies on untrusted software. PoliSeer users rely on expert policy engineers to specify universally composable policy modules; PoliSeer users then build complex policies by composing those expert-written modules. This dissertation describes the design and implementation of PoliSeer and a case study in which we have used PoliSeer to specify and enforce a policy on PoliSeer itself. PoCo is a language for specifying composable software-security policies. PoCo users specify software-security policies in terms of abstract input-output event sequences. The policy outputs are expressive, capable of describing all desired, irrelevant, and prohibited events at once. These descriptive outputs compose well: operations for combining them satisfy a large number of algebraic properties, which allows policy hierarchies to be designed more simply and naturally. We demonstrate PoCo's capability via a case study in which a sophisticated policy is implemented in PoCo.
APA, Harvard, Vancouver, ISO, and other styles
2

O'Neill, I. M. "Logic programming tools and techniques for imperative program verification." Thesis, University of Southampton, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.380044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

D'Souza, Rosario J. "Techniques and tools for implementing and testing robust object-oriented software." Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/9198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Serrano, José Artur Ferreira da Silva e. Vale. "Automatic generation of software design tools supporting semantics of modelling techniques." Thesis, University of Glasgow, 1997. http://theses.gla.ac.uk/7018/.

Full text
Abstract:
A generic visual language for diagram editing has been created which may be instantiated for a particular modelling technique. The instantiated visual language is used within the generated design tool. It provides non-obtrusive guidance observing the semantics of the underlying modelling technique. The tool user is allowed to produce intermediate inconsistent states to facilitate diagram editing. A prototype, comprising a compiler for the specification language, a multi-purpose graph tool and a configurable design tool was implemented to prove the feasibility of the complete approach. The prototype compiler generates executable code. The target of the compiler is the persistent programming language Napier88. The architecture of the compiler has been designed as two separate components: a front-end (the parser), and a back-end (the code generator). This approach gives independence from the target language. The code generator comprises a number of translation rules to produce Napier88 from a VC-t specification. The prototype compiler only incorporates some of the translation rules to demonstrate that executable Napier88 can be generated automatically. The remainder of the translation rules have been applied manually to produce Napier88, to demonstrate that the rules are correct. The multi-purpose graph tool, designated as GraphTool, can be used with the class of applications using graphs as their main data structures. It provides support for visual and interactive representations of an application. The application acts as a client of the Graph-Tool. A protocol has been defined to connect the client application to the GraphTool. Any number of visual representations can be associated with the application. Maps are used for this purpose: to change the representation it is only necessary to change the map. The GraphTool includes a constraint manager used to associate constraints with the representations objects and check these at run-time. The configurable design tool has been developed as a client for the GraphTool. It includes generic components for diagram editing and a drawing canvas. The functionality of the canvas is fully provided by the GraphTool.
APA, Harvard, Vancouver, ISO, and other styles
5

Bagherli, J. "High level techniques and software tools for custom VLSI parser design." Thesis, University of Kent, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.371141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Waters, Matthew. "Application of software engineering tools and techniques to PLC programming : innovation report." Thesis, University of Warwick, 2009. http://wrap.warwick.ac.uk/36897/.

Full text
Abstract:
The software engineering tools and techniques available for use in traditional information systems industries are far more advanced than in the manufacturing and production industries. Consequently there is a paucity of ladder logic programming support tools. These tools can be used to improve the way in which ladder logic programs are written, to increase the quality and robustness of the code produced and minimise the risk of software related downtime. To establish current practice and to ascertain the needs of industry a literature review and a series of interviews with industrial automation professionals were conducted. Two opportunities for radical improvement were identified; a tool to measure software metrics for code written in ladder logic and a tool to detect cloned code within a ladder program. Software metrics quantify various aspects of code and can be used to assess code quality, measure programmer productivity, identify weak code and develop accurate costing models with respect to code. They are quicker, easier and cheaper than alternative code reviewing strategies such as peer review and allow organisations to make evidence based decisions with respect to code. Code clones occur because reuse of copied and pasted code increases programmer productivity in the short term, but make programs artificially large and can spread bugs. Cloned code can be removed with no loss of functionality, dramatically reducing the the size of a program. To implement these tools, a compiler front end for ladder logic was first constructed. This included a lexer with 24 lexical modes, 71 macro definitions and 663 token definitions as well as a 729 grammar rule parser. The software metrics tool and clone detection tool perform analyses on an abstract sytax tree, the output from the compiler. The tools have been designed to be as user friendly as possible. Metrics results are compiled in XML reports that can be imported into spreadsheet applications, and the clone detector generates easily navigable HTML reports for each clone as well as an index file of all clones that contains hyperlinks to all clone reports. Both tools were demonstrated by analysing real factory code from a Jaguar Land Rover body in white line. The metrics tool analysed over 1.5 million lines of ladder logic code contained within 23 files and 8466 routines. The results identified those routines that are abnormally complex in addition to routines that are excessively large. These routines are a likely source of problems in future and action to improve them immediately is recommended. The clone detector analysed 59K lines from a manufacturing cell. The results of this analysis proved that the code could be reduced in volume by 43.9% and found previously undetected bugs. By removing clones for all factory code, the code would be reduced in size by so much that it could run on as much as 25% fewer PLCs, yielding a significant saving on hardware costs alone. De-cloned code is also easier to make modifications to, so this process goes some way towards future-proofing the code.
APA, Harvard, Vancouver, ISO, and other styles
7

Tristram, Waide Barrington. "Investigating tools and techniques for improving software performance on multiprocessor computer systems." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1006651.

Full text
Abstract:
The availability of modern commodity multicore processors and multiprocessor computer systems has resulted in the widespread adoption of parallel computers in a variety of environments, ranging from the home to workstation and server environments in particular. Unfortunately, parallel programming is harder and requires more expertise than the traditional sequential programming model. The variety of tools and parallel programming models available to the programmer further complicates the issue. The primary goal of this research was to identify and describe a selection of parallel programming tools and techniques to aid novice parallel programmers in the process of developing efficient parallel C/C++ programs for the Linux platform. This was achieved by highlighting and describing the key concepts and hardware factors that affect parallel programming, providing a brief survey of commonly available software development tools and parallel programming models and libraries, and presenting structured approaches to software performance tuning and parallel programming. Finally, the performance of several parallel programming models and libraries was investigated, along with the programming effort required to implement solutions using the respective models. A quantitative research methodology was applied to the investigation of the performance and programming effort associated with the selected parallel programming models and libraries, which included automatic parallelisation by the compiler, Boost Threads, Cilk Plus, OpenMP, POSIX threads (Pthreads), and Threading Building Blocks (TBB). Additionally, the performance of the GNU C/C++ and Intel C/C++ compilers was examined. The results revealed that the choice of parallel programming model or library is dependent on the type of problem being solved and that there is no overall best choice for all classes of problem. However, the results also indicate that parallel programming models with higher levels of abstraction require less programming effort and provide similar performance compared to explicit threading models. The principle conclusion was that the problem analysis and parallel design are an important factor in the selection of the parallel programming model and tools, but that models with higher levels of abstractions, such as OpenMP and Threading Building Blocks, are favoured.
APA, Harvard, Vancouver, ISO, and other styles
8

Siviter, D. "HyperCourseware : the development of software tools and techniques to enable courseware management." Thesis, London South Bank University, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.618644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kågström, Simon. "Tools, techniques, and trade-offs when porting large software systems to new environments /." Karlskrona : Department of Systems and Software Engineering, Blekinge Institute of Technology, 2008. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/8007549c674e519dc1257452003440f5?OpenDocument.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kågström, Simon. "Tools, Techniques, and Trade-offs when Porting Large Software Systems to New Environments." Doctoral thesis, Blekinge Tekniska Högskola [bth.se], School of Engineering - Dept. of Systems and Software Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-00402.

Full text
Abstract:
Computer hardware and software evolve very fast. With the advent of chip-multiprocessors and symmetric multithreading, multiprocessor hardware configurations are becoming prevalent. For software, new hardware and requirements such as security, performance and maintainability drive the development of new runtime environments, virtual machines and programming methodologies. These trends present problems when porting legacy software. Multiprocessor hardware require ports of uniprocessor operating system kernels while new software environments might require that programs have to be ported to different languages. This thesis examines the tradeoff between performance and development effort for software porting with case studies in operating system porting to multiprocessors and tool support for porting C and C++ applications to Java virtual machines. The thesis consists of seven papers. The first paper is a survey of existing multiprocessor development approaches and focuses on the tradeoff between performance and implementation effort. The second and third papers describe the evolution a traditional lock-based multiprocessor port, going from a serialized “giant locked” port and evolving into a coarse-grained implementation. The fourth paper instead presents an alternative porting approach which aims to minimize development effort. The fifth paper describes a tool for efficient instrumentation of programs, which can be used during the development of large software systems such as operating system kernels. The sixth and seventh papers finally describe a binary translator which translates MIPS binaries into Java bytecode to allow low-effort porting of C and C++ applications to Java virtual machines. The first main contributions of this thesis is an in-depth investigation of the techniques used when porting operating system kernels to multiprocessors, focusing on development effort and performance. The traditional approach used in the second and third papers required longer development time than expected, and the alternative approach in the fourth paper can therefore be preferable in some cases. The second main contribution is the development of a binary translator that targets portability of C and C++ applications to J2ME devices. The last two papers show that the approach is functional and has good enough performance to be feasible in real-life situations.
APA, Harvard, Vancouver, ISO, and other styles
11

Liu, Yin. "Methodologies, Techniques, and Tools for Understanding and Managing Sensitive Program Information." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103421.

Full text
Abstract:
Exfiltrating or tampering with certain business logic, algorithms, and data can harm the security and privacy of both organizations and end users. Collectively referred to as sensitive program information (SPI), these building blocks are part and parcel of modern software systems in domains ranging from enterprise applications to cyberphysical setups. Hence, protecting SPI has become one of the most salient challenges of modern software development. However, several fundamental obstacles stand on the way of effective SPI protection: (1) understanding and locating the SPI for any realistically sized codebase by hand is hard; (2) manually isolating SPI to protect it is burdensome and error-prone; (3) if SPI is passed across distributed components within and across devices, it becomes vulnerable to security and privacy attacks. To address these problems, this dissertation research innovates in the realm of automated program analysis, code transformation, and novel programming abstractions to improve the state of the art in SPI protection. Specifically, this dissertation comprises three interrelated research thrusts that: (1) design and develop program analysis and programming support for inferring the usage semantics of program constructs, with the goal of helping developers understand and identify SPI; (2) provide powerful programming abstractions and tools that transform code automatically, with the goal of helping developers effectively isolate SPI from the rest of the codebase; (3) provide programming mechanism for distributed managed execution environments that hides SPI, with the goal of enabling components to exchange SPI safely and securely. The novel methodologies, techniques, and software tools, supported by programming abstractions, automated program analysis, and code transformation of this dissertation research lay the groundwork for establishing a secure, understandable, and efficient foundation for protecting SPI. This dissertation is based on 4 conference papers, presented at TrustCom'20, GPCE'20, GPCE'18, and ManLang'17, as well as 1 journal paper, published in Journal of Computer Languages (COLA).
Doctor of Philosophy
Some portions of a computer program can be sensitive, referred to as sensitive program information (SPI). By compromising SPI, attackers can hurt user security/privacy. It is hard for developers to identify and protect SPI, particularly for large programs. This dissertation introduces novel methodologies, techniques, and software tools that facilitate software developments tasks concerned with locating and protecting SPI.
APA, Harvard, Vancouver, ISO, and other styles
12

Snyder, Brett W. "Tools and Techniques for Evaluating the Reliability of Cloud Computing Systems." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1371685877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Shahrezaei, Khashayar, and Pontus Holmström. "Software development from theory to practical machining techniques." Thesis, Luleå tekniska universitet, Institutionen för teknikvetenskap och matematik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79289.

Full text
Abstract:
In already optimized processes it may be challenging to find room for further improvement. The solution can be found in the advanced software and tools that support the digital manufacturing, all the way from planning and design to in-machining and machining analysis. This project the- sis focuses on developing a process methodology to transcribe Sandvik Coromant’s theories and knowledge about machining operation grooving into machine-readable formats. Various software development models have been analysed and a particular model inspired by the incremental and iterative process model was developed to match the context of this project. This project thesis describes the working methodology for gathering theories and translating them into machine-interpretable format. A working methodology developed in this project thesis succeeded in transcribing different human- readable theories such as people’s minds (experts within the field) and handbooks into a machine- interpretable format. The proposed algorithms for tool path generation was developed and imple- mented successfully through the integration of mathematical modelling. MATLAB and Siemens NX has been used to build a proof of concept environment.
APA, Harvard, Vancouver, ISO, and other styles
14

Mamun, Md Abdullah Al, and Aklima Khanam. "Concurrent Software Testing : A Systematic Review and an Evaluation of Static Analysis Tools." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4310.

Full text
Abstract:
Verification and validation is one of the most important concerns in the area of software engineering towards more reliable software development. Hence it is important to overcome the challenges of testing concurrent programs. The extensive use of concurrent systems warrants more attention to the concurrent software testing. For testing concurrent software, automatic tools development is getting increased focus. The first part of this study presents a systematic review that aims to explore the state-of-the-art of concurrent software testing. The systematic review reports several issues like concurrent software characteristics, bugs, testing techniques and tools, test case generation techniques and tools, and benchmarks developed for the tools. The second part presents the evaluation of four commercial and open source static analysis tools detecting Java multithreaded bugs. An empirical evaluation of the tools would help the industry as well as the academia to learn more about the effectiveness of the static analysis tools for concurrency bugs.
APA, Harvard, Vancouver, ISO, and other styles
15

Jiang, Haozhen, and Yi Chen. "Comparison of Different Techniques of Web GUI-based Testing with the Representative Tools Selenium and EyeSel." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14771.

Full text
Abstract:
Context. Software testing is becoming more and more important in software development life-cycle especially for web testing. Selenium is one of the most widely used property-based Graph-User-Interface(GUI) web testing tools. Nevertheless, it also has some limitations. For instance, Selenium cannot test the web components in some specific plugins or HTML5 videos frame. But it is important for testers to verify the functionality of plugins or videos on the websites. Recently, the theory of the image recognition-based GUI testing is introduced which can locate and interact with the components to be tested on the websites by image recognition. There are only a few papers do research on comparing property-based GUI web testing and image recognition-based GUI testing. Hence, we formulated our research objectives based on this main gap. Objectives. We want to compare these two different techniques with EyeSel which is the tool represents the image recognition-based GUI testing and Selenium which is the tool represents the property-based GUI testing. We will evaluate and compare the strengths and drawbacks of these two tools by formulating specific JUnit testing scripts. Besides, we will analyze the comparative result and then evaluate if EyeSel can solve some of the limitations associated with Selenium. Therefore, we can conclude the benefits and drawbacks of property-based GUI web testing and image recognition-based GUI testing.   Methods. We conduct an experiment to develop test cases based on websites’ components both by Selenium and EyeSel. The experiment is conducted in an educational environment and we select 50 diverse websites as the subjects of the experiment. The test scripts are written in JAVA and ran by Eclipse.  The experiment data is collected for comparing and analyzing these two tools. Results. We use quantitative analysis and qualitative analysis to analyze our results. First of all, we use quantitative analysis to evaluate the effectiveness and efficiency of two GUI web testing tools. The effectiveness is measured by the number of components that can be tested by these two tools while the efficiency is measured by the measurements of test cases’ development time and execution time. The results are as follows (1) EyeSel can test more number of components in web testing than Selenium (2) Testers need more time to develop test cases by Selenium than by EyeSel (3) Selenium executes the test cases faster than EyeSel. (4) “Results (1)” indicates the effectiveness of EyeSel is better than Selenium while “Results (2)(3)” indicate the efficiency of EyeSel is better than Selenium. Secondly, we use qualitative analysis to evaluate four quality characteristics (learnability, robustness, portability, functionality) of two GUI web testing tools. The results show that portability and functionality of Selenium are better than EyeSel while the learnability of EyeSel is better than Selenium. And both of them have good robustness in web testing. Conclusions. After analyzing the results of comparison between Selenium and EyeSel, we conclude that (1) Image recognition-based GUI testing is more effectiveness than property-based GUI web testing (2) Image recognition-based GUI testing is more efficiency than property-based GUI web testing (3) The portability and functionality of property-based GUI web testing is better than Image recognition-based GUI testing (4) The learnability of image recognition-based GUI testing is better than property-based GUI web testing. (5) Both of them are good at different aspects of robustness
APA, Harvard, Vancouver, ISO, and other styles
16

Contino, Sergio. "Development of Software Tools for the Test of Ultra Wide Band Receivers." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4327/.

Full text
Abstract:
In the last years, the importance of locating people and objects and communicating with them in real time has become a common occurrence in every day life. Nowadays, the state of the art of location systems for indoor environments has not a dominant technology as instead occurs in location systems for outdoor environments, where GPS is the dominant technology. In fact, each location technology for indoor environments presents a set of features that do not allow their use in the overall application scenarios, but due its characteristics, it can well coexist with other similar technologies, without being dominant and more adopted than the others indoor location systems. In this context, the European project SELECT studies the opportunity of collecting all these different features in an innovative system which can be used in a large number of application scenarios. The goal of this project is to realize a wireless system, where a network of fixed readers able to query one or more tags attached to objects to be located. The SELECT consortium is composed of European institutions and companies, including Datalogic S.p.A. and CNIT, which deal with software and firmware development of the baseband receiving section of the readers, whose function is to acquire and process the information received from generic tagged objects. Since the SELECT project has an highly innovative content, one of the key stages of the system design is represented by the debug phase. This work aims to study and develop tools and techniques that allow to perform the debug phase of the firmware of the baseband receiving section of the readers.
APA, Harvard, Vancouver, ISO, and other styles
17

Ahmi, Aidi. "Adoption of generalised audit software (GAS) by external auditors in the UK." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/7357.

Full text
Abstract:
This research is motivated by the interest in understanding the usage of the Generalised Audit Software (GAS) by external auditors within public accounting firms. GAS is a tool used by auditors to automate various audit tasks. It helps auditors to analyse accounting data electronically where it is quite impossible to do so manually. GAS is claimed to be the most influential Computer Assisted Audit Tools and Technique (CAATTs) that can facilitate the audit objective. However, research has found that there is little evidence that auditors have extensively adopted GAS. Even greater benefits have been promoted since the existence of GAS, but auditors do not really seem to be interested in this tool. Most previous studies have focused on either internal auditors, large accounting firms, other countries or merely adopters of GAS. However, there is little evidence that the study of GAS has been conducted on external auditors, especially in small and medium sized accounting firms in the United Kingdom (UK). This study helps to fill this gap by exploring the use of GAS among them, and covers both adopters and non-adopters of GAS. Through an online survey using both close and open-ended questions, this issue has been investigated among registered statutory auditors. The primary aim of this study is to explore the current usage of GAS and to understand the factors that influence the use of GAS as well as the perceptions and expectations of using GAS. The views are gathered from both auditors who are already implementing GAS and those who are not using GAS. A framework was developed to identify a range of relevant factors which are important when considering the application of GAS. Responses from 205 statutory auditors across the UK were then mapped against the framework. Of the 14 variables used to test the factors that influence the use of GAS, only six of them are found to be significant from logistic regression analysis. These are firm size, experience of auditors in computerised auditing, organisational influence, client factor, audit engagement allocation and perceived usefulness. The findings show that the utilisations of GAS is unusually low among audit firms in the UK. Almost 73% of external auditors make no use of GAS, due to the limited perceived benefit of using GAS for auditing small clients. While some respondents recognised the advantages of GAS, they were put off by what they believed to be high implementation costs; the significant learning curve and adoption process; and lack of ease of use. Some auditors expressed their awareness of GAS, but most of them showed a preference for using traditional auditing methods instead. A few problems have also been identified in causing the limitation of GAS usage. This study contributes to the literature on suggestions to improve the use of GAS that can be used by small and medium sized public accounting firm, which is lacking in existing research related to this group. In sum, this study has deepened current understanding of the GAS usage among small and medium sized audit firms in the UK, and has provided useful insights for audit professionals, software developers, vendors, standards setters, academicians and researchers. This study has also opened up the possibilities for further study on GAS or related areas either in the UK or other places in the world.
APA, Harvard, Vancouver, ISO, and other styles
18

Almroth, Tobias. "Data visualization for the modern web : A look into tools and techniques for visualizing data in Angular 5 applications." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17014.

Full text
Abstract:
This paper looks into how data is best visualized and how visualizations should be designed to be most easily perceived. Furthermore the study looks into what tools there are available on the market today for visualizing data in angular 5 applications. With regards to a client, a developer team from the swedish police IT-department, the tools are evaluated and the one most suitable for the client is found. The paper also looks into how a dynamic data solution can be developed in angular 5. A solution where data can be selected in one component and displayed in another. To answer the questions sought a study of previous research into data visualization was done as well as a look into how angular 5 applications can be developed. Interviews with the clients were held where their specific requirements on visualization tools were identified. After searching and listing available visualization tools on the market the tools were evaluated against the clients requirements and a prototype application were developed. Showcasing both the most suitable tool and its integration but also a dynamic data solution in angular 5. As a conclusion data visualizations should be made as simple as possible with the main focus on the data. When it comes to tools the one most suitable to the client was Chart.js that easily integrated into an angular 5 application. An application that thanks to angular’s features is well equipped for handling and developing dynamic data solutions.
APA, Harvard, Vancouver, ISO, and other styles
19

Ivanov, Dinko. "Integrating formal analysis techniques into the Progress-IDE." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-13884.

Full text
Abstract:
In this thesis we contribute to the Progress IDE, an integrated development enviroment for real-time embedded systems and more precisely to the REMES toolchain, a set of tools to enabling construction and analysis of embedded system behavior models. The contribution aims to facilitate the formal analysis of behavioral models, so that certain extra-functional properties might be verified during early stages of development. Previous work in the field proposes use of the Priced Timed Automata framework for verification of such properties. The thesis outlines the main points where the current toolchain should be extended in order to allow formal analysis of modeled components. Result of the work is a prototype, which minimizes the manual efforts of system designer by model to model transformations and provides seamless integration with existing tools for formal analysis.
APA, Harvard, Vancouver, ISO, and other styles
20

Tekin, Yasar. "An Automated Tool For Requirements Verification." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605401/index.pdf.

Full text
Abstract:
In today&
#8217
s world, only those software organizations that consistently produce high quality products can succeed. This situation enforces the effective usage of defect prevention and detection techniques. One of the most effective defect detection techniques used in software development life cycle is verification of software requirements applied at the end of the requirements engineering phase. If the existing verification techniques can be automated to meet today&
#8217
s work environment needs, the effectiveness of these techniques can be increased. This study focuses on the development and implementation of an automated tool that automates verification of software requirements modeled in Aris eEPC and Organizational Chart for automatically detectable defects. The application of reading techniques on a project and comparison of results of manual and automated verification techniques applied to a project are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
21

Persson-Holmes, Paul, and Pontus Lyngsten. "IT in auditing : A descriptive study about IT-tool usage, IT knowledge, and the future digital environment for auditors." Thesis, Umeå universitet, Företagsekonomi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-172383.

Full text
Abstract:
The audit industry is under a digital transformation where various IT-tools are being frequently used by auditors at different experience levels. It is almost impossible to perform an audit with good results without using any IT-tools. Therefore, pressure is put on audit firms,both Big 4 and Non-Big 4 firms to stay ahead or at least up to date in terms of the digital development, implementation and usage of IT-tools to not fall behind its competitors. Educating the audit team members in the different information technology systems (IT) will be of great importance so that auditors can utilize new technology and enhance audit quality.This study contributes with practical knowledge by mapping out and describing in detail how and in which IT-tools auditors spend their time in during their commitments during a typical week. Secondly, the study provides insights on the current IT-knowledge among auditors, which is a factor that influences the use of IT-tools among auditors. Further, this also includes, getting an enhanced understanding of what type of IT-knowledge that is required today, for the audit team member at a specific level, ranging from associates to partners at Big 4 and Non-big 4 firms. Thirdly, the thesis will also discuss impacts of digitalisation and advanced technologies in auditing and give an update of to what degree advanced technologies has been implemented.This was possible to accomplish through an online questionnaire and interview sessions which implied that seven different types of software are used by auditors where Spreadsheet software is one of the most frequently used IT-tools. Auditors generally use software they are familiar with and a resistance towards new software exists. The study also highlights the discussion if the implementation and use of advanced technologies is as widespread as the auditing firms are picturing it. Additionally, there is still a general lack of IT-skills among auditors, and students seeing a future in the auditing profession would have to take responsibility over their own IT-knowledge increasement alongside with educators implementing more IT-courses for students studying Business administration.
APA, Harvard, Vancouver, ISO, and other styles
22

Payne, John C. "Fault tolerant computing testbed : a tool for the analysis of hardware and software fault handling techniques /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA359579.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering) Naval Postgraduate School, December 1998.
"December 1998." Thesis advisor(s): Alan A. Ross. Includes bibliographical references (p. 169). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
23

Chielle, Eduardo. "CFT-tool : ferramenta configurável para aplicação de técnicas de detecção de falhas em processadores por software." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2012. http://hdl.handle.net/10183/54883.

Full text
Abstract:
Este trabalho apresenta uma ferramenta configurável, denominada de CFT-tool, capaz de aplicar automaticamente técnicas de detecção de erros em software com o objetivo de proteger processadores com diferentes arquiteturas e organizações contra falhas transientes no hardware. As técnicas baseadas em redundância e comparação são aplicadas pela CFT-tool no código assembly de um programa desprotegido, compilado para a arquitetura alvo. A ferramenta desenvolvida foi validada utilizando dois processadores distintos: miniMIPS e LEON3. O processador miniMIPS foi utilizado para verificar a eficiência, em termos de taxa de detecção de erros, tempo de execução e ocupação de memória, das técnicas de detecção em software aplicadas pela CFT-tool, comparando os resultados obtidos com os presentes na literatura. O processador LEON3 foi selecionado por ser amplamente utilizado em aplicações espaciais e por ser baseado em uma arquitetura diferente da arquitetura do processador miniMIPS. Com o processador LEON3 é verificada a configurabilidade da CFT-tool, isto é, a capacidade dela de aplicar técnicas de detecção em software em um código compilado para um diferente processador, o mantendo funcional e sendo capaz de detectar erros. A CFT-tool pode ser utilizada para proteger programas para outras arquiteturas e organizações através da modificação dos arquivos de configuração da ferramenta. A configuração das técnicas é definida segundo as especificações da aplicação, recursos do processador e seleções do usuário. Programas foram protegidos e falhas foram injetadas em nível lógico em ambos os processadores. Para o processador miniMIPS, as taxas de detecção de erros, os tempos de execução e as ocupações de memórias dos programas protegidos se mostraram compatíveis com os resultados presentes na literatura. Resultados semelhantes foram encontrados para o processador LEON3. Diferenças entre os resultados ocorrem devido às características da arquitetura. A ferramenta CFT-tool por ser configurável pode proteger o código na integralidade ou selecionar partes do código e registradores que serão redundantes e protegidos. A vantagem de proteger parte do código é reduzir o custo final em termos de tempo de processamento e ocupação de memória. Uma análise do impacto da seleção seletiva de registradores na taxa de detecção de erros é apresentada. E diretivas de alcançar um comprometimento ótimo entre quantidade de registradores protegidos, taxa de detecção de erros e custo são discutidas.
This work presents a configurable tool, called CFT-tool, capable of automatically applying software-based error detection techniques aiming to protect processors with different architectures and organizations against transient faults in the hardware. The techniques are based on redundancy and comparison. They are applied by CFT-tool in the assembly code of an unprotected program, compiled to the target architecture. The developed tool was validated using two distinct processors: miniMIPS and LEON3. The miniMIPS processor has been utilized to verify the efficiency of the software-based techniques applied by CFT-tool in the assembly code of unprotected programs in terms of error detection rate, runtime and memory occupation, comparing the obtained results with those presented in the literature. The LEON3 processor was selected because it is largely adopted in space applications and because it is based on a different architecture that miniMIPS processor. The configurability of the CFT-tool is verified with the LEON3 processor, that is, the capability of the tool at applying software-based detection techniques in a code compiled to a different processor, maintaining it functional and capable of detecting errors. The CFT-tool can be utilized to protect programs compiled to other architectures and organizations by modifying the configuration files of the tool. The configuration of the techniques is defined by the specifications of the application, processor resources and selections of the user. Programs were protected and faults were injected in logical level in both processors. When using the miniMIPS processor, the error detection rates, runtimes and memory occupations of the protected programs are comparable to the results presents in the literature. Similar results are reached with the LEON3 processor. Differences between the results are due to architecture features. The CFT-tool can be configurable to protect the entire code or to select portions of the code or registers that will be redundant and protected. The advantage of protecting portions of the code is to reduce the final cost in terms of runtime and memory occupation. An analysis of the impact of selective selection of registers in the error detection rate is also presented. And policies to reach an optimum committal between amount of protected registers, error detection rate and cost are discussed.
APA, Harvard, Vancouver, ISO, and other styles
24

Santos, Ligia Cassia Moreno de Castro. "Uso de técnicas e ferramentas para detecção de vulnerabilidades: um survey com membros de equipes de desenvolvimento ágil de software." Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/100/100131/tde-09062018-123730/.

Full text
Abstract:
Métodos ágeis foram criados para sanar fraquezas reais e perceptíveis dos métodos tradicionais de desenvolvimento de software. Devido à pressão na entrega de produtos de software dentro do prazo, muitas vezes requisitos de segurança são pouco mensurados ou até deixados de lado. Durante o desenvolvimento ágil de software é importante detectar possíveis vulnerabilidades. Esta dissertação descreve um survey aplicado a membros de equipes de desenvolvimento de software que aplicam métodos ágeis. Para tanto, foram identificados por meio da rede de profissionais LinkedIn 110 membros de equipes ágeis que implantaram, estão em processo de implantação ou ainda irão implantar técnicas e ferramentas para detecção de vulnerabilidades. Além disso, foram entrevistados nove gerentes de equipes ágeis. O questionário e o roteiro da entrevista foram baseados em três conhecidos processos de desenvolvimento de software seguro, a saber, Processo de McGraw, OWASP CLASP e as atividades de Howard e Lipner. A coleta de dados se deu por meio de questionários e entrevistas. A análise dos resultados utilizou técnicas de estatística descritiva e análise de conteúdo. Elas indicaram os métodos ágeis mais utilizados, o uso atual das técnicas e ferramentas, as aptidões, os interesses e as necessidades em treinamento em técnicas e ferramenta para detecção de vulnerabilidades. Além disso, os benefícios obtidos com a implantação das técnicas e ferramentas, as motivações, as estratégias, as dificuldades, as limitações e as lições aprendidas foram identificadas. Os resultados indicam que existe motivação para a implantação de segurança, mas ainda não se dá atenção especial à detecção de vulnerabilidades nas equipes ágeis cujos membros participaram do survey
Agile methods were created to address real and perceived weaknesses of traditional software development methods. Due to the pressure to delivery software products on time, security requirements are often poorly addressed or even neglected. During agile software development it is important to detect possible vulnerabilities. This dissertation describes a survey applied to members of software development teams who apply agile methods. Thus, 110 members of agile teams were identified through LinkedIns network of professionals who deployed, are in the process of being deployed or will still implement techniques and tools for vulnerability detection techniques and tools were identified. The questionnaire was based on three known safe software development processes, namely, the McGraw Process, OWASP CLASP, and the activities of Howard and Lipner. Data were collected through questionnaires and interviews. The analysis of the results used techniques of descriptive statistics and content analysis. They indicated the most widely used agile methods, the current use of techniques and tools, the skills, interests and training needs of agile teams in vulnerability detection techniques and tools. In addition, the benefits of implementing the techniques and tools, the motivations, the strategies, the difficulties, the limitations and the lessons learned were identified. The results suggest that special attention is still not given to detection of vulnerabilities in the agile teams whose members participated in the survey
APA, Harvard, Vancouver, ISO, and other styles
25

Summers, David C. "Implementation of a fault tolerant computing testbed a tool for the analysis of hardware and software fault handling techniques /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380203.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering) Naval Postgraduate School, June 2000.
Thesis advisor(s): Ross, Alan A.; Loomis, Herschel H. "June 2000." Includes bibliographical references (p. 163-165). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
26

Sullivan, Kevin Michael. "An image delta compression tool: IDelta." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2543.

Full text
Abstract:
The purpose of this thesis is to present a modified version of the algorithm used in the open source differencing tool zdelta, entitled "iDelta". This algorithm will manage file data and will be built specifically to difference images in the Photoshop file format.
APA, Harvard, Vancouver, ISO, and other styles
27

Pacheco, Motta Junior Eury. "Investigação de modelo de auditoria contínua para tribunais de contas." Universidade Federal de Pernambuco, 2010. https://repositorio.ufpe.br/handle/123456789/2417.

Full text
Abstract:
Made available in DSpace on 2014-06-12T15:58:03Z (GMT). No. of bitstreams: 2 arquivo3245_1.pdf: 1745357 bytes, checksum: 69355571b9b350b5663bdd9a8e5c0ba3 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2010
Tribunal de Contas de Pernambuco
A pressão pela melhoria dos mecanismos de controle e de transparência vem demandando a modernização das técnicas de auditoria. Nesta busca, os recursos de Tecnologia da Informação têm se mostrado os principais aliados, utilizados cada vez em maior escala, e cada vez mais sofisticados. Neste aspecto, a utilização da chamada Auditoria Contínua (AC) é um dos principais avanços em curso na iniciativa privada. Voltada para análise de dados em formato eletrônico, a abordagem vem sendo cada vez mais adotada, impulsionada pelo crescimento das transações sem papel e por imposições legais, como o ato Sarbanes-Oxley (SOX) de 2002 que procura garantir que as empresas possuam mecanismos de controles confiáveis, reforçando sua governança e transparência como meio de recuperar a credibilidade dos investidores após escândalos financeiros envolvendo grandes corporações americanas. Recentes alterações na legislação brasileira criam obrigações de transparência para o setor público que são semelhantes às criadas pelo ato SOX. A mudança determina que as informações relativas à execução orçamentária e financeira dos entes públicos sejam publicadas em tempo real. Com a mudança, surgem as condições para que os Tribunais de Contas (TCs) utilizem abordagens de AC para fiscalizar a aplicação dos recursos públicos em tempo real. Os modelos proposto para AC são voltados para o setor privado, e muitas vezes para o controle interno. O presente trabalho visa investigar um modelo de AC apropriado ao papel dos TCs no exercício do controle externo. Com esta atualização tecnológica as Cortes de Contas podem avançar muito no nível de efetividade da sua atuação, gerando melhores resultados para a sociedade e benefícios para o setor público brasileiro como um todo. Como resultado da investigação foi construído um modelo de Ambiente de AC para TCs. A proposta descreve as instituições participantes do ambiente e seus papéis; a arquitetura tecnológica que suporta o funcionamento do ambiente; e o desenho dos principais processos do ambiente. Adicionalmente, apresenta-se alguns cenários de evolução e sugestão de critérios para planejamento do ambiente, bem como os benefícios que a abordagem pode trazer
APA, Harvard, Vancouver, ISO, and other styles
28

Jesus, Telmo Oliveira de. "Uma técnica baseada em eventos para rastreabilidade entre requisitos modelados com SysML." Universidade Federal de Sergipe, 2017. https://ri.ufs.br/handle/riufs/3397.

Full text
Abstract:
Managing a software project is an increasingly complex task as it demands the quality of the final product to increase. Thus, e ective management is required from project design to software deployment and maintenance. According to the literature found, Requirements Engineering is the most important phase in terms of final impact on a software project. Changes in software requirements occur throughout the software process, from elicitation and requirements analysis to software operation. Requirements traceability enables one to identify the source and the dependency among software requirements. Studies show that current requirements traceability tools and methods are insu cient which makes it di cult to use traceability in practice. The goal of this work was the proposal of a requirements traceability technique combined with a modeling language and supported by a tool. To achieve this goal, bibliographic review, state-of-the-art research, comparative analysis, questionnaire and interviews were used as research instruments. Initially, an analysis of requirements traceability techniques and evaluation of requirements traceability tools were performed to evaluate if the techniques are used in practice and are being supported by software tools. After these analysis, an event-based traceability technique was proposed using concepts from the SysML modeling language. A software tool was developed to support this technique. Whenever a requirement is modified, the tool notifies stakeholders of such change made to the system requirements through e-mail. The technique and the tool were evaluated by twenty four information technology professionals using a questionnaire based on the TAM model that encompasses the concepts of perceived utility, perceived ease of use and perceived use, and interviews. As a result, the lack of relationship between the techniques and the tools surveyed was observed, and the criterion of automatic communication with stakeholders was not addressed in any evaluated tool. With regard to the proposed technique and tool, a wide acceptance of technique and tool was observed. The acceptance of the proposals was carried out by professionals with varied experiences in software development.
Gerenciar um projeto de software é uma tarefa cada vez mais complexa à medida que as exigências sobre a qualidade do produto final aumentam. Assim, é preciso um gerenciamento eficaz desde a concepção do projeto até a implantação e manutenção do software. Segundo a literatura encontrada, a Engenharia de Requisitos é a fase que possui maior impacto em um projeto de software. As mudanças nos requisitos de software ocorrem ao longo do processo de software, desde a elicitação e análise de requisitos até a operação do software. A rastreabilidade de requisitos possibilita identificar a origem e a dependência entre os requisitos de software. Estudos mostram que as ferramentas e métodos de rastreabilidade de requisitos atuais são insuficientes e dificultam o uso prático da rastreabilidade. O objetivo deste trabalho é a criação de uma técnica de rastreabilidade de requisitos combinada com uma linguagem de modelagem e que seja apoiada por uma ferramenta. Para atingir este objetivo, foram utilizados como instrumentos de pesquisa a revisão bibliográfica, uma pesquisa do tipo estado da arte, análise comparativa, questionário e entrevistas. Inicialmente, foram realizadas análise das técnicas de rastreabilidade de requisitos e avaliação de ferramentas de rastreabilidade de requisitos com intuito de avaliar se as técnicas são utilizadas na prática, e se estão sendo apoiadas por ferramentas de software. Após estas análises, foi proposta uma técnica de rastreabilidade entre requisitos baseada em eventos utilizando conceitos da linguagem de modelagem SysML. Uma ferramenta de software foi desenvolvida para apoiar essa técnica. Sempre que um requisito é modificado, a ferramenta notifica aos stakeholders a alteração realizada nos requisitos do sistema por meio de e-mails. A técnica e a ferramenta foram avaliadas por vinte e quatro profissionais de tecnologia da informação utilizando questionário, baseado no modelo TAM, que engloba os conceitos de utilidade percebida, facilidade de uso percebido e uso percebido, e entrevistas. Como resultado, foram observados a falta de relação entre as técnicas e as ferramentas pesquisadas e que o critério de comunicação automática com stakeholders não foi abordado em nenhuma ferramenta avaliada. Com relação à técnica e ferramenta propostas, observou-se uma ampla aceitação da técnica e da ferramenta. A aceitação das propostas foi realizada por profissionais com experiências variadas em desenvolvimento de software.
APA, Harvard, Vancouver, ISO, and other styles
29

Dewi, Alita. "Apport des nouvelles technologies interactives pour l'analyse intégrée en génie électrique : vers un laboratoire virtuel d'expérimentation en électrotechnique." Phd thesis, Grenoble INPG, 2001. http://tel.archives-ouvertes.fr/tel-00597707.

Full text
Abstract:
La course à l'innovation dans la technologie des dispositifs électriques, induit de nouvelles contraintes sur les fonctionnalités des systèmes de CAO en Génie Electrique. Ils doivent permettre l'analyse fine des comportements multiphysiques des dispositifs électriques. Cette puissance, nécessaire en terme de modélisation, se traduit aussi par une complexité en terme de maîtrise par l'utilisateur. Par conséquent, les techniques d'interaction homme - machine, qui avaient été longtemps considérées comme d'intérêt secondaire dans le domaine de Pélectrotechnique, deviennent aussi importantes que les modèles physiques. L'objectif de notre travail est de développer des méthodes d'exploration et d'Interface homme - machine, naturelles et faciles à comprendre, afin de facilité l'utilisation des logiciels de simulation en électrotechnique. Pour arriver à cet objectif, nous nous sommes inspirés des activités intervenant dans un laboratoire d'expérimentation en électrotechnique. Dans un premier temps, nous avons modélisé un vrai laboratoire en dégageant les rôles du dispositif électrique à étudier, des manipulations à mettre en places, des protocoles d'expérimentation, .... Après cela, nous avons développé un système interactif, le Laboratoire Virtuel d'Expérimentation en Électrotechnique (LVEE), bâti sur le modèle d'un laboratoire réel, et dans lequel le fonctionnement du dispositif électrique est obtenu à l'aide des logiciels de simulation. La contribution de la technologie de Réalité Virtuelle a été prise en considération pour fournir l'interaction intuitive et la visualisation naturelle des comportements physiques des dispositifs électriques.
APA, Harvard, Vancouver, ISO, and other styles
30

Munir, Qaiser, and Muhammad Shahid. "Software Product Line:Survey of Tools." Thesis, Linköping University, Department of Computer and Information Science, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-57888.

Full text
Abstract:

software product line is a set of software-intensive systems that share a common, managed set of features satisfying the specificneeds of a particular market segment or mission. The main attractive part of SPL is developing a set of common assets which includes requirements, design, test plans, test cases, reusable software components and other artifacts. Tools for the development of softwareproduct line are very few in number. The purpose of these tools is to support the creation, maintenance and using different versions ofproduct line artifacts. This requires a development environment that supports the management of assets and product development,processes and sharing of assets among different products.

The objective of this master thesis is to investigate the available tools which support Software Product Line process and itsdevelopment phases. The work is carried out in two steps, in the first step available Software Product Line tools are explored and a list of tools is prepared, managed and a brief introduction of each tool is presented. The tools are classified into different categoriesaccording to their usage, relation between the tools is established for better organization and understanding. In the second step, two tools Pure::variant and MetaEdit+ are selected and the quality factors such as Usability, Performance, Reliability, MemoryConsumption and Capacity are evaluated.

APA, Harvard, Vancouver, ISO, and other styles
31

Sampson, Stephen Filson. "Software visualization tools for Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0019/MQ54538.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Moschoglou, Georgios Moschos. "Software testing tools and productivity." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014862.

Full text
Abstract:
Testing statistics state that testing consumes more than half of a programmer's professional life, although few programmers like testing, fewer like test design and only 5% of their education will be devoted to testing. The main goal of this research is to test the efficiency of two software testing tools. Two experiments were conducted in the Computer Science Department at Ball State University. The first experiment compares two conditions - testing software using no tool and testing software using a command-line based testing tool - to the length of time and number of test cases needed to achieve an 80% statement coverage for 22 graduate students in the Computer Science Department. The second experiment compares three conditions - testing software using no tool, testing software using a command-line based testing tool, and testing software using a GUI interactive tool with added functionality - to the length of time and number of test cases needed to achieve 95% statement coverage for 39 graduate and undergraduate students in the same department.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
33

Guest, S. P. "Software tools for dialogue design." Thesis, De Montfort University, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.372851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Tilevich, Eli. "Software Tools for Separating Distribution Concerns." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7518.

Full text
Abstract:
With the advent of the Internet, distributed programming has become a necessity for the majority of application domains. Nevertheless, programming distributed systems remains a delicate and complex task. This dissertation explores separating distribution concerns, the process of transforming a centralized monolithic program into a distributed one. This research develops algorithms, techniques, and tools for separating distribution concerns and evaluates the applicability of the developed artifacts by identifying the distribution concerns that they separate and the common architectural characteristics of the centralized programs that they transform successfully. The thesis of this research is that software tools working with standard mainstream languages, systems software, and virtual machines can effectively and efficiently separate distribution concerns from application logic for object-oriented programs that use multiple distinct sets of resources. Among the specific technical contributions of this dissertation are (1) a general algorithm for call-by-copy-restore semantics in remote procedure calls for linked data structures, (2) an analysis heuristic that determines which application objects get passed to which parts of native (i.e., platform-specific) code in the language runtime system for platform-independent binary code applications, (3) a technique for injecting code in such applications that will convert objects to the right representation so that they can be accessed correctly inside both application and native code, (4) an approach to maintaining the Java centralized concurrency and synchronization semantics over remote procedure calls efficiently, and (5) an approach to enabling the execution of legacy Java code remotely from a web browser. The technical contributions of this dissertation have been realized in three software tools for separating distribution concerns: NRMI, middleware with copy-restore semantics; GOTECH, a program generator for distribution; and J-Orchestra, an automatic partitioning system. This dissertation presents several case studies of successfully applying the developed tools to third-party programs.
APA, Harvard, Vancouver, ISO, and other styles
35

Dijkstra, Semme Josua. "Software tools developed for seafloor classification." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0031/NQ62170.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

McParland, Patrick J. "Software tools to support formal methods." Thesis, Queen's University Belfast, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.292757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Souza, J. M. de. "Software tools for conceptual schema integration." Thesis, University of East Anglia, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.373740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Carney, John C. "Message passing tools for software integration." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/37769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mucci, Claudio <1977&gt. "Software tools or embedded reconfigurable processors." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2007. http://amsdottorato.unibo.it/402/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Pilon, Daniel. "Software tools for improving classroom interaction." Thesis, University of Ottawa (Canada), 1995. http://hdl.handle.net/10393/10266.

Full text
Abstract:
Cette these decrit un systeme informatise d'aide aux presentations et aux assistances lors d'exposes magistraux et presente ses fonctionnalites. Elle introduit un systeme utilisant les blocs-notes stylo et un ensemble d'outils logiciels pour ameliorer la communication entre les professeurs et les etudiants. Les outils logiciels permettent aux professeurs d'interagir efficacement avec les etudiants durant les cours et aident les etudiants a prendre des notes pertinentes. Le systeme peut etre employe dans une classe traditionnelle, lors d'enseignement a distance ou dans un environnement de teleconference. Pour cette these, les outils logiciels lorsque referes comme un tout, seront designes comme Class Tool.
APA, Harvard, Vancouver, ISO, and other styles
41

Martin, Matthew Daniel. "Managed pressure drilling techniques and tools." Texas A&M University, 2003. http://hdl.handle.net/1969.1/3884.

Full text
Abstract:
The economics of drilling offshore wells is important as we drill more wells in deeper water. Drilling-related problems, including stuck pipe, lost circulation, and excessive mud cost, show the need for better drilling technology. If we can solve these problems, the economics of drilling the wells will improve, thus enabling the industry to drill wells that were previously uneconomical. Managed pressure drilling (MPD) is a new technology that enables a driller to more precisely control annular pressures in the wellbore to prevent these drillingrelated problems. This paper traces the history of MPD, showing how different techniques can reduce drilling problems. MPD improves the economics of drilling wells by reducing drilling problems. Further economic studies are necessary to determine exactly how much cost savings MPD can provide in certain situation. Furter research is also necessary on the various MPD techniques to increase their effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
42

Brännström, Åke. "Modelling animal populations : tools and techniques /." Umeå : Univ, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Howard, Craig M. "Tools and techniques for knowledge discovery." Thesis, University of East Anglia, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.368357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Poudel, Pavan. "Tools and Techniques for Efficient Transactions." Kent State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=kent1630591700589561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Poudel, Pavan. "Tools and Techniques for Efficient Transactions." Kent State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=kent1630591700589561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Murphy-Hill, Emerson. "Programmer Friendly Refactoring Tools." PDXScholar, 2009. https://pdxscholar.library.pdx.edu/open_access_etds/2672.

Full text
Abstract:
Tools that perform semi-automated refactoring are currently under-utilized by programmers. If more programmers adopted refactoring tools, software projects could make enormous productivity gains. However, as more advanced refactoring tools are designed, a great chasm widens between how the tools must be used and how programmers want to use them. This dissertation begins to bridge this chasm by exposing usability guidelines to direct the design of the next generation of programmer-friendly refactoring tools, so that refactoring tools fit the way programmers behave, not vice-versa.
APA, Harvard, Vancouver, ISO, and other styles
47

Eatinger, Christopher J. "Testing automation tools for secure software development." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Jun%5FEatinger.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2007.
Thesis Advisor(s): Mikhail Auguston. "June 2007." Description based on title screen as viewed on August 14, 2007. Includes bibliographical references (p. 61). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
48

Ren, Jinsong. "Software tools for integral imaging virtual studios." Thesis, De Montfort University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.406029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Keller, René. "Predicting change propagation : algorithms, representations, software tools." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.443494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Bhatia, Sanjay. "Software tools for computer-controlled fatigue testing." Thesis, Virginia Tech, 1986. http://hdl.handle.net/10919/45749.

Full text
Abstract:
Past efforts at implementing Load Spectrum Generation and Neuber Control have centered around minicomputers and analog circuits. The use of a personal computer to implement the tasks is presented. On implementation of the load Spectrum Generation software, the response of the Materials Testing System was investigated for distortion and attenuation. In particular, the effect of the resolution of the waveform on the test system response was noted. There was negligible attenuation for full scale frequencies of up to 20 Hz. Greater waveform resolution was required at lower frequencies than at higher frequencies. On implementation of the Neuber Control program, the accuracy obtained at the Neuber hyperbolas was noted. Better accuracy was obtained at ramp frequencies below 0.1 Hz. Based on the results obtained after implementing the Load Spectrum Generator program and the Neuber Control program, the performance of the personal computer in controlling fatigue tests is evaluated. Cost effectiveness and versatility favor the use of a personal computer for the control of fatigue tests.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography