Dissertations / Theses on the topic 'Software Tools and Techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Software Tools and Techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Lomsak, Daniel. "Toward More Composable Software-Security Policies: Tools and Techniques." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4531.
Full textO'Neill, I. M. "Logic programming tools and techniques for imperative program verification." Thesis, University of Southampton, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.380044.
Full textD'Souza, Rosario J. "Techniques and tools for implementing and testing robust object-oriented software." Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/9198.
Full textSerrano, José Artur Ferreira da Silva e. Vale. "Automatic generation of software design tools supporting semantics of modelling techniques." Thesis, University of Glasgow, 1997. http://theses.gla.ac.uk/7018/.
Full textBagherli, J. "High level techniques and software tools for custom VLSI parser design." Thesis, University of Kent, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.371141.
Full textWaters, Matthew. "Application of software engineering tools and techniques to PLC programming : innovation report." Thesis, University of Warwick, 2009. http://wrap.warwick.ac.uk/36897/.
Full textTristram, Waide Barrington. "Investigating tools and techniques for improving software performance on multiprocessor computer systems." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1006651.
Full textSiviter, D. "HyperCourseware : the development of software tools and techniques to enable courseware management." Thesis, London South Bank University, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.618644.
Full textKågström, Simon. "Tools, techniques, and trade-offs when porting large software systems to new environments /." Karlskrona : Department of Systems and Software Engineering, Blekinge Institute of Technology, 2008. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/8007549c674e519dc1257452003440f5?OpenDocument.
Full textKågström, Simon. "Tools, Techniques, and Trade-offs when Porting Large Software Systems to New Environments." Doctoral thesis, Blekinge Tekniska Högskola [bth.se], School of Engineering - Dept. of Systems and Software Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-00402.
Full textLiu, Yin. "Methodologies, Techniques, and Tools for Understanding and Managing Sensitive Program Information." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103421.
Full textDoctor of Philosophy
Some portions of a computer program can be sensitive, referred to as sensitive program information (SPI). By compromising SPI, attackers can hurt user security/privacy. It is hard for developers to identify and protect SPI, particularly for large programs. This dissertation introduces novel methodologies, techniques, and software tools that facilitate software developments tasks concerned with locating and protecting SPI.
Snyder, Brett W. "Tools and Techniques for Evaluating the Reliability of Cloud Computing Systems." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1371685877.
Full textShahrezaei, Khashayar, and Pontus Holmström. "Software development from theory to practical machining techniques." Thesis, Luleå tekniska universitet, Institutionen för teknikvetenskap och matematik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79289.
Full textMamun, Md Abdullah Al, and Aklima Khanam. "Concurrent Software Testing : A Systematic Review and an Evaluation of Static Analysis Tools." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4310.
Full textJiang, Haozhen, and Yi Chen. "Comparison of Different Techniques of Web GUI-based Testing with the Representative Tools Selenium and EyeSel." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14771.
Full textContino, Sergio. "Development of Software Tools for the Test of Ultra Wide Band Receivers." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4327/.
Full textAhmi, Aidi. "Adoption of generalised audit software (GAS) by external auditors in the UK." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/7357.
Full textAlmroth, Tobias. "Data visualization for the modern web : A look into tools and techniques for visualizing data in Angular 5 applications." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17014.
Full textIvanov, Dinko. "Integrating formal analysis techniques into the Progress-IDE." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-13884.
Full textTekin, Yasar. "An Automated Tool For Requirements Verification." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605401/index.pdf.
Full text#8217
s world, only those software organizations that consistently produce high quality products can succeed. This situation enforces the effective usage of defect prevention and detection techniques. One of the most effective defect detection techniques used in software development life cycle is verification of software requirements applied at the end of the requirements engineering phase. If the existing verification techniques can be automated to meet today&
#8217
s work environment needs, the effectiveness of these techniques can be increased. This study focuses on the development and implementation of an automated tool that automates verification of software requirements modeled in Aris eEPC and Organizational Chart for automatically detectable defects. The application of reading techniques on a project and comparison of results of manual and automated verification techniques applied to a project are also discussed.
Persson-Holmes, Paul, and Pontus Lyngsten. "IT in auditing : A descriptive study about IT-tool usage, IT knowledge, and the future digital environment for auditors." Thesis, Umeå universitet, Företagsekonomi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-172383.
Full textPayne, John C. "Fault tolerant computing testbed : a tool for the analysis of hardware and software fault handling techniques /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA359579.
Full text"December 1998." Thesis advisor(s): Alan A. Ross. Includes bibliographical references (p. 169). Also available online.
Chielle, Eduardo. "CFT-tool : ferramenta configurável para aplicação de técnicas de detecção de falhas em processadores por software." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2012. http://hdl.handle.net/10183/54883.
Full textThis work presents a configurable tool, called CFT-tool, capable of automatically applying software-based error detection techniques aiming to protect processors with different architectures and organizations against transient faults in the hardware. The techniques are based on redundancy and comparison. They are applied by CFT-tool in the assembly code of an unprotected program, compiled to the target architecture. The developed tool was validated using two distinct processors: miniMIPS and LEON3. The miniMIPS processor has been utilized to verify the efficiency of the software-based techniques applied by CFT-tool in the assembly code of unprotected programs in terms of error detection rate, runtime and memory occupation, comparing the obtained results with those presented in the literature. The LEON3 processor was selected because it is largely adopted in space applications and because it is based on a different architecture that miniMIPS processor. The configurability of the CFT-tool is verified with the LEON3 processor, that is, the capability of the tool at applying software-based detection techniques in a code compiled to a different processor, maintaining it functional and capable of detecting errors. The CFT-tool can be utilized to protect programs compiled to other architectures and organizations by modifying the configuration files of the tool. The configuration of the techniques is defined by the specifications of the application, processor resources and selections of the user. Programs were protected and faults were injected in logical level in both processors. When using the miniMIPS processor, the error detection rates, runtimes and memory occupations of the protected programs are comparable to the results presents in the literature. Similar results are reached with the LEON3 processor. Differences between the results are due to architecture features. The CFT-tool can be configurable to protect the entire code or to select portions of the code or registers that will be redundant and protected. The advantage of protecting portions of the code is to reduce the final cost in terms of runtime and memory occupation. An analysis of the impact of selective selection of registers in the error detection rate is also presented. And policies to reach an optimum committal between amount of protected registers, error detection rate and cost are discussed.
Santos, Ligia Cassia Moreno de Castro. "Uso de técnicas e ferramentas para detecção de vulnerabilidades: um survey com membros de equipes de desenvolvimento ágil de software." Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/100/100131/tde-09062018-123730/.
Full textAgile methods were created to address real and perceived weaknesses of traditional software development methods. Due to the pressure to delivery software products on time, security requirements are often poorly addressed or even neglected. During agile software development it is important to detect possible vulnerabilities. This dissertation describes a survey applied to members of software development teams who apply agile methods. Thus, 110 members of agile teams were identified through LinkedIns network of professionals who deployed, are in the process of being deployed or will still implement techniques and tools for vulnerability detection techniques and tools were identified. The questionnaire was based on three known safe software development processes, namely, the McGraw Process, OWASP CLASP, and the activities of Howard and Lipner. Data were collected through questionnaires and interviews. The analysis of the results used techniques of descriptive statistics and content analysis. They indicated the most widely used agile methods, the current use of techniques and tools, the skills, interests and training needs of agile teams in vulnerability detection techniques and tools. In addition, the benefits of implementing the techniques and tools, the motivations, the strategies, the difficulties, the limitations and the lessons learned were identified. The results suggest that special attention is still not given to detection of vulnerabilities in the agile teams whose members participated in the survey
Summers, David C. "Implementation of a fault tolerant computing testbed a tool for the analysis of hardware and software fault handling techniques /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380203.
Full textThesis advisor(s): Ross, Alan A.; Loomis, Herschel H. "June 2000." Includes bibliographical references (p. 163-165). Also available in print.
Sullivan, Kevin Michael. "An image delta compression tool: IDelta." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2543.
Full textPacheco, Motta Junior Eury. "Investigação de modelo de auditoria contínua para tribunais de contas." Universidade Federal de Pernambuco, 2010. https://repositorio.ufpe.br/handle/123456789/2417.
Full textTribunal de Contas de Pernambuco
A pressão pela melhoria dos mecanismos de controle e de transparência vem demandando a modernização das técnicas de auditoria. Nesta busca, os recursos de Tecnologia da Informação têm se mostrado os principais aliados, utilizados cada vez em maior escala, e cada vez mais sofisticados. Neste aspecto, a utilização da chamada Auditoria Contínua (AC) é um dos principais avanços em curso na iniciativa privada. Voltada para análise de dados em formato eletrônico, a abordagem vem sendo cada vez mais adotada, impulsionada pelo crescimento das transações sem papel e por imposições legais, como o ato Sarbanes-Oxley (SOX) de 2002 que procura garantir que as empresas possuam mecanismos de controles confiáveis, reforçando sua governança e transparência como meio de recuperar a credibilidade dos investidores após escândalos financeiros envolvendo grandes corporações americanas. Recentes alterações na legislação brasileira criam obrigações de transparência para o setor público que são semelhantes às criadas pelo ato SOX. A mudança determina que as informações relativas à execução orçamentária e financeira dos entes públicos sejam publicadas em tempo real. Com a mudança, surgem as condições para que os Tribunais de Contas (TCs) utilizem abordagens de AC para fiscalizar a aplicação dos recursos públicos em tempo real. Os modelos proposto para AC são voltados para o setor privado, e muitas vezes para o controle interno. O presente trabalho visa investigar um modelo de AC apropriado ao papel dos TCs no exercício do controle externo. Com esta atualização tecnológica as Cortes de Contas podem avançar muito no nível de efetividade da sua atuação, gerando melhores resultados para a sociedade e benefícios para o setor público brasileiro como um todo. Como resultado da investigação foi construído um modelo de Ambiente de AC para TCs. A proposta descreve as instituições participantes do ambiente e seus papéis; a arquitetura tecnológica que suporta o funcionamento do ambiente; e o desenho dos principais processos do ambiente. Adicionalmente, apresenta-se alguns cenários de evolução e sugestão de critérios para planejamento do ambiente, bem como os benefícios que a abordagem pode trazer
Jesus, Telmo Oliveira de. "Uma técnica baseada em eventos para rastreabilidade entre requisitos modelados com SysML." Universidade Federal de Sergipe, 2017. https://ri.ufs.br/handle/riufs/3397.
Full textGerenciar um projeto de software é uma tarefa cada vez mais complexa à medida que as exigências sobre a qualidade do produto final aumentam. Assim, é preciso um gerenciamento eficaz desde a concepção do projeto até a implantação e manutenção do software. Segundo a literatura encontrada, a Engenharia de Requisitos é a fase que possui maior impacto em um projeto de software. As mudanças nos requisitos de software ocorrem ao longo do processo de software, desde a elicitação e análise de requisitos até a operação do software. A rastreabilidade de requisitos possibilita identificar a origem e a dependência entre os requisitos de software. Estudos mostram que as ferramentas e métodos de rastreabilidade de requisitos atuais são insuficientes e dificultam o uso prático da rastreabilidade. O objetivo deste trabalho é a criação de uma técnica de rastreabilidade de requisitos combinada com uma linguagem de modelagem e que seja apoiada por uma ferramenta. Para atingir este objetivo, foram utilizados como instrumentos de pesquisa a revisão bibliográfica, uma pesquisa do tipo estado da arte, análise comparativa, questionário e entrevistas. Inicialmente, foram realizadas análise das técnicas de rastreabilidade de requisitos e avaliação de ferramentas de rastreabilidade de requisitos com intuito de avaliar se as técnicas são utilizadas na prática, e se estão sendo apoiadas por ferramentas de software. Após estas análises, foi proposta uma técnica de rastreabilidade entre requisitos baseada em eventos utilizando conceitos da linguagem de modelagem SysML. Uma ferramenta de software foi desenvolvida para apoiar essa técnica. Sempre que um requisito é modificado, a ferramenta notifica aos stakeholders a alteração realizada nos requisitos do sistema por meio de e-mails. A técnica e a ferramenta foram avaliadas por vinte e quatro profissionais de tecnologia da informação utilizando questionário, baseado no modelo TAM, que engloba os conceitos de utilidade percebida, facilidade de uso percebido e uso percebido, e entrevistas. Como resultado, foram observados a falta de relação entre as técnicas e as ferramentas pesquisadas e que o critério de comunicação automática com stakeholders não foi abordado em nenhuma ferramenta avaliada. Com relação à técnica e ferramenta propostas, observou-se uma ampla aceitação da técnica e da ferramenta. A aceitação das propostas foi realizada por profissionais com experiências variadas em desenvolvimento de software.
Dewi, Alita. "Apport des nouvelles technologies interactives pour l'analyse intégrée en génie électrique : vers un laboratoire virtuel d'expérimentation en électrotechnique." Phd thesis, Grenoble INPG, 2001. http://tel.archives-ouvertes.fr/tel-00597707.
Full textMunir, Qaiser, and Muhammad Shahid. "Software Product Line:Survey of Tools." Thesis, Linköping University, Department of Computer and Information Science, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-57888.
Full textsoftware product line is a set of software-intensive systems that share a common, managed set of features satisfying the specificneeds of a particular market segment or mission. The main attractive part of SPL is developing a set of common assets which includes requirements, design, test plans, test cases, reusable software components and other artifacts. Tools for the development of softwareproduct line are very few in number. The purpose of these tools is to support the creation, maintenance and using different versions ofproduct line artifacts. This requires a development environment that supports the management of assets and product development,processes and sharing of assets among different products.
The objective of this master thesis is to investigate the available tools which support Software Product Line process and itsdevelopment phases. The work is carried out in two steps, in the first step available Software Product Line tools are explored and a list of tools is prepared, managed and a brief introduction of each tool is presented. The tools are classified into different categoriesaccording to their usage, relation between the tools is established for better organization and understanding. In the second step, two tools Pure::variant and MetaEdit+ are selected and the quality factors such as Usability, Performance, Reliability, MemoryConsumption and Capacity are evaluated.
Sampson, Stephen Filson. "Software visualization tools for Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0019/MQ54538.pdf.
Full textMoschoglou, Georgios Moschos. "Software testing tools and productivity." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014862.
Full textDepartment of Computer Science
Guest, S. P. "Software tools for dialogue design." Thesis, De Montfort University, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.372851.
Full textTilevich, Eli. "Software Tools for Separating Distribution Concerns." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7518.
Full textDijkstra, Semme Josua. "Software tools developed for seafloor classification." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0031/NQ62170.pdf.
Full textMcParland, Patrick J. "Software tools to support formal methods." Thesis, Queen's University Belfast, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.292757.
Full textSouza, J. M. de. "Software tools for conceptual schema integration." Thesis, University of East Anglia, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.373740.
Full textCarney, John C. "Message passing tools for software integration." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/37769.
Full textMucci, Claudio <1977>. "Software tools or embedded reconfigurable processors." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2007. http://amsdottorato.unibo.it/402/.
Full textPilon, Daniel. "Software tools for improving classroom interaction." Thesis, University of Ottawa (Canada), 1995. http://hdl.handle.net/10393/10266.
Full textMartin, Matthew Daniel. "Managed pressure drilling techniques and tools." Texas A&M University, 2003. http://hdl.handle.net/1969.1/3884.
Full textBrännström, Åke. "Modelling animal populations : tools and techniques /." Umeå : Univ, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-205.
Full textHoward, Craig M. "Tools and techniques for knowledge discovery." Thesis, University of East Anglia, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.368357.
Full textPoudel, Pavan. "Tools and Techniques for Efficient Transactions." Kent State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=kent1630591700589561.
Full textPoudel, Pavan. "Tools and Techniques for Efficient Transactions." Kent State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=kent1630591700589561.
Full textMurphy-Hill, Emerson. "Programmer Friendly Refactoring Tools." PDXScholar, 2009. https://pdxscholar.library.pdx.edu/open_access_etds/2672.
Full textEatinger, Christopher J. "Testing automation tools for secure software development." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Jun%5FEatinger.pdf.
Full textThesis Advisor(s): Mikhail Auguston. "June 2007." Description based on title screen as viewed on August 14, 2007. Includes bibliographical references (p. 61). Also available in print.
Ren, Jinsong. "Software tools for integral imaging virtual studios." Thesis, De Montfort University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.406029.
Full textKeller, René. "Predicting change propagation : algorithms, representations, software tools." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.443494.
Full textBhatia, Sanjay. "Software tools for computer-controlled fatigue testing." Thesis, Virginia Tech, 1986. http://hdl.handle.net/10919/45749.
Full textMaster of Science