• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 64
  • 23
  • 22
  • 9
  • 8
  • 6
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 161
  • 161
  • 39
  • 28
  • 25
  • 22
  • 20
  • 20
  • 20
  • 19
  • 17
  • 16
  • 16
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

WE-QT: uma técnica de inspeção de usabilidade de aplicações de web para inspetores novatos

Fernandes, Priscila Silva 08 February 2013 (has links)
Submitted by Geyciane Santos (geyciane_thamires@hotmail.com) on 2015-06-17T14:51:52Z No. of bitstreams: 1 Dissertação- Prsicila Silva Fernandes.pdf: 8682442 bytes, checksum: cf742a434c25244708ee5ed78c8e4718 (MD5) / Approved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-06-17T20:42:53Z (GMT) No. of bitstreams: 1 Dissertação- Prsicila Silva Fernandes.pdf: 8682442 bytes, checksum: cf742a434c25244708ee5ed78c8e4718 (MD5) / Approved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-06-17T20:43:53Z (GMT) No. of bitstreams: 1 Dissertação- Prsicila Silva Fernandes.pdf: 8682442 bytes, checksum: cf742a434c25244708ee5ed78c8e4718 (MD5) / Made available in DSpace on 2015-06-17T20:43:53Z (GMT). No. of bitstreams: 1 Dissertação- Prsicila Silva Fernandes.pdf: 8682442 bytes, checksum: cf742a434c25244708ee5ed78c8e4718 (MD5) Previous issue date: 2013-02-08 / CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / In recent years, Web applications have been intensive used in current society, and their user population comprises since young kids to elderly individuals. The success of Web applications can be determined by two features: their fast evolution and their usability. Despite the great evolution of Web applications, users often face errors while using them, caused by not intuitive interfaces. A large proportion of this problem is on the development process of these applications, which sometimes does not embody usability principals and methods. Usability evaluations on Web development processes are often avoided by industry professionals due to their lack of experience in the field. Also, usability evaluation can be expensive in terms of time and human resources. Our motivation consists on assist novice inspectors, such as developers with little knowledge on usability, improving the quality of their Web applications by producing better interfaces, with a lower cost. We developed a new usability inspection technique, called WE-QT (Web Evaluation Question Technique). The WE-QT technique was specifically tailored for usability evaluation of Web applications for novice inspectors. Our technique uses a question based approach to guide the inspectors uncovering usability problems. We adopted an experimental methodology to develop WE-QT. This thesis describes the WE-QT’s creation, a feasibility study and two observational studies. Our goal is to increase the quality of Web applications and improve the user’s interaction in this technology. / Nos últimos anos, aplicações Web têm sido amplamente utilizadas na sociedade, e sua população de usuários compreende desde crianças jovens a idosos. O sucesso das aplicações da Web pode ser determinado por duas características: sua rápida evolução e sua usabilidade. Apesar da grande evolução das aplicações Web, os usuários muitas vezes se deparam com erros ao utilizá-las, causados por interfaces não intuitivas. Grande parte deste problema está no processo de desenvolvimento destas aplicações, que às vezes não incorporam princípios e métodos de usabilidade. Avaliações de usabilidade nos processos de desenvolvimento são muitas vezes evitadas por profissionais da indústria, devido à sua falta de experiência na área, e avaliações de usabilidade podem ser caras em termos de tempo e de recursos humanos. A motivação deste trabalho consiste em ajudar os inspetores novatos, tais como desenvolvedores com pouco conhecimento em usabilidade, a melhorar a qualidade de suas aplicações Web, com um custo menor. Foi desenvolvida uma nova técnica de inspeção de usabilidade, chamada WE-QT (Web Evaluation Question Technique). A técnica WE-QT foi desenvolvida especificamente para avaliação de usabilidade de aplicações Web por inspetores novatos. A WE-QT utiliza uma abordagem baseada em perguntas para orientar os inspetores a detectar defeitos de usabilidade. Foi adotada uma metodologia experimental para desenvolver WE-QT. Esta dissertação descreve a criação da WE-QT, um estudo de viabilidade e dois estudos de observação. Nosso objetivo é aumentar a qualidade de aplicações Web e melhorar a interação do usuário nesta tecnologia.
32

A testing methodology for the validation of web applications / Une méthodologie de test pour la validation des applications web

Morales, Gerardo 13 July 2010 (has links)
L'objectif de cette thèse est d'assurer le bon comportement des aspects fonctionnels des systèmes basés sur le web. Pour atteindre cet objectif, nous nous basons dans ce manuscrit, sur deux approches différentes de test: l'approche active et l'approche passive. Le principe du test actif consiste à générer automatiquement une suite de scénarios de tests qui sera appliquée sur un système sous test pour en étudier sa conformité par rapport à ses besoins fonctionnels. Quant au test passif, il consiste à observer passivement le système sous test, sans interrompre le flux normal de ses opérations. Pour l'approche active, nous proposons une méthodologie qui permet de générer automatiquement des séquences de test afin de valider la conformité d'un système par rapport à la description formel du comportement du système. Le comportement est spécifié en utilisant un modèle formel basé sur des machines à états finis étendues temporisées (TEFSM). La génération automatique des tests est ensuite effectuée en utilisant des outils développés dans notre laboratoire et permet d'obtenir des cas de test exécutables qui permettent au moteur de test d'interagir avec une application web réel. Dans l’approche passive, nous spécifions des propriétés fonctionnelles à tester sous la forme d'invariants temporisés.Nous analysons ensuite les traces d’exécution d’un Web service composé afin d’élaborer un verdict sur sa conformité par rapport au comportement souhaité du système. Plusieurs algorithmes et outils sont fournis dans ce manuscrit pour effectuer le test actif et passif des systèmes Web. Nous avons appliqué nos méthodologies à divers systèmes (le Mission Handler et le Travel Reservation Service) pour illustrer les approches proposées sur des systèmes réels / The objective of this thesis is to ensure the proper behaviour of the functional aspects of web based systems. To achieve this goal, we proposed two different test approaches: the active approach and the passive approach. Our goal is to automatically generate a suite of active test scenarios that will be applied on a system under test to examine its compliance with respect to its functional specification, and, when interrupting the normal flow of operation is problematic, to observe the system under test with passive testing. The goal of this work is developing a method and a set of tools to test web based systems using the active and passive testing approaches. Concerning the active testing approach, we present a methodology to cover the end-to-end testing process (from building the model until the test execution). This work tackles the gap between, on the one hand, generating abstract test cases from abstract models and, on the other hand, developing methods allowing concretizing these tests and automatically applying them on a real applications. Then, concerning the passive test approach, we present a methodology and a new tool for observing the behaviour of the communications of the web applications with external web services (for SOA based web applications) in order to check whether the observed behaviour is correct. All the methodologies and tools presented in this work are applied on two industrial case studies, Mission Handler and Travel Reservation Service, in order to validate our contributions in active and passive testing respectively
33

Database Auto Awesome: Enhancing Database-Centric Web Applications through Informed Code Generation

Adams, Jonathan 01 August 2017 (has links)
Database Auto Awesome is an approach to enhancing web applications comprised of forms used to interact with stored information. It was inspired by Google's Auto Awesome tool, which provides automatic enhancements for photos. Database Auto Awesome aims to automatically or semi-automatically provide improvements to an application by expanding the functionality of the application and improving the existing code. This thesis describes a tool that gathers information from the application and provides details on how the parts of the application work together. This information provides the details necessary to generate new portions of an application. These enhancements are directed by the web application administrator through specifying what they would like to have generated, in terms of functionality. Once the administrator has provided this direction, the new application code is generated and put in updated or new files. Using this approach, Database Auto Awesome provides a viable solution for semi-automatically generating enhancements to an existing web application.
34

Säkerhet och integritet i webbapplikationer : En orientering över säker utveckling / Security and Integrity in Web Applications : An orientation of safe development

Nordlander, Mikael, Martinsson, Fredrik January 2010 (has links)
<p>The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.</p><p>This study’s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.</p><p>The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject. The results of the study was generated through comparison of the theoretical material with the empirical material, to then conclude the most prominent points of what are different and similar between those materials.</p><p>During the study some key points has been revealed for development: Responsibility for safety in the application lies, in the cases we looked at, with the developers to describe the technical possibilities and hence vulnerabilities when the client usually does not possess the same technical skills for that. The customer was, as the cases we studied, often not so proactive on safety and does not value it very high (if it was not a security-critical business such as being involved with defense technology). Because the customer in such cases didn’t put security as high priority, there existed a lack of motivation to spend extra money to combat threats that were not considered significant. In cases where extra recourses were spent on security, a measurement was developed that security should not cost more than the value of what it protects else the cost is unjustified. Finally it is noted that it is technically difficult to protect against human errors that can disarm the security, for example a simple or misplaced password.</p>
35

Analyzing demographic and geographic characteristics of "Cycle Atlanta" smartphone application users

Poznanski, Alex Joshua 09 April 2013 (has links)
The objective of this research is to analyze how the demographic characteristics and reported home locations of Cycle Atlanta smartphone app users compare to those of cyclists reflected by other datasets. The findings of this research show that the majority of Cycle Atlanta users are young, white males belonging to either a very high annual income group or a low annual income group, with fewer users belonging to middle-income groups. Most of the app's users live in east-side, ``intown' Atlanta neighborhoods. Other cyclist data for the Atlanta area show similar trends, although less pronounced than the trends exhibited by Cycle Atlanta users. Because smartphone apps such as Cycle Atlanta are a fairly recent innovation, there is still a great deal of uncertainty as to how equitably they can gather bicycle data. The research presented in this thesis has the potential to empower transportation planners to plan bicycle facilities that will benefit many different facets of the cycling community in Atlanta. This has the potential to increase the mode share of cycling in cities, which will reduce congestion and promote healthier lifestyles.
36

Säkerhet och integritet i webbapplikationer : En orientering över säker utveckling / Security and Integrity in Web Applications : An orientation of safe development

Nordlander, Mikael, Martinsson, Fredrik January 2010 (has links)
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind. This study’s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications. The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject. The results of the study was generated through comparison of the theoretical material with the empirical material, to then conclude the most prominent points of what are different and similar between those materials. During the study some key points has been revealed for development: Responsibility for safety in the application lies, in the cases we looked at, with the developers to describe the technical possibilities and hence vulnerabilities when the client usually does not possess the same technical skills for that. The customer was, as the cases we studied, often not so proactive on safety and does not value it very high (if it was not a security-critical business such as being involved with defense technology). Because the customer in such cases didn’t put security as high priority, there existed a lack of motivation to spend extra money to combat threats that were not considered significant. In cases where extra recourses were spent on security, a measurement was developed that security should not cost more than the value of what it protects else the cost is unjustified. Finally it is noted that it is technically difficult to protect against human errors that can disarm the security, for example a simple or misplaced password.
37

Ontology Population Using Human Computation

Evirgen, Gencay Kemal 01 January 2010 (has links) (PDF)
In recent years, many researchers have developed new techniques on ontology population. However, these methods cannot overcome the semantic gap between humans and the extracted ontologies. Words-Around is a web application that forms a user-friendly environment which channels the vast Internet population to provide data towards solving ontology population problem that no known efficient computer algorithms can yet solve. This application&rsquo / s fundamental data structure is a list of words that people naturally link to each other. It displays these lists as a word cloud that is fun to drag around and play with. Users are prompted to enter whatever word comes to their mind upon seeing a word that is suggested from the application&rsquo / s database / or they can search for one word in particular to see what associations other users have made to it. Once logged in, users can view their activity history, which words they were the first to associate, and mark particular words as misspellings or as junk, to help keep the list&rsquo / s structure to be relevant and accurate. The results of this implementation indicate the fact that an interesting application that enables users just to play with its visual elements can also be useful to gather information.
38

Automated Navigation Model Extraction For Web Load Testing

Kara, Ismihan Refika 01 December 2011 (has links) (PDF)
Web pages serve a huge number of internet users in nearly every area. An adequate testing is needed to address the problems of web domains for more efficient and accurate services. We present an automated tool to test web applications against execution errors and the errors occured when many users connect the same server concurrently. Our tool, called NaMoX, attains the clickables of the web pages, creates a model exerting depth first search algorithm. NaMoX simulates a number of users, parses the developed model, and tests the model by branch coverage analysis. We have performed experiments on five web sites. We have reported the response times when a click operation is eventuated. We have found 188 errors in total. Quality metrics are extracted and this is applied to the case studies.
39

Selected Papers of the International Workshop on Smalltalk Technologies (IWST’10) : Barcelona, Spain, September 14, 2010

January 2010 (has links)
The goal of the IWST workshop series is to create and foster a forum around advancements of or experience in Smalltalk. The workshop welcomes contributions to all aspects, theoretical as well as practical, of Smalltalk-related topics. / Zweck der IWST-Workshop-Reihe ist die Formung und Pflege eines Forums fŸr die Diskussion von Fortschritten und Arbeitsergebnissen mit der Programmierumgebung Smalltalk. Der Workshop beinhaltet BeitrŠge zu allen Aspekten von auf Smalltalk bezogenen Arbeiten sowohl theoretischer als auch praktischer Natur.
40

Designing security policies and frameworks for web applications

Singh, Kapil 24 May 2011 (has links)
The new developments behind Web 2.0 have increased the complexity of web systems making the task of securing these systems a challenging problem. As a result, end-to-end security for web access has been hindered by the limitations of current web security policies and by the lack of systems that enable effective enforcement of policies. The focus of this dissertation is on how new tools and frameworks may be designed to aid the protection of web systems by acting as policy specification and enforcement points. In particular, we develop a set of policies and frameworks for three web players--the user, the web browser and the web application--that determine the end-to-end security of web content. Our contributions include a framework for users to specify security policies, a platform to enforce user policies for third-party applications, a systematic analysis of browser policy issues, and a mechanism to provide improved end-to-end security/integrity guarantees.

Page generated in 0.0647 seconds