• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1383
  • 192
  • 73
  • 30
  • 27
  • 11
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • Tagged with
  • 3635
  • 3635
  • 1069
  • 940
  • 902
  • 716
  • 706
  • 510
  • 470
  • 447
  • 399
  • 357
  • 291
  • 267
  • 263
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
361

An empirical study of software design balance dynamics

Bhattrai, Gopendra R. January 1995 (has links)
The Design Metrics Research Team in the Computer Science Department at Ball State University has been engaged in developing and validating quality design metrics since 1987. Since then a number of design metrics have been developed and validated. One of the design metrics developed by the research team is design balance (DB). This thesis is an attempt to validate the metric DB. In this thesis, results of the analysis of five systems are presented. The main objective of this research is to examine if DB can be used to evaluate the complexity of a software design and hence the quality of the resulting software. Two of the five systems analyzed were student projects and the remaining three were from industry. The five systems analyzed were written in different languages, had different sizes and exhibited different error rates. / Department of Computer Science
362

Data security in European healthcare information systems

Furnell, Steven Marcus January 1995 (has links)
This thesis considers the current requirements for data security in European healthcare systems and establishments. Information technology is being increasingly used in all areas of healthcare operation, from administration to direct care delivery, with a resulting dependence upon it by healthcare staff. Systems routinely store and communicate a wide variety of potentially sensitive data, much of which may also be critical to patient safety. There is consequently a significant requirement for protection in many cases. The thesis presents an assessment of healthcare security requirements at the European level, with a critical examination of how the issue has been addressed to date in operational systems. It is recognised that many systems were originally implemented without security needs being properly addressed, with a consequence that protection is often weak and inconsistent between establishments. The overall aim of the research has been to determine appropriate means by which security may be added or enhanced in these cases. The realisation of this objective has included the development of a common baseline standard for security in healthcare systems and environments. The underlying guidelines in this approach cover all of the principal protection issues, from physical and environmental measures to logical system access controls. Further to this, the work has encompassed the development of a new protection methodology by which establishments may determine their additional security requirements (by classifying aspects of their systems, environments and data). Both the guidelines and the methodology represent work submitted to the Commission of European Communities SEISMED (Secure Environment for Information Systems in MEDicine) project, with which the research programme was closely linked. The thesis also establishes that healthcare systems can present significant targets for both internal and external abuse, highlighting a requirement for improved logical controls. However, it is also shown that the issues of easy integration and convenience are of paramount importance if security is to be accepted and viable in practice. Unfortunately, many traditional methods do not offer these advantages, necessitating the need for a different approach. To this end, the conceptual design for a new intrusion monitoring system was developed, combining the key aspects of authentication and auditing into an advanced framework for real-time user supervision. A principal feature of the approach is the use of behaviour profiles, against which user activities may be continuously compared to determine potential system intrusions and anomalous events. The effectiveness of real-time monitoring was evaluated in an experimental study of keystroke analysis -a behavioural biometric technique that allows an assessment of user identity from their typing style. This technique was found to have significant potential for discriminating between impostors and legitimate users and was subsequently incorporated into a fully functional security system, which demonstrated further aspects of the conceptual design and showed how transparent supervision could be realised in practice. The thesis also examines how the intrusion monitoring concept may be integrated into a wider security architecture, allowing more comprehensive protection within both the local healthcare establishment and between remote domains.
363

Motivators and de-motivators in software process improvement : an empirical study

Baddoo, Nathan January 2001 (has links)
Software quality problems are a concern for the software engineering community. Software Process Improvement (SPI) is the most recent and most popular approach adopted to address this problem. SPI focuses on the processes that develop software in order to deliver improvements to the product. Despite this popularity of SPI there is insufficient evidence of its successful impact on software quality. Quality problems in software continue. This has led to some concern in the industry about the effectiveness of SPI in tackling the problem of software quality. There is evidence to suggest that SPI does improve software quality. However, there is also evidence to suggest that SPI is not sufficiently supported by software practitioners. This lack of support may be one of the reasons why SPI appears to be failing at tackling the problem of software quality. In this research it is argued that this lack of support for SPI is caused by companies' inability to manage software practitioners' motivation for SPI properly. Companies may not be managing software practitioners' motivation for SPI properly because they may not understand them. There is therefore a need to better understand what software practitioners'motivations for supporting SPI are. A review of the literature suggests a set of guidelines that can improve software practitioners' support for SPI. The literature also suggests four themes that underpin software practitioners' motivation for SPI. The four themes are SPI managers' perception of the motivators and demotivators for SPI, software practitioners' motivators, software practitioners' de-motivators and the differences in software practitioners' motivators and de-motivators. The basis of this research is that exploring the four themes that underpin software practitioners' motivation for SPI improves understanding of the factors that influence support for SPI. This knowledge of the factors that influence support for SPI can then be used to validate and provide an empirical basis for the literature-suggested guidelines. Thereby improving confidence in the "-IL iidelines. The four themes underpinning software practitioners' motivation for SPI are examined through empirical studies. Findings from these studies suggest that SPI managers perceive senior managers as not supportive of SPI. They also perceive developers as not enthusiastic about SPI. The findings also suggest that the key motivators of software practitioners for SPI are visible support and commitment from senior management and empowerment of practitioners, whereas the key de-motivators are related to constraints on resources and a failure to secure practitioners' buy-in for SPI. There are also differences in what motivates and de-motivates different practitioner groups for SPI and these differences are related to the jobs that practitioners do. Finally, software practitioners have different perceptions of their role in SPI, which are related to their software development roles. This suggests that the objectives of SPI should be tailored to the software development objectives of practitioners in order to improve their support for SPI. Overall, findinas from these studies confirm most of the guidelines suggested by the t:, literature. The confirmed guidelines are offered as insight to improving support for SPI, which can in turn help to improve the impact of SPI on software quality.
364

Business-oriented Software Process Improvement based on CMM and CMMI using QFD

Sun, Yan, January 2008 (has links) (PDF)
Thesis (Ph. D.)--Missouri University of Science and Technology, 2008. / Degree granted by Missouri University of Science and Technology, formerly known as the University of Missouri-Rolla. Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 29, 2008) Includes bibliographical references (p. 108-111).
365

Determinism in power signatures of electronics for health monitoring

Rayas, Giancarlo, January 2008 (has links)
Thesis (M.S.)--University of Texas at El Paso, 2008. / Title from title screen. Vita. CD-ROM. Includes bibliographical references. Also available online.
366

A case study in integrating formal verification tools using the OMDoc standard for mathematical documents /

Jin, Xiao Bing, January 1900 (has links)
Thesis (M.C.S.)--Carleton University, 2004. / Includes bibliographical references (p. 97-100). Also available in electronic format on the Internet.
367

Fault-injection through model checking via naive assumptions about state machine synchrony semantics

Joseph, Sabina. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 1998. / Title from document title page. "December 8, 1998." Document formatted into pages; contains vi, 98 p. : ill. (some col.) Includes abstract. Includes bibliographical references (p. 78-81).
368

The scrum process for independent programmers

Srirangarajan, Ananth. Lall, Pradeep, Umphress, David A., January 2009 (has links)
Thesis--Auburn University, 2009. / Abstract. Includes bibliographical references (p. 39-41).
369

Domain modelling : with a case study in air traffic /

Leung, Ping Hung, Karl Richard. January 1997 (has links)
Thesis (Ph. D.)--University of Hong Kong, 1997. / Includes bibliographical references (leaf 229-234).
370

A UML profile for developing airworthiness-compliant (RTCA DO-178B) safety-critical software /

Zoughbi, Gregory. January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 218-222). Also available in electronic format on the Internet.

Page generated in 0.0235 seconds