Spelling suggestions: "subject:"computer 5oftware"" "subject:"computer 1software""
91 |
Software quality and reliability prediction using Dempster-Shafer theoryGuo, Lan, January 1900 (has links)
Thesis (Ph. D.)--West Virginia University, 2004. / Title from document title page. Document formatted into pages; contains x, 118 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 104-118).
|
92 |
A case-study based assessment of Agile software developmentTheunissen, William Herman Morkel. January 2003 (has links)
Thesis (MSc(Computer Science))--University of Pretoria, 2003. / Summary in English and Afrikaans. Includes bibliographical references.
|
93 |
A cost effective methodology for quantitative evaluation of software reliability using static analysis /Schilling, Walter W., January 2007 (has links)
Dissertation (Ph.D.)--University of Toledo, 2007. / Typescript. "Submitted as partial fulfillment of the requirements for the Doctor of Philosophy in Engineering." Bibliography: leaves 210-238.
|
94 |
Optimizing the productivity of development teams during software system construction : theoretical and practical considerations /Chiang, I-Cheng Robert, January 1999 (has links)
Thesis (Ph. D.)--University of Washington, 1999. / Vita. Includes bibliographical references (leaves 104-115).
|
95 |
Finding termination and time improvement in predicate abstraction with under-approximation and abstract matching /Kudra, Dritan, January 2007 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2007. / Includes bibliographical references (p. 30-31).
|
96 |
Verification and validation in software product line engineering /Addy, Edward A. January 1999 (has links)
Thesis (Ph. D.)--West Virginia University, 1999. / Title from document title page. Includes bibliographical references (p. 35-39).
|
97 |
Countering kernel malware in virtual execution environmentsXuan, Chaoting. January 2009 (has links)
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010. / Committee Chair: Copeland A. John; Committee Member: Alessandro Orso; Committee Member: Douglas M. Blough; Committee Member: George F. Riley; Committee Member: Raheem A. Beyah. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
98 |
A case study of software process assessment and improvementHertzer, Cynthia J. January 1997 (has links)
Thesis (M.S.)--University of California, Santa Cruz, 1997. / Typescript. Includes bibliographical references (leaves 58-60).
|
99 |
Developing a strategic IS plan for the Cherry Creek SneakBass, Stephanie Kay January 2006 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2006. / "December 2005"--T.p. Title from PDF title page (viewed on Aug. 30, 2006). Includes bibliographical references.
|
100 |
Exploring the memorability of multiple recognition-based graphical passwords and their resistance to guessability attacksChowdhury, Soumyadeb January 2015 (has links)
Most users find it difficult to remember traditional text-based passwords. In order to cope with multiple passwords, users tend to adopt unsafe mechanisms like writing down the passwords or sharing them with others. Recognition-based graphical authentication systems (RBGSs) have been proposed as one potential solution to minimize the above problems. But, most prior works in the field of RBGSs make the unrealistic assumption of studying a single password. It is also an untested assumption that RBGS passwords are resistant to being written down or verbally communicated. The main aim of the research reported in this thesis is to examine the memorability of multiple image passwords and their guessability using written descriptions (provided by the respective account holders). In this context, the thesis presents four user studies. The first user study (US1) examined the usability of multiple RBGS passwords with four different image types: Mikon, doodle, art and everyday objects (e.g. images of food, buildings, sports etc.). The results obtained in US1 demonstrated that subjects found it difficult to remember four RBGS passwords (of the same image type) and the memorability of the passwords deteriorated over time. The results of another usability study (US2) conducted using the same four image types (as in US1) demonstrated that the memorability of the multiple RBGS passwords created by employing a mnemonic strategy do not improve even when compared to the existing multiple password studies and US1. In the context of the guessability, a user study (GS1) examined the guessability of RBGS passwords (created in US1), using the textual descriptions given by the respective account holders. Another study (GS2) examined the guessability of RBGS passwords (created in US2), using descriptions given by the respective account holders. The results obtained from both the studies showed that RBGS passwords can be guessed using the password descriptions in the experimental set-up used. Additionally, this thesis presents a novel Passhint authentication system (PHAS).The results of a usability study (US3) demonstrated that the memorability of multiple PHAS passwords is better than in existing Graphical authentication systems (GASs). Although the registration time is high, authentication time for the successful attempts is either equivalent to or less than the time reported for previous GASs. The guessability study (GS3) showed that the art passwords are the least guessable, followed by Mikon, doodle and objects in that order. This thesis offers these initial studies as a proof of principle to conduct large scale field studies in the future with PHAS. Based on the review of the existing literature, this thesis identifies the need for a general set of principles to design usability experiments that would allow systematic evaluation and comparison of different authentication systems. From the empirical studies (US1, US2 and US3) reported in this thesis, we found that multiple RBGS passwords are difficult to remember, and the memorability of such passwords can be increased using the novel PHAS. We also recommend using the art images as the passwords in PHAS, because they are found to be the least guessable using the written descriptions in the empirical studies (GS1, GS2 and GS3) reported in this thesis.
|
Page generated in 0.0602 seconds