• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 62
  • 4
  • 3
  • Tagged with
  • 77
  • 77
  • 41
  • 34
  • 14
  • 13
  • 11
  • 10
  • 10
  • 8
  • 8
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Simplifying development of secure software : Aspects and Agile methods

Boström, Gustav January 2006 (has links)
<p>Reducing the complexity of building secure software systems is an important goal as increased complexity can lead to more security flaws. This thesis aims at helping to reduce this complexity by investigating new programming techniques and software development methods for implementing secure software. We provide case studies on the use and effects of applying Aspect-oriented software development to Confidentiality, Access Control and Quality of Service implementation. We also investigate how eXtreme Programming can be used for simplifying the secure software development process by comparing it to the security engineering standards Common Criteria and the Systems Security Engineering Capability Maturity Model. We also explore the relationship between Aspect-oriented programming and Agile software development methods, such as eXtreme Programming.</p>
22

IRSS: integrated reservoir simulation system

Zhang, Jiang 28 August 2008 (has links)
Not available / text
23

On the Design and Testing of Authorization Systems

Sharifi, Alireza January 2013 (has links)
Authorization deals with the specification and management of accesses principals have to resources. In the design of an authorization system, sometimes we just implement the accessenforcement without having a precise semantics for it. In this dissertation we show that, there exists a precise semantics that improves the efficiency of access-enforcement over the accessenforcement without precise semantics. We present an algorithm to produce an Access Control List (ACL), in a particular authorization system for version control syatems called gitolite, and we compare the implementation of our algorithm against the implementation that is already being used. As another design problem, we consider least-restrictive enforcement of the Chinese Wall security policy. We show that there exists a least-restrictive enforcement of the Chinese Wall Security Policy. Our approach to proving the thesis is by construction; we present an enforcement that is least-restrictive. We also prove that such an enforcement mechanism cannot be subjectindependent. We also propose a methodology that tests the implementation of an authorization system to check whether it has properties of interest. The properties may be considered to be held in the design of an authorization system, but they are not held in the implementation. We show that there exist authorization systems that do not have the properties of interest.
24

Cost-Based Automatic Recovery Policy in Data Centers

Luo, Yi 19 May 2011 (has links)
Today's data centers either provide critical applications to organizations or host computing clouds used by huge Internet populations. Their size and complex structure make management difficult, causing high operational cost. The large number of servers with various different hardware and software components cause frequent failures and need continuous recovery work. Much of the operational cost is from this recovery work. While there is significant research related to automatic recovery, from automatic error detection to different automatic recovery techniques, there is currently no automatic solution that can determine the exact fault, and hence the preferred recovery action. There is some study on how to automatically select a suitable recovery action without knowing the fault behind the error. In this thesis we propose an estimated-total-cost model based on analysis of the cost and the recovery-action-success probability. Our recovery-action selection is based on minimal estimated-total-cost; we implement three policies to use this model under different considerations of failed recovery attempts. The preferred policy is to reduce the recovery action-success probability when it failed to fix the error; we also study different reduction coefficients in this policy. To evaluate the various policies, we design and implement a simulation environment. Our simulation experiments demonstrate significant cost improvement over previous research based on simple heuristic models.
25

An empirical investigation of issues relating to software immigrants

Hutton, Alistair James. January 2008 (has links)
Thesis (Ph.D.) - University of Glasgow, 2008. / Ph.D. thesis submitted to the Department of Computing Science, Faculty of Information and Mathematical Sciences, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
26

Multilevel performance analysis of scenario specification for a presence system /

Liu, Helen C. January 1900 (has links)
Thesis (M.Sc.) - Carleton University, 2003. / Includes bibliographical references (p. 135-138). Also available in electronic format on the Internet.
27

Key knowledge delivery factors affecting software development productivity /

Sun, Zheng, January 1900 (has links)
Thesis (M. Eng.)--Carleton University, 2004. / Includes bibliographical references (p. 68-75). Also available in electronic format on the Internet.
28

A methodology for risk assessment of product line architectures

Jalali, Amir H. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2008. / Title from document title page. Document formatted into pages; contains xi, 126 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 121-126).
29

Graphbasiertes Reengineering von Telekommunikationssystemen /

Mosler, Christof. January 2009 (has links)
Zugl.: Aachen, Techn. Hochsch., Diss., 2009.
30

Hardware and software for WINC2R cognitive radio platform

Jain, Shalini. January 2008 (has links)
Thesis (M.S.)--Rutgers University, 2008. / "Graduate Program in Electrical and Computer Engineering." Includes bibliographical references (p. 59-60).

Page generated in 0.0804 seconds