• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2635
  • 483
  • 390
  • 370
  • 58
  • 45
  • 35
  • 19
  • 10
  • 10
  • 9
  • 7
  • 6
  • 3
  • 2
  • Tagged with
  • 4631
  • 4631
  • 2051
  • 1971
  • 1033
  • 617
  • 521
  • 485
  • 456
  • 448
  • 421
  • 416
  • 408
  • 337
  • 310
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
261

MICROFRONTENDS: TAKING THE MICROSERVICES PERSPECTIVE TO FRONTEND DEVELOPMENT

Palamar, Almir January 2023 (has links)
Microfrontend architecture is attracting increasing attention from companies that have applications with a large number of users. The traditional monolithic architecture used in the developmentof these applications causes a bottleneck when a large number of users interact with the application.Also, monolithic applications become more challenging to maintain, scale and implement new features over time. New developers must get familiar with the whole codebase before they can makea concrete contribution to the team. One of the solutions is the migration of these applications tomicrofrontend architecture. The term microfrontend is relatively new, although the basic principles on which this architecture is based are already known and used in microservice architecture.This thesis aims to investigate the possibilities of implementing the basic principles of microservice architecture in frontend development, as well as to identify the benefits and challenges thatmicrofrontend architecture brings with it. In the research process, two research methods were used:an experiment and a case study. Before conducting the experiment, a demo prototype of the application was created. The experiment consisted of migrating an existing monolithic applicationto the microfrontend architecture. The basic principles identified for microfrontend architecturehave been met: loose coupling, single responsibility, standalone deployment and framework agnosticism. A case study was conducted among developers, to collect data on their perspective andview on the migrated application, as well as the benefits and risks they see in the microfrontendarchitecture. The developers also provided information regarding the quality attributes (QAs) fromthe ISO/IEC 25010 standard, processed by DEMATEL, to single out most affected by this migration. Based on the collected data, this thesis provides an overview of the benefits and challengesthat should be paid attention to, when using microfrontend architecture, as well as a detailed planfor the development of applications with microfrontend architecture, developers’ view regarding themicrofrontend architecture, and an insight into which QAs from the selected, are the most affectedones by migration.
262

The effect of COVID-19 pandemic onsoftware developers well-being : An Empirical study

Hellgren, Robin, Jakobsson, Josef January 2023 (has links)
No description available.
263

Visualisering och prediktion av prestandadata / Visualization and prediction of performance data

Arnlund, Nils, Andersson, Viktor, Holmgren, Rasmus, Johansson, Fabian, Kleringer, Göte, Larsson Eskilsson, Algot, Samuelsson, Adam, Wargren, Cajsa, Wilander, Albin, Östman, Anton January 2023 (has links)
I rapporten beskrivs det projekt projektgruppen PUM04 utförde som en del av kursen Kandidatprojekt i programvaruutveckling, kurskod TDDD96, på Linköpings universitet under vårterminen 2023. Projektet gick ut på att utveckla en webbapplikation åt företaget Sectra som ska visualisera data i loggfiler som laddats upp. Frontend-delen av applikationen skrevs i TypeScript med ramverket React och backend-delen i C++. För kommunikation mellan frontend och backend användes WebAssembly då även backend-delen körs i webbläsaren. Rapporten följer en standardiserad struktur med introduktion, bakgrund, teori, metod, resultat, diskussion samt slutsatser. I rapporten förklaras hur gruppen gick tillväga för att utveckla verktyget, vilka arbetsätt som användes, hur det gick, möjliga förbättringar och allt som kan tänkas behövas för att reproducera projektet. Fyra slutatser drogs. Första var att ett webbaserat visualiserigsverktyg kan implementeras på ett sådant sätt att man skapar värde för kunden genom att fokusera på användarvänlighet, funktionalitet och kvalitet. Andra var att de erfarenheter som kan dokumenteras från programvaruprojektet som kan vara intressanta för framtida projekt är att jobba agilt med SCRUM, arbeta inom både formell och informell struktur, kodgranskning och parprogrammering med parskiften. Tredje var att det stöd man kan få genom att skapa och följa upp en systemanatomi inte var värt mödan det tog att skapa den och hålla den uppdaterad för detta projekt. Fjärde och sista slutsatsen var att projektgruppen upplevde utvecklingen av en webbapplikation med hjälp av C++ och WebAssembly ledde till en långsammare utvecklingstakt och några andra mindre problem.
264

Internet of Kegs : En IoT-lösning för visualisering av sensordata för öl / Internet of Kegs : An IoT Solution for Visualisation of Sensor Data for Beer

Batra, Sagar, Gustafsson, August, Hellberg, Erik, Holm, Fredrik, Norberg, Philip, Roos, Linus, Tarkka, Johannes, Öhman, Elis, Österberg, Jakob January 2023 (has links)
Rapporten behandlar projektet Internet of Kegs som genomfördes av nio studenter som en del av kursen TDDD96 – Kandidatprojekt i programvaruutveckling vid Linköpings universitet under vårterminen 2023. Projektets beställare var Neue AB. I rapporten undersöks hur ett system kan konstrueras för att skapa värde åt en kund, hur en systemanatomi kan ge stöd till utveckling samt vilka erfarenheter som kan tas från arbetet. Resultatet av projektet var en användarvänlig webbapplikation för visualisering av ölkonsumtion och annan relaterad data som hämtades från en molntjänst. En systemanatomi användes i projektet men upplevdes inte som särskilt hjälpsam på grund av iterativt arbete där den ofta blev utdaterad. Flera erfarenheter tas med av gruppen, men den viktigaste är att tidigt i projektet dokumentera idéer och diskutera dessa med kunden för att undvika missförstånd och oklarheter senare i projektet.
265

Utbildningsapplikation med digitala tvillingar / Education application with digital twins

Aronsson, Fabian, Berg, Filip, Bergström, Fabian, Bjurek, Simon, Davidsson, Alexander, Koch, André, Luong, Anders, Post, Pontus, Strömberg Hooshidar, Felix, Svensson, Erik January 2023 (has links)
Detta dokument är en rapport angående projektet Utbildningsapplikation med digitalatvillingar. Projektet beställdes av Sund AB och utfördes av en grupp bestående av tio stu-denter på Linköpings universitet i samband med kursen TDDD96 – Kandidatprojekt i pro-gramvaruutveckling under våren år 2023. Rapporten diskuterar hur värde skapades förkunden, vilka erfarenheter gruppen tar med sig och hur en systemanatomi användes föratt få stöd under utvecklingen. Projektets mål var att skapa en applikation i Flutter somanvände Sunds matematiska modeller av människokroppen. Syftet med den resulterandeapplikationen är att hjälpa användare att lära sig om hur olika delar av kroppen fungerar.Applikationen kan användas som en prototyp. Projektet skapade värde för kunden genomden resulterande applikationen och kunskap om hur kundens existerande grundsystemkan förbättras. Många erfarenheter dokumenterades, bland annat vikten av kontinuerligkommunikation och bra planering. Systemanatomin underlättade planeringen och därmedfungerade arbetet på ett smidigare sätt.
266

On-Line Journal: A Tool for Enhancing Student Journals

Riser, Robert, Gotterbarn, Donald 01 August 1998 (has links)
This paper discusses the development of a web-based on-line journal to replace a traditional project journal in a writing intensive undergraduate software engineering course. The on-line journal allows students to conveniently maintain their project journals while allowing the instructor to more effectively review student journals and provide timely feedback.
267

GoalMate : An Application for Visualization of Ice Hockey Statistics

Carsting, Tim, Gummesson, Jens January 2021 (has links)
Visualization of sports statistics is proven to improve the performance and training of athletes. Sports teams use several different types of software systems to help them visualize the data gathered from their games. We created a software system that visualizes and filters game data to help Linköping Hockey Club (LHC) develop and evaluate their goalkeepers. The current systems employed by LHC were evaluated to identify the missing desired features. We also identified the most effective types of visualization for LHC through an iterative development process and avid testing. The developed application works as a complementary tool to the currently used systems and uses data directly exported from those systems. A short usability test was done on a prototype and the final product. The final version of the application scored 92.5 of 100, which indicates that the software and layout are well designed.
268

Towards Large-Scale and Robust Code Authorship Identification with Deep Feature Learning

Abuhamad, Mohammed 01 January 2020 (has links) (PDF)
Successful software authorship identification has both software forensics applications and privacy implications. However, the process requires an efficient extraction of quality authorship attributes. The extraction of such attributes is very challenging due to several factors such as the variety of software formats, number of available samples, and possible obfuscation or adversarial manipulation. We focus on software authorship identification from three central perspectives: large-scale single-authored software, real-world multi-authored software, and the robustness assessment of code authorship identification methods against adversarial attacks. First, we propose DL-CAIS, a deep Learning-based approach for software authorship attribution, that facilitates large-scale, format-independent, language-oblivious, and obfuscation-resilient software authorship identification. DL-CAIS incorporates learning deep authorship attribution using a recurrent neural network and identifying programmers using ensemble random forest. We demonstrate the effectiveness of DL-CAIS under different experimental settings and scenarios for identifying programmers of both source code and software binaries. Second, we propose Multi-X, a fine-grained multi-author identification system of programmers in single code files. Multi-X incorporates code segmentation, code representation, authorship verification, code integration, and authorship identification. We evaluate Multi-X with several Github projects (Caffe, Facebook's Folly, TensorFlow, etc.) and show remarkable accuracy. We examine the performance of Multi-X against multiple dimensions and design choices, and demonstrate its effectiveness. Finally, we propose Author-SHIELD to examine the robustness of six state-of-the-art code authorship attribution approaches against adversarial examples. We define three adversarial attacks on attribution techniques---confidence reduction, a programmer imitation, and evasion attacks---and realize them in targeted and non-targeted adversarial code perturbation. Our experiments demonstrate the vulnerability of current authorship attribution methods against adversarial attacks.
269

Translations to Support Loop Invariant Generation in JML

Koja, Kohei 01 January 2022 (has links) (PDF)
Software is used in many critical systems in the real world such as autonomous cars and medical devices. Such software must be reliable to protect the general public. One standard way to make reliable software is to use Hoare-style verification techniques. However, for Hoare-style verification of loop correctness, loop invariants are necessary but are difficult for people to write themselves. Since Java is one of the most popular programming languages in the world, it is useful to have a tool to generate loop invariants for Java programs. OpenJML is a widely used program verification tool for Java. However, it does not provide automatic loop invariant generation. Therefore, the problem that this thesis addresses is to automatically generate loop invariants in OpenJML. The plan is to use a third-party tool to achieve this goal. Since this external tool does not support Java, a package is necessary to translate from Java/JML to the syntax of the loop invariant tool. However, there are a few conditions that the package has to meet. Since the programming language that the third- party tool supports has a limited grammar, we have to work around unsupported syntax. The resulting package is successful because it can integrate a loop invariant generation tool with OpenJML. Therefore, this package may help developers produce more reliable Java programs.
270

Analyzing the Blockchain Attack Surface: A Top-down Approach

Saad, Muhammad 01 January 2021 (has links) (PDF)
Blockchains enable secure asset exchange in a distributed system, thereby facilitating innovative applications such as cryptocurrencies and smart contracts. Although the cryptographic constructs of blockchains are highly secure, however, their practical deployments are vulnerable to various attacks due to their application-specific policies, and their peer-to-peer (P2P) network intricacies. In this work, we take a top-down approach towards exploring those attacks, starting with the application-specific abuse of blockchain-based cryptocurrencies and concluding with the network conditions that violate the blockchain consistency. In the top-down approach, we first analyze the application-specific abuse of blockchain-based cryptocurrencies by uncovering (1) covert cryptocurrency mining in the web browsers, and (2) artificially inflating the transaction fee by attacking the blockchain memory pools. For both attacks, we show how the application policies are exploited to affect benign users. After exploring the application-specific attacks, we proceed towards a systematic analysis of inconsistencies in the blockchain P2P network. For this analysis, we focus on Bitcoin which is the most dominant blockchain system. Our analysis reveals that the biased distribution of resources in the Bitcoin network can be exploited to launch various partitioning attacks. Furthermore, through a root cause analysis, we discover that (1) the Bitcoin network is asynchronous in the real world, and (2) its security model does not embrace the risks associated with network churn. The last two components in the dissertation consolidate our attack surface analysis by analyzing the impact of network asynchrony and network churn on the blockchain consistency property. We conduct theoretical analysis and measurements to show how various network characteristics can be exploited to reduce the cost of launching notable attacks that violate consistency. Our top-down approach uncovers various novel attacks that have not been studied in the prior works. For each attack, we also propose countermeasures to harden the blockchain security.

Page generated in 0.0796 seconds