• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2634
  • 483
  • 390
  • 370
  • 58
  • 45
  • 35
  • 19
  • 10
  • 10
  • 9
  • 7
  • 6
  • 3
  • 2
  • Tagged with
  • 4630
  • 4630
  • 2051
  • 1971
  • 1033
  • 617
  • 521
  • 485
  • 456
  • 448
  • 421
  • 416
  • 408
  • 337
  • 310
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
281

End-to-End Software License Management

Pozder, Nudzejma January 2022 (has links)
As the software is constantly evolving, licensing choices in complex business environments are becoming more and more sophisticated, since licenses are used to govern software costs, access, and responsibilities. With the right licensing model in place and efficiently utilized licensing flow, organizations are able to ensure that the software is being used according to the licensing agreement which can strongly influence the return on software investment. The main objective of this thesis is to investigate what the process looks like when dealing with licenses that are tailored for a huge and complex software products, focusing on identifying improvement areas and proposing possible solutions in order to improve the license management in general. To achieve defined objective, this research has conducted a case study and qualitative comparison combining both published research and a real business context by performing sixteen interviews in two companies. Some of the main results of the investigation are: (i) license management is affected by the complete software end–to-end flow and such needs to be controlled by providing automated mechanisms for managing licenses through lifecycle changes, starting from the order step, through activation, upgrade, return, etc, (ii) centralized entitlement management (licensing server) should be established with shared and consistent view between all integrated systems to ease the process of tracking of all customer entitlements in one place,(iii) the license key files should not be delivered manually (via email) and in general, manual keys are the bottlenecks in the automated flow, (iv) contracts should be standardized in the first place to avoid manual translations from the customer purchase order into the sales order, (v) blockchain can be considered as a future trend towards software license management in various use cases (vi) usage-based and subscription-based licensing models are becoming more and more popular. The conclusions drawn from this study together with the presented results can help the research community to identify key strategies when exploring license management, but we believe it is also a good starting point to reveal possible directions for future research in this field as well.
282

A Model-Based Approach to Formal Assurance Cases

Annable, Nicholas January 2020 (has links)
The rapidly increasing complexity of safety-critical embedded systems has been the cause of difficulty in assuring the safety of safety-critical embedded systems and managing their documentation. More specifically, current approaches to safety assurance are struggling to keep up with the complex relationships be- tween the ever growing number of components and the sheer amount of code underlying safety-critical embedded systems such as road vehicles. We believe that an approach to safety assurance able to cope with this complexity must: i) have sound mathematical foundations on which safety assurance can be built; and ii) provide a formal framework with precisely defined semantics in which the assurance can be represented. In doing this, assurance can be made less ad-hoc, more precise and more repeatable. Sound mathematical foundations also facilitate the creation of tools that automate many aspects of assurance, which will be invaluable in coping with the complexity of modern-day and future embedded systems. The model-based framework that achieves this is + Workflow . This framework is rigorous, developed on proven notations from model-based methodologies, comprehensively integrates assurance within the development activities, and provides the basis for more formal assurance cases. / Thesis / Master of Applied Science (MASc)
283

Farstat : Trådlös temperaturmätare

Hersi, Mahamed, Yusuf, Mohamed January 2022 (has links)
Det här projektet går ut på att utveckla en produkt som ska underlätta för privatpersoner att ha koll på ett fordons temperatur och luftfuktighet på ett snabbt och enkelt sätt. Den utvecklade produkten ger nya uppdateringar om hur insidan av fordonet förändras. Med hjälp av en molntjänst kan man genom mobil, PC eller Linux få en inblick på klimatet inuti ett fordon. Processen startade med en marknadsanalys för att se om marknaden är i behov av en digitaliserad termometer. Därefter började projektgruppen undersöka hur farligt ett varmt fordon kan vara för djur och människor. Undersökningen visade att dagens fordon inte har kapabilitet att mäta klimatförändringar och lufkfuktighetsförändringar. Produkten utvecklas på ett sådant sätt att den kontinuerligt kan förbättras. Denna process gör att projektgruppen kan arbeta med produktens utveckling samtidigt som behovet av en portabel termometer & luftfuktighetsmätare ligger i framkant. Resultatet av produkten är en funktionell prototyp som kan mäta temperatur och luftfuktighet. Information kring temperatur och luftfuktighet matas in i Raspberry Pi och sedan in på molntjänst hemsidan där informationen enkelt visas på en Mobiltelefon eller PC. Värdena uppdateras var tionde sekund. Prototypen motsvarade projektgruppens förväntningar, men den kunde utvecklats ytterligare ifall den material som behövdes fanns tillgängligt. / This project aims to develop a product that will make it easier for private individuals to keep track of a vehicle's temperature and humidity in a quick and easy way. The developed product provides new updates on how the inside of the vehicle changes. With the help of a cloud service, you can get an insight into the climate inside a vehicle via mobile, PC or Linux. The process started with a market analysis to see if the market is in need of a digitized thermometer. The project team then began to investigate how dangerous a hot vehicle can be for animals and humans. The study showed that today's vehicles do not have the capacity to measure climate change and humidity changes. The product is developed in such a way that it can be continuously improved. This process allows the project team to work with product development while the need for a portable thermometer & humidity meter is at the forefront. The result of the product is a functional prototype that can measure temperature and humidity. Information about temperature and humidity is entered into the Raspberry Pi and then into the cloud service website where the information is easily displayed on a Mobile Phone or PC. The values are updated every five seconds. The prototype met the project group's expectations, but it could have been further developed if the material needed was available.
284

An Overview of Recent Product, Process, and People Metrics in Software Quality Assurance

Appiah, Donald January 2024 (has links)
Software Quality Assurance (SQA) is a critical aspect of the software development life cycle, ensuring the delivery of high-quality software products. This systematic literature review provides an overview of product, process and people metrics used in SQA, as well as the relationship between different metrics. Product Metrics focus on evaluating the characteristics and attributes of the software product itself. Pro- cess Metrics centre around the software development and testing processes. People Metrics focuses on evaluating the performance, skills, and collaboration of the indi- viduals involved in the software development team.  This study not only synthesizes existing knowledge on SQA measurements, but also elucidates the complicated interactions between these many metrics, offering a comprehensive understanding of their interaction. Furthermore, it methodically finds and addresses discrepancies in the identification and description of various in- dicators, helping to standardize SQA methods.  The paper also covers a range of technologies used for the quantification of the defined metrics with the goal of measurement accuracy and efficiency. The exami- nation of these tools not only aids in the practical comprehension of metric measure- ment but also the selection of appropriate instruments for certain SQA scenarios.  As software systems grow in complexity and size, the findings of this study are a significant resource for practitioners, researchers, and stakeholders alike, providing a nuanced viewpoint on improving software quality through strong SQA techniques.  Keywords: Product metrics, Process metrics, people metrics, Software quality as- surance, Development cycle Software Quality Assurance (SQA) Metrics Evaluation Product Metrics Process Metrics People Metrics Software Development Life Cycle (SDLC).
285

An Overview of Recent Product, Process, and People Metrics in Software Quality Assurance

Appiah, Donald, Maxim, Makov January 2024 (has links)
Software Quality Assurance (SQA) is a critical aspect of the software development life cycle, ensuring the delivery of high-quality software products. This systematic literature review provides an overview of product, process and people metrics used in SQA, as well as the relationship between different metrics. Product Metrics focus on evaluating the characteristics and attributes of the software product itself. Process Metrics centre around the software development and testing processes. PeopleMetrics focuses on evaluating the performance, skills, and collaboration of the individuals involved in the software development team. This study not only synthesizes existing knowledge on SQA measurements but also elucidates the complicated interactions between these many metrics, offering a comprehensive understanding of their interaction. Furthermore, it methodically finds and addresses discrepancies in the identification and description of various indicators, helping to standardize SQA methods. The paper also covers a range of technologies used for the quantification of the defined metrics with the goal of measurement accuracy and efficiency. The examination of these tools not only aids in the practical comprehension of metric measurement but also in the selection of appropriate instruments for certain SQA scenarios. As software systems grow in complexity and size, the findings of this study are significant resources for practitioners, researchers, and stakeholders alike, providing nuanced viewpoints on improving software quality through strong SQA techniques. Keywords: Product metrics, Process metrics, people metrics, Software quality assurance, Development cycle Software Quality Assurance (SQA) Metrics evaluation metrics Process Metrics People Metrics Software Development Life Cycle(SDLC).
286

FixEval: Execution-based Evaluation of Program Fixes for Competitive Programming Problems

Haque, Md Mahim Anjum 14 November 2023 (has links)
In a software life-cycle Source code repositories serve as vast storage areas for program code, ensuring its maintenance and version control throughout the development process. It is not uncommon for these repositories to house programs with hidden errors, which only manifest under specific input conditions, causing the program to deviate from its intended functionality. The growing intricacy of software design has amplified the time and resources required to pinpoint and rectify these issues. These errors, often unintended by developers, can be challenging to identify and correct. While there are techniques to auto-correct faulty code, the expansive realm of potential solutions for a single bug means there's a scarcity of tools and datasets for effective evaluation of the corrected code. This study presents FIXEVAL, a benchmark that includes flawed code entries from competitive coding challenges and their corresponding corrections. FIXEVAL offers an extensive test suite that not only gauges the accuracy of fixes generated by models but also allows for the assessment of a program's functional correctness. This suite further sheds light on time, memory limits, and acceptance based on specific outcomes. We utilize cutting-edge language models, trained on coding languages, as our reference point and juxtapose them using match-based (essentially token similarity) and execution-based (focusing on functional assessment) criteria. Our research indicates that while match-based criteria might not truly represent the functional precision of fixes generated by models, execution-based approaches offer a comprehensive evaluation tailored to the solution. Consequently, we posit that FIXEVAL paves the way for practical automated error correction and assessment of code generated by models. Dataset and models for all of our experiments are made publicly available at https://github.com/mahimanzum/FixEval. / Master of Science / Think of source code repositories as big digital libraries where computer programs are kept safe and updated. Sometimes, these programs have hidden mistakes that only show up under certain conditions, making the program act differently than planned which we call bugs or errors. As software gets more complex, it takes more time and effort to find and fix these mistakes. Even though there are ways to automatically fix these errors, finding the best solution can be like looking for a needle in a haystack. That's why there aren't many tools to check if the automatic fixes are right. Enter FIXEVAL: our new tool that tests and compares faulty computer code from coding competitions and their fixes. It has a set of tests to see how well the fixed code works and gives insights into its performance and results. We used the latest computer language tools to see how well they fix code, comparing them in two ways: by looking at the code's structure and by testing its function. Our findings? Just looking at the code's structure isn't enough; we need to test how it works in action. We believe FIXEVAL is a big step forward in making sure automatic code fixes are spot-on. Dataset and models for all of our experiments are made publicly available at https://github.com/mahimanzum/FixEval.
287

BULB plattform – ett stöd för att effektivt samla in behov i vården

Saltin, Mårten, Albåge Simonsson, Cecilia, Brännerud, Eskil, Carlsson, Gustav, Dahlberg, Jacob, Edblom, Björn, Ljung, Adam, Quensel, Conrad January 2024 (has links)
Denna rapport redogör för utvecklingen av mötesapplikationen BULB-plattform. Rap- porten beskriver projektarbetet som genomförts i kursen TDDD96 - Kandidatprojekt i programvaruutveckling på Linköpings universitet. I rapporten diskuteras processrelatera- de erfarenheter, metoder som bearbetats och utförts under projektarbetet samt utveckling och design för programvara. Plattformen har skapats i samarbete med East Sweden Med- tech. Rapporten diskuterar även hur värde kan skapas för kunden och vilket stöd man kan få av en systemanatomi.  Genom BULB-plattform önskar East Sweden Medtech att effektivisera behovsidentifi- kation inom sjukvården. Plattformen ska även vara en plats för utomstående företag att ta del av information kring identifierade behov och ha möjlighet att erbjuda lösningar till dessa.
288

Positionering av ljudhändelser i öppna miljöer

Ahlgren, Mathias, Sjöberg, David, Celik Yildirim, Mehmet, Gardshol, Linus, Jarhede, Leo, Nilsson, Anton, Näs, Christoffer, Nilsson, Edvard January 2024 (has links)
Rapporten redovisar utförandet av projektet Positionering av ljudhändelser i öppnamiljöer. Projektet genomfördes på beställning av SafeReaction AB av åtta studenter på tek-niska fakulteten vid Linköpings universitet. Rapportens syfte är att undersöka hur pro-jektets genomförande och resultat skapar värde för kunden, vilka överförbara erfarenhetersom kan identifieras, hur en systemanatomi kan stötta utvecklingen av ett projekt och vilkafördelar och nackdelar som kan identifieras med metoderna TDOA och AD inom ljudpo-sitioneringssyfte i projektet. Målet med projektet var att utveckla ett system för att positio-nera ljudhändelser upptagna av mikrofoner, samt jämföra olika metoders prestanda för attgöra detta. Värde skapades för kunden genom framställning av en kravspecifikation ochen arkitekturplan, samt utveckling av ett modulärt system. De överförbara erfarenheternasom identifierades var konsekvent kommunikation inom gruppen och med kunden, samtframställning och kontinuerlig förbättring av en mötesstruktur. Med hjälp av en systema-natomi kunde gruppen ha en tydlig bild på systemets struktur att referera till vid behov.Slutsatsen kring AD var att det inte krävde någon synkning mellan enheter, men att meto-den medförde osäkerhet kring hur amplituddifferensen skulle beräknas. Slutsatsen kringTDOA var att det resulterade i minst felmarginal, men att det krävde mer av systemet.
289

Security oriented chat application development : Focus on developing chat applications with high security standards

Termond, Jazzley January 2024 (has links)
Den snabba teknikutvecklingen och den ständigt ökande närvaron av smartphones kräver robusta säkerhetsåtgärder vid applikationsutveckling. Denna avhandling fokuserar på utvecklingen av en säker chattapplikation utformad för användare med känsliga identiteter. Det primära målet är att identifiera, och implementera de bästa säkerhetsmetoderna för att säkerställa användarens säkerhet och trygghet. För att uppnå detta utforskar studien olika ramverk, databasalternativ, krypteringsalgoritmer samt 2FA alternativ. Som ramverk valdes Flutter, Firebase för databasen, ECC tillsammans med ECC för att säkra datatrafiken, och biometrisk autentisering tillsammans med en kopplad autentiserings applikation för användarautentisering. Det valda tillvägagångssättet syftar till att ge hög säkerhet samtidigt som användarvänligheten bibehålls. Metodologin inkluderar en omfattande förstudie som involverar jämförelser av olika verktyg och metoder med hjälp av Pugh-matriser. Implementeringskapitlet beskriver applikationens design och logik, med fokus på säker användarautentisering, datakryptering och skyddade kommunikationskanaler. Resultaten indikerar att applikationen uppfyller de flesta av sina säkerhetsmål, inklusive säker datatrafik, krypterad lagrad data, samt bibehållen användaranonymitet. Målen relaterade till 2FA och säkerhetstestning uppfylldes dock inte helt på grund av tidsbegränsningar. Denna avhandling bidrar till området säker applikationsutveckling genom att demonstrera effektiva metoder för att skydda användardata i chattapplikationer. Framtida arbete kommer att innebära ytterligare förbättringar av autentiseringsimplementeringar och genomförande av säkerhetsutvärderingar för att identifiera potentiella sårbarheter. / The rapid evolution of technology and ever-increasing presence of smartphones necessitate robust security measures in application development. This thesis focuses on the development of a secure chat application designed for users with sensitive identities. The primary goal is to identify and implement the best security practices to ensure the user’s safety and security. To achieve this, the study explores various frameworks, database options, encryption algorithms, and 2FA options. Ultimately, selecting Flutter for the Framework, Firebase for the database, ECC coupled with E2EE for securing data traffic and biometric authentication together with a linked authentication application as the authentication methods. The chosen approach aims to provide high security whilst maintaining user friendliness. The methodology includes a comprehensive pre-study involving comparisons of different tools and methods using Pugh matrices. The implementation chapter details the design and logic of the application, focusing on secure user authentication, data encryption and protected communication channels. Results indicate that the application meets most of its security goals, including secured data traffic, encrypted stored data as well as maintaining the user’s anonymity. The goals related to 2FA, and rigorous security testing were not entirely met due to time constraints. This thesis contributes to the field of secure application. development by demonstrating effective methods for protecting user data in chat applications. Future work will involve further enhancing authentication implementations and conducting security evaluations to identify potential vulnerabilities.
290

Ett system för främjande av marin medborgarforskning : En lösning med öppen källkod för alla

Hedman, Pontus, Bång, Valdemar, Alzén, Jacob, Bahrehman, Hannah, Faraj, Sandra, Jonsson, Max, Karlsson, Mattias, Lööf, Emil January 2024 (has links)
Följande dokument är en rapport om implementeringen av produkten BlueHub. Projektet beställdes och genomfördes på begäran av företaget Deepoid, som representeras av Anders Brodin. Produkten har realiserats av en grupp bestående av åtta studenter vid Linköpings universitet, under vårterminen 2024, som en del av kursen TDDD96 - Kandidatprojekt i programvaruutveckling. Rapporten beskriver hur gruppen skapade en produkt för att kunna producera värde för kunden genom ett agilt arbetssätt, samt hur gruppens ar- betsprocesser har förbättrats under projektets gång. Rapporten innehåller även gruppens erfarenheter och lärdomar från att realisera produkten.  Projektets grundläggande mål var att skapa en prototyp för en hemsida där användare kan ladda upp mätdata från marina sensorer samt se data från olika sjöar utifrån en karta. Dessa data kan sedan forskare ta del av och använda inom forskning utan att behöva samla in all data själva. Senare under projektets gång ändrades detta mål till att vara en prototyp där en användare kan hysa en egen version av BlueHub och tillåta flera användare att vara uppkopplade till den i ett P2P-nätverk. Prototypen är tänkt att användas av Deepoid för att erhålla finansiering för vidareutveckling.

Page generated in 0.1113 seconds