• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 1
  • Tagged with
  • 15
  • 15
  • 9
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Empirical validation of requirement error abstraction and classification a multidisciplinary approach /

Walia, Gursimran Singh, January 2006 (has links)
Thesis (M.S.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
12

A formal application of safety and risk assessmen in software systems /

Williamson, Christopher Loyal. January 2004 (has links) (PDF)
Thesis (Ph. D. in Software Engineering)--Naval Postgraduate School, Sept. 2004. / Thesis Advisor(s): Luqi. Includes bibliographical references. Also available online.
13

Using error modeling to improve and control software quality an empirical investigation /

Walia, Gursimran Singh, January 2009 (has links)
Thesis (Ph.D.)--Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
14

Detection of Generalizable Clone Security Coding Bugs Using Graphs and Learning Algorithms

Mayo, Quentin R 12 1900 (has links)
This research methodology isolates coding properties and identifies the probability of security vulnerabilities using machine learning and historical data. Several approaches characterize the effectiveness of detecting security-related bugs that manifest as vulnerabilities, but none utilize vulnerability patch information. The main contribution of this research is a framework to analyze LLVM Intermediate Representation Code and merging core source code representations using source code properties. This research is beneficial because it allows source programs to be transformed into a graphical form and users can extract specific code properties related to vulnerable functions. The result is an improved approach to detect, identify, and track software system vulnerabilities based on a performance evaluation. The methodology uses historical function level vulnerability information, unique feature extraction techniques, a novel code property graph, and learning algorithms to minimize the amount of end user domain knowledge necessary to detect vulnerabilities in applications. The analysis shows approximately 99% precision and recall to detect known vulnerabilities in the National Institute of Standards and Technology (NIST) Software Assurance Metrics and Tool Evaluation (SAMATE) project. Furthermore, 72% percent of the historical vulnerabilities in the OpenSSL testing environment were detected using a linear support vector classifier (SVC) model.
15

Software Design Ethics for Biomedicine

Gotterbarn, Don, Rogerson, Simon 16 May 2006 (has links)
No description available.

Page generated in 0.0382 seconds