• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 173
  • 157
  • 138
  • 13
  • 8
  • 7
  • 7
  • 4
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 544
  • 215
  • 168
  • 124
  • 118
  • 98
  • 97
  • 92
  • 92
  • 83
  • 78
  • 74
  • 66
  • 62
  • 54
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Разработка туристического web-сайта для города Екатеринбург : магистерская диссертация / Development of tourist web-site for city Ekaterinburg

Василевич, Я. Е., Vasilevich, Y. E. January 2023 (has links)
Цель исследования – разработать туристический сайт для г. Екатеринбург. В результате исследования разработан web-сайт, который можно использовать как сервис для поиска и выбора проведения досуга в городе Екатеринбург. Практическая значимость исследования заключается в туристическом развитии города. / The goal of work is development of tourist web-site for city Ekaterinburg. In the course of the study, a working web-site which may use for travels and excursions in Ekaterinburg city was developed. Practical goal of research consists of touristic extension of Ekaterinburg city.
182

Creating a Unit Testing Application Prototype for JavaScript / Skapandet av en prototyp för en enhetstestningsapplikation med stöd för JavaScript

Björkman, Mårten, Bergqvist, Jonathan January 2022 (has links)
Testing is an integral part of software development with the goal of verifying a system’s requirements. One of the most commonly used methods for verifying code is unit testing. If done properly, unit testing can guarantee the intended functionality of a code unit. Furthermore, sufficiently tested code provides dependents with a level of trust in the code’s abilities. The unit testing process has several flaws; it is difficult to identify which code must be tested; and it is challenging to maintain tests pertaining to inconstant systems. Automatic test case generation tools are a common alternative to writing tests manually. However, these tools often focus on high code coverage, but produce flaky and unreliable tests. The goal of this thesis is to develop a prototype for a unit testing application that facilitates unit test creation and maintenance for JavaScript. Using code analysis metrics, the application aims to give developers an aid in deciding what code units to test. In order to construct this prototype, a literature study was conducted, focused on unit testing and code metrics. After having constructed the prototype, a user study, in the form of an interview, was conducted in order to evaluate its usefulness. Results from the user study shows that the application could be beneficial for people with limited experience in unit testing. However, in order to determine the effectiveness of various code analysis metrics, a more thorough study would be needed. / Testning är en central del i mjukvaruutvecklingsprocessen med syftet att verifiera systemkrav. Enhetstestning är en av de mest vanliga metoderna för att verifiera kodlogik. Under rätt förutsättningar kommer enhetstester garantera den avsedda funktionaliteten hos kodsektioner. Vidare erhåller kodkomponenter beroende av väl testad kod en grad av förtroende för kodens utlovade funktion. Det finns ett flertal brister när det kommer till processen för att skapa enhetstester: identifiering av kod i behov av att testas är svårt och det är utmanande att underhålla tester för system under utveckling. Ett vanligt alternativ till det manuella testskapandet är att använda ett automatiskt testgenereringsverktyg. Fokuset hos dessa verktyg ligger på att uppnå stor kodteckning, men de genererade testerna är oftast bristfälliga samt opålitliga. Målet med detta examensarbete är att utveckla en prototyp för en enhetstestignsapplikation som förenklar skapandet och underhållandet av enhetstester för JavaScript. Applikationen ämnar att med hjälp av kodmått förenkla för utvecklaren när det kommer till att bestämma vad som bör testas. För att utveckla prototypen genomförs en litteraturstudie med fokus på enhetstestning och kodmått. Efter utvecklandet av prototypen genomfördes en användarstudie för att utvärdera dess användbarhet. Studien utfördes i form av en intervju. Resultatet från användarstudien visar att applikationen kan vara till nytta för personer med begränsad erfarenhet av enhetstestning. Dock skulle en mer gedigen studie behöva genomföras för att kunna utvärdera kodmåttens effektivitet.
183

SOFTWARE TEST AUTOMATION : Implementation of End-to-End testing in web application

Björkman, Maria January 2024 (has links)
Today’s software applications are often scattered in many layers, suchas connected to cloud services or third-party solutions. This makes itimportant to ensure that a software application works as intended ina real-world setting, especially when changes are made to the codebase. End-to-End (E2E) tests are made to ensure the software has theexpected behavior from an end-user’s viewpoint. Automation of thesoftware testing process is often implemented since it has the potentialto be more time-efficient than manually inspecting the behavior of thesoftware application. This thesis describes the work of implementing automated E2E tests foran e-learning application. The first step in the project was to identifywhich automated testing tool would best suit the criteria laid out for theproject. The criteria were that the testing tool needed to have supportfor testing in the Chrome browser, support for using JavaScript as theprogramming language, and to be open-source and possible to be usedfree of charge. A literature review and a comparison of the most popu-lar E2E testing tools yielded the result that Playwright was best suitedas the automated testing tool because it has good documentation and isspecifically a tool for implementing End-to-End tests. After that, a testsuite consisting of 11 test cases was implemented in Playwright. Thetest cases were evaluated and improved in an iterative process con-cerning robustness and performance. This project supports previousobservations that automation of the test process is time-consuming inthe initial stage. This thesis concluded that Playwright is a suitable tool to use withinE2E testing, with a low learning curve. Furthermore, it concluded thatthe robustness of the tests is an important factor for the tests to be use-ful in the testing process. Tests that unexpectedly fail on occasion needto be properly investigated. It would be important to have a proper testenvironment where test data can be reset, so all the desired user flowscan get a test case. Developers and testers benefit from working closelytogether. The collaborative company can take the findings from this re-search for future reference, in case they decide to update the company’scurrent testing process.
184

Užmaskuoto kenkėjiško programinio kodo tinklalapiuose aptikimas pagal jo savybes / Detection of malicious obfuscated code in websites using its characteristics

Ladyga, Linas 20 June 2011 (has links)
Darbo tikslas – sudaryti ir praktiškai realizuoti metodą užmaskuoto kenkėjiško programinio kodo tinklalapiuose aptikimui pagal jo savybes. Darbe nagrinėjamos tinklalapiuose talpinamo užmaskuoto kenkėjiško kodo aptikimo problemos. Išanalizuoti kenkėjiško kodo maskavimo metodai ir jo savybės. Aprašytas užmaskuoto JavaScript kodo aptikimo metodas, paremtas nustatytomis užmaskuoto kodo savybėmis ir pagal jas aprašytais paieškos kriterijais: žodžio ilgiu, simbolių skaičiumi žodyje ir simbolių dažniu žodyje. Metodas pristatytas pranešime 14-oje Lietuvos jaunųjų mokslininkų konferencijoje „Mokslas - Lietuvos ateitis“, įvykusioje Vilniuje 2011 m. balandžio 15 d. Remiantis šiuo metodu atliktas tyrimas, kurio rezultatai rodo pasiūlyto metodo veiksmingumą – pasiektas 98% užmaskuoto kodo aptikimo tinklalapiuose tikslumas. Tyrimo rezultatai paskelbti straipsnyje, kuris priimtas spausdinimui recenzuojamame periodiniame mokslo žurnale „Jaunųjų mokslininkų darbai“. Darbą sudaro: įvadas, 6 skyriai, išvados, literatūros sąrašas, priedai. Darbo apimtis – 55 p. teksto be priedų, 23 iliustr., 4 lent., 44 bibliografiniai šaltiniai. Atskirai pridedami darbo priedai. / The aim of this thesis is to suggest and practically implement a method of malicious obfuscated code detection using its characteristics. In this thesis we analyze problems of obfuscated malicious code detection in websites, malicious code obfuscation techniques and obfuscated code characteristics. In this paper suggested method of malicious obfuscated code detection in websites using its characteristics is described. Method is based on three search characteristics: word size, number of characters in word and frequency of particular characters. Method was presented in the 14th Conference for Lithuania Junior Researchers SCIENCE FOR FUTURE held in Vilnius, April 15, 2011. An experiment based on this study was made. Results show the effectiveness of the proposed method – 98% accuracy of obfuscated code detection in websites was reached. Experiment results were published in an article, which is being published in a reviewed periodical academic journal "Young Scientists". Structure: introduction, 6 chapters, conclusions and suggestions, references. Thesis consists of – 55 p. text without appendixes, 23 pictures, 4 tables, 44 bibliographical entries. Appendixes included.
185

Aplicação de algoritmos de agrupamento para descoberta de padrões de defeito em software JavaScript / Application of clustering algorithms for discovering bug patterns in JavaScript software

Macedo, Charles Mendes de 26 October 2018 (has links)
As aplicações desenvolvidas com a linguagem JavaScript, vêm aumentando a cada dia, não somente aquelas na web (client-side), como também as aplicações executadas no servidor (server-side) e em dispositivos móveis (mobile). Neste contexto, a existência de ferramentas para identicação de defeitos e code smells é fundamental, para auxiliar desenvolvedores durante a evoluçãp destas aplicações. A maioria dessas ferramentas utiliza uma lista de defeitos predenidos que são descobertos a partir da observação das melhores práticas de programação e a intuição do desenvolvedor. Para melhorar essas ferramentas, a descoberta automática de defeitos e code smells é importante, pois permite identicar quais ocorrem realmente na prática e de forma frequente. Uma ferramenta que implementa uma estratégia semiautomática para descobrir padrões de defeitos através de agrupamentos das mudanças realizadas no decorrer do desenvolvimento do projeto é a ferramenta BugAID. O objetivo deste trabalho é contribuir nessa ferramenta estendendo-a com melhorias na abordagem da extração de características, as quais são usadas pelos algoritmos de clusterização. O módulo estendido encarregado da extração de características é chamado de BugAIDExtract+ +. Além disso, neste trabalho é realizada uma avaliação de vários algoritmos de clusterização na descoberta dos padrõs de defeitos em software JavaScript / Applications developed with JavaScript language are increasing every day, not only for client-side, but also for server-side and for mobile devices. In this context, the existence of tools to identify faults is fundamental in order to assist developers during the evolution of their applications. Most of these tools use a list of predened faults that are discovered from the observation of the programming best practices and developer intuition. To improve these tools, the automatic discovery of faults and code smells is important because it allows to identify which ones actually occur in practice and frequently. A tool that implements a semiautomatic strategy for discovering bug patterns by grouping the changes made during the project development is the BugAID. The objective of this work is to contribute to the BugAID tool, extending this tool with improvements in the extraction of characteristics to be used by the clustering algorithm. The extended module that extracts the characteristics is called BE+. Additionally, an evaluation of the clustering algorithms used for discovering fault patterns in JavaScript software is performed
186

JavaScripts animationer för en interaktiv lärplattform : En jämförelse av 2D animationer med  JavaScriptsbiblioteken jQuery, VelocityJS och AnimeJS / JavaScripts animations for an interactive learning platform : A comparison of 2D animations with the JavaScript libraries jQuery, VelocityJS and AnimeJS

Gustafsson, Therése January 2019 (has links)
Allt eftersom undervisningsmaterialet utökas med nytt och reviderat material behöver lärarna hjälpa sina studenter att bli motiverade till att lära sig materialet. Genom att använda interaktiva verktyg blir undervisningen mer intressant och gör det enklare att visa komplext material i undervisningen. JavaScript är det mest använda programmeringsspråket på internet och användas för att skapa dynamiska webbsidor. Animationer är en sekvens av bilder som får ett objekt att röra på sig. Denna studies resultat visar på att AnimeJS är det JavaScriptsbibliotek med minst signifikanta skillnader i datan som har utvunnits från mätningar. Studien visar även att JavaScriptsbiblioteken blir påverkade av vilken webbläsare som används, både för att hålla sin fördefinierade animationslängd och för webbläsaren att exekvera animationens funktionen snabbare.
187

User controlled trust and security level of Web real-time communications / Niveau de confiance et de sécurité des communications Web temps-réel contrôlé par l'utilisateur

Corre, Kevin 31 May 2018 (has links)
Dans cette thèse, je propose trois contributions principales : dans notre première contribution, nous étudions l'architecture d'identité WebRTC et plus particulièrement son intégration aux algorithmes de délégation d'authentification existants. Cette intégration n'a pas encore été étudiée jusqu'à présent. Dans cette perspective, nous implémentons les composants de l'architecture d'identité WebRTC ce qui nous permet de montrer que cette architecture n'est pas particulièrement adaptée à une intégration aux protocoles de délégation d'authentification existants tels qu'OpenID Connect. Pour répondre à RQ1, nous montrons ensuite comment la position centrale des fournisseurs d'identité dans l'écosystème du Web est renforcée par leur intégration à l'établissement de session WebRTC, posant ainsi un risque supplémentaire contre la discrétion des utilisateurs. Dans l'écosystème Web, la norme est l'architecture des services en silo dont les utilisateurs sont captifs. C'est en particulier le cas des systèmes de délégation d'authentification, pour lesquels la plupart du temps, il n'est pas possible de choisir son fournisseur d'identité. Afin de répondre à RQ3, nous réalisons une étude afin de déterminer pour quelles raisons les utilisateurs ne peuvent pas choisir leur fournisseur d'identité sur Web. Notre étude montre que bien que ce choix soit possible en théorie, l'absence d'implémentation de certains standards par les sites webs et les fournisseurs d'identité empêche ce choix en pratique. Dans notre seconde contribution, nous cherchons à donner plus de contrôle à l'utilisateur. Pour ce faire et en réponse à RQ2, nous proposons une extension de la spécification WebRTC afin de permettre la négociation des paramètres d'identité. Un prototype d'implémentation est proposé afin de valider notre proposition. Cette implémentation révèle certaines limites dues à l'API d'identité WebRTC empêchant notamment d'obtenir un retour sur le niveau d'authentification de l'autre utilisateur ainsi que l'impossibilité de changer de fournisseur d'identité en cours de session. Nous proposons ensuite une API Web permettant aux utilisateurs de choisir leur fournisseur d'identité lors d'une authentification sur un site tiers via une interface de sélection d'identité contrôlée par le navigateur. Répondant à RQ3, notre API repose sur une réutilisation de l'architecture d'identité WebRTC dans un scénario client-serveur. Nous présentons une implémentation de notre solution, basée sur une extension du navigateur Firefox, afin d'en démontrer l'utilisabilité. Nos résultats montrent qu'à long terme, l'adoption de cette API pourrait réduire la charge d'implémentation pour les développeurs de sites Web et permettre aux utilisateurs de préserver leur discrétion en choisissant des fournisseurs d'identité de confiance. / In this thesis, we propose three main contributions : In our first contribution we study the WebRTC identity architecture and more particularly its integration with existing authentication delegation protocols. This integration has not been studied yet. To fill this gap, we implement components of the WebRTC identity architecture and comment on the issues encountered in the process. In order to answer RQ1, we then study this specification from a privacy perspective an identify new privacy considerations related to the central position of identity provider. In the Web, the norm is the silo architecture of which users are captive. This is even more true of authentication delegation systems where most of the time it is not possible to freely choose an identity provider. In order to answer RQ3, we conduct a survey on the top 500 websites according to Alexa.com to identify the reasons why can't users choose their identity provider. Our results show that while the choice of an identity provider is possible in theory, the lack of implementation of existing standards by websites and identity providers prevent users to make this choice. In our second contribution, we aim at giving more control to users. To this end and in order to answer RQ2, we extend the WebRTC specification to allow identity parameters negotiation. We present a prototype implementation of our proposition to validate it. It reveals some limits due to the WebRTC API, in particular preventing to get feedback on the other peer's authentication strength. We then propose a web API allowing users to choose their identity provider in order to authenticate on a third-party website, answering RQ2. Our API reuse components of the WebRTC identity architecture in a client-server authentication scenario. Again, we validate our proposition by presenting a prototype implementation of our API based on a Firefox extension. Finally, in our third contribution, we look back on RQ1 and propose a trust and security model of a WebRTC session. Our proposed model integrates in a single metric the security parameters used in the session establishment, the encryption parameters for the media streams, and trust in actors of the communication setup as defined by the user. Our model objective is to help non-expert users to better understand the security of their WebRTC session. To validate our approach, we conduct a preliminary study on the comprehension of our model by non-expert users. This study is based on a web survey offering users to interact with a dynamic implementation of our model.
188

Aplicação de algoritmos de agrupamento para descoberta de padrões de defeito em software JavaScript / Application of clustering algorithms for discovering bug patterns in JavaScript software

Charles Mendes de Macedo 26 October 2018 (has links)
As aplicações desenvolvidas com a linguagem JavaScript, vêm aumentando a cada dia, não somente aquelas na web (client-side), como também as aplicações executadas no servidor (server-side) e em dispositivos móveis (mobile). Neste contexto, a existência de ferramentas para identicação de defeitos e code smells é fundamental, para auxiliar desenvolvedores durante a evoluçãp destas aplicações. A maioria dessas ferramentas utiliza uma lista de defeitos predenidos que são descobertos a partir da observação das melhores práticas de programação e a intuição do desenvolvedor. Para melhorar essas ferramentas, a descoberta automática de defeitos e code smells é importante, pois permite identicar quais ocorrem realmente na prática e de forma frequente. Uma ferramenta que implementa uma estratégia semiautomática para descobrir padrões de defeitos através de agrupamentos das mudanças realizadas no decorrer do desenvolvimento do projeto é a ferramenta BugAID. O objetivo deste trabalho é contribuir nessa ferramenta estendendo-a com melhorias na abordagem da extração de características, as quais são usadas pelos algoritmos de clusterização. O módulo estendido encarregado da extração de características é chamado de BugAIDExtract+ +. Além disso, neste trabalho é realizada uma avaliação de vários algoritmos de clusterização na descoberta dos padrõs de defeitos em software JavaScript / Applications developed with JavaScript language are increasing every day, not only for client-side, but also for server-side and for mobile devices. In this context, the existence of tools to identify faults is fundamental in order to assist developers during the evolution of their applications. Most of these tools use a list of predened faults that are discovered from the observation of the programming best practices and developer intuition. To improve these tools, the automatic discovery of faults and code smells is important because it allows to identify which ones actually occur in practice and frequently. A tool that implements a semiautomatic strategy for discovering bug patterns by grouping the changes made during the project development is the BugAID. The objective of this work is to contribute to the BugAID tool, extending this tool with improvements in the extraction of characteristics to be used by the clustering algorithm. The extended module that extracts the characteristics is called BE+. Additionally, an evaluation of the clustering algorithms used for discovering fault patterns in JavaScript software is performed
189

Mobila hybridapplikationers prestanda : En experimentell studie / The performance of mobile hybrid applications : An experimental study

Nilsson, Elias, Lagerqvist, Alexander January 2015 (has links)
Syfte – Studiens syfte är att undersöka hybridapplikationers prestanda i olika situationer för att ta reda på varför de upplevs som långsamma. För att uppnå syftet besvaras följande frågeställningar: Hur presterar hybridapplikationer jämfört med nativapplikationer beräkningsmässigt Är JavaScript-biblioteken anledningen till hybridapplikationers sämre prestanda, och vilket av de bibliotek som undersöks är det mest lämpade för bästa prestanda? Kan hybridapplikationer hantera stora datamängder med IndexedDB utan att bli oresponsiva? Metod – Studien använder sig av en experimentell forskningsmetod där hypoteser och förutsägelser formuleras och sedan testas för att besvara frågeställningarna. Resultat – Resultatet från studien visar att prestandan för mobila hybrid-applikationer är i de flesta fall, vid utförande av samma uppgift, underlägsen den för dess motsvarande nativapplikationer. Resultaten visar även att prestandan påverkas av vilket JavaScript-bibliotek som används men att biblioteken inte är anledningen till hybridapplikationers långsamma prestanda. Vidare visar resultaten att hybridapplikationer kan hantera stora datamängder utan att bli oresponsiva. Implikationer – Studien bidrar till att bredda den kunskapsbas som finns om hybridapplikationers prestanda och ger framtida forskning referensdata att bygga vidare på. Studien påvisar dessutom att hybridapplikationer fortfarande är ett alternativ, i synnerhet för företag som vill spara tid och som ej kräver applikationer som utför tunga beräkningar. Begränsningar – Användandet av applikationer som sannolikt inte förekommer i ett verklighetstroget scenario bidrog till resultat som inte har stor relevans inom de användningsområden som finns för hybridapplikationer. / Purpose – The purpose of this thesis is to examine the performance of hybrid mobile applications in different situations to find out why they are perceived as slow. To fulfill the purpose, the following research questions will be answered: How do hybrid applications perform compared to native applications computationally? Are the JavaScript-libraries the reason behind the slower performance of hybrid applications, and which one of the libraries that are examined is most suitable for the best performance? Can hybrid applications manage large amounts of data with IndexedDB without getting unresponsive? Method – The study uses an experimental research method where hypotheses and predictions are formulated and later tested to answer the research questions. Results – The results show that the performance of mobile hybrid applications are in most cases, when performing the same task, inferior to that of corresponding native applications. The results also show that the performance is affected by which JavaScript-library that is being used, but that it is not the main reason for hybrid applications poor performance. They also show that hybrid applications can manage large amounts of data without becoming unresponsive. Implications – The study contributes to broadening the knowledge available on the performance of mobile hybrid applications and provides future research with reference data to build upon. The study also demonstrate that hybrid applications still is an alternative, especially for enterprises who want to save time and does not demand applications that perform heavy computations. Research limitations – The use of applications that most likely would not occur in a realistic scenario contributed with results that have little relevance in the areas of use that exists for hybrid applications.
190

3D Graphics Technologies for Web Applications : An Evaluation from the Perspective of a Real World Application / Tekniker för 3D-grafik i webbapplikationer : En utvärdering sedd utifrån en riktig applikations perspektiv

Waernér, Klara January 2012 (has links)
Web applications are becoming increasingly sophisticated and functionality that was once exclusive to regular desktop applications can now be found in web applications as well. One of the more recent advances in this field is the ability for web applications to render 3D graphics. Coupled with the growing number of devices with graphics processors and the ability of web applications to run on many different platforms using a single code base, this represents an exciting new possibility for developers of 3D graphics applications. This thesis aims to explore and evaluate the technologies for 3D graphics that can be used in web applications, with the final goal of using one of them in a prototype application. This prototype will serve as a foundation for an application to be included in a commercial product. The evaluation is performed using general criteria so as to be useful for other applications as well, with one part presenting the available technologies and another part evaluating the three most promising technologies more in-depth using test programs. The results show that, although some technologies are not production-ready, there are a few which can be used in commercial software, including the three chosen for further evaluation; WebGL, the Java library JOGL and Stage 3D for Flash. Among these, there is no clear winner and it is up to the application requirements to decide which to use. The thesis demonstrates an application built with WebGL and shows that fairly demanding 3D graphics web applications can be built. Also included are the lessons learned during the development and thoughts on the future of 3D graphics in web applications.

Page generated in 0.0407 seconds