Dissertationen zum Thema „Programs analysis“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Programs analysis" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Nagulakonda, Vikram. „Assertion seeding development of program instrumentation through iterative formal analysis /“. Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=1080.
Der volle Inhalt der QuelleTitle from document title page. Document formatted into pages; contains v, 80 p. : ill. Includes abstract. Includes bibliographical references (p. 33-35).
Jakobsson, Filip. „Static Analysis for BSPlib Programs“. Thesis, Orléans, 2019. http://www.theses.fr/2019ORLE2005.
Der volle Inhalt der QuelleThe goal of scalable parallel programming is to program computer architectures composed of multiple processing units so that increasing the number of processing units leads to an increase in performance. Bulk Synchronous Parallel (BSP) is a widely used model for scalable parallel programming with predictable performance. BSPlib is a library for BSP programming in C. In BSPlib, parallel algorithms are expressed by intermingling instructions that control the global parallel structure, and instructions that express the local computation of each processing unit. This lets the programmer fine-tune synchronization, but also implement programs whose diverging parallel control flow obscures the underlying BSP structure. In practice however, the majority of BSPlib program are textually aligned, a property that ensures parallel control flow convergence. We examine three core aspects of BSPlib programs through the lens of textual alignment: synchronization, performanceandcommunication.First,wepresentastaticanalysisthatidentifiestextuallyalignedstatements and use it to verify safe synchronization. This analysis has been implemented in Frama-C and certified in Coq. Second, we exploit textual alignment to develop a static performance analysis for BSPlib programs, based on classic cost analysis for sequential programs. Third, we develop a textual alignment-based sufficient condition for safe registration. Registration in BSPlib enables communication by Direct Remote Memory Access but is error prone. This development forms the basis for a future static analysis of registration
Armstrong, Alasdair. „Formal analysis of concurrent programs“. Thesis, University of Sheffield, 2015. http://etheses.whiterose.ac.uk/13089/.
Der volle Inhalt der QuelleKim, Minjang. „Dynamic program analysis algorithms to assist parallelization“. Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45758.
Der volle Inhalt der QuelleZhang, Connie. „Static Conflict Analysis of Transaction Programs“. Thesis, University of Waterloo, 2000. http://hdl.handle.net/10012/1052.
Der volle Inhalt der QuelleXu, HaiYing. „Dynamic purity analysis for Java programs“. Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18481.
Der volle Inhalt der QuelleLes fonctions purs dans un programme sont ceux qui démontre un comportement sans fonctionnalité ou effet secondaire. Ceci s'avère une propriété utile pour une fonction ou du code dans le contexte d'optimisation et de compréhension du programme. Cependant, récolter de l'information de pureté n'est pas une tâche facile, et les techniques existantes pour les analyses de pureté ne fournissent que des résultats statiques basés sur une analyses de la compilation du programme. Nous avons exécuter une analyse détaillée de la pureté dynamique des fonctions dans des applications Java en utilisant une approche basés sur un Java Virtual Machine (JVM). Nous avons évalué multiples définitions de pureté, forte et faible, et considéré les formats de pureté spécifiques à l'exécution, tout en considérant les contraintes qui nous sont imposées par un application "consommateur" d'information de pureté et de mémorisation. Nous démontrons que malgré la consistance de la pureté dynamique des fonctions parmi certains applications, l'examen du nombre d'invocation pure et le pourcentage de chaîne d'instruction "bytecode" trouvé dans les fonctions purs nous dévoile l'existante de grande variation. Nous montrons aussi que malgré l'affaiblissement de la définition de la pureté expose considérablement la pureté dynamique, les pré-requis des consommateurs peuvent actuellement limiter l'utilité de cet information. Une bonne compréhension de ce qu'est une fonction "pure" et dans quel sens, est une important contribution à comprendre quand, où, et quelles optimisations ou propriétés une application peut dévoilée.
Lin, Nai-Wei. „Automatic complexity analysis of logic programs“. Diss., The University of Arizona, 1993. http://hdl.handle.net/10150/186287.
Der volle Inhalt der QuelleMitchell, Neil. „Transformation and analysis of functional programs“. Thesis, University of York, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.495901.
Der volle Inhalt der QuelleAbu, Hashish Nabil. „Mutation analysis of dynamically typed programs“. Thesis, University of Hull, 2013. http://hydra.hull.ac.uk/resources/hull:8444.
Der volle Inhalt der QuelleBenton, Peter Nicholas. „Strictness analysis of lazy functional programs“. Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.281891.
Der volle Inhalt der QuelleCarré, Jean-Loup. „Static analysis of embedded multithreaded programs“. Cachan, Ecole normale supérieure, 2010. https://theses.hal.science/tel-01199739.
Der volle Inhalt der QuelleThis Phd thesis presents a static analysis algorithm for programs with threads. It generalizes abstract interpretation techniques used in the single-threaded case and allows to detect runtimes errors, e. G, invalid pointer dereferences, array overflows, integer overflows. We have implemented this algorithm. It analyzes a large industrial multithreaded code (100K LOC) in few hours. Our technique is modular, it uses any abtract domain designed for the single-threaded-case. Furthermore, without any change in the fixpoint computation, sorne abstract domains allow to detect data-races or deadlocks. This technique does not assume sequential consistency, since, in practice (INTEL and SPARC processors, JAVA,. . . ), program execution is not sequentially consistent. E. G, it works in TSO (Total Store ordering) or PSO (Partial Store Ordering) memory models
Hardwicke, Shannon Bragg. „An Analysis of Student Assistance Programs“. Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/27780.
Der volle Inhalt der QuellePh. D.
Stewart, Jonathan A. „An Analysis of Bilingual Programs in the Context of a Schoolwide Reading Program“. DigitalCommons@USU, 2004. https://digitalcommons.usu.edu/etd/6217.
Der volle Inhalt der QuelleScott, Christopher G. „Undergraduate leadership programs a case study analysis of Marietta College's McDonough Leadership Program /“. Ohio : Ohio University, 2007. http://www.ohiolink.edu/etd/view.cgi?ohiou1187296643.
Der volle Inhalt der QuelleScott, Christopher G. „Undergraduate Leadership Programs: A Case Study Analysis of Marietta College’s McDonough Leadership Program“. Ohio University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1187296643.
Der volle Inhalt der QuelleMcGraw, Lora K. „Challenging masculinities: a program analysis of male-based university sexual violence prevention programs“. Thesis, Kansas State University, 2017. http://hdl.handle.net/2097/35389.
Der volle Inhalt der QuelleDepartment of Sociology, Anthropology, and Social Work
Nadia Shapkina
This study examines male-based sexual violence prevention programs on college campuses. In an effort to combat the widespread problem of sexual violence against college women, universities have implemented sexual assault prevention programs. While past programs have focused on risk-reduction strategies that target women, new programs are beginning to focus on approaching men to challenge hegemonic masculinity and gender social norms that are conducive to sexual violence. Thus far, the methods of these programs have not been studied in detail. This study uses interviews, observation, and document analysis to analyze the methods and messages of male-based sexual violence prevention programs at six universities in the United States. The research describes and analyzes the origins, goals, structures, strategies, success, and challenges of these programs. Their strengths and limitations are discussed, and suggestions and considerations for the programs are provided. As male-based violence prevention programs become more popular on college campuses, this research offers a deeper understanding of these programs that may inform and improve the effort to combat violence against college women.
Hackett, James Simpson. „An economic analysis of multiple use forestry using FORPLAN-Version 2“. Thesis, University of British Columbia, 1989. http://hdl.handle.net/2429/29033.
Der volle Inhalt der QuelleForestry, Faculty of
Graduate
Wu, Jerry. „Using dynamic analysis to infer Python programs and convert them into database programs“. Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121643.
Der volle Inhalt der QuelleThesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 195-196).
I present Nero, a new system that automatically infers and regenerates programs that access databases. The developer first implements a Python program that uses lists and dictionaries to implement the database functionality. Nero then instruments the Python list and dictionary implementations and uses active learning to generate inputs that enable it to infer the behavior of the program. The program can be implemented in any arbitrary style as long as it implements behavior expressible in the domain specific language that characterizes the behaviors that Nero is designed to infer. The regenerated program replaces the Python lists and dictionaries with database tables and contains all code required to successfully access the databases. Results from several inferred and regenerated applications highlight the ability of Nero to enable developers with no knowledge of database programming to obtain programs that successfully access databases.
by Jerry Wu.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Rodriguez, Dulma. „Amortised resource analysis for object-oriented programs“. Diss., lmu, 2012. http://nbn-resolving.de/urn:nbn:de:bvb:19-149832.
Der volle Inhalt der QuelleBernhard, Joshua C. „An analysis of Company XYZ's insurance programs“. Menomonie, WI : University of Wisconsin--Stout, 2005. http://www.uwstout.edu/lib/thesis/2005/2005bernhardj.pdf.
Der volle Inhalt der QuelleNguyen, Phung Hua Computer Science & Engineering Faculty of Engineering UNSW. „Static analysis for incomplete object-oriented programs“. Awarded by:University of New South Wales. School of Computer Science and Engineering, 2005. http://handle.unsw.edu.au/1959.4/24228.
Der volle Inhalt der QuelleNovillo, Diego. „Analysis and optimization of explicitly parallel programs“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0012/NQ60007.pdf.
Der volle Inhalt der QuelleLehner, William D. „An analysis of Naval Officer acession programs“. Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FLehner.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Horner, Donald H., Jr. ; Mehay, Stephen L. "March 2008." Description based on title screen as viewed on May 1, 2008. Includes bibliographical references (p. 85-98). Also available in print.
Lehner, William D. „An analysis of Naval Officer accession programs“. Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA479949.
Der volle Inhalt der QuelleThesis Advisor(s): Horner, Donald H., Jr. ; Mehay, Stephen L. "March 2008." Title from title page of PDF document (viewed on: Jul 3, 2008). Includes bibliographical references (p. 85-98).
Sereni, Damien. „Termination analysis of higher-order functional programs“. Thesis, University of Oxford, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.437001.
Der volle Inhalt der QuelleWeiser, David A. „Hybrid analysis of multi-threaded Java programs“. Laramie, Wyo. : University of Wyoming, 2007. http://proquest.umi.com/pqdweb?did=1400971421&sid=1&Fmt=2&clientId=18949&RQT=309&VName=PQD.
Der volle Inhalt der QuelleGreenquist, Chad J. „An analysis of IABC Minnesota training programs“. Online version, 1998. http://www.uwstout.edu/lib/thesis/1999/1999greenquistc.pdf.
Der volle Inhalt der QuelleSands, David. „Calculi for time analysis of functional programs“. Thesis, Imperial College London, 1990. http://hdl.handle.net/10044/1/46536.
Der volle Inhalt der QuelleBalachandra, Lakshmi 1974. „Experimental learning programs : an analysis and review“. Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28687.
Der volle Inhalt der Quelle"June 2004 -- revised October 2004."
Includes bibliographical references (leaves 47-48).
Experiential Learning programs have increasingly been included in corporate training programs. Today there is a wide range of experiential learning programs using a variety of methodologies. However, there is a surprising dearth of research on the effectiveness of such programs for learning in business. This thesis reviews and analyzes one form of experiential learning--a program that utilizes outdoor activities for leadership and teamwork training--to understand the value proposition of such education for corporate clients. From this, a framework for implementing a successful experiential learning program was suggested and then analyzed by the design and delivery of a new, original experiential training program utilizing improvisational theater techniques. Finally, a method to evaluate experiential learning programs both before and after purchase is suggested.
by Lakshmi Balachandra.
M.B.A.
Lamb, Andrew Allinson 1980. „Linear analysis and optimization of stream programs“. Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29668.
Der volle Inhalt der QuelleIncludes bibliographical references (p. 123-127).
As more complex DSP algorithms are realized in practice, there is an increasing need for high-level stream abstractions that can be compiled without sacrificing efficiency. Toward this end, we present a set of aggressive optimizations that target linear sections of a stream program. Our input language is StreamIt, which represents programs as a hierarchical graph of autonomous filters. A filter is linear if each of its outputs can be represented as an affine combination of its inputs. Linearity is common in DSP components; examples include FIR filters, expanders, compressors, FFTs and DCTs. We demonstrate that several algorithmic transformations, traditionally handtuned by DSP experts, can be completely automated by the compiler. First, we present a linear extraction analysis that automatically detects linear filters from the C-like code in their work function. Then, we give a procedure for combining adjacent linear filters into a single filter, a specialized caching strategy to remove redundant computations, and a method for translating a linear filter to operate in the frequency domain. We also present an optimization selection algorithm, which finds the sequence of combination and frequency transformations that yields the maximal benefit. We have completed a fully-automatic implementation of the above techniques as part of the StreamIt compiler. Using a suite of benchmarks, we show that our optimizations remove, on average, 86% of the floating point instructions required. In addition, we demonstrate an average execution time decrease of 450% and an 800% decrease in the best case.
by Andrew Allinson Lamb.
M.Eng.
Rassa, Adam Omary. „A cost analysis of medicine donation programs to Tanzania’s neglected tropical diseases control program“. University of the Western Cape, 2019. http://hdl.handle.net/11394/7055.
Der volle Inhalt der QuelleOverreliance on donor supported health programs has crippled many African countries and there is inadequate long-term planning on the future sustainability of health systems. In the age of uncertainty in global politics and global economy, the future of these donor funded programs is also uncertain. It is imperative for African nations to begin to take responsibility for their health programs. In as much as the name “donation” suggests that something is given free of charge, in actual sense this may not be the case due to hidden costs attached. In medicine access, the hidden costs are the supply chain costs including cost for clearance, storage and distribution of such medicines which are charged as a percentage of claimed commodity costs on donors’ or suppliers’ invoices. Since the medicines donated are in originators’ brands, the invoiced prices are high thus supply chain costs are high as well. In some cases, it is thought that the hidden costs are higher than the cost of medicines had they been sourced locally as generics. The aim of this research was to assess and determine the hidden supply chain costs associated with the four medicine donation programs supporting the Tanzania Neglected Tropical Diseases Program and inform policy decision on optimal financing options for the program Methodology The cost analysis of the two options was undertaken from a payers’ perspective which in this case is the Government of Tanzania (Ministry of Health). Data was collected on both product and supply chain cost drivers incurred in the medicine donation programs from July 2014 to June 2017. Costs of the current mechanism were obtained from the program’s quantification reports and transaction data for the study period. Transactional data was obtained from shipment documents including sales invoices, parking list, proof of delivery and goods receiving notes were evaluated for actual quantities shipped, commodity prices and other supply chain cost. To verify the actual supply chain cost charged by the program, both the official bills from Medical Stores Department (MSD) to the program and the electronic bills available at MSD electronic database covering the study period were studied.
Hooker, Taylor. „Equine Assisted Programs for Military Service Members| A Program Evaluation Using Importance-Performance Analysis“. Thesis, Clemson University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10792627.
Der volle Inhalt der QuelleDeveloping research, anecdotal evidence and a growing focus on non-pharmacological interventions for veterans with post-traumatic stress support the use equine-therapy as a therapeutic outlet; however, programmatic factors that contribute to veteran’s desire to attend such programs are under-investigated. Furthermore, evaluative processes in equine therapy for this particular population are scare and vary greatly from program to program. The use of the Importance-Performance Analysis (IPA) tool when applied to social services yields direct, applicable feedback of program success and relevancy. In this study, interviews with the selected population informed the evaluation tool used to assess the importance, and subsequent performance, of various program factors in a national military-specific equine therapy program. Results of this study provided insight into key factors being sought after in similar equine therapy programs to inform the development and maintenance of programs serving the veteran population. The application of the IPA, a consumer feedback tool typically reserved for market research, to the health and human services sector provided a new pathway for quality assurance and program analysis for the equine therapy field.
Tinker, Audrey Kristen. „The Austin Green Building Program: an analysis of the program's effectiveness“. Diss., Texas A&M University, 2003. http://hdl.handle.net/1969.1/1492.
Der volle Inhalt der QuelleNagapattinam, Ramamurthi Ragavendar. „Dynamic Trace-based Analysis of Vectorization Potential of Programs“. The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339733528.
Der volle Inhalt der QuelleZhan, Jin Ping. „Review and verification of marine riser analysis programs“. Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for marin teknikk, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-11640.
Der volle Inhalt der QuelleCain, Andrew Angus, und n/a. „Dynamic data flow analysis for object oriented programs“. Swinburne University of Technology, 2005. http://adt.lib.swin.edu.au./public/adt-VSWT20060904.161506.
Der volle Inhalt der QuelleBaspaly, Dave. „Analysis of community mediation programs in North America“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ54546.pdf.
Der volle Inhalt der QuelleWeston, Nathan Philip. „Incremental data-flow analysis for aspect-oriented programs“. Thesis, Lancaster University, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543988.
Der volle Inhalt der QuelleBernard, Amy Lynn. „A descriptive analysis of selected smoking cessation programs“. Virtual Press, 1991. http://liblink.bsu.edu/uhtbin/catkey/774763.
Der volle Inhalt der QuelleDepartment of Physiology and Health Science
Green, Kerrie L. „A descriptive analysis of cardiac rehabilitation education programs“. Virtual Press, 2000. http://liblink.bsu.edu/uhtbin/catkey/1177976.
Der volle Inhalt der QuelleDepartment of Physiology and Health Science
Nakade, Radha Vi. „Verification of Task Parallel Programs Using Predictive Analysis“. BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6176.
Der volle Inhalt der QuelleSălcianu, Alexandru D. (Alexandru Doru) 1975. „Pointer analysis and its applications for Java programs“. Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86781.
Der volle Inhalt der QuelleIncludes bibliographical references (p. 135-137).
by Alexandru D. Sălcianu.
S.M.
Navaratnam, K. K. „Cost-benefit analysis of secondary vocational education programs“. Diss., Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/76461.
Der volle Inhalt der QuelleEd. D.
Fuller, Judith Ann. „A comparative analysis of two television reading programs /“. The Ohio State University, 1987. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487327695620589.
Der volle Inhalt der QuelleNaci, Sofiane. „Data analysis and optimisation of array-dominated programs“. Thesis, University of Cambridge, 2008. https://www.repository.cam.ac.uk/handle/1810/252096.
Der volle Inhalt der QuelleHayashi, Yasushi. „Shape-based cost analysis of skeletal parallel programs“. Thesis, University of Edinburgh, 2001. http://hdl.handle.net/1842/14029.
Der volle Inhalt der QuelleOhlsson, Henry. „Cost-benefit analysis of labor market programs : applied to a temporary program in northern Sweden“. Doctoral thesis, Umeå universitet, Institutionen för nationalekonomi, 1988. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-65820.
Der volle Inhalt der QuelleDiss. Umeå : Umeå universitet, 1988
digitalisering@umu
Nailor, Michael G. „The economics of voluntary cost-share programs, an analysis of the rural water quality program“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0032/MQ47351.pdf.
Der volle Inhalt der QuelleSettenvini, Matteo. „Algorithmic Analysis of Name-Bounded Programs : From Java programs to Petri Nets via π-calculus“. Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3112.
Der volle Inhalt der Quelle+49 151 52966429
Maglaras, Dimitrios. „A formal mechanism for analysis and re-implementation of legacy programs“. Thesis, University of South Wales, 2001. https://pure.southwales.ac.uk/en/studentthesis/a-formal-mechanism-for-analysis-and-reimplementation-of-legacy-programs(2173ac6f-5d70-4bf4-8efb-c4fe4ff7d17a).html.
Der volle Inhalt der Quelle