Dissertationen zum Thema „Software crisis“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-26 Dissertationen für die Forschung zum Thema "Software crisis" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Pelaez, Valdez Maria Eloina. „A gift from Pandora's Box : the software crisis“. Thesis, University of Edinburgh, 1988. http://hdl.handle.net/1842/19228.
Der volle Inhalt der QuelleSantos, Daniel Soares. „Quality Evaluation Model for Crisis and Emergency Management Systems-of-Systems“. Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-10072017-162919/.
Der volle Inhalt der QuelleSistemas-de-Sistemas (SoS, do inglês Systems-of-Systems) realizam um importante e até essencial papel na sociedade. Referem-se a complexos sistemas intensivos em software, resultado da interoperabilidade de sistemas constituintes independentes que trabalham juntos para realizar missões mais complexas. SoS têm emergido especialmente em domínios de aplicação crítica, portanto, um alto nível de qualidade deve ser garantido durante seu desenvolvimento e evolução. Entretanto, lidar com qualidade em SoS ainda apresenta grandes desafios, uma vez que possuem um conjunto de características únicas que podem diretamente afetar a qualidade desses sistemas. Além disso, não existem modelos abrangentes para o suporte à avaliação de qualidade de SoS. Motivado por este cenário, a principal contribuição deste projeto de mestrado é apresentar um modelo de avaliação para SoS, especialmente destinado ao domínio de gerenciamento de crises e emergências. Este modelo foi construído no contexto de um grande projeto de pesquisa internacional, e cobre as mais importantes atividades de avaliação, considerando as principais características e desafios de SoS geralmente não abordados por outros modelos. Este modelo foi aplicado na avaliação de um SoS de gerenciamento de crises e emergência, e nossos resultados têm mostrado sua viabilidade para o efetivo gerenciamento da qualidade de SoS.
Nourjou, Reza. „GIS-based Intelligent Assistant Agent for Supporting Decisions of Incident Commander in Disaster Response“. 京都大学 (Kyoto University), 2014. http://hdl.handle.net/2433/188867.
Der volle Inhalt der QuelleSaoutal, Amina. „Amélioration de l'awareness informationnelle dans la collaboration inter-organisations pendant la gestion de crise“. Thesis, Troyes, 2015. http://www.theses.fr/2015TROY0036/document.
Der volle Inhalt der QuelleIn order to overcome the technological and social locks that are identified in supporting collaboration - for instance, the computer systems design problems that do not meet the needs of users and/or systems that are rigid and do not allow to deal with dynamic situations where events are unexpected and appeal to emerging measures - our work is positioned in the field of Computer-Supported Cooperative Work (CSCW) characterized by the dualistic social and technical aspects.This research proposes flexible information and communication system that supports the information awareness in the inter-agency collaboration in emerging and complex situations as crisis. These situations add to a collaborative work several constraints such as stress, lack of foresight, the multitude of actors and organizational boundaries. In crisis management, the various organizations – emergency medical service, firefighters, police and others - need to perceive useful information to them to complete their inter-agency activities. However, actors encounter problems that prevent them to reach their goals. This study brings to its scale, a contribution in computer sciences opened to interdisciplinary with the help of social sciences which rely on study of current practices to understand and analyze the users, their activities and the work environment
Sonnekus, Michael Hendrik. „A comparison of open source and proprietary digital forensic software“. Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017939.
Der volle Inhalt der QuelleChitturi, Kiran. „Building CTRnet Digital Library Services using Archive-It and LucidWorks Big Data Software“. Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/46865.
Der volle Inhalt der QuelleMaster of Science
Judd, Aaron C. „Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.
Der volle Inhalt der QuelleSantos, Rodrigo Antônio dos. „Criminalidade em Goiânia: mapeamento dos crimes contra a pessoa nos contextos sociais de 2010 a 2014“. Universidade Federal de Goiás, 2016. http://repositorio.bc.ufg.br/tede/handle/tede/6604.
Der volle Inhalt der QuelleApproved for entry into archive by Jaqueline Silva (jtas29@gmail.com) on 2016-12-16T15:29:53Z (GMT) No. of bitstreams: 2 Dissertação - Rodrigo Antônio dos Santos - 2016.pdf: 7982615 bytes, checksum: d618d017d5a9c7d3c33ce6611af601bb (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2016-12-16T15:29:53Z (GMT). No. of bitstreams: 2 Dissertação - Rodrigo Antônio dos Santos - 2016.pdf: 7982615 bytes, checksum: d618d017d5a9c7d3c33ce6611af601bb (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2016-11-07
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
This paper aimed to map, for neighborhoods of Goiânia, crimes against the person recorded in the 2010-2014 period. With the support of GIS software ArcGIS, crossed crime data with demographic and criminal, such as drug dealing, drug dealing association, color / race, gender and income of the population. The chosen crimes against the person were intentional homicide, manslaughter, bodily injury followed by death and robbery (the latter being a crime against property). At the end, you can see the rapid growth of violence in the city of Goiânia, as well as the most prominent criminal neighborhoods, and its correlation with the demographic variables
O presente trabalho buscou fazer um mapeamento, por bairros de Goiânia, dos crimes contra a pessoa registrados no período de 2010 a 2014. Com o apoio do software SIG ArcGIS, cruzou-se os dados criminais com variáveis demográficas e, também, criminais, sendo: tráfico de drogas, associação ao tráfico de drogas, cor/ raça da população, gênero e renda. Os crimes contra a pessoa escolhidos foram: homicídio doloso, homicídio culposo, lesão corporal seguida de morte e latrocínio (sendo este último um crime contra o patrimônio). Ao final, é possível perceber o crescimento acelerado da violência dentro da cidade de Goiânia, bem como aqueles bairros com maior destaque criminal, e, ainda, sua correlação com as variáveis demográficas.
Forrester, Jock Ingram. „An exploration into the use of webinjects by financial malware“. Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1012079.
Der volle Inhalt der QuelleRansbotham, III Samuel B. „Acquisition and diffusion of technology innovation“. Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.
Der volle Inhalt der QuelleCommittee Chair: Sabyasachi Mitra; Committee Member: Frank Rothaermel; Committee Member: Sandra Slaughter; Committee Member: Sridhar Narasimhan; Committee Member: Vivek Ghosal.
OURIQUES, João Felipe Silva. „Investigation of Test Case Prioritization for Model-Based Testing“. Universidade Federal de Campina Grande, 2017. http://dspace.sti.ufcg.edu.br:8080/jspui/handle/riufcg/1674.
Der volle Inhalt der QuelleMade available in DSpace on 2018-09-10T23:01:21Z (GMT). No. of bitstreams: 1 JOÃO FELIPE SILVA OURIQUES – TESE (PPGCC) 2017.pdf: 1146873 bytes, checksum: ad9b0dc8f44c3aa49b2d3201dca79589 (MD5) Previous issue date: 2017-12-12
CNPq
Teste de Software é uma tarefa cara dentre as de Verificação de Validação. No entanto, ainda é a mais utilizada para medir a qualidade de sistemas em desenvolvimento. No Teste Baseado em Modelo (TBM), casos de teste são gerados automaticamente de modelos de sistema, o que reduz tempo e custos. Por outro lado, frequentemente o tamanho das suites de teste geradas leva a uma execução completa inviável. Assim, algumas abordagens são usadas para lidar com os custos da execução dos casos de teste: Seleção de Casos de Teste, Minimização de suítes de teste e Priorização de Casos de Teste (PCT). Com a finalidade de melhorar o consumo de recursos durante o teste no nível de sistema, ao mesmo tempo não eliminando casos de teste no processo, nós exploramos a PCT neste trabalho. Nesta pesquisa de doutorado abordamos o problema de propor uma nova ordem de execução para casos de teste de sistema, especificamente os gerados através de abordagens de TBM, considerando que informação histórica não está disponível para guiar este processo. Como primeiro passo, avaliamos as técnicas atuais no nosso contexto de pesquisa, com a finalidade de avaliar suas caracteristicas. Baseado nisto, propomos duas técnicas de PCT: HARP e CRISPy. A primeira usa indicações de membros do time de desenvolvimento sobre porções suscetíveis a erros (as ditas dicas), como guia para a priorização; a segunda cria clusters de casos de teste com a finalidade de adicionar variabilidade a priorização. HARP se baseia na estratégia aleatórioadaptativa e explora casos de teste que cobrem passos relacionados às dicas. Para validá-la, executamos dois estudos empíricos e deles, concluimos que, com dicas boas, HARP é capaz de sugerir sequências de casos de teste efetivas, mas é necessário evitar situações em que as dicas não são consensuais entre os membros do time de desenvolvimento. Por outro lado, propomos CRISPy para complementar HARP. Para validá-la, realizamos três estudos empíricos e, mesmo sendo uma técnica simples de clustering, já consegue propor sequências de casos de teste efetivas em comparação as outras técnicas investigadas. Além disso, a depender dos tipos de casos de teste considerados, a escolha de uma função de distância adequada pode ser um passo de adequação da técnica. Detalhamos a implementação de todas as técnicas propostas e publicamos todos os artefatos relacionados aos estudos empíricos realizados em uma página web, o que permite a reprodução dos nossos resultados.
Software Testing is an expensive and laborious task among the Verification and Validation ones. Nevertheless testing is still the main way of assessing the quality of systems under development. In Model-Based Testing (MBT), test cases are generated automatically from system models, which provides time and cost reduction. On the other hand, frequently the size of the generated test suites leads to an unfeasible complete execution. Therefore, some approaches are used to deal with the costs involved in the test case execution, for example: Test Case Selection, Test Suite Reduction and the Test Case Prioritization (TCP). In order to improve resource consumption during system level testing, whereas not eliminating test cases, we explore TCP in our work. In this doctorate research we address the general problem of proposing a new order for the execution of system level test cases, specifically the ones generated through MBT approaches and considering that historical information is not available to guide this process. As a first step, we evaluate current techniques in this context, aiming at assessing their strengths and weaknesses. Based on these results, we propose two TCP techniques: HARP and CRISPy. The former uses indications (hints) provided by development team members regarding error prone portions of the system under test, as guidance for prioritization; the latter clusters test cases in order to add variability to the prioritization. HARP is based on the adaptive random strategy and explore test cases that cover steps related to the hints. To validate it, we perform two studies and from them we conclude that, with good hints, HARP can suggest effective prioritized test suites, provided that one avoid situations that the hints are not consensual in the development team. On the other hand, we propose CRISPy to complement HARP, i.e. to apply it when HARP is not indicated. To validate it we perform three studies and, even being a simple clustering technique, it already proposes effective prioritized test suites in comparison to current TCP techniques. Besides, depending on the kind of the test suites, choosing an adequate distance function could be a tuning step. We detail the implementation of all investigated and proposed techniques, and publish the artifacts related to the performed empirical studies in a companion site, enabling researchers to verify and reproduce our findings.
Koen, Renico. „The development of an open-source forensics platform“. Diss., Pretoria : [s.n.], 2009. http://upetd.up.ac.za/thesis/available/etd-02172009-014722/.
Der volle Inhalt der QuelleRansbotham, Samuel B. III. „Acquisition and diffusion of technology innovation“. Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.
Der volle Inhalt der QuelleRastogi, Achal. „Phaeodactylum tricornutum genome and epigenome : characterization of natural variants“. Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE048/document.
Der volle Inhalt der QuelleSince the discovery of Phaeodactylum tricornutum by Bohlin in 1897, its classification within the tree of life has been controversial. It was in 1958 when Lewin, using oval and fusiform morphotypes, described multiple characteristic features of this species that resemble diatoms structure, the debate to whether classify P. tricornutum as a member of Bacillariophyceae was ended. To this point three morphotypes (oval, fusiform and triradiate) of Phaeodactylum tricornutum have been observed. Over the course of approximately 100 years, from 1908 till 2000, 10 strains of Phaeodactylum tricornutum (referred to asecotypes) have been collected and stored axenically as cryopreserved stocks at various stock centers. Various cellular and molecular tools have been established to dissect and understand the physiology and evolution of P. tricornutum, and/or diatoms in general. It is because of decades of research and efforts by many laboratories that now P. tricornutum is considered to be a model diatom species. My thesis majorly focuses in understanding the genetic and epigenetic makeup of P. tricornutum genome to decipher the underlying morphological and physiological diversity within different ecotype populations. To do so, I established the epigenetic landscape within P. tricornutum genome using various histone post-translational modification marks (chapter 1 and chapter 2) and also compared the natural variation in the distribution of some key histone PTMs between two ecotype populations (chapter 4). We also generated a genome-wide genetic diversity map across 10 ecotypes of P. tricornutum revealing the presence of a species-complex within the genus Phaeodactylum as aconsequence of ancient hybridization (Chapter 3). Based on the evidences from many previous reports and similar observations within P. tricornutum, we propose natural hybridization as a strong and potential foundation for explaining unprecedented species diversity within the diatom clade. Moreover, we updated the functional and structural annotations of P. tricornutum genome (Phatr3, chapter 2) and developed a user-friendly software algorithm to fetch CRISPR/Cas9 targets, which is a basis to perform knockout studies using CRISPR/Cas9 genome editing protocol, in 13 phytoplankton genomes including P. tricornutum (chapter 5). To accomplish all this, I used various state-of-the-art technologies like Mass-Spectrometry, ChIPsequencing, Whole genome sequencing, RNA sequencing, CRISPR genome editing protocols and several computational softwares/pipelines. In brief, the thesis work provides a comprehensive platform for future epigenetic, genetic and functional molecular studies in diatoms using Phaeodactylum tricornutum as a model. The work is an addon value to the current state of diatom research by answering questions that have never been asked before and opens a completely new horizon and demand of epigenetics research that underlie the ecological success of diatoms in modern-day ocean
Ramos, Ana Rita Galocha. „Desenvolvimento de um equipamento para diagnóstico do pé diabético“. Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14072.
Der volle Inhalt der QuelleIn the recent decades, the incidence of Diabetes Mellitus has been increasing, with the increase of population obesity. This chronic and metabolic disease causes not only a decrease in quality of life, morbidity and mortality, as well as high costs associated with serious social and economic consequences. Therefore, it becomes essential to improve the diagnosis and monitoring pathways of the disease-related complications. Among the most serious and costly consequences, especially for Diabetes Mellitus type 2, is the Diabetic Foot disease, the main responsible for approximately half of lower limb amputations for non-traumatic causes. Early identification of Diabetic Foot becomes critical for the adoption of preventive measures that can modify the disease prognosis. The aim of the current dissertation project, realized synergistically with the company Exatronic, is the study and collection of information to develop a technological platform for the Diabetic Foot diagnosis. It was firstly intended to perform a market study, to identify the devices that are currently used in this type of diagnosis, and to define the main needs and methodologies to take into account for the design of a prototype. After this study, it was decided to apply the thermography method for the construction of the equipment, since thermal analysis has demonstrated its wide applicability in medical diagnosis of various pathologies and, any patient with Diabetic Foot invariably shows notable changes in skin temperatures of the foot. The liquid crystals technology, through its fast response times, high sensitivity to thermal changes, low cost and easy image acquisition, allowed to offer a successful thermography assessment for the desired application. Therefore, for the prototype construction, it was decided to use a scanner that was adapted, containing a liquid crystals sheet, to acquire thermal patterns of the patients’ soles. Inherent to the platform planned to be built, a computer interface was developed, through the programming language MATLAB, which allows the segmentation and digital storage of images obtained by the equipment to effectively assist the health professional in results interpretation. Subsequently, the main steps of the medical certification process were analysed, in order to enable a future CE marking, which is essential for placing the device mentioned above on the market. To achieve this, it was necessary to check the compliance with the medical directive 93/42/CEE. Due to the current lack of instruments for measuring the temperatures of the foot in the medical check-up for this pathology and high costs of most medical platforms, the technology presented in this project has led to a high interest among the medical community, in order to improve the prevention and monitoring of this complication.
Coetzee, Dirk. „Visualisation of PF firewall logs using open source“. Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018552.
Der volle Inhalt der QuellePrice, Erin Peta. „Development of novel combinatorial methods for genotyping the common foodborne pathogen Campylobacter jejuni“. Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16601/1/Erin_Peta_Price_Thesis.pdf.
Der volle Inhalt der QuellePrice, Erin Peta. „Development of novel combinatorial methods for genotyping the common foodborne pathogen Campylobacter jejuni“. Queensland University of Technology, 2007. http://eprints.qut.edu.au/16601/.
Der volle Inhalt der QuelleQureshi, Tahir N. „Attacking software crisis a macro approach“. Thesis, 1985. http://hdl.handle.net/10945/21171.
Der volle Inhalt der QuelleTsao, Chia-Chi, und 曹嘉琪. „Crisis Management for Information Systems: An Example of the Year 2000 Software Crisis“. Thesis, 1999. http://ndltd.ncl.edu.tw/handle/24093626100260116466.
Der volle Inhalt der Quelle國立中正大學
資訊管理學系
87
Crises are inevitable, only those enterprises taking precautions against crises can reduce damage. In the past, crises of information systems are often treated similarly as general crises, but not anymore. The problem of information system is a crisis that most companies can not ignore. Take the year of 2000 software (Y2K) crisis for example. According to Gartner Group, Y2K has an estimated $300 to $ 600 billion price tag just to fix it. The problem cuts across all industry boundaries. This study aims to answer the question of whether information system crises are handled differently in comparing with general, non-information system crises. Crisis management is examined at three stages of a crisis, namely, before, during, and after the crises. In each stage, we identify the characteristics of crisis management from three aspects. They are the characteristics of decision-makers, characteristics of firms and industries, and types of crises. Results show that: (1). The environmental characteristics of enterprises do not have significant correlation with high-ranking managers’ attitudes toward both information system crises and non-information system crises managers. (2). High-ranking managers’ characteristics have a strong impact on how crises are handled. In Particular, whether or not a manager keeping abreast of knowledge of technology has strong influences on the manager’s attitude toward information system crisis management. (3). Across industries, banking and financial industry is the most active in handling and anticipating information system crises.
Chung, Yu-Yao, und 鐘裕堯. „An Empirical Study of Year 2000 Software Crisis - the Bank industry as a Case Study“. Thesis, 1997. http://ndltd.ncl.edu.tw/handle/01655040494069771909.
Der volle Inhalt der Quelle淡江大學
資訊管理學系
85
Due to the insufficient length of date-field and the possible calculation error of leap-year formula in information systems, parts of them will get troubles on data processing and even on company running at the beginning of the next century. Since the daily works of domestic banks heavily depend on their information system and the development date of those systems are earlier than the date of software crisis announcement, the relating chief executives of the banking industry must pay attention this issue.In this article, we first proposed a framework by literature reviews and expert opinions. The contents of this framework included some variables from crisis recognition, feasibility analyses and reaction strategies. Based on this framework, we designed a questionnaire to make a field survey on 149 banking CIOs. We got 48 valid samples and some findings, (1) Most CEOs and all CIOs realized this software crisis, (2) The bigger the organizational size was, the more aggressive attitudes of their strategies took, (3) Man-powers and professional consultants were two major needs to out-source when the legacy system must be modified, (4) Source codes and system design documentation of the legacy system were complete in general, (5) The most concerned crisis items were related to issues of validity of file updates and smooth running of branches, (6) There were no statistically significance between the variables of organizational size and crisis recognition.
Granåsen, Magdalena. „Exploring C2 Capability and Effectiveness in Challenging Situations : Interorganizational Crisis Management, Military Operations and Cyber Defence“. Licentiate thesis, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-156151.
Der volle Inhalt der QuelleIn the printed version is the permanent link to this publication incorrect. The link is changecd in the online version.
Odendaal, Maria Elizabeth. „An interpretive case study into the application of software engineering theory“. Diss., 2012. http://hdl.handle.net/2263/25756.
Der volle Inhalt der QuelleDissertation (MSc)--University of Pretoria, 2012.
Computer Science
unrestricted
Corregedor, Manuel Rodrigues. „Utilizing rootkits to address the vulnerabilities exploited by malware“. Thesis, 2012. http://hdl.handle.net/10210/6257.
Der volle Inhalt der QuelleAnyone who uses a computer for work or recreational purposes has come across one or all of the following problems directly or indirectly (knowingly or not): viruses, worms, trojans, rootkits and botnets. This is especially the case if the computer is connected to the Internet. Looking at the statistics in [1] we can see that although malware detection techniques are detecting and preventing malware, they do not guarantee a 100% detection and or prevention of malware. Furthermore the statistics in [2] show that malware infection rates are increasing around the world at an alarming rate. The statistics also show that there are a high number of new malware samples being discovered every month and that 31% of malware attacks resulted in data loss [3], with 10% of companies reporting the loss of sensitive business data [4][5]. The reason for not being able to achieve a 100% detection and / or prevention of malware is because malware authors make use of sophisticated techniques such as code obfuscation in order to prevent malware from being detected. This has resulted in the emergence of malware known as polymorphic and metamorphic malware. The aforementioned malware poses serious challenges for anti-malware software specifically signature based techniques. However a more serious threat that needs to be addressed is that of rootkits. Rootkits can execute at the same privilege level as the Operating System (OS) itself. At this level the rootkit can manipulate the OS such that it can distribute other malware, hide existing malware, steal information, hide itself, disable anti-malware software etc all without the knowledge of the user. It is clear from the statistics that anti-malware products are not working because infection rates continue to rise and companies and end users continue to fall victims of these attacks. Therefore this dissertation will address the problem that current anti-malware techniques are not working. The main objective of this dissertation is to create a framework called ATE (Anti-malware Technique Evaluator) that can be used to critically evaluate current commercial anti-malware products. The framework will achieve this by identifying the current vulnerabilities that exist in commercial anti-malware products and the operating system. The prior will be achieved by making use of two rootkits, the Evader rootkit and the Sabotager rootkit, which were specifically developed to support the anti-malware product evaluation. Finally an anti-malware architecture we called External Malware Scanner (EMS), will be proposed to address the identified vulnerabilities.
Botes, Christo. „Utilising advanced accounting software to trace the reintegration of proceeds of crime, from underground banking into the formal banking system“. Diss., 2008. http://hdl.handle.net/10500/791.
Der volle Inhalt der QuelleCriminal Justice
M.Tech. (Forensic Investigation)
Dagada, Rabelani. „Legal and policy aspects to consider when providing information security in the corporate environment“. Thesis, 2014. http://hdl.handle.net/10500/18839.
Der volle Inhalt der QuelleSchool of Computing
D. Phil. (Information Systems)