Dissertationen zum Thema „Views on computer software“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Views on computer software.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Views on computer software" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Boiten, E. A. „Views of formal program development“. Thesis, University of Kent, 1992. https://kar.kent.ac.uk/21069/.

Der volle Inhalt der Quelle
Annotation:
A formal specification describes a problem to be solved on a high level - ideally, it specifies what has to be done, but not how. Such descriptive specifications facilitate the derivation of any of the possible solutions, whereas operational specifications suggest only particular ones. Formal derivations in this framework consist of semantics preserving transformations, i.e. steps that proceed from solutions to the initial specification to other, more defined, more operational, or more efficient ones. Thus, the resulting programs are correct by construction with respect to their initial specifications. This thesis contains a number of case studies aiming at the exploration of new territories in the area of program specification and transformation. /pubs/1992/159/''Improving recursive functions by inverting the order of evaluation'' gives a comprehensive survey of one particular transformation strategy (a larger conceptual step in a transformational development that can be described at a more abstract level). This strategy for recursive functions entails the derivation of equivalent functions that use in their recursive evaluations the same arguments in an inverted order. This is an important optimization strategy, in particular for tree-like recursive functions, that are often defined in such a way that several function calls need to be evaluated more than once. By evaluating the function in an inverted order, such multiple evaluations are eliminated. /pubs/1990/165/ ''Factorization of the factorial'', illustrates a number of the transformations in chapter 2, and also demonstrates the state of the art in recursion simplification transformations. Directed by a small set of simple and well-known heuristics, a previously unknown algorithm for computing factorials is derived. Also, a similar development is shown leading to a corresponding program for a simple pipeline architecture. /pubs/1991/162/ ''A note on similarity of specifications and reusability of transformational developments'', written together with http://www.informatik.uni-ulm.de/pm/mitarbeiter/helmuth.html , explores the possibilities of reuse of transformational developments. Although it has often been claimed that this could be done fully mechanically, the experience with a number of derivations in this chapter indicates that this claim is somewhat preposterous. Only by describing the transformation steps in a very abstract way (using just natural language) and by considering very general specifications, can the developments be reused. The central concept is similarity, and several definitions of this informal notion are given, each leading to a particular kind of reuse of derivations. Variants of a derivation of linear search lead to several interesting search algorithms, culminating in derivations by reuse of two complicated string matching algorithms. /pubs/1991/161/ ''Intersections of sets and bags of extended substructures - a class of problems'', generalizes the specification of pattern matching. It describes a class of problems that can be viewed as a generalization of pattern matching problems. The essence of pattern matching is considered to be the intersection of a particular set with a bag (multiset) of extended substructures of a structured object. The set contains the patterns, the extended substructures are possible occurrences, extended with labels that mark their positions in the original object. This leads to the first ideas on an (interesting) theory on (extended) substructures. It is shown how the abstract description of this class of problems lends itself to calculation in a BMF style. Also, clearly exhibiting the basic structure of such problems facilitates connecting them with various solution strategies. /pubs/1991/156/ ''Solving a combinatorial problem by transformation of abstract data types'', gives an application of techniques from the area of formal program development in a different area, viz. combinatorics. By describing a given combinatorial problem in terms of abstract data types with equivalences, and transforming those data types, a reduction to a known problem is obtained. Abstract data types proved to be a more suitable specification mechanism in this case than context free grammars, since arbitrary equivalences could be introduced on the data types.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Green, Richard. „Use of a layered knowledge architecture to support multiple views of system development knowledge“. Thesis, Keele University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.242275.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hung, Che Shian. „Boa Views: Enabling Modularization and Sharing of Boa Queries“. Bowling Green State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1563557234898944.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Eriksson, Jeanette. „Interaction Views in Architectures for ActionBlocks : To Each His Own“. Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1641.

Der volle Inhalt der Quelle
Annotation:
This master thesis is done in collaboration with Space and Virtuality studio of the Interactive Institute in Malmö. The project ActionBlocks, at the Space studio, relate to the requirements concerning hardware for ubiquitous computing. A system of intelligent building blocks is developed to be able to build functional HiFi prototypes fast. The building blocks are distributed in space and small, cheap web servers, called TINI, integrate the devices. ActionBlocks may be regarded as physical interfaces. The intention is that systems of different ActionBlocks (tag readers, digital cameras, loud-speakers, lamps, buttons etc.) may easily be constructed to support interaction with digital media in different projects. To be able to do this the ActionBlocks need to be assembled by a flexible architecture that can change when the needs alter. The goal with this thesis is to propose a concept for such an architecture. Except for the concept the thesis also contains an investigation of related architectures to explore what user aspect they have in the various projects and an implementation of a minor prototype to discover if the concept is valid in practice. ActionBlocks consist of an intelligent (digital) part and a physical part and it is possible to discern three different approaches towards the ActionBlocks. There are: · Physical - Action approach where the physical part and what happens in the real world is what matters. · Physical - Computational - Action approach where both parts are integrated on equal terms. · Computational approach where the intelligent part is most important and this view makes it possible for an ActionBlock to only contain an intelligent part. The approaches are entertained by three different user roles: the user, the interaction designer and the programmer. The user only interacts with the physical part of the ActionBlocks and is therefore only concerned about that part. He designs in use of ActionBlocks. The interaction designer assembles the ActionBlocks into a system. He configures the system and is concerned about the performance and the appearance of the ActionBlocks. Therefore he focuses on both the intelligent and the physical part. The interaction designer designs the interaction with the ActionBlocks. The programmer is the one that controls what can be done with an ActionBlock. He designs ActionBlocks. In development only the computational part is of interest because it is the only thing the programmer interacts with. The three ways to interact with ActionBlocks have an internal relationship. Development is needed to alter the possibilities to do configuration and use. The configuration forms a platform to use, because it provides new possibilities to customize it. This leads to a division into three aspects: Use, configuration and development. The partition makes it possible to focus on one aspect at a time. The three aspects have it counterparts in three different architectures: Pure Peer-to-Peer, Peer-to-Peer with distributed service and client-server architecture. The result is that the concept for an architecture for ActionBlocks is divided into three parts. One for each aspect. The concepts suggests that when the user interacts with the system the architecture is Peer-to-Peer and when the interaction designer interact with the system it is a Peer-to-Peer architecture with distributed service and when the programmer interacts with the system he can regard it as an client-server architecture. The concluding question is if there really is a reason to adapt the architecture to different aspects. My answer is that there is always an reason to adapt the technology to the human if it is possible.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Atilgan, Aydin Elcin. „Merging Multi-view Feature Models“. Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12613965/index.pdf.

Der volle Inhalt der Quelle
Annotation:
Feature models are used for variability management in software product lines. Instead of developing a single feature model, merging small models can be an effective solution to obtain a unified view. Since each stakeholder views the product family from a different perspective, conflicts may occur during merging. In this research, merging of feature models arising from different viewpoints is considered. A normative procedure is proposed to merge feature models by applying local rules. This procedure can merge feature models with cross-tree relationships between sibling features. Application of the local rules is demonstrated with examples.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Hochstettler, William Henry. „A model for supporting multiple software engineering methods in a software environment /“. The Ohio State University, 1986. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487322984315003.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Mutha, Chetan V. „Software Fault Propagation And Failure Analysis For UML Based Software Design“. The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1404305866.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

McKnight, Walter Lee. „A meta system for generating software engineering environments /“. The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487260531958418.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sartipi, Kamran. „Software Architecture Recovery based on Pattern Matching“. Thesis, University of Waterloo, 2003. http://hdl.handle.net/10012/1122.

Der volle Inhalt der Quelle
Annotation:
Pattern matching approaches in reverse engineering aim to incorporate domain knowledge and system documentation in the software architecture extraction process, hence provide a user/tool collaborative environment for architectural design recovery. This thesis presents a model and an environment for recovering the high level design of legacy software systems based on user defined architectural patterns and graph matching techniques. In the proposed model, a high-level view of a software system in terms of the system components and their interactions is represented as a query, using a description language. A query is mapped onto a pattern-graph, where a module and its interactions with other modules are represented as a group of graph-nodes and a group of graph-edges, respectively. Interaction constraints can be modeled by the description language as a part of the query. Such a pattern-graph is applied against an entity-relation graph that represents the information extracted from the source code of the software system. An approximate graph matching process performs a series of graph edit operations (i. e. , node/edge insertion/deletion) on the pattern-graph and uses a ranking mechanism based on data mining association to obtain a sub-optimal solution. The obtained solution corresponds to an extracted architecture that complies with the given query. An interactive prototype toolkit implemented as part of this thesis provides an environment for architecture recovery in two levels. First the system is decomposed into a number of subsystems of files. Second each subsystem can be decomposed into a number of modules of functions, datatypes, and variables.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Afifi, Faten Helmy. „Detecting errors in nonlinear functions for computer software“. Case Western Reserve University School of Graduate Studies / OhioLINK, 1992. http://rave.ohiolink.edu/etdc/view?acc_num=case1060013182.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Turgeon, Josée. „A view-based system for eliciting software process models“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0017/NQ55388.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Alrabghi, Leenah O. „QFD IN SOFTWARE ENGINEERING“. Kent State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=kent1385046526.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Byrne, Declan Jerome. „The needs of the software industry and the content of undergraduate education in Ireland : a survey of the views of practitioners, managers and academics“. Thesis, University of Hull, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.321054.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Zhang, Hailong. „Differentially-Private Remote Software Profiling“. The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1595270049924409.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Gibson, David S. „Behavioral relationships between software components /“. The Ohio State University, 1997. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487948158627364.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Schilling, Walter W. „A cost effective methodology for quantitative evaluation of software reliability using static analysis /“. Connect to full text in OhioLINK ETD Center, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1189820658.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Li, Chin-Hsiang. „Extensions to the attribute grammar form model to model meta software engineering environments /“. The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487259580261289.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Kiper, James Dennis. „The ergonomic, efficient, and economic integration of existing tools into a software environment /“. The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487260531956924.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Ali, Zoya. „Designing Object Oriented Software Applications within the Context of Software Frameworks“. The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316183692.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Tagore, Aditi. „Techniques to Improve Automated Software Verification“. The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397661277.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Nicholas, Charles Kenneth. „Assuring accessibility of complex software systems /“. The Ohio State University, 1988. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487587604132583.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Edwards, Stephen. „A formal model of software subsystems /“. The Ohio State University, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487861796819812.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Colesky, Michael Robert. „SecMVC : a model for secure software design based on the model-view-controller pattern“. Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1020614.

Der volle Inhalt der Quelle
Annotation:
Current advances in the software development industry are growing more ubiquitous by the day. This has caused for security, not only in the broader sense, but specifically within the design and overall development of software itself, to become all the more important. An evidently prevalent problem in the domain of software development is that software security is not consistently addressed during design, which undermines core security concerns, and leads to the development of insecure software. This research seeks to address this issue via a model for secure software design, which is based on a software design pattern, namely, the Model-View-Controller (MVC) pattern. The use of a pattern to convey knowledge is not a new notion. However, the ability of software design patterns to convey secure software design is an idea worth investigating. Following identification of secure software design principles and concepts, as well as software design patterns, specifically those relating to the MVC pattern, a model was designed and developed. With the MVC pattern argued as being a suitable foundation for the model, the security conscious MVC (SecMVC) combines secure software design principles and concepts into the MVC pattern. Together herewith, the MVC pattern’s components in the MVC Compound pattern, namely: the Observer pattern, the Strategy pattern, and the Composite pattern, have provided further sub-models for less abstraction and greater detail. These sub-models were developed, as a result of the SecMVC model’s evaluation in the validation for this study, an expert review. Argued in the light of similar research methods, the expert review was chosen – along with a process that included the use of two expert participants to validate the SecMVC model. It was determined through the expert review that the SecMVC model is of sufficient utility, quality, and efficacy to constitute research value. The research methodology process followed was design science, in which the SecMVC model, which includes its related sub-models, serves as the artefact and research output of this study. This research study contributes evidence of the feasibility for integrating knowledge into software design patterns. This includes the SecMVC model itself. In addition, it argues for the use of an expert review, as an evaluative research method for such an artifact.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Bihari, Thomas Edward. „Adapting real-time software for reliable performance /“. The Ohio State University, 1987. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487326511714772.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Herrmann, William J. „Creating a Fun Program that is Simple and Easy to Use“. Wittenberg University Honors Theses / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=wuhonors1337875707.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Liang, Kai. „Fault Localization In Embedded Control System Software“. Case Western Reserve University School of Graduate Studies / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=case1396610077.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Hall, Kathleen J. „An examination of issues related to the implementation of evolutionary development and DOD-STD-2167A in software development : a practitioners view /“. This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-03302010-020143/.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Kagdi, Huzefa H. „Mining Software Repositories to Support Software Evolution“. Kent State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=kent1216149768.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Albattah, Waleed. „SOFTWARE MAINTAINABILITY AND TESTABILITY PREDICTIONS USING PACKAGE COHESION“. Kent State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=kent1415737576.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Dutta, Binamra. „Enterprise software metrics how to add business value /“. [Kent, Ohio] : Kent State University, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1239239432.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Kurian, Roger. „The benefits to management of using GQM, continuous GQM, and V-GQM in a measurement program“. [Kent, Ohio] : Kent State University, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1248130473.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Neerukonda, Narender. „AUTOMATIC SETUP SELECTION AND OPERATION SEQUENCING FOR COMPUTER-AIDED MANUFACTURING SOFTWARE“. Ohio University / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1132668178.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Fung, Casey Kin-Chee. „A methodology for the collection and evaluation of software error data /“. The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487263399022312.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Nesbitt, Brian E. „Integration and deployment techniques in combination with development methodologies“. [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:141.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Harms, Douglas Eugene. „The influence of software reuse on programming language design /“. The Ohio State University, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487683049374373.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Parrish, Allen Scott. „An axiomatic theory of software test data adequacy criteria /“. The Ohio State University, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487683401441596.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Kirschenbaum, Jason P. „Investigations in Automating Software Verification“. The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1306862918.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Chockalingam, Arun. „Framework for Analyzing the Success of Open Source Software“. The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1307983718.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Ye, Xin. „Automated Software Defect Localization“. Ohio University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1462374079.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Chalasani, Pallavi. „Engineering for evolution of a Software to a Production Environment“. The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1398952564.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Alali, Abdulkareem. „Improved Methods for Mining Software Repositories to Detect Evolutionary Couplings“. Kent State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=kent1406565384.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

AlAbed-AlHaq, Abrar Fawwaz. „APPLYING GRAPH MINING TECHNIQUES TO SOLVE COMPLEX SOFTWARE ENGINEERING PROBLEMS“. Kent State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=kent1442986844.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Hegazy, Wael A. „The requirements of testing a class of reusable software modules /“. The Ohio State University, 1989. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487668215806965.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Sitaraman, Muralidharan. „Mechanisms and methods for performance tuning of reusable software components /“. The Ohio State University, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487683401443961.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Frisch, Blade William Martin. „A User Experience Evaluation of AAC Software“. Bowling Green State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1594112876812982.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Bai, Zhuofu. „LOCALIZING FAULTS IN NUMERICAL SOFTWARE USING A VALUE-BASED CAUSAL MODEL“. Case Western Reserve University School of Graduate Studies / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=case1459437802.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

LaGuardia, John Louis. „Computer Aided Parametric Screw Design and Analysis Using Pro/Engineer Solid Modeling Software“. University of Akron / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=akron1237988201.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

THOMPSON, ELIZABETH M. „SPELLING ACCURACY WITH NON-FLUENT APHASIA: WORD PROCESSING V.S. WORD PREDICTION COMPUTER SOFTWARE“. University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1116211390.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Hammad, Maen M. „SUPPORTING CODE-DESIGN CONSISTENCY DURING SOFTWARE EVOLUTION“. Kent State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=kent1271363195.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Kasu, Velangani Deepak Reddy. „Programmer Difficulties within a Software Development Environment“. University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1544002452972811.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie