Dissertations / Theses on the topic 'Software patterns'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Software patterns.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Jones, Mary Elizabeth Song Il-Yeol. "Dimensional modeling : identifying patterns, classifying patterns, and evaluating pattern impact on the design process /." Philadelphia, Pa. : Drexel University, 2006. http://dspace.library.drexel.edu/handle/1860/743.
Full textWaqas, Ahmad, and Fawad Kamal. "Modeling Patterns in Software Design." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2350.
Full textFolkspark Vägan 15:11 ,372 40 Ronneby ,Sweden
Geyer-Schulz, Andreas, and Michael Hahsler. "Software engineering with analysis patterns." Institut für Informationsverarbeitung und Informationswirtschaft, WU Vienna University of Economics and Business, 2001. http://epub.wu.ac.at/592/1/document.pdf.
Full textSeries: Working Papers on Information Systems, Information Business and Operations
Ayata, Mesut. "Effect Of Some Software Design Patterns On Real Time Software Performance." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/2/12612001/index.pdf.
Full textJerding, Dean Frederick. "Visualizing interaction patterns in program executions." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/9223.
Full textBorstad, Ole Gunnar. "Finding Security Patterns to Countermeasure Software Vulnerabilities." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8850.
Full textSoftware security is an increasingly important part of software development as the risk from attackers is constantly evolving through increased exposure, threats and economic impact of security breaches. Emerging security literature describes expert knowledge such as secure development best practices. This knowledge is often not applied by software developers because they lack security awareness, security training and secure development methods and tools. Existing methods and tools require too much effort and security is often given less priority in the trade-off between functionality and security. This thesis defines a tool supported approach to secure software analysis and design. Possible vulnerabilities and their causes are identified through analysis of software specifications and designs, resulting in vulnerability cause graphs. The security modelling tool SeaMonster is extended to include security activity graphs; this technique is used with vulnerability cause graphs to model vulnerabilities and security improvement activities. A security activity graph is created to identify activities that keep the vulnerabilities from instantiating in the final software product. The activities in the security activity graph can be the use of security patterns. This way the above approach is used to find a security pattern as a countermeasure to a vulnerability, and can be used with the security pattern design templates implemented in a preliminary project. This is a way of providing coupling between security expertise and software developers to apply security knowledge in software development practice. The approach and tools are tested and demonstrated through a development case study of a medical patient journal system. The main contributions of this thesis are an approach to secure software analysis and design, an extension of the security modelling tool SeaMonster, a case study of the approach and tools that show how security can be incorporated in early stages of software development. The contributions are intended to improve availability of security knowledge, to increase security awareness and bridge the gap between software experts and software developers.
Harjumaa, L. (Lasse). "Improving the software inspection process with patterns." Doctoral thesis, University of Oulu, 2005. http://urn.fi/urn:isbn:9514278941.
Full textSampson, Adam T. "Process-Oriented Patterns for Concurrent Software Engineering." Thesis, University of Kent, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527586.
Full textKhan, Saad Usman. "Identification of malicious behavior patterns for software." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26603.
Full textAli, Zoya. "Designing Object Oriented Software Applications within the Context of Software Frameworks." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316183692.
Full textAlzyoud, Mazen Salem. "ONTOLOGY DESIGN PATTERNS WITH APPLICATIONS TO SOFTWARE MEASUREMENT." Kent State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=kent1447338253.
Full textHoffman, Fredrik. "Architectural software patterns and maintainability: A case study." Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-528.
Full textThe importance of building maintainable software is being recognized in the community of software development. By developing software that is easy to maintain, the time and resources needed to perform the modifications may be decreased. This will in turn mean economical savings and increased profits.
Architectural software patterns are said to promote the development of maintainable software. The aim of this project was therefore to investigate whether architectural software patterns possess this property or not. A case study was performed where two candidate architectures were compared using a method called Architectural analysis of modifiability. This method uses change scenarios and modification ratios to identify differences between candidate architectures. A system developed at Ericsson Microwave Systems AB was used for the case study.
One of the candidate architectures consisted of two architectural software patterns: the Layers pattern and the Model-View-Controller pattern. The architecture analysis showed that the Layers pattern did promote maintainability whereas the Model-View-Controller pattern did not, from the basis of judgement associated with the method.
Ljosland, Ingvar. "BUCS: Patterns and Robustness : Experimentation with Safety Patterns in Safety-Critical Software Systems." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10088.
Full textIn modern society, we rely on safely working software systems. This is the final report in a masters degree project to reveal key issues in the science field of computer software architecture and design of safety-critical software systems. A pre-study of a navigation system implied that functionality related problems and safety-critical problems do not stack one to one, but rather is a case of solving these aspects in different layers. This means that changes in software systems functionality do not necessary mean that change in safety-critical modules has to be done as well, and visa versa. To further support the findings in the pre-study, an experiment was created to investigate these matters. A group of twenty-three computer science students from the Norwegian University of Science and Technology (NTNU) participated as subjects in the experiment. They were asked to make two functional additions and two safety-critical additions to a software robot emulator. A dynamic web tool was created to present information to the subjects, and they could here answer surveys and upload their task solutions. The results of the experiment shows that there were not found any evidence that the quality attributes got affected by the design approaches. This means that the findings of this study suggest that there is difficult to create safety-critical versions of software architectural design patterns, because all design patterns have a set of additions and concequences to a system, and all sides of the implications of the design pattern should be discussed by the system architects before used in a safety-critical system.
Farah, Hanna Ibrahim. "Applying cognitive patterns to support software tool development." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27354.
Full textOluyomi, Ayodele. "Patterns and protocols for agent oriented software development /." Connect to thesis, 2006. http://eprints.unimelb.edu.au/archive/00002780.
Full textMotii, Anas. "Engineering secure software architectures : patterns, models and analysis." Thesis, Toulouse 3, 2017. http://www.theses.fr/2017TOU30274/document.
Full textNowadays most organizations depend on Information and Communication Technologies (ICT) to perform their daily tasks (sometimes highly critical). However, in most cases, organizations and particularly small ones place limited value on information and its security. In the same time, achieving security in such systems is a difficult task because of the increasing complexity and connectivity in ICT development. In addition, security has impacts on many attributes such as openness, safety and usability. Thus, security becomes a very important aspect that should be considered in early phases of development. In this work, we propose an approach in order to secure ICT software architectures during their development by considering the aforementioned issues. The contributions of this work are threefold: (1) an integrated design framework for the specification and analysis of secure software architectures, (2) a novel model- and pattern-based methodology and (3) a set of supporting tools. The approach associates a modeling environment based on a set of modeling languages for specifying and analyzing architecture models and a reuse model repository of modeling artifacts (security pattern, threat and security property models) which allows reuse of capitalized security related know-how. The approach consists of the following steps: (a) model-based risk assessment performed on the architecture to identify threats, (b) selection and instantiation of security pattern models towards the modeling environment for stopping or mitigating the identified threats, (c) integration of security pattern models into the architecture model, (d) analysis of the produced architecture model with regards to other non-functional requirements and residual threats. In this context, we focus on real-time constraints satisfaction preservation after application of security patterns. Enumerating the residual threats is done by checking techniques over the architecture against formalized threat scenarios from the STRIDE model and based on existing threat references (e.g., CAPEC). As part of the assistance for the development of secure architectures, we have implemented a tool chain based on SEMCO and Eclipse Papyrus to support the different activities based on a set of modeling languages compliant with OMG standards (UML and its profiles). The assessment of our work is presented via a SCADA system (Supervisory Control And Data Acquisition) case study
Turk, Tuna. "The Effect Of Software Design Patterns On Object-oriented Software Quality And Maintainability." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12611104/index.pdf.
Full textShah, Dharmesh S. M. Massachusetts Institute of Technology. "On Startups : patterns and practices of contemporary software entrepreneurs." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/37253.
Full textIncludes bibliographical references (leaves 106-109).
"When you write a book, you need to have more than an interesting story. You need to have a desire to tell the story. You need to be personally invested in some way. You need to care about it." Malcolm Gladwell Author, "The Tipping Point". "I have never thought of writing for reputation and honor. What I have in my heart must come out, that is the reason why I compose. " Ludwig van Beethoven. The above quotes answer the basic question that many people have asked me (and I have asked myself): Why are you writing a thesis? The answer is simple: I believe there's a story to be told, and I have a personal passion for the subject. This thesis will analyze the patterns and practices of contemporary software startups. Though much has been written about software companies and much has been written on startups, I'm primarily interested in the intersection: software startups. More specifically, I will explore contemporary software startups that were started after the Internet bubble burst. About The Website: onstartups.com
As part of the thesis writing experience, I started a blog called "OnStartups" (http://onstartups.com) where I have been posting articles on software startups. More information on the onstartups.com site is included at the end of the thesis. My passion for learning more about software startups, the opportunity to work with two exceptional individuals as co-advisors and the overwhelming response to my onstartups.com website are my primary motivations for this thesis. Onward!
by Dharmesh Shah.
S.M.M.O.T.
Alhusain, Sultan. "Intelligent data-driven reverse engineering of software design patterns." Thesis, De Montfort University, 2016. http://hdl.handle.net/2086/14341.
Full textDESTEFANIS, GIUSEPPE. "Assessing sofware quality by micro patterns detection." Doctoral thesis, Università degli Studi di Cagliari, 2013. http://hdl.handle.net/11584/266243.
Full textNaish, James Alexander. "Towards systematic requirements reuse." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/towards-systematic-requirements-reuse(75db42b9-51be-43f6-af3e-324bf6c753fa).html.
Full textWu, Weizhong. "An on-line library of design patterns." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2611.
Full textMoore, Freeman Leroy. "Quantifying Design Principles in Reusable Software Components." Thesis, University of North Texas, 1995. https://digital.library.unt.edu/ark:/67531/metadc278795/.
Full textPalomares, Bonache Cristina. "Definition and use of software requirement patterns in requirements engineering." Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/403992.
Full textLa qualitat final dels productes i serveis de software depèn del requisits definits en l’especificació de Requisits Software (ERS). Tot i així, alguns problemes com la ambigüitat, incompletesa i inconsistència han sigut detectats en la escriptura dels ERS, especialment quan el llenguatge natural és usat per escriure’ls. La reutilització de requisits ha sigut proposada com un recurs clau pels enginyers de requisits per tal d’obtenir, validar i documentar requisits software i, com a conseqüència, obtenir ERS de millor qualitat usant processos d’enginyeria més efectius. Entre totes les tècniques possibles per aconseguir la reutilització, els patrons tenen una posició destacada. En la seva forma més clàssica, els patrons descriuen problemes que ocorren sovint, i després descriuen la part central de la solució a aquests problemes. Els professionals de la enginyeria del software han adoptat la noció de patró en diferents àmbits, especialment en els relacionats amb el disseny del software (per exemple, els patrons de disseny i els patrons d’arquitectura del software), però també en altres etapes del desenvolupament del software, tant abans com després del seu disseny. Seguint aquesta estratègia, els patrons de requisits emergeixen com una manera natural de reutilitzar coneixement durant l’etapa d’enginyeria de requisits. Tot i que hi ha hagut varies tècniques proposades per reutilitzar requisits, s’ha observat que no hi ha cap proposta concreta que hagi aconseguit una àmplia acceptació, ni cap proposta completa que cobreixi tots els elements necessaris per animar a les organitzacions a adoptar la reutilització de requisits. Com a conseqüència, aquesta tesis proposa l’ús de Patrons de Requisits Software (en anglès Software Requirement Patterns o SRPs) com un medi per capturar i reutilitzar coneixement de requisits en l’àmbit de projectes de tecnologia de la informació. Seguint la estructura típica dels patrons de context-problema-solució, un SRP consisteix en: una plantilla (solució) que pot generar un o més requisits quan és aplicat en un projecte específic, i informació relacionada (context-problema) per identificar la seva aplicabilitat en un projecte. Per facilitar el seu ús, els SRP han sigut encapsulats dintre del framework PABRE (de l’anglès PAttern-Based Requirements Elicitation). El framework cobreix tots els elements que podrien ser crítics per adoptar una tècnica de reutilització de requisits. Més detalladament, el framework inclou: - Un meta model que descriu la estructura i semàntica dels SRPs i la seva organització dintre d’un catàleg.
Wang, Xin. "Deriving software performance models from architectural patterns by graph transformations." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0019/MQ48496.pdf.
Full textStal, Michael. "Understanding and analyzing software architecture (of distributed systems) using patterns." [S.l. : [Groningen : s.n.] ; University Library Groningen] [Host], 2007. http://irs.ub.rug.nl/ppn/300343159.
Full textStepan, Petr. "Interaction patterns as composite connectors in component-based software development." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/interaction-patterns-as-composite-connectors-in-componentbased-software-development(d4ba9b5e-3c5f-472b-ace1-4060ea5a88de).html.
Full textWang, Xin Carleton University Dissertation Engineering Systems and Computer. "Deriving software performance models from architectural patterns by graph transformations." Ottawa, 1999.
Find full textMoghim, Mohammad Reza. "Incorporating design patterns into object-oriented development methods." Thesis, University of Salford, 1999. http://usir.salford.ac.uk/26820/.
Full textAlbertsen, Thomas. "Application patterns for ontology based applications." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-618.
Full textSoftware patterns have been proven as a valuable way to storing a repeatable solution to a commonly occurring problem in software design. A pattern is not a finished design that can be directly formed into program code; instead it is a description how to solve a problem that may occur in many situations.
In the ontology community very little research have been made in producing high-level patterns where the solution shows how an architecture of an ontology based software might look like.
In this thesis the results of examining how high-level patterns of this type relates to other types of patterns are given and how these patterns would be described are formulated.
Avkarogullari, Okan. "Representing Design Patterns As Super Components In Component Oriented Software Engineering." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/1305390/index.pdf.
Full textCiftci, Aysegul. "Use Of Design Patterns In Non-object Oriented Real-time Software." Master's thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615431/index.pdf.
Full textFaniyi, Funmilade Olugbenga. "Self-aware software architecture style and patterns for cloud-based applications." Thesis, University of Birmingham, 2015. http://etheses.bham.ac.uk//id/eprint/6032/.
Full textDuck, Geraint. "Extraction of database and software usage patterns from the bioinformatics literature." Thesis, University of Manchester, 2015. https://www.research.manchester.ac.uk/portal/en/theses/extraction-of-database-and-software-usage-patterns-from-the-bioinformatics-literature(fac16cb8-5b5b-4732-b7af-77a41cc64487).html.
Full textBeauchel, Virginia Bernstrom. "Patterns of Arizona high schools' acquisition and use of microcomputer software." Diss., The University of Arizona, 1990. http://hdl.handle.net/10150/185045.
Full textDimitrov, Dimitar. "Towards cloud application architectural patterns: transfer, evolution, innovation and oblivion." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH. Forskningsmiljö Informationsteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-27643.
Full textEdge, Crystal. "Quantitative Assessment of the Modularization of Security Design Patterns with Aspects." NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/142.
Full textHuo, Ming Computer Science & Engineering Faculty of Engineering UNSW. "A systematic framework of recovering process patterns from project enactment data as inputs to software process improvement." Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43683.
Full textAzman, Norhidayah. "Dark retweets : an investigation of non-conventional retweeting patterns." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/368784/.
Full textElizalde, Edith. "The role of help resources in users' solution patterns comparison of methods /." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textPizarro, Venegas Cristóbal Gaspar Ignacio. "Implementación de una librería de control de un radar con interfaz a la plataforma Ros." Tesis, Universidad de Chile, 2014. http://repositorio.uchile.cl/handle/2250/131356.
Full textIngeniero Civil en Computación
Este trabajo de título se enmarca en la investigación realizada en el Centro de Tecnología Minera Avanzada (Advanced Mining Technology Center, AMTC) con tecnologías de percepción. Los desarrollos hechos en robótica en este centro constan de desarrollos de hardware y de software, siendo el software para robots un problema en si mismo. Actualmente, en el campo de la robótica, existe una plataforma de desarrollo que está tomando fuerza como una solución al problema del desarrollo de software para robots, la plataforma Robot Operating System (ROS), la cual permite el desarrollo de módulos de control para un robot como un sistema distribuido. El objetivo de este trabajo de título es la implementación de una librería de control para un radar de ondas milimétricas que se usa en el AMTC, que permita su uso con la plataforma ROS. De esta forma, el radar podrá ser usado como un sensor en conjunto con las otras piezas de hardware (sensores y actuadores) de que dispone el laboratorio. Esta librería consiste en un conjunto de piezas de software ejecutables que permiten la comunicación con el radar, generando datos en el formato apropiado para la plataforma, una interfaz gráfica que facilita el control del sistema, un módulo que permite la visualización de datos y un módulo que implementa un algoritmo de detección de objetos basado en los datos generados por los otros módulos. La librería implementada fue probada en el laboratorio, en un entorno controlado, para la validación directa de ésta contra el software oficial que se vende con el radar, y para analizar el uso de la red por parte de la librería. Además, se probó en la elipse del parque O'Higgins, para un caso de prueba en terreno, en la que se evaluó el desempeño de la integración del radar con ROS, usando sus funcionalidades de visualización de datos. Con este trabajo se logró la utilización de todas las características del radar y su total integración con la plataforma ROS, lo que permitirá el uso del radar con los otros sensores del laboratorio y su uso para nuevos experimentos.
Ji, Katrina Yun. "ADAP: A component-based model using design patterns with applications in E-Commerce." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/1694.
Full textLight, Adam. "Design patterns for cartography and data graphics /." view abstract or download file of text, 2004. http://wwwlib.umi.com/cr/uoregon/fullcit?p3153792.
Full textTypescript. Includes vita and abstract. Includes bibliographical references (leaves 93-97). Also available for download via the World Wide Web; free to University of Oregon users.
Bohdanowicz, Daniel. "Toward Tool Support for Usage of Object-Oriented Design Patterns Expressed in Unified Modeling Language." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5895.
Full textMalik, Obaid Ur Rehman. "Mining object-oriented software execution traces to discover patterns for automated testing." Thesis, University West, Department of Technology, Mathematics and Computer Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-570.
Full textWith the evolution of new software technologies, the requirements for automated testing are becoming more and more stringent. With increasing size of software projects, manual testing is becoming less efficient. For automated testing one of the most important question is, what to focus upon while testing? For a large number of functions along with large number of possible call sequences, it is very hard to generate test cases that cover all possible paths of control flow. By finding patterns in the calling sequences we will be able to identify more defects by focusing our testing efforts on those patterns. In this paper, we have described our work on tracing call sequences using Aspect Oriented Programming methodology and discovering those patterns in call sequences using data mining techniques.
Liang, Chengzhi. "COPIA: A New Software for Finding Consensus Patterns in Unaligned Protein Sequences." Thesis, University of Waterloo, 2001. http://hdl.handle.net/10012/1050.
Full textOduor, M. (Michael). "Persuasive software design patterns and user perceptions of behaviour change support systems." Doctoral thesis, Oulun yliopisto, 2018. http://urn.fi/urn:isbn:9789526218854.
Full textTiivistelmä Teknologia on yhä tiukemmin osa nykyelämää. Viime vuosina on tapahtunut kasvua ja kehitystä teknologioissa, jotka tukevat ihmisiä esimerkiksi elämään terveellisemmin ja ympäristöä säästäen. Tämän kasvun keskiössä on ollut vakuuttavien järjestelmien suunnittelu, jonka on osoitettu vaikuttavan positiivisesti sekä ihmisten käyttäytymiseen että järjestelmien käyttöön. Tämä väitöskirja käsittää viisi tutkimusta, sisältäen kirjallisuuskatsauksen, kaksi kvantitatiivista tutkimusta yhteensä 227 vastaajalla, ja kaksi konstruktiivista tutkimusta, jotka yhdessä vastaavat väitöskirjan päätutkimuskysymykseen: Kuinka arviointi- ja päätöksentekoprosessit sekä vakuuttavien järjestelmien suunnittelumallit yhdistämällä voidaan edistää käyttäytymisen muutosta tukevien järjestelmien kehitystä? Ensisijainen teoreettinen viitekehys tutkimukselle on vakuuttavien järjestelmien suunnittelumalli (Persuasive Systems Design model). Kyseinen malli määrittää keskeiset vaatimukset vakuuttavien järjestelmien kehittämiselle. Tärkeänä aiheena on ollut vakuuttavien järjestelmien suunnittelemisen edistäminen, jotta niillä voitaisiin paremmin saavuttaa aiotut päämäärät. Vakuuttavien järjestelmien ohjelmisto-ominaisuuksien vaikutuksesta käyttäytymiseen tutkimisen lisäksi väitöskirja yhdistää myös behavioristisen taloustieteen ja ohjelmistosuunnittelumallit vakuuttavien järjestelmien suunnitteluun. Lisäksi kategorioiden ja muiden käsitteiden, kuten koetun pätevyyden, vuorovaikutusta on tutkittu tilastollisen analyysin keinoin. Kaiken kaikkiaan tulokset paljastavat vakuuttavien järjestelmien ominaisuuksilla olevan vaikutusta käyttäytymisen muutosta tukevien järjestelmien vaikuttavuuteen. Lisäksi integroimalla behavioristisen taloustieteen konsepteja, jotka selittävät syitä, joiden vuoksi yksilöt käyttäytyvät odotetusta poikkeavasti, ohjelmistosuunnittelumalleihin, voidaan auttaa edistämään vakuuttavien järjestelmien kehittämistä ja parantaa niiden vaikuttavuutta
Brandt, Christina E. "Software Patents and Litigation Patterns: Does patent hoarding deter or incentivize litigation?" Scholarship @ Claremont, 2013. http://scholarship.claremont.edu/cmc_theses/793.
Full textZhang, Tong. "Designing Practical Software Bug Detectors Using Commodity Hardware and Common Programming Patterns." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/96422.
Full textDoctor of Philosophy
Software bugs have caused many real-world problems, e.g., the 2003 Northeast blackout and the Facebook stock price mismatch. Finding bugs is critical to solving those problems. Unfortunately, many existing bug detectors suffer from high run-time and space overheads as well as scalability and precision issues. In this dissertation, we address the limitations of bug detectors by leveraging commodity hardware and common programming patterns. Particularly, we focus on improving the run-time overhead of dynamic data race detectors, the space overhead of a memory safety bug detector, and the scalability and precision of the Linux kernel permission check bug detector. We first present a data race detector built upon commodity hardware transactional memory that can achieve 7x overhead reduction compared to the state-of-the-art solution (Google's TSAN). We then present a very lightweight sampling-based data race detector which re-purposes performance monitoring hardware features for lightweight sampling and uses a novel offline analysis for better race detection capability. Our result highlights very low overhead (2.6%) with 27.5% detection probability with a sampling period of 10,000. Next, we present a space-efficient temporal memory safety bug detector for a hardware spatial memory safety bug detector, without additional hardware support. According to experimental results, our full memory safety solution incurs only a 36% memory overhead with a 60% run-time overhead. Finally, we present a permission check bug detector for the Linux kernel. This bug detector leverages indirect call usage patterns in the Linux kernel for scalable and precise analysis. As a result, within a limited time budget (scalable), the detector discovered 14 previously unknown bugs (precise).
Taylor, Quinn Carlson. "Analysis and Characterization of Author Contribution Patterns in Open Source Software Development." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2971.
Full text