This Is AuburnElectronic Theses and Dissertations

Browsing Auburn Theses and Dissertations by Author "Umphress, David"

Now showing items 61-75 of 75

The Scrum Process for Independent Programmers 

Srirangarajan, Ananth (2009-03-27)
A software process is an attempt to impose structure on the software development process. The primary goal of a software process is to arrive at a repeatable, predictable process that will raise the productivity of software ...

Securing Web Applications: Web Application Flow Whitelisting to Improve Security 

Alabdulrazzaq, Haneen (2017-04-25)
The explosion in the availability of data fueled by mobile devices has pushed security to the forefront. As of 2016, Internet users worldwide are estimated at a staggering 3.47 billion. Such large numbers of users dictate ...

SISE: A novel approach to individual effort estimation 

Thackston, Russell (2013-06-25)
(Author’s note: This dissertation has been prepared following a manuscript style. Each chapter has been constructed as a stand alone manuscript, suitable for separate publication. Therefore, each chapter contains an abstract ...

Smartphone Detection of Abnormal Equine Behavior 

Burton, Megan (2018-11-20)
This research was motivated by two key facts: There are over 9.2 million horses in the United States and over 64% of adults own a smartphone. Blending these two ideas led to the genesis of this research by asking the ...

Taming the Scientific Big Data with Flexible Organizations for Exascale Computing 

Tian, Yuan (2012-07-31)
The last five years of supercomputers has evolved at an unprecedented rate as High Performance Computing (HPC) continue to progress towards exascale computing in 2018. These systems enable scientists to simulate scientific ...

Team-RUP: An Agent-Based Simulation Study of Team Behavior In Software Development Organizations 

Phillips, Jared (2006-05-15)
Software production methods are enacted via the interactions of software teams that cooperate to build software. Therefore, organizational culture has a significant effect on project coordination. Yet, this is not reflected ...

Thermal-aware Resource Management in Energy Efficient Clusters 

Taneja, Shubbhi (2018-07-25)
There is a pressing need for thermal management in most electronic devices today, ranging from portables to high-performance servers, and it poses barriers to the safe operations of data centers. The goal of thermal ...

Toolpath Static Analysis Testing for Additive Manufacturing 

Searle, Kyle (2020-07-31)
Fused Deposition Modelling (FDM) 3D printers are the most common 3D printers in the world. However, most of the world’s 3D printers have little-to-no security to prevent cyber-attacks. Most small businesses that employ 3D ...

Toward a Transparent, Checkpointable Fault-Tolerant Message Passing Interface for HPC Systems 

Sultana, Nawrin (2019-12-09)
With each successive generation of large-scale high-performance computing (HPC) systems, faults and associated failures are becoming more frequent. Long-running applications in such systems require efficient fault-tolerance ...

Trusted, Third-Party Authenticated, Quantum Key Distribution 

Hood, Jonathan (2016-08-05)
This dissertation presents an algorithm that provides a way of establishing trust and authentication. The protocol negotiates a key using extensions to QKD algorithms that include non-repudiation and endpoint verification ...

UAV Collision Avoidance Utilizing ADS-B and TCAS with Independent Ranging 

Henshall, Andrea (2018-07-20)
With the proliferation of Unmanned Aerial Vehicles (UAVs), their integration into the National Airspace System (NAS) is becoming increasingly imperative. To accomplish such integration, UAVs must be able to ''sense and ...

User Experience Design and Experimental Evaluation of Extensible and Dynamic Viewers for Data Structures 

Jain, Jhilmil (2007-05-15)
Many techniques for the visualization of data structures and algorithms have been proposed and shown to be pedagogically effective. Yet, they are not widely adopted because they lack suitable methods for automatically ...

Utilizing Facial Recognition Software to Record Classroom Attendance 

Miller, William E. (2018-04-25)
Facial recognition software offers many opportunities for educators, especially in regards to recording classroom attendance. With so much time lost in the classroom each day, utilizing facial recognition software allows ...

Vulnerability Assessment of Java Bytecode 

Shah, Rahul (2005-12-15)
Security of the software applications has become a critical issue as software is now used in almost all sectors parts of our day to day life. There is always an underlying threat that a malicious user may be able to access ...

A Vulnerability Assessment Testing Methodology for V2X-Enabled Environments 

Cuneo, Jason (2022-12-05)
V2X systems and networks are unlike existing wireless technologies since more data, bandwidth, and speed is required when communicating over a highly dynamic and ever-changing vehicular network. Protocols supporting V2X ...