- AUETD Home
- Browsing by Author
Browsing by Author "Umphress, David"
Now showing items 1-20 of 75
- Sort by:
- title
- issue date
- submit date
- Order:
- ascending
- descending
- Results:
- 5
- 10
- 20
- 40
- 60
- 80
- 100
Adapting Extreme Programming For Global Software Development Project
Tian, Yuan (2009-04-20)
Growth of the global economy has led to remarkable changes in the way software is developed. Global Software Development (GSD) is becoming the norm for many technology companies. Even though organizations are enjoying the ...
Agent-mediated brokering and matchmaking for simulation model reuse on the semantic grid
Paspuleti, Swetha (2005-12-15)
The need for simulation in military is increasing significantly due to high costs and safety limitations. Simulation in military is employed for training individuals in real-operating scenarios. The virtual, simulated ...
Analysis of Video Latency in UAV Wired and Wireless Networks
Works, Gloice (2008-05-15)
The ability to utilize wireless networks to transmit information offers many benefits as compared to wired networks. For example, in Unmanned Aerial Vehicle (UAV) military applications current technology relies on a wired ...
Analyzing the Benefits of Graphics Processing Units for Computation-Intensive Applications on Hadoop
Vasko, Kevin (2015-07-21)
Due to the ever expanding amount of data that is being generated in the “Big Data era” there is an ever increasing challenge of processing this data. This work aims to tackle the challenge of improving the performance of ...
Android Malware Detection Using Data Mining Techniques on Process Control Block Information
Alawneh, Heba (2020-07-24)
Because smartphones are increasingly becoming the mobile computing device of choice, we are experiencing an increase in the number and sophistication of mobile-computing-based malware attacks. A lot of these attacks target ...
Application Of Neural Network On PLC-based Automation Systems For Better Fault Tolerance And Error Detection
Joshi, Bhargav (2019-07-18)
Neural networks have a wide range of applications such as building complex equations using the input and output characteristics of functions, predictions of outputs, error detections, monitoring complex systems, etc. Neural ...
Applications of GUI Usage Analysis
Imsand, Eric (2008-05-15)
In the realm of computer security, a masquerade attack is a form of attack wherein the attacker deceives the victim, causing them to believe they are someone other than who they are. One particularly dangerous form of ...
Augmenting Traditional Static Analysis With Commonly Available Metadata
Cook, Devin (2015-01-20)
Developers and security analysts have been using static analysis for a long time to analyze programs for defects and vulnerabilities with some success. Generally a static analysis tool is run on the source code for a given ...
The Automated Design of Network Graph Algorithms with Applications in Cybersecurity
Pope, Aaron (2020-01-06) ETD File Embargoed
Graph representations and graph algorithms are commonplace in a wide variety of research domains, including computer and network security. Many problems can be expressed in terms of graphs in order to leverage the strengths ...
Automated Source Code Measurement Environment For Software Quality
Lee, Young (2007-12-15)
Measuring how well software component can be reused and maintained helps programmers not only write reusable and maintainable software, but also identifies reusable or maintainable components. We develop an automated ...
Automatic Detection of Software Security Vulnerabilities in Executable Program Files
Tevis, Jay-Evan (2005-08-15)
Secure programming describes those techniques that software developers use to provide security features in their applications. In addition to these techniques, software practitioners use static code security checkers to ...
Bandwidth-Aware Routing Tree (BART) for Underwater 3-D Geographic Routing
Kim, Tae (2008-08-15)
The limited bandwidth and power resources in underwater sensor networks have made geographic routing a favorite choice. While many detouring strategies in geographic routing do not work for 3-D underwater network topology, ...
Business Rules Discovery in Web Application through Process Mining
Alkofahi, Hamza (2020-07-20)
Advances in information technologies have allowed businesses to deliver their services to new markets that did not exist before, especially in fields such as e-commerce, healthcare, e-education, and cloud services. Web ...
A Case Study in Applying Agile Software Engineering Practices to Systems Engineering
Kennedy, Matthew (2013-02-01)
With the fast-paced nature of technology, the need to rapidly field systems has never been more important. Success does not just depend on well-defined requirements but also on the ability to respond to change during and ...
Collaborative-Adversarial Pair (CAP) Programming
Swamidurai, Rajendran (2010-01-13)
The advocates of pair programming claim that it has a number of benefits over traditional individual programming, including faster software development, higher quality code, reduced overall software development cost, ...
Cyber Security System Dynamic Modeling
Kannan, Uma (2017-12-15)
Cyber security modeling is the process of creating a normalized view of the cyber security situation. A typical cyber security model has information about the network infrastructure, security settings, and a list of possible ...
The Cybersecurity Preparedness of Local Election Offices: Influences, Challenges, and the Intergovernmental Perspective
Forson, Lindsey (2020-07-16)
Recent events have heightened concerns over the cybersecurity of US elections. In the decentralized US election system, counties and municipalities have primary responsibility for election administration. Therefore, ...
A Demographic Survey of Selected Third-Party Android Markets
Symon, William (2012-07-20)
In 1998 less than 10 percent of the global population held cell phone subscriptions. By the end of 2011 this number had increased to 87 percent, accounting for over 5.9 billion subscribers worldwide. Due to this high ...
Demographics of Adware and Spyware
Sanyasi, Arumugam (2007-12-15)
The World Wide Web is the most popular use of the Internet. Information can be accessed from this network of web pages. Unknown to users, web pages can access their personal information and, sometimes, also provide information ...
Design and evaluation of an accessible website developed using SharePoint 2010
Kulkarni, Sonal (2012-01-06)
The internet and web applications are growing rapidly. People are, more than ever before, dependent on the web applications and this dependency will continue to increase. A large number of web users have various accessibility ...