- AUETD Home
- Browsing by Author
Browsing by Author "Umphress, David A."
Now showing items 1-11 of 11
- Sort by:
- title
- issue date
- submit date
- Order:
- ascending
- descending
- Results:
- 5
- 10
- 20
- 40
- 60
- 80
- 100
Designing Efficient Single Page Web Applications
Sanandan, Nyruthya (2018-12-03)
Traditional web applications rely on the client-server model to request and render data on
the browser. Although this architecture has been popular for over a decade, waiting for
information as the server caters to ...
A Framework for Universal Problem Resolution with Continuous Improvement
Leithiser, Robert (2014-05-01)
This dissertation outlines a universal problem resolution framework implementing reasoning and improvement capabilities exhibited by human beings. The work reviews literature concerning major differentiations of human ...
Go with the flow: Data Flow Analysis for Binary Differencing
Denton, Benjamin (2014-07-30)
Differencing in computer science is often used to quickly determine differences between two files. While this works well for plain text files, such as source code, applying differencing to binary executable files is more ...
A Metaheuristic for Autonomous and Self-Organizing Consensus Formation Inspired by Honey Bee Nest Site Selection Behavior
Mentis, Alexander (2014-12-04)
This research presents a self-organizing system for engineering consensus among cooperating, distributed processes and studying consensus negotiation in natural systems that use the quorum sensing mechanism. The presented ...
Odinn: An In-Vivo Hypervisor-based Intrusion Detection System for the Cloud
Harrison, Christopher (2014-06-18)
Cloud computing has emerged as the de facto service model for modern enterprises;
however, security concerns remain a major impediment to full-scale adoption. Concurrent
to this paradigm shift looms another concern that ...
Opportunistic Random Access in CSMA/CA-Based Wireless Networks
Balasubramani, Jagadeesh (2013-10-18)
IEEE 802.11 MAC based CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance) is the most widely used protocol in wireless networks. In CSMA/CA, every
node listens to the shared wireless medium and transmits ...
Privacy-Enabled Probabilistic Verification in Broadcast Authentication for Vehicular Networks
Grover, Kanika (2014-10-10)
Vehicular Ad hoc Networks (VANETs) possess an extremely dynamic nature accompanying the high mobility feature. In VANETs, each vehicle sends out safety messages at regular intervals of 100-300 ms. Since the purpose of ...
Repatterning: Improving the Reliability of Android Applications with an Adaptation of Refactoring
Dennis, Bradley (2014-07-02)
Studies of Android applications show that NullPointerException, OutofMemoryError, and BadTokenException account for a majority of errors observed in the real world. The technical debt being born by Android developers from ...
Scalable, Self-Healing, and Real-Time Network Services for Directed Diffusion
Casey, Kenan (2008-08-15)
Directed diffusion is a data-centric publish-subscribe routing protocol for sensor networks. We have proposed three network services which increase the capabilities of directed diffusion. Our protocols build on the inherent ...
Situated Socio-Cognitive and Ecological Simulation of the Triple-Helix Theory of Regional Innovation Dynamics
Morris-King, James R. (2014-05-14)
This dissertation focuses on applying the concept of agent-based ecological simulation
to the problem of developing and maintaining regional innovation economies. A simulation
model based on a popular model of innovation, ...
A Survey of Android App Quality Using Third Party Markets
Shaw, Eric (2014-11-06)
Since its inception, the smart phone has quickly become one of the most ubiquitous technological artifacts in today’s society. In the first quarter of 2014, 281.5 million units were shipped. This was a 28.6 percent ...