Search
Now showing items 31-40 of 148
A Survey of Android App Quality Using Third Party Markets
(2014-11-06)
Since its inception, the smart phone has quickly become one of the most ubiquitous technological artifacts in today’s society. In the first quarter of 2014, 281.5 million units were shipped. This was a 28.6 percent ...
Implementation of Fork-Merge Parsing in OpenRefactory/C
(2015-05-04)
C preprocessor directives are extensively used in C programs. Due to this, performing advanced program transformations on C programs is difficult. To obtain correct transformations, all possible configurations have to be ...
Proactive Thermal-Aware Scheduling
(2014-12-15)
Modern CPU’s cut-off operations when CPU temperature reaches a predetermined threshold making the CPU unavailable for all processes. Furthermore, operating the CPU for extended periods at temperatures close to, but slightly ...
Discovering Vulnerabilities In The Wild: An Empirical Study
(2014-12-11)
There is little or no information available on what actually happens when a software vulnerability is detected. We performed an empirical study on reporters of the three most prominent security vulnerabilities: buffer ...
Odinn: An In-Vivo Hypervisor-based Intrusion Detection System for the Cloud
(2014-06-18)
Cloud computing has emerged as the de facto service model for modern enterprises;
however, security concerns remain a major impediment to full-scale adoption. Concurrent
to this paradigm shift looms another concern that ...
iTad: An I/O-Aware Thermal Model for Data Centers
(2014-05-08)
With the ever-growing cooling costs of large-scale data centers, thermal management
must be adequately addressed. Thermal models can play a critical role in thermal management
that helps in reducing cooling costs in data ...
An Approach for Anonymous Spelling for Voter Write-Ins Using Speech Interaction
(2009-10-23)
Today, the technology used for voting does not fully address the issues that disabled voters are confronted with during elections. Every voter, regardless of disability, should be able to vote and verify his or her ballot ...
An Automated Rename Refactoring for Go
(2015-05-12)
Our work focuses on building an automated Rename refactoring for Go. We show that the tool is effective by testing with a suite of 75 manually written unit test cases and running it on 50 large, open source Go projects ...
Performance Evaluation of Split Disk-Cache
(2013-03-29)
The performance gap between the processor and the memory speeds has been ever increasing. Whereas processor speeds have improved by 60% annually, secondary storage speed has only improved by 10% annually. Although there ...
Social Networking and Culturally Situated Design Teaching Tools: Providing a Socially Interactive Computer Supported Collaborative Network Environment for K-12
(2014-03-20)
Culturally Situated Design Tools (CSDTs) are web-based software applications that allow students to create simulations of cultural arts: Native American beadwork, African American cornrow hairstyles, urban graffiti, and ...