Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

An Algorithm For Clearing Combinatorial Markets, Josiane Domgang Nzouonta Dec 2003

An Algorithm For Clearing Combinatorial Markets, Josiane Domgang Nzouonta

Theses and Dissertations

It was recently shown possible to solve single item auctions without revealing any secret except for the solution. Namely, with vMB-share [4], the seller and the buyer only learn each other's identity and the selling price for a chosen M+1 pricing scheme. No trusted party was necessary. In this thesis, we show how vMB-share can be extended for the clearing of combinatorial negotiations with several items, buyers and sellers. We first show how the more general problem can be reduced to a virtual form, relatively similar to the single-item auctions. Then, some modifications in the cryptographic techniques of vMB-share are …


When Personality Traits Need A Frame Of Reference: Enhancing The Predictive Validity Of Non-Cognitive Measures, Andrew David English Dec 2003

When Personality Traits Need A Frame Of Reference: Enhancing The Predictive Validity Of Non-Cognitive Measures, Andrew David English

Theses and Dissertations

The reconsideration of personality among personnel specialists is partly due to the discovery of the five-factor model of personality or the "Big Five" (Costa, 1996). In the years following the acceptance of this taxonomy, several researchers have examined the relationship of the "Big Five" personality traits to numerous job performance criteria. Research has show:n that personality testing can contribute significant incremental validity over that of cognitive ability and skills (Neuman & Wright, 1999). The issues of trait consistency and the faking of personality measures have divided researchers in regards to how detrimental the effects of each are. The results of …


Pair Programming To Facilitate The Training Of Newly-Hired Programmers, Mark Anthony Poff May 2003

Pair Programming To Facilitate The Training Of Newly-Hired Programmers, Mark Anthony Poff

Theses and Dissertations

Pair programming is touted by some software professionals as a style which allows developers to produce superior code in less time, and with fewer defects, than code produced by individuals. However, the acclaim for the pair methodology is not universal; some see it was a waste of effort which produces marginal improvements. Reported experiments which obtain quantitative results have typically been performed in an educational environment, and may not reflect actual workplace conditions. This thesis reports on an experiment using pair programing in an industrial setting. Its goal is to determine if this programming style can be used to increase …


A Taxonomy Of E-Commerce Risks And Failures, Giridharan Vilangadu Vijayaraghavan May 2003

A Taxonomy Of E-Commerce Risks And Failures, Giridharan Vilangadu Vijayaraghavan

Theses and Dissertations

Imagine being asked to test an e-commerce website. If you haven't tested one before, where would you start? What experience would you draw on? Where would you look for more information? Even very experienced testers have blind spots when they try to generate test ideas for an application that they have not tested. This thesis presents a simple outline that will help you generate test ideas and limit your blind spots. The outline is the result of about 18 months of research on classifying e-commerce related failures and risks. The result has 45 top-level categories and 700+ examples of errors …


A Machine Learning Approach To Detecting Attacks By Identifying Anomalies In Network Traffic, Matthew Vincent Mahoney May 2003

A Machine Learning Approach To Detecting Attacks By Identifying Anomalies In Network Traffic, Matthew Vincent Mahoney

Theses and Dissertations

The current approach to detecting novel attacks in network traffic is to model the normal frequency of session IP addresses and server port usage and to signal unusual combinations of these attributes as suspicious. We make four major contributions to the field of network anomaly detection. First, rather than just model user behavior, we also model network protocols from the data link through the application layer in order to detect attacks that exploit vulnerabilities in the implementation of these protocols. Second, we introduce a time-based model suitable for the bursty nature of network traffic: the probability of an event depends …


Migration From A Waterfall/Non Sei Cmm Compliant Process To A Rup/Sei Cmm Compliant Process, Chad Amos Chamberlin May 2003

Migration From A Waterfall/Non Sei Cmm Compliant Process To A Rup/Sei Cmm Compliant Process, Chad Amos Chamberlin

Theses and Dissertations

Software Life Cycle processes play a key role in the successful development of software products. Software processes continue to evolve as the field of software development progresses toward being a true engineering discipline. This theses has two objectives: (1) To apply software engineering knowledge gained during the pursuit of this degree toward the design and development of a complete, Software Engineering Institute (SEI) Capability Maturity Model (CMM) compliant process for the design phase of the software lifecycle. (2) To evaluate a Waterfall Lifecycle Model vs. an Iterative Lifecycle Model and compare SEI CM compliant processes to non-SEI CM compliant process …


Strategies For Testing Web Applications From The Client Side, Lawrence Thaddeus Prevatte Iii May 2003

Strategies For Testing Web Applications From The Client Side, Lawrence Thaddeus Prevatte Iii

Theses and Dissertations

This thesis is presented on the testing of computer software designed to operate over the World Wide Web. A fault model to guide Web software testing is developed, the components of Web software applications and their interfaces to each other are defined, and strategies to test Web software are discussed. The approach taken is to simplify the concepts of testing Web software to aid in a methodical treatment of the techniques required to conduct meaningful tests using a minimum amount of testing resources, conducting the tests from the client side of the Web application during the “ready for users” or …


Design And Implementation Of Exception Handling With Zero Overhead In Functional Languages, Ramon Zatarain Cabada May 2003

Design And Implementation Of Exception Handling With Zero Overhead In Functional Languages, Ramon Zatarain Cabada

Theses and Dissertations

This dissertation considers the implementation of exception handling specifically for functional languages. Some implementations incur overhead for using exception handling even when no exceptions are raised. We show the results of some experiments with the SML of New Jersey and OCAML compilers, two well-known compilers for functional languages. Imperative languages avoid this overhead by using tables, but the approach does not easily transfer to compilers using continuation passing style (CPS). This dissertation proposes an approach that works with CPS compilers like SML of New Jersey. We first present an experiment where programs in SML are written with and without exception …