Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 8 of 8
Full-Text Articles in Entire DC Network
An Algorithm For Clearing Combinatorial Markets, Josiane Domgang Nzouonta
An Algorithm For Clearing Combinatorial Markets, Josiane Domgang Nzouonta
Theses and Dissertations
It was recently shown possible to solve single item auctions without revealing any secret except for the solution. Namely, with vMB-share [4], the seller and the buyer only learn each other's identity and the selling price for a chosen M+1 pricing scheme. No trusted party was necessary. In this thesis, we show how vMB-share can be extended for the clearing of combinatorial negotiations with several items, buyers and sellers. We first show how the more general problem can be reduced to a virtual form, relatively similar to the single-item auctions. Then, some modifications in the cryptographic techniques of vMB-share are …
When Personality Traits Need A Frame Of Reference: Enhancing The Predictive Validity Of Non-Cognitive Measures, Andrew David English
When Personality Traits Need A Frame Of Reference: Enhancing The Predictive Validity Of Non-Cognitive Measures, Andrew David English
Theses and Dissertations
The reconsideration of personality among personnel specialists is partly due to the discovery of the five-factor model of personality or the "Big Five" (Costa, 1996). In the years following the acceptance of this taxonomy, several researchers have examined the relationship of the "Big Five" personality traits to numerous job performance criteria. Research has show:n that personality testing can contribute significant incremental validity over that of cognitive ability and skills (Neuman & Wright, 1999). The issues of trait consistency and the faking of personality measures have divided researchers in regards to how detrimental the effects of each are. The results of …
Pair Programming To Facilitate The Training Of Newly-Hired Programmers, Mark Anthony Poff
Pair Programming To Facilitate The Training Of Newly-Hired Programmers, Mark Anthony Poff
Theses and Dissertations
Pair programming is touted by some software professionals as a style which allows developers to produce superior code in less time, and with fewer defects, than code produced by individuals. However, the acclaim for the pair methodology is not universal; some see it was a waste of effort which produces marginal improvements. Reported experiments which obtain quantitative results have typically been performed in an educational environment, and may not reflect actual workplace conditions. This thesis reports on an experiment using pair programing in an industrial setting. Its goal is to determine if this programming style can be used to increase …
A Taxonomy Of E-Commerce Risks And Failures, Giridharan Vilangadu Vijayaraghavan
A Taxonomy Of E-Commerce Risks And Failures, Giridharan Vilangadu Vijayaraghavan
Theses and Dissertations
Imagine being asked to test an e-commerce website. If you haven't tested one before, where would you start? What experience would you draw on? Where would you look for more information? Even very experienced testers have blind spots when they try to generate test ideas for an application that they have not tested. This thesis presents a simple outline that will help you generate test ideas and limit your blind spots. The outline is the result of about 18 months of research on classifying e-commerce related failures and risks. The result has 45 top-level categories and 700+ examples of errors …
A Machine Learning Approach To Detecting Attacks By Identifying Anomalies In Network Traffic, Matthew Vincent Mahoney
A Machine Learning Approach To Detecting Attacks By Identifying Anomalies In Network Traffic, Matthew Vincent Mahoney
Theses and Dissertations
The current approach to detecting novel attacks in network traffic is to model the normal frequency of session IP addresses and server port usage and to signal unusual combinations of these attributes as suspicious. We make four major contributions to the field of network anomaly detection. First, rather than just model user behavior, we also model network protocols from the data link through the application layer in order to detect attacks that exploit vulnerabilities in the implementation of these protocols. Second, we introduce a time-based model suitable for the bursty nature of network traffic: the probability of an event depends …
Migration From A Waterfall/Non Sei Cmm Compliant Process To A Rup/Sei Cmm Compliant Process, Chad Amos Chamberlin
Migration From A Waterfall/Non Sei Cmm Compliant Process To A Rup/Sei Cmm Compliant Process, Chad Amos Chamberlin
Theses and Dissertations
Software Life Cycle processes play a key role in the successful development of software products. Software processes continue to evolve as the field of software development progresses toward being a true engineering discipline. This theses has two objectives: (1) To apply software engineering knowledge gained during the pursuit of this degree toward the design and development of a complete, Software Engineering Institute (SEI) Capability Maturity Model (CMM) compliant process for the design phase of the software lifecycle. (2) To evaluate a Waterfall Lifecycle Model vs. an Iterative Lifecycle Model and compare SEI CM compliant processes to non-SEI CM compliant process …
Strategies For Testing Web Applications From The Client Side, Lawrence Thaddeus Prevatte Iii
Strategies For Testing Web Applications From The Client Side, Lawrence Thaddeus Prevatte Iii
Theses and Dissertations
This thesis is presented on the testing of computer software designed to operate over the World Wide Web. A fault model to guide Web software testing is developed, the components of Web software applications and their interfaces to each other are defined, and strategies to test Web software are discussed. The approach taken is to simplify the concepts of testing Web software to aid in a methodical treatment of the techniques required to conduct meaningful tests using a minimum amount of testing resources, conducting the tests from the client side of the Web application during the “ready for users” or …
Design And Implementation Of Exception Handling With Zero Overhead In Functional Languages, Ramon Zatarain Cabada
Design And Implementation Of Exception Handling With Zero Overhead In Functional Languages, Ramon Zatarain Cabada
Theses and Dissertations
This dissertation considers the implementation of exception handling specifically for functional languages. Some implementations incur overhead for using exception handling even when no exceptions are raised. We show the results of some experiments with the SML of New Jersey and OCAML compilers, two well-known compilers for functional languages. Imperative languages avoid this overhead by using tables, but the approach does not easily transfer to compilers using continuation passing style (CPS). This dissertation proposes an approach that works with CPS compilers like SML of New Jersey. We first present an experiment where programs in SML are written with and without exception …