Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

On The Viability Of Quantitative Assessment Methods In Software Engineering And Software Services, Joseph D. Lucente Jun 2015

On The Viability Of Quantitative Assessment Methods In Software Engineering And Software Services, Joseph D. Lucente

Electronic Theses and Dissertations

IT help desk operations are expensive. Costs associated with IT operations present challenges to profit goals. Help desk managers need a way to plan staffing levels so that labor costs are minimized while problems are resolved efficiently. An incident prediction method is needed for planning staffing levels. The potential value of a solution to this problem is important to an IT service provider since software failures are inevitable and their timing is difficult to predict. In this research, a cost model for help desk operations is developed. The cost model relates predicted incidents to labor costs using real help desk …


Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain Jun 2015

Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain

Electronic Theses and Dissertations

Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.


Fail-Safe Test Generation Of Safety Critical Systems, Salwa Elakeili Mar 2015

Fail-Safe Test Generation Of Safety Critical Systems, Salwa Elakeili

Electronic Theses and Dissertations

This dissertation introduces a technique for testing proper failure mitigation in safety critical systems. Unlike other approaches which integrate behavioral and failure models, and then generate tests from the integrated model, we build safety mitigation tests from an existing behavioral test suite, using an explicit mitigation model for which we generate mitigation paths which are then woven at selected failure points into the original test suite to create failure-mitigation tests (safety mitigation test).


Towards Closed-Loop Deep Brain Stimulation: Behavior Recognition From Human Stn, Soroush Niketeghad Jan 2015

Towards Closed-Loop Deep Brain Stimulation: Behavior Recognition From Human Stn, Soroush Niketeghad

Electronic Theses and Dissertations

Deep brain stimulation (DBS) provides significant therapeutic benefit for movement disorders such as Parkinson’s disease (PD). Current DBS devices lack real-time feedback (thus are open loop) and stimulation parameters are adjusted during scheduled visits with a clinician. A closed-loop DBS system may reduce power consumption and side effects by adjusting stimulation parameters based on patient’s behavior. Thus behavior detection is a major step in designing such systems. Various physiological signals can be used to recognize the behaviors. Subthalamic Nucleus (STN) Local field Potential (LFP) is a great candidate signal for the neural feedback, because it can be recorded from the …