Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (4)
- Thesis; University of North Florida; UNF; Dissertations (4)
- Academic -- UNF -- Computing (1)
- Academic -- UNF -- Computing; Cloudstone; Web 2.0; Faban; Olio; IaaS; Benchmarking (1)
- Academic -- UNF -- Computing; Computer Security; Energy Optimization; Energy Aware Computing (1)
-
- Academic -- UNF -- Computing; Workflow; Unknown exceptions; BPEL4PEOPLE; Web Services; Human Task; SWIMs (1)
- Thesis; University of North Florida; UNF; Dissertations; Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations; Academic -- UNF -- Computing; traceability; clm; alm; collaborative lifecycle management; IBM Rational Collaborative Lifecycle Management Solution (1)
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Towards Designing Energy-Efficient Secure Hashes, Priyanka Dhoopa Harish
Towards Designing Energy-Efficient Secure Hashes, Priyanka Dhoopa Harish
UNF Graduate Theses and Dissertations
In computer security, cryptographic algorithms and protocols are required to ensure security of data and applications. This research investigates techniques to reduce the energy consumed by cryptographic hash functions. The specific hash functions considered are Message Digest-2 (MD2), Message Digest-5 (MD5), Secure Hash Algorithm-1 (SHA-1) and Secure Hash Algorithm-2 (SHA-2).
The discussion around energy conservation in handheld devices like laptops and mobile devices is gaining momentum. Research has been done at the hardware and operating system levels to reduce the energy consumed by these devices. However, research on conserving energy at the application level is a new approach. This research …
An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni
An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni
UNF Graduate Theses and Dissertations
Web 2.0 applications have become ubiquitous over the past few years because they provide useful features such as a rich, responsive graphical user interface that supports interactive and dynamic content. Social networking websites, blogs, auctions, online banking, online shopping and video sharing websites are noteworthy examples of Web 2.0 applications. The market for public cloud service providers is growing rapidly, and cloud providers offer an ever-growing list of services. As a result, developers and researchers find it challenging when deciding which public cloud service to use for deploying, experimenting or testing Web 2.0 applications. This study compares the scalability and …
Use Of Ibm Collaborative Lifecycle Management Solution To Demonstrate Traceability For Small, Real-World Software Development Project, Lovelesh Chawla
Use Of Ibm Collaborative Lifecycle Management Solution To Demonstrate Traceability For Small, Real-World Software Development Project, Lovelesh Chawla
UNF Graduate Theses and Dissertations
The Standish Group Study of 1994 showed that 53 percent of software projects failed outright and another 31 percent were challenged by extreme budget and/or time overrun. Since then different responses to the high rate of software project failures have been proposed. SEI’s CMMI, the ISO’s 9001:2000 for software development, and the IEEE’s JSTD-016 are some examples of such responses. Traceability is the one common feature that these software development standards impose.
Over the last decade, software and system engineering communities have been researching subjects such as developing more sophisticated tooling, applying information retrieval techniques capable of semi-automating the trace …
Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga
Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga
UNF Graduate Theses and Dissertations
In a typical workflow process, exceptions are the norm. Exceptions are defined as deviations from the normal sequence of activities and events. Exceptions can be divided into two broad categories: known exceptions (i.e., expected and predefined deviations) and unknown exceptions (i.e., unexpected and undefined deviations). Business Process Execution Language (BPEL) has become the de facto standard for executing business workflows with the use of web services. BPEL includes exception handling methods that are sufficient for known exception scenarios. Depending on the exception and the specifics of the exception handling tools, processes may either halt or move to completion. Instances of …
Hadoop Based Data Intensive Computation On Iaas Cloud Platforms, Sruthi Vijayakumar
Hadoop Based Data Intensive Computation On Iaas Cloud Platforms, Sruthi Vijayakumar
UNF Graduate Theses and Dissertations
Cloud computing is a relatively new form of computing which uses virtualized resources. It is dynamically scalable and is often provided as pay for use service over the Internet or Intranet or both. With increasing demand for data storage in the cloud, the study of data-intensive applications is becoming a primary focus. Data intensive applications are those which involve high CPU usage, processing large volumes of data typically in size of hundreds of gigabytes, terabytes or petabytes. The research in this thesis is focused on the Amazon’s Elastic Cloud Compute (EC2) and Amazon Elastic Map Reduce (EMR) using HiBench Hadoop …