Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Purdue University (8)
- Western University (5)
- California Polytechnic State University, San Luis Obispo (4)
- Chapman University (4)
- SelectedWorks (2)
-
- University of North Florida (2)
- West Virginia University (2)
- Cedarville University (1)
- Florida International University (1)
- Old Dominion University (1)
- University of Arkansas, Fayetteville (1)
- University of Louisville (1)
- University of Massachusetts Amherst (1)
- University of Nebraska - Lincoln (1)
- University of New Mexico (1)
- University of New Orleans (1)
- University of Tennessee, Knoxville (1)
- Keyword
-
- Empirical software engineering (5)
- Machine Learning (4)
- Deep Learning (3)
- Deep learning (3)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (2)
-
- Internet of Things (2)
- Java (2)
- Machine learning (2)
- Security (2)
- Software reuse (2)
- Thesis; University of North Florida; UNF; Dissertations (2)
- 2D Game (1)
- AI Decision Making (1)
- AI testing (1)
- Academic -- UNF -- Computing; Message Oriented Middleware (1)
- Academic -- UNF -- Computing; offloading (1)
- Activism (1)
- Aiolos (1)
- Algorithmic complexity attacks (1)
- Android (1)
- Application Security (1)
- Arduino (1)
- Artificial Intelligence & Robotic Control (1)
- Artificial Intelligence (AI) (1)
- Autonomic Management (1)
- Autonomous system verification (1)
- Benefits of AI (1)
- Bias in AI Systems (1)
- Biology (1)
- Bitcoin (1)
- Publication Year
- Publication
-
- Department of Electrical and Computer Engineering Faculty Publications (8)
- Electronic Thesis and Dissertation Repository (5)
- Computer Engineering (3)
- Engineering Faculty Articles and Research (3)
- Graduate Theses, Dissertations, and Problem Reports (2)
-
- Jeremy Straub (2)
- Masters Theses (2)
- UNF Graduate Theses and Dissertations (2)
- Arkansas Law Review (1)
- Computer Science ETDs (1)
- Electronic Theses and Dissertations (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- Engineering Technical Reports (1)
- FIU Electronic Theses and Dissertations (1)
- Library Philosophy and Practice (e-journal) (1)
- Master's Theses (1)
- The Research and Scholarship Symposium (2013-2019) (1)
- University of New Orleans Theses and Dissertations (1)
- Publication Type
Articles 31 - 37 of 37
Full-Text Articles in Other Computer Engineering
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Electronic Thesis and Dissertation Repository
Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
University of New Orleans Theses and Dissertations
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Masters Theses
An enumeration hybrid automaton has been shown in principle to be ready for automated transformation into a Simulink implementation. This paper describes a strategy for and a demonstration of automated construction. This is accomplished by designing a data model which represents EHA data and providing a mapping from EHA data points to Simulink blocks.
A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub
A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub
Jeremy Straub
A Human Proximity Operations System (HPOS) poses numerous risks in a real world environment. These risks range from mundane tasks such as avoiding walls and fixed obstacles to the critical need to keep people and processes safe in the context of the HPOS’s situation-specific decision making. Validating the performance of an HPOS, which must operate in a real-world environment, is an ill posed problem due to the complexity that is introduced by erratic (non-computer) actors. In order to prove the HPOS’s usefulness, test cases must be generated to simulate possible actions of these actors, so the HPOS can be shown …
Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju
Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju
UNF Graduate Theses and Dissertations
Message Oriented Middleware (MOM) is an enabling technology for modern event- driven applications that are typically based on publish/subscribe communication [Eugster03]. Enterprises typically contain hundreds of applications operating in environments with diverse databases and operating systems. Integration of these applications is required to coordinate the business process. Unfortunately, this is no easy task. Enterprise Integration, according to Brosey et al. (2001), "aims to connect and combines people, processes, systems, and technologies to ensure that the right people and the right processes have the right information and the right resources at the right time"[Brosey01]. Communication between different applications can be achieved …
Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk
Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk
Jeremy Straub
No abstract provided.
Software Development Project Risk Management: A Literature Review, Kevin Macg. Adams, C. Ariel Pinto
Software Development Project Risk Management: A Literature Review, Kevin Macg. Adams, C. Ariel Pinto
Engineering Management & Systems Engineering Faculty Publications
The rapid and unprecedented growth in software has brought with it some of the most spectacular and costly project failures in modern history. How risk management is presented in the scholarly journals may give insight into the risk management methods and techniques in use on software development projects. This paper provides a glimpse into the risk management methods, methodologies and techniques available to those who are responsible for software development projects by conducting a non-experimental content analysis. The findings reveal that risk management has not received sufficient attention and does not appear to be widely accepted within the software engineering …