Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (86)
- Selected Works (42)
- Western University (20)
- SelectedWorks (13)
- California Polytechnic State University, San Luis Obispo (10)
-
- California State University, San Bernardino (6)
- Loyola University Chicago (4)
- Western Kentucky University (4)
- Old Dominion University (3)
- University of Nevada, Las Vegas (3)
- University of New Orleans (3)
- University of Tennessee, Knoxville (3)
- Florida International University (2)
- Portland State University (2)
- University of Dayton (2)
- University of Nebraska - Lincoln (2)
- University of Texas at El Paso (2)
- Air Force Institute of Technology (1)
- Boise State University (1)
- East Tennessee State University (1)
- Edith Cowan University (1)
- Gallaudet University (1)
- Liberty University (1)
- Purdue University (1)
- Sheridan College (1)
- University of Arkansas, Fayetteville (1)
- University of Kentucky (1)
- University of Nebraska at Omaha (1)
- University of North Florida (1)
- Keyword
-
- Software Engineering (10)
- Empirical study (7)
- Data mining (5)
- Management Information Systems (5)
- Simulation (5)
-
- Software engineering (5)
- Software testing (5)
- Computer science (4)
- Computer security (4)
- Image processing (4)
- Information systems (4)
- Model Check (4)
- Proton beams Therapeutic use (4)
- Small Spacecraft (4)
- Adequacy (3)
- Algorithms (3)
- Anti-virus (3)
- Anti-virus software (3)
- Cloud computing (3)
- Computer Anti-Virus (3)
- Computer virus (3)
- Concurrency (3)
- CubeSat (3)
- Diagnostic imaging (3)
- Heuristic scanning (3)
- Indoor localization (3)
- Management information system (3)
- Model checking (3)
- Ontology (3)
- Security (3)
- Publication
-
- Research Collection School Of Computing and Information Systems (84)
- Electronic Thesis and Dissertation Repository (12)
- Jaime G. Carbonell (11)
- David LO (9)
- Electrical and Computer Engineering Publications (8)
-
- Umakant Mishra (7)
- Theses Digitization Project (6)
- Hisham Assal (5)
- Jeremy Straub (5)
- Computer Science: Faculty Publications and Other Works (4)
- George K. Thiruvathukal (4)
- Luiz Fernando Capretz (4)
- Masters Theses & Specialist Projects (4)
- Computer Engineering (3)
- Master's Theses (3)
- University of New Orleans Theses and Dissertations (3)
- Computational Modeling & Simulation Engineering Faculty Publications (2)
- Computer Science Faculty Publications (2)
- Computer Science Faculty Publications and Presentations (2)
- Computer Science and Software Engineering (2)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (2)
- Departmental Technical Reports (CS) (2)
- FIU Electronic Theses and Dissertations (2)
- Masters Theses (2)
- Maurice Dawson (2)
- Muhammad Imran (2)
- Ole J Mengshoel (2)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (2)
- AFIT Patents (1)
- Chancellor’s Honors Program Projects (1)
- Publication Type
- File Type
Articles 31 - 60 of 219
Full-Text Articles in Physical Sciences and Mathematics
Mobimed: Framework For Rapid Application Development Of Medical Mobile Apps, Frank Hernadez
Mobimed: Framework For Rapid Application Development Of Medical Mobile Apps, Frank Hernadez
FIU Electronic Theses and Dissertations
In the medical field images obtained from high definition cameras and other medical imaging systems are an integral part of medical diagnosis. The analysis of these images are usually performed by the physicians who sometimes need to spend long hours reviewing the images before they are able to come up with a diagnosis and then decide on the course of action. In this dissertation we present a framework for a computer-aided analysis of medical imagery via the use of an expert system. While this problem has been discussed before, we will consider a system based on mobile devices.
Since the …
Next Generation Crystal Viewing Tool, Zach Schaffter, Gerhard Klimeck
Next Generation Crystal Viewing Tool, Zach Schaffter, Gerhard Klimeck
The Summer Undergraduate Research Fellowship (SURF) Symposium
The science and engineering community is limited when it comes to crystal viewing software tools. Each tool lacks in a different area such as customization of structures or visual output. Crystal Viewer 2.0 was created to have all of these features in one program. This one tool simulates virtually any crystal structure with any possible material. The vtkvis widget offers users advanced visual options not seen in any other crystal viewing software. In addition, the powerful engine behind Crystal Viewer 2.0, nanoelectronic modeling 5 or (NEMO5), performs intensive atomic calculations depending on user input. A graphical user interface, or GUI, …
Automatic Recovery Of Root Causes From Bug-Fixing Changes, Ferdian Thung, David Lo, Lingxiao Jiang
Automatic Recovery Of Root Causes From Bug-Fixing Changes, Ferdian Thung, David Lo, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
No abstract provided.
Automatic Recovery Of Root Causes From Bug-Fixing Changes, Ferdian Thung, David Lo, Lingxiao Jiang
Automatic Recovery Of Root Causes From Bug-Fixing Changes, Ferdian Thung, David Lo, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
What is the root cause of this failure? This question is often among the first few asked by software debuggers when they try to address issues raised by a bug report. Root cause is the erroneous lines of code that cause a chain of erroneous program states eventually leading to the failure. Bug tracking and source control systems only record the symptoms (e.g., bug reports) and treatments of a bug (e.g., committed changes that fix the bug), but not its root cause. Many treatments contain non-essential changes, which are intermingled with root causes. Reverse engineering the root cause of a …
Creating Adaptive Quests To Support Personalized Learning Experiences When Learning Software Languages, Chris Boesch, Sandra Boesch
Creating Adaptive Quests To Support Personalized Learning Experiences When Learning Software Languages, Chris Boesch, Sandra Boesch
Research Collection School Of Computing and Information Systems
Over the past three years the authors have been developing and refining an online practicing platform called SingPath, which enables users to practice writing code in various software languages. The most recent feature to be released is a Quest mode that encourages users by showing short video clips each time a user solves five problems. In addition, users are able to choose whether to play through these quests on easy, medium, or hard levels of difficulty. The ability for users to customize their game play enables them to modify the difficulty of the experience and ideally self-regulate how frustrating or …
Livelabs: Initial Reflections On Building A Large-Scale Mobile Behavioral Experimentation Testbed, Archan Misra, Rajesh Krishna Balan
Livelabs: Initial Reflections On Building A Large-Scale Mobile Behavioral Experimentation Testbed, Archan Misra, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
We believe that, for successful adoption of novel mobile technologies and applications, it is important to be able to test them under real usage patterns, and with real users. To implement this vision, we present our initial effort in building LiveLabs, a large-scale mobile testbed for in-situ experimentation. LiveLabs is unique in two aspects. First, LiveLabs operates on a scale much larger than most research testbeds— it is being deployed in four different public spaces in Singapore (a university campus, a shopping mall, an airport and a leisure resort), and is expected to have a pool of over 30,000 opt-in …
Adaptive Gameplay For Programming Practice, Chris Boesch, Sandra Boesch
Adaptive Gameplay For Programming Practice, Chris Boesch, Sandra Boesch
Research Collection School Of Computing and Information Systems
Over the past four years, we have collaborated to develop a set of online games to enable users to practice software languages in a self-directed manner and as part of a class. Recently we introduced a new adaptive difficulty feature that enables players to self-regulate the difficulty of the games they are playing to practice. These new features also provide additional information to further adapt the problem content to better meet the needs of the users.
Todmis: Mining Communities From Trajectories, Siyuan Liu, Shuhui Wang, Kasthuri Jayarajah, Archan Misra, Rammaya Krishnan
Todmis: Mining Communities From Trajectories, Siyuan Liu, Shuhui Wang, Kasthuri Jayarajah, Archan Misra, Rammaya Krishnan
Research Collection School Of Computing and Information Systems
Existing algorithms for trajectory-based clustering usually rely on simplex representation and a single proximity-related distance (or similarity) measure. Consequently, additional information markers (e.g., social interactions or the semantics of the spatial layout) are usually ignored, leading to the inability to fully discover the communities in the trajectory database. This is especially true for human-generated trajectories, where additional fine-grained markers (e.g., movement velocity at certain locations, or the sequence of semantic spaces visited) can help capture latent relationships between cluster members. To address this limitation, we propose TODMIS: a general framework for Trajectory cOmmunity Discovery using Multiple Information Sources. TODMIS combines …
Accurate Developer Recommendation For Bug Resolution, Xin Xia, David Lo, Xinyu Wang, Bo Zhou
Accurate Developer Recommendation For Bug Resolution, Xin Xia, David Lo, Xinyu Wang, Bo Zhou
Research Collection School Of Computing and Information Systems
Bug resolution refers to the activity that developers perform to diagnose, fix, test, and document bugs during software development and maintenance. It is a collaborative activity among developers who contribute their knowledge, ideas, and expertise to resolve bugs. Given a bug report, we would like to recommend the set of bug resolvers that could potentially contribute their knowledge to fix it. We refer to this problem as developer recommendation for bug resolution. In this paper, we propose a new and accurate method named DevRec for the developer recommendation problem. DevRec is a composite method which performs two kinds of analysis: …
Automated Library Recommendation, Ferdian Thung, David Lo, Julia Lawall
Automated Library Recommendation, Ferdian Thung, David Lo, Julia Lawall
Research Collection School Of Computing and Information Systems
Many third party libraries are available to be downloaded and used. Using such libraries can reduce development time and make the developed software more reliable. However, developers are often unaware of suitable libraries to be used for their projects and thus they miss out on these benefits. To help developers better take advantage of the available libraries, we propose a new technique that automatically recommends libraries to developers. Our technique takes as input the set of libraries that an application currently uses, and recommends other libraries that are likely to be relevant. We follow a hybrid approach that combines association …
Clustering Algorithms For Maximizing The Lifetime Of Wireless Sensor Networks With Energy-Harvesting Sensors, Pengfei Zhang, Gaoxi Xiao, Hwee-Pink Tan
Clustering Algorithms For Maximizing The Lifetime Of Wireless Sensor Networks With Energy-Harvesting Sensors, Pengfei Zhang, Gaoxi Xiao, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
Motivated by recent developments in wireless sensor networks (WSNs), we present several efficient clustering algorithms for maximizing the lifetime of WSNs, i.e., the duration till a certain percentage of the nodes die. Specifically, an optimization algorithm is proposed for maximizing the lifetime of a single-cluster network, followed by an extension to handle multi-cluster networks. Then we study the joint problem of prolonging network lifetime by introducing energy-harvesting (EH) nodes. An algorithm is proposed for maximizing the network lifetime where EH nodes serve as dedicated relay nodes for cluster heads (CHs). Theoretical analysis and extensive simulation results show that the proposed …
An Experimental Study For Inter-User Interference Mitigation In Wireless Body Sensor Networks, Bin Cao, Yu Ge, Chee Wee Kim, Gang Feng, Hwee-Pink Tan, Yun Li
An Experimental Study For Inter-User Interference Mitigation In Wireless Body Sensor Networks, Bin Cao, Yu Ge, Chee Wee Kim, Gang Feng, Hwee-Pink Tan, Yun Li
Research Collection School Of Computing and Information Systems
Inter-user interference degrades the reliability of data delivery in wireless body sensor networks (WBSNs) in dense deployments when multiple users wearing WBSNs are in close proximity to one another. The impact of such interference in realistic WBSN systems is significant but is not well explored. To this end, we investigate and analyze the impact of inter-user interference on packet delivery ratio (PDR) and throughput. We conduct extensive experiments based on the TelosB WBSN platform, considering unslotted carrier sense multiple access (CSMA) with collision avoidance (CA) and slotted CSMA/CA modes in IEEE 802.15.4 MAC, respectively. In order to mitigate interuser interference, …
Cell: A Compositional Verification Framework, Kun Ji, Yang Liu, Jun Sun, Jun Sun, Jin Song Dong, Truong Khanh Nguyen
Cell: A Compositional Verification Framework, Kun Ji, Yang Liu, Jun Sun, Jun Sun, Jin Song Dong, Truong Khanh Nguyen
Research Collection School Of Computing and Information Systems
This paper presents CELL, a comprehensive and extensible framework for compositional verification of concurrent and real-time systems based on commonly used semantic models. For each semantic model, CELL offers three libraries, i.e., compositional verification paradigms, learning algorithms and model checking methods to support various state-of-the-art compositional verification approaches. With well-defined APIs, the framework could be applied to build customized model checkers. In addition, each library could be used independently for verification and program analysis purposes. We have built three model checkers with CELL. The experimental results show that the performance of these model checkers can offer similar or often better …
Skyhunter: A Multi-Surface Environment For Supporting Oil And Gas Exploration, Teddy Seyed, Mario Costa Sousa, Frank Maurer, Anthony Tang
Skyhunter: A Multi-Surface Environment For Supporting Oil And Gas Exploration, Teddy Seyed, Mario Costa Sousa, Frank Maurer, Anthony Tang
Research Collection School Of Computing and Information Systems
The process of oil and gas exploration and its result, the decision to drill for oil in a specific location, relies on a number of distinct but related domains. These domains require effective collaboration to come to a decision that is both cost effective and maintains the integrity of the environment. As we show in this paper, many of the existing technologies and practices that support the oil and gas exploration process overlook fundamental user issues such as collaboration, interaction and visualization. The work presented in this paper is based upon a design process that involved expert users from an …
Towards Real-Time, On-Board, Hardware-Supported Sensor And Software Health Management For Unmanned Aerial Systems, Johann Schumann, Kristin Y. Rozier, Thomas Reinbacher, Ole J. Mengshoel, Timmy Mbaya, Corey Ippolito
Towards Real-Time, On-Board, Hardware-Supported Sensor And Software Health Management For Unmanned Aerial Systems, Johann Schumann, Kristin Y. Rozier, Thomas Reinbacher, Ole J. Mengshoel, Timmy Mbaya, Corey Ippolito
Ole J Mengshoel
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Electronic Thesis and Dissertation Repository
With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …
Using Meta-Ethnography To Synthesize Research: A Worked Example Of The Relations Between Personality On Software Team Processes, Fabio Q. B. Silva Dr., Shirley S. J. O. Cruz, Tatiana B. Gouveia, Luiz Fernando Capretz
Using Meta-Ethnography To Synthesize Research: A Worked Example Of The Relations Between Personality On Software Team Processes, Fabio Q. B. Silva Dr., Shirley S. J. O. Cruz, Tatiana B. Gouveia, Luiz Fernando Capretz
Electrical and Computer Engineering Publications
Context: The increase in the number of qualitative and mixed-methods research published in software engineering has created an opportunity for further knowledge generation through the synthesis of studies with similar aims. This is particularly true in the research on human aspects because the phenomena of interest are often better understood using qualitative research. However, the use of qualitative synthesis methods is not widespread and worked examples of their consistent application in software engineering are needed. Objective: To explore the use of meta-ethnography in the synthesis of empirical studies in software engineering through an example using studies about the relations between …
Designing An Mis Database For Selection And Recruitment, Umakant Mishra
Designing An Mis Database For Selection And Recruitment, Umakant Mishra
Umakant Mishra
Selection and recruitment is a key HR function and it is often necessary to maintain at least a small database of all the candidates who have been invited in past interviews. This information may be considered as a part of HR MIS and may be maintained by HR department along with other HR MIS such as employee information, transfers, performance appraisals, trainings etc.
This recruitment MIS database includes all the candidates after the preliminary scrutiny is over. When the candidates go through different stages of interviews, the MIS also captures all their interview results. Maintaining this information not only helps …
A Robust Rgbd Slam System For 3d Environment With Planar Surfaces, Po-Chang Su, Ju Shen, Sen-Ching S. Cheung
A Robust Rgbd Slam System For 3d Environment With Planar Surfaces, Po-Chang Su, Ju Shen, Sen-Ching S. Cheung
Computer Science Faculty Publications
With the increasing popularity of RGB-depth (RGB-D) sensors such as the Microsoft Kinect, there have been much research on capturing and reconstructing 3D environments using a movable RGB-D sensor. The key process behind these kinds of simultaneous location and mapping (SLAM) systems is the iterative closest point or ICP algorithm, which is an iterative algorithm that can estimate the rigid movement of the camera based on the captured 3D point clouds. While ICP is a well-studied algorithm, it is problematic when it is used in scanning large planar regions such as wall surfaces in a room. The lack of depth …
Securearray: Improving Wifi Security With Fine-Grained Physical-Layer, Jie Xiong, Kyle Jamieson
Securearray: Improving Wifi Security With Fine-Grained Physical-Layer, Jie Xiong, Kyle Jamieson
Research Collection School Of Computing and Information Systems
Despite the important role that WiFi networks play in home and enterprise networks they are relatively weak from a security standpoint. With easily available directional antennas, attackers can be physically located off-site, yet compromise WiFi security protocols such as WEP, WPA, and even to some extent WPA2 through a range of exploits specific to those protocols, or simply by running dictionary and human-factors attacks on users' poorly-chosen passwords. This presents a security risk to the entire home or enterprise network. To mitigate this ongoing problem, we propose SecureArray, a system designed to operate alongside existing wireless security protocols, adding defense …
Learning Spatio-Temporal Co-Occurrence Correlograms For Efficient Human Action Classification, Qianru Sun, Hong Liu
Learning Spatio-Temporal Co-Occurrence Correlograms For Efficient Human Action Classification, Qianru Sun, Hong Liu
Research Collection School Of Computing and Information Systems
Spatio-temporal interest point (STIP) based features show great promises in human action analysis with high efficiency and robustness. However, they typically focus on bag-of-visual words (BoVW), which omits any correlation among words and shows limited discrimination in real-world videos. In this paper, we propose a novel approach to add the spatio-temporal co-occurrence relationships of visual words to BoVW for a richer representation. Rather than assigning a particular scale on videos, we adopt the normalized google-like distance (NGLD) to measure the words' co-occurrence semantics, which grasps the videos' structure information in a statistical way. All pairwise distances in spatial and temporal …
Theory And Practice, Do They Match? A Case With Spectrum-Based Fault Localization, Tien-Duy B. Le, Ferdian Thung, David Lo
Theory And Practice, Do They Match? A Case With Spectrum-Based Fault Localization, Tien-Duy B. Le, Ferdian Thung, David Lo
Research Collection School Of Computing and Information Systems
Spectrum-based fault localization refers to the process of identifying program units that are buggy from two sets of execution traces: normal traces and faulty traces. These approaches use statistical formulas to measure the suspiciousness of program units based on the execution traces. There have been many spectrum-based fault localization approaches proposing various formulas in the literature. Two of the best performing and well-known ones are Tarantula and Ochiai. Recently, Xie et al. find that theoretically, under certain assumptions, two families of spectrum-based fault localization formulas outperform all other formulas including those of Tarantula and Ochiai. In this work, we empirically …
Focus: A Usable & Effective Approach To Oled Display Power Management, Kiat Wee Tan, Tadashi Okoshi, Archan Misra, Rajesh Krishna Balan
Focus: A Usable & Effective Approach To Oled Display Power Management, Kiat Wee Tan, Tadashi Okoshi, Archan Misra, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
In this paper, we present the design and implementation of Focus, a system for effectively and efficiently reducing power consumption of OLED displays on smartphones. These displays, while becoming exceedingly common still consume significant power. The key idea of Focus is that we use the notion of saliency to save display power by dimming portions of the applications that are less important to the user. We envision Focus being especially useful during low battery situations when usability is less important than power savings. We tested Focus using 15 applications running on a Samsung Galaxy S III and show that it …
Conferencesense: Monitoring Of Public Events Using Phone Sensors, Vigneshwaran Subbaraju, Amit Kumar, Vikrant Nandakumar, Sonali Batra, Salil Kanhere, Pradipta De, Vinayak Naik, Dipanjan Chakraborty, Archan Misra
Conferencesense: Monitoring Of Public Events Using Phone Sensors, Vigneshwaran Subbaraju, Amit Kumar, Vikrant Nandakumar, Sonali Batra, Salil Kanhere, Pradipta De, Vinayak Naik, Dipanjan Chakraborty, Archan Misra
Research Collection School Of Computing and Information Systems
We explore the use of a participatory sensing paradigm, where data generated from individual smartphones is used to extract and understand collective properties of temporary public gatherings and events (e.g., concerts & conferences). We focus on the use of this paradigm at a technical conference, and describe the design, implementation and deployment of ConferenceSense, an application that uses multiple sensor and human-generated inputs from attendees' smartphones to infer context, such as the start time of a session or the degree of interaction during a tea break. Based on data collected from multiple attendees at a 3-day conference, we explore how …
Will Fault Localization Work For These Failures? An Automated Approach To Predict Effectiveness Of Fault Localization Tools, Tien-Duy B. Le, David Lo
Will Fault Localization Work For These Failures? An Automated Approach To Predict Effectiveness Of Fault Localization Tools, Tien-Duy B. Le, David Lo
Research Collection School Of Computing and Information Systems
Debugging is a crucial yet expensive activity to improve the reliability of software systems. To reduce debugging cost, various fault localization tools have been proposed. A spectrum-based fault localization tool often outputs an ordered list of program elements sorted based on their likelihood to be the root cause of a set of failures (i.e., their suspiciousness scores). Despite the many studies on fault localization, unfortunately, however, for many bugs, the root causes are often low in the ordered list. This potentially causes developers to distrust fault localization tools. Recently, Parnin and Orso highlight in their user study that many debuggers …
Inferring Ongoing Human Activities Based On Recurrent Self-Organizing Map Trajectory, Qianru Sun, Hong Liu
Inferring Ongoing Human Activities Based On Recurrent Self-Organizing Map Trajectory, Qianru Sun, Hong Liu
Research Collection School Of Computing and Information Systems
Automatically inferring ongoing activities is to enable the early recognition of unfinished activities, which is quite meaningful for applications, such as online human-machine interaction and security monitoring. State-of-the-art methods use the spatiotemporal interest point (STIP) based features as the low-level video description to handle complex scenes. While the existing problem is that typical bag-of-visual words (BoVW) focuses on the statistical distribution of features but ignores the inherent contexts in activity sequences, resulting in low discrimination when directly dealing with limited observations. To solve this problem, the Recurrent Self-Organizing Map (RSOM), which was designed to process sequential data, is novelly adopted …
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Electronic Thesis and Dissertation Repository
Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …
Opencuda+Mpi, Kenny Ballou, Nilab Mohammad Mousa
Opencuda+Mpi, Kenny Ballou, Nilab Mohammad Mousa
Student Research Initiative
The introduction and rise of General Purpose Graphics Computing has significantly impacted parallel and high-performance computing. It has introduced challenges when it comes to distributed computing with GPUs. Current solutions target specifics: specific hardware, specific network topology, a specific level of processing. Those restrictions on GPU computing limit scientists and researchers in various ways. The goal of OpenCUDA+MPI project is to develop a framework that allows researchers and scientists to write a general algorithm without the overhead of worrying about the specifics of the hardware and the cluster it will run against while taking full advantage of parallel and distributed …
Automated Test Case Generation To Validate Non-Functional Software Requirements, Pingyu Zhang
Automated Test Case Generation To Validate Non-Functional Software Requirements, Pingyu Zhang
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
A software system is bounded by a set of requirements. Functional requirements describe what the system must do, in terms of inputs, behavior, and outputs. We define non-functional requirements to be how well these functional requirements are satisfied, in terms of qualities or constraints on the design or on the implementation of a system. In practice, the validation of these kinds of requirements, does not receive equal emphasis. Techniques for validating functional requirements target all levels of software testing phases, and explore both black-box and white-box approaches. Techniques for validating non-functional requirements, on the other hand, largely operate in a …
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
University of New Orleans Theses and Dissertations
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …