Browsing Masteruppsatser by Title
Now showing items 1-20 of 208
-
A case study on Software Testing Methods and Tools
(2012-04-13)This paper presents the findings and analysis done on a case study conducted at Volvo Technology (VTEC, Göteborg, Sweden) for studying the software testing and verification methods, tools and practices used in automobile ... -
A Decision Framework on Refactoring Architectural Technical Debt: Paying Back in Modularity- An Industrial Case Study
(2016-02-19)Technical debt refers to sub-optimal solutions during software development where there is a trade-o between short-term and long-term goals. Lately there has been a few studies which identi es technical debt, however ... -
A DSL Supporting Textual and Graphical Views
(2015-08-12)Domain Specific Languages(DSLs) are languages that are designed to be used in a particular development area. These languages aim to help developers solve the problems related to that domain and therefore contain information ... -
A Lazy to Strict Language Compiler
(2017-06-21)The evaluation strategies of programming languages can be broadly categorised as strict or lazy. A common approach to strict evaluation is to implement a call-by-value semantics that always evaluates expressions when ... -
A Logical Relation for Dependent Type Theory Formalized in Agda
(2017-02-27)When writing proofs, it is desirable to show that one’s proof is correct. With formalising a proof in dependent type theory, it is implied that the proof is correct as long as the type theory is correct. <br><br> This ... -
A Methodology to Validate Compliance to the GDPR
(2019-11-19)This study analyses two state-of-the-art methodologies for eliciting privacy threats in software contexts, LINDDUN and PIA. A first goal is to understand the limitations of these methodologies in terms of compliance to ... -
A Petri Nets Semantics for Privacy-Aware Data Flow Diagrams
(2017-07-12)Privacy of personal data in information systems is gaining importance rapidly. Although data flow diagrams (DFDs) are commonly used for designing information systems, they do not have appropriate elements to address privacy ... -
A Real-Time Extension of the Formal Privacy Policy Framework
(2017-04-10)Online social networks (OSNs) have become an important part of people’s lives worldwide. Although users supply OSNs with large amounts of personal data, the ability to control the audience of one’s own information is ... -
A Structured Editor for Labelled Bracket Notation
(2012-09-21)This report describes the development and resulting product of a web-based editor for a simple programming language. This language is an extension of simply typed lambda calculus and labelled bracket notation, with a simple ... -
A Study of Trust in Open Source Software
(2015-08-11)This study developed an algorithm which can be used to identify trust network from evaluation network. The algorithm developed uses global trust value of the members and their evaluation network to approximate local trust ... -
A study on the improvement of the Bus driver’s User interface
(2013-10-03)A bus driver performs several different tasks and receives lot of information during the work day. Located on the dashboard is a graphical screen which shows different kind of information to the drivers. This information ... -
A Transformation of Controlled Natural Language Behavioural Requirements into Modal Sequence Diagram Simulation Models for Requirement Conflict Detection
(2017-06-21)PURPOSE: Specifying requirements in a semi-formal notation, such as a controlled natural language (CNL), allows reduction of ambiguity and underspecification in requirement specifications, as the notation uses well defined ... -
Acceptability Of Intelligent Transportation Systems (Its) To Various Groups Of Drivers
(2015-08-11)The introduction of Intelligent Transportation Systems (ITS) in road vehicles is predicted to enhance traffic safety and mobility considerably. Hence, transport policymakers in most countries are increasingly become ... -
Adaptable Controlled Natural Languages for Online Query Systems
(2013-05-17)This workintroduces atechnique for adapting GF7 basedquery systems.This technique is implemented in a travel planning query system in two ways. Firstly, users can customize the systemto their own needs and definesynonyms ... -
Adding an LLVM Backend to Bigloo Scheme
(2013-10-17) -
Agile transformation and its implementation in large corporate institutions
(2022-10-10)[Context] Agile transformation is a growing trend not only in software development companies, but recently also in traditional corporate environments. Waterfall-based strategies may no longer keep pace with the current ... -
Alarm management for intrusion detection systems - Prioritizing and presenting alarms from intrusion detection systems
(2012-02-28)Intrusion detection systems (IDSs) are important tools helping the network and system administrators to detect intrusions, but have the drawback of many false positives. Due to increasing bandwidth, an IDS must process ... -
An empirical study of the Decision-making process in Agile software development based on industries from China
(2015-03-19)The efficiency of Agile software development is directly associated with the decision-making among Agile team members. This article aimed at improving the decision-making process in Agile software development. In order to ... -
An experimental study on combining automated and stochastic test data generation
(2020-07-06)Test data plays an important role in improving the quality and e ectiveness of test cases and automatic generation of meaningful test data saves a lot of human e ort. There are several automatic test data generation ... -
An Exploratory Study of Free / Libre / Open Source Software Organizations
(2015-07-20)Growing research on the adoption of a FLOSS ecosystem among novice adopters have been seen during the last decade. However, due to the increasing rise of novice adopters such as FLOSS organizations, firms, individual ...