• English
    • svenska
  • svenska 
    • English
    • svenska
  • Logga in
Visar titeln 
  •   Startsida
  • Student essays / Studentuppsatser
  • Department of Computer Science and Engineering / Institutionen för data- och informationsteknik
  • Masteruppsatser
  • Visar titeln
  •   Startsida
  • Student essays / Studentuppsatser
  • Department of Computer Science and Engineering / Institutionen för data- och informationsteknik
  • Masteruppsatser
  • Visar titeln
JavaScript is disabled for your browser. Some features of this site may not work without it.

Visar titlar:

  • 0-9
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z

Sortera efter:

Ordning:

Resultat:

Visas titlar 1-20 av 208

  • Titel
  • Publiceringsdatum
  • Inmatningsdatum
  • stigande
  • fallande
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
    • A case study on Software Testing Methods and Tools 

      Konka, Bharat Bhushan (2012-04-13)
      This paper presents the findings and analysis done on a case study conducted at Volvo Technology (VTEC, Göteborg, Sweden) for studying the software testing and verification methods, tools and practices used in automobile ...
    • A Decision Framework on Refactoring Architectural Technical Debt: Paying Back in Modularity- An Industrial Case Study 

      Sikander, Erik; Madlani, Neil (2016-02-19)
      Technical debt refers to sub-optimal solutions during software development where there is a trade-o between short-term and long-term goals. Lately there has been a few studies which identi es technical debt, however ...
    • A DSL Supporting Textual and Graphical Views 

      Maro, Salome (2015-08-12)
      Domain Specific Languages(DSLs) are languages that are designed to be used in a particular development area. These languages aim to help developers solve the problems related to that domain and therefore contain information ...
    • A Lazy to Strict Language Compiler 

      Tham, Philip (2017-06-21)
      The evaluation strategies of programming languages can be broadly categorised as strict or lazy. A common approach to strict evaluation is to implement a call-by-value semantics that always evaluates expressions when ...
    • A Logical Relation for Dependent Type Theory Formalized in Agda 

      Öhman, Joakim (2017-02-27)
      When writing proofs, it is desirable to show that one’s proof is correct. With formalising a proof in dependent type theory, it is implied that the proof is correct as long as the type theory is correct. <br><br> This ...
    • A Methodology to Validate Compliance to the GDPR 

      Ekdahl, Axel; Nyman, Lídia (2019-11-19)
      This study analyses two state-of-the-art methodologies for eliciting privacy threats in software contexts, LINDDUN and PIA. A first goal is to understand the limitations of these methodologies in terms of compliance to ...
    • A Petri Nets Semantics for Privacy-Aware Data Flow Diagrams 

      Rahman, Mushfiqur (2017-07-12)
      Privacy of personal data in information systems is gaining importance rapidly. Although data flow diagrams (DFDs) are commonly used for designing information systems, they do not have appropriate elements to address privacy ...
    • A Real-Time Extension of the Formal Privacy Policy Framework 

      Kellyérová, Ivana (2017-04-10)
      Online social networks (OSNs) have become an important part of people’s lives worldwide. Although users supply OSNs with large amounts of personal data, the ability to control the audience of one’s own information is ...
    • A Structured Editor for Labelled Bracket Notation 

      Ivarsson, Johan (2012-09-21)
      This report describes the development and resulting product of a web-based editor for a simple programming language. This language is an extension of simply typed lambda calculus and labelled bracket notation, with a simple ...
    • A Study of Trust in Open Source Software 

      Tahir, Bitebo (2015-08-11)
      This study developed an algorithm which can be used to identify trust network from evaluation network. The algorithm developed uses global trust value of the members and their evaluation network to approximate local trust ...
    • A study on the improvement of the Bus driver’s User interface 

      Chang, Fanny; Gunasekara, Yathika (2013-10-03)
      A bus driver performs several different tasks and receives lot of information during the work day. Located on the dashboard is a graphical screen which shows different kind of information to the drivers. This information ...
    • A Transformation of Controlled Natural Language Behavioural Requirements into Modal Sequence Diagram Simulation Models for Requirement Conflict Detection 

      Styre, Alexander (2017-06-21)
      PURPOSE: Specifying requirements in a semi-formal notation, such as a controlled natural language (CNL), allows reduction of ambiguity and underspecification in requirement specifications, as the notation uses well defined ...
    • Acceptability Of Intelligent Transportation Systems (Its) To Various Groups Of Drivers 

      Rafiyan, Elmira (2015-08-11)
      The introduction of Intelligent Transportation Systems (ITS) in road vehicles is predicted to enhance traffic safety and mobility considerably. Hence, transport policymakers in most countries are increasingly become ...
    • Adaptable Controlled Natural Languages for Online Query Systems 

      Hasibi, Faegheh (2013-05-17)
      This workintroduces atechnique for adapting GF7 basedquery systems.This technique is implemented in a travel planning query system in two ways. Firstly, users can customize the systemto their own needs and definesynonyms ...
    • Adding an LLVM Backend to Bigloo Scheme 

      Brockman, Mikael (2013-10-17)
    • Agile transformation and its implementation in large corporate institutions 

      SCHEIBINGER, MAREK (2022-10-10)
      [Context] Agile transformation is a growing trend not only in software development companies, but recently also in traditional corporate environments. Waterfall-based strategies may no longer keep pace with the current ...
    • Alarm management for intrusion detection systems - Prioritizing and presenting alarms from intrusion detection systems 

      Klüft, Sebastian; Staaf, Eva Lina (2012-02-28)
      Intrusion detection systems (IDSs) are important tools helping the network and system administrators to detect intrusions, but have the drawback of many false positives. Due to increasing bandwidth, an IDS must process ...
    • An empirical study of the Decision-making process in Agile software development based on industries from China 

      Su, Feiyi; Zhu, Linkai (2015-03-19)
      The efficiency of Agile software development is directly associated with the decision-making among Agile team members. This article aimed at improving the decision-making process in Agile software development. In order to ...
    • An experimental study on combining automated and stochastic test data generation 

      Haverkate, Patrick; Binte Mostafa, Marufa (2020-07-06)
      Test data plays an important role in improving the quality and e ectiveness of test cases and automatic generation of meaningful test data saves a lot of human e ort. There are several automatic test data generation ...
    • An Exploratory Study of Free / Libre / Open Source Software Organizations 

      KUMAR MENDU, BHARATH; SMITH SOUNDARARAJAN, JOSHUA (2015-07-20)
      Growing research on the adoption of a FLOSS ecosystem among novice adopters have been seen during the last decade. However, due to the increasing rise of novice adopters such as FLOSS organizations, firms, individual ...

      DSpace software copyright © 2002-2016  DuraSpace
      gup@ub.gu.se | Teknisk hjälp
      Theme by 
      Atmire NV
       

       

      Visa

      VisaSamlingarI datumordningFörfattareTitlarNyckelordDenna samlingI datumordningFörfattareTitlarNyckelord

      Mitt konto

      Logga inRegistrera dig

      DSpace software copyright © 2002-2016  DuraSpace
      gup@ub.gu.se | Teknisk hjälp
      Theme by 
      Atmire NV