Masteruppsatser: Recent submissions
Now showing items 101-120 of 208
-
Machine Learning to Uncover Correlations Between Software Code Changes and Test Results
(2017-12-05)Statistics show that many large software companies, particularly those dealing with large-scale legacy systems, ultimately face an ever-growing code base. As the product grows, it becomes increasingly difficult to adequately ... -
A Petri Nets Semantics for Privacy-Aware Data Flow Diagrams
(2017-07-12)Privacy of personal data in information systems is gaining importance rapidly. Although data flow diagrams (DFDs) are commonly used for designing information systems, they do not have appropriate elements to address privacy ... -
Visualizing cyber attacks with misuse case maps
(2017-06-21)Business processes require a supporting technical architecture enabling their realization. The secure design of this architecture has key importance in the future of the business; however there are not many notations which ... -
A Transformation of Controlled Natural Language Behavioural Requirements into Modal Sequence Diagram Simulation Models for Requirement Conflict Detection
(2017-06-21)PURPOSE: Specifying requirements in a semi-formal notation, such as a controlled natural language (CNL), allows reduction of ambiguity and underspecification in requirement specifications, as the notation uses well defined ... -
A Lazy to Strict Language Compiler
(2017-06-21)The evaluation strategies of programming languages can be broadly categorised as strict or lazy. A common approach to strict evaluation is to implement a call-by-value semantics that always evaluates expressions when ... -
A Real-Time Extension of the Formal Privacy Policy Framework
(2017-04-10)Online social networks (OSNs) have become an important part of people’s lives worldwide. Although users supply OSNs with large amounts of personal data, the ability to control the audience of one’s own information is ... -
Speech-to-speech translation using deep learning
(2017-03-17)Current state-of-the-art translation systems for speech-to-speech rely heavily on a text representation for the translation. By transcoding speech to text we lose important information about the characteristics of the ... -
A Logical Relation for Dependent Type Theory Formalized in Agda
(2017-02-27)When writing proofs, it is desirable to show that one’s proof is correct. With formalising a proof in dependent type theory, it is implied that the proof is correct as long as the type theory is correct. <br><br> This ... -
Sustainability Aspects in Requirements Engineering
(2016-12-08) -
Bioinformatics pipeline development to support Helicobacter pylori genome analysis
(2016-09-20)Helicobacter pylori is a bacterium related to a variety of diseases and is a major risk factor for gastric cancer [1]. There can be differences in the genomes of H. pylori bacteria that are isolated from different patient ... -
The Performance of TLS Protocol in Vehicular Embedded Computers
(2016-09-19)Transport Layer Security (TLS) is a protocol that is widely used to secure Hypertext Transfer Protocol (HTTP) data transported across the Internet. This protocol comes with a set of operations that are for encryption, ... -
Visualization of Electrical Architectures In the Automotive Domain Based on the Needs of Stakeholders
(2016-06-27)The use of software in automotive engineering keeps on growing higher every year. This has an impact on a data stored in a database in such a way that a structure of data stored becomes complex due to hierarchy and hence ... -
Entity extraction for people profile matching
(2016-06-23)With the rise in social media platform usage, the average number of people profiles has increased as well. The fact that people have social media profiles on multiple platforms reveals the interesting problem of matching ... -
Group Development and Software Engineering Performance
(2016-06-22)Background: Empirical evidence regarding the connection between group development (maturity) and the success of software development teams is lacking. Since software development is primarily a product of team e ort that ... -
Evaluating the Characteristics of Code Reviewers and the Code Reviewed by Them in Open Source Projects
(2016-06-09)Open Source Software (OSS) solutions play an important role in software industry. People all around the world use open source applications in their daily life. Development practices in OSS usually don’t follow established ... -
Radiosity for Real-Time Simulations of Highly Tessellated Models
(2016-05-27)The accurate simulation of light is one of the most important aspects of computer graphics. Radiosity is a physically-based method that can generate view-independent solutions of the light scattering in a scene. This thesis ... -
A Decision Framework on Refactoring Architectural Technical Debt: Paying Back in Modularity- An Industrial Case Study
(2016-02-19)Technical debt refers to sub-optimal solutions during software development where there is a trade-o between short-term and long-term goals. Lately there has been a few studies which identi es technical debt, however ... -
Measuring Agility- A Validity Study on Tools Measuring The Agility Level of Software Development Teams
(2015-08-12)Context: In the past two decades, an increasing number of software development teams have been transitioning to agile. As a result, a need has emerged for measuring how agile these teams are. To satisfy this need, many ... -
A DSL Supporting Textual and Graphical Views
(2015-08-12)Domain Specific Languages(DSLs) are languages that are designed to be used in a particular development area. These languages aim to help developers solve the problems related to that domain and therefore contain information ... -
Performance Monitoring of Web-Based IT Systems
(2015-08-12)Web-based IT systems have become very popular among corporations being a strategic part of their business approach. However, the success of web-based IT systems is very dependent on the performance at the customer end. ...