NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 30 results Save | Export
Ménager, David H. – ProQuest LLC, 2021
This dissertation presents a novel theory of event memory along with an associated computational model that embodies the claims of view which is integrated within a cognitive architecture. Event memory is a general-purpose storage for personal past experience. Literature on event memory reveals that people can remember events by both the…
Descriptors: Artificial Intelligence, Computer Software, Models, Information Processing
Flint D. Million – ProQuest LLC, 2023
The education of students on existing and emerging technologies in higher education environments requires access to complex software. The rise of the Bring Your Own Device (BYOD) phenomenon in many postsecondary educational institutions, along with the increasing complexity of technological coursework, creates challenges for students needing…
Descriptors: Information Technology, Information Science, Business Education, Computer Software
Kimberly A. Mayer – ProQuest LLC, 2020
This action research study explored how women perceived the influences of collaborative software development methodologies on workplace culture at one financial technology firm. While collaborative software development methodologies were not designed to increase gender diversity, the transformational shifts in the way technology teams work…
Descriptors: Employed Women, Technology, Computer Software, Cooperation
Domah, Darshan – ProQuest LLC, 2013
Agile software development has become very popular around the world in recent years, with methods such as Scrum and Extreme Programming (XP). Literature suggests that functionality is the primary focus in Agile processes while non-functional requirements (NFR) are either ignored or ill-defined. However, for software to be of good quality both…
Descriptors: Computer Software, Computer Software Evaluation, Evaluation Methods, Taxonomy
Barnes, Jeffrey M. – ProQuest LLC, 2013
Many software systems eventually undergo changes to their basic architectural structure. Such changes may be prompted by new feature requests, new quality attribute requirements, changing technology, or other reasons. Whatever the causes, architecture evolution is commonplace in real-world software projects. Today's software architects, however,…
Descriptors: Computer Science, Computer Software
Tennyson, Matthew F. – ProQuest LLC, 2013
Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…
Descriptors: Authors, Programming, Computer Software, Plagiarism
Ramachandran, Lakshmi – ProQuest LLC, 2013
Relevance helps identify to what extent a review's content pertains to that of the submission. Relevance metric helps distinguish generic or vague reviews from the useful ones. Relevance of a review to a submission can be determined by identifying semantic and syntactic similarities between them. Our work introduces the use of a word-order graph…
Descriptors: Evaluation, Evaluators, Semantics, Word Order
Cohen, Kevin Bretonnel – ProQuest LLC, 2010
Although software testing has been well-studied in computer science, it has received little attention in natural language processing. Nonetheless, a fully developed methodology for glass box evaluation and testing of language processing applications already exists in the field methods of descriptive linguistics. This work lays out a number of…
Descriptors: Testing, Computer Software, Quality Control, Computer Science
Pai, Vinay – ProQuest LLC, 2011
The increasing popularity of high-bandwidth Internet connections has enabled new applications like the online delivery of high-quality audio and video content. Conventional server-client approaches place the entire burden of delivery on the content provider's server, making these services expensive to provide. A peer-to-peer approach allows end…
Descriptors: Video Technology, Program Effectiveness, Internet, Information Technology
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Linnell, Natalie – ProQuest LLC, 2011
Worldwide, demand for education of all kinds is increasing beyond the capacity to provide it. One approach that shows potential for addressing this demand is facilitated video. In facilitated video, an educator is recorded teaching, and that video is sent to a remote site where it is shown to students by a facilitator who creates interaction…
Descriptors: Video Technology, Agricultural Education, Interaction, Foreign Countries
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Bajracharya, Sushil Krishna – ProQuest LLC, 2010
Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…
Descriptors: Semantics, Search Engines, Engines, Measures (Individuals)
Ryoo, Jean Jinsun – ProQuest LLC, 2013
Computing occupations are among the fastest growing in the U.S. and technological innovations are central to solving world problems. Yet only our most privileged students are learning to use technology for creative purposes through rigorous computer science education opportunities. In order to increase access for diverse students and females who…
Descriptors: Teaching Methods, Computer Science, Critical Theory, Student Diversity
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Previous Page | Next Page »
Pages: 1  |  2