Theses and Dissertations - Department of Computer Science

Theses and Dissertations - Department of Computer Science

 

Recent Submissions

  • Williams, Elizabeth (University of Alabama Libraries, 2017)
    Traditional query-based search engines such as Google are often not able to discover real-time, contextual information such as traffic accidents or severe weather situations. As an alternative, social media can often provide ...
  • Hudnall, Matthew (University of Alabama Libraries, 2017)
    E-mail is generally regarded as an insecure method of electronic communication for numerous reasons. Most notably, the default does not guarantee the authentic identity of either the intended sender or receiver of a message, ...
  • Ergin, Huseyin (University of Alabama Libraries, 2017)
    MDE is considered a well-established software development approach that uses abstraction to bridge the gap between the problem space and the software implementation. These abstractions are represented by models that make ...
  • Robinson, Jeffrey A. (University of Alabama Libraries, 2017)
    General Purpose Programming using Graphical Processing Units (GPGPU) is a fast growing subfield in High Performance Computing (HPC). These devices provide a very high throughput with low cost to many parallel problems, ...
  • Gao, Jingcheng (University of Alabama Libraries, 2015)
    The world has been on a fast track of industrial development thanks to human activities. On the back of the same coin is the fact that people are consuming more and more energy to support the fast-paced development. Studies ...
  • Yue, Songqing (University of Alabama Libraries, 2015)
    Advances in the software industry over the past half-century have resulted in a large amount of legacy code implemented across hundreds of different programming languages and paradigms running throughout various application ...
  • Bosu, Amiangshu Shekhar (University of Alabama Libraries, 2015)
    Prior research indicates that peer code review is an effective method for reducing the number of defects and improving the quality of code. Besides maintaining the integrity of the code, code review spreads knowledge, ...
  • Liang, Xiannuan (University of Alabama Libraries, 2014)
    Mobile sensors have been widely applied in sensing applications. The performance of mobile sensors in intrusion detection has drawn a lot of attention from researchers. In this dissertation, we model the behaviors of mobile ...
  • Zeng, Lei (University of Alabama Libraries, 2014)
    Logging has become a fundamental feature within the modern operating systems due to the fact that logging may be used through a variety of applications and fashion. Syslog daemon is the logging implementation in Unix/Linux ...
  • Zhang, Yanping (University of Alabama Libraries, 2012)
    Wireless sensor networks have many applications. In our research, we are particularly interested in applications of monitoring a field to detect emergent incidents, such as forest fire, or intrusion objects such as enemy ...
  • Corley, Jonathan Adam (University of Alabama Libraries, 2016)
    Model-Driven Engineering (MDE) has emerged as a software development paradigm that can assist in separating the issues of the problem space of a software system from a particular solution space of implementation. MDE ...
  • Zhao, Lei (University of Alabama Libraries, 2016)
    Intelligent Transportation System (ITS) is the integration of advanced communication technologies into the transportation infrastructure and in vehicles. It is aimed to improve transportation safety and to enhance traffic ...
  • Heaton, Dustin (University of Alabama Libraries, 2015)
    Scientific software is code written by scientists for the purpose of doing research. While the results of this software development have been widely published, there has been relatively little publication of the development ...
  • Eddy, Brian Patrick (University of Alabama Libraries, 2015)
    Software maintenance and evolution make up a considerable portion of the time and effort spent during the life cycle of a software system. During the maintenance and evolution phase, the majority of a developer’s time is ...
  • Loewen, Gabriel J. (University of Alabama Libraries, 2015)
    Cloud computing is a technological strategy for saving time, money, and resources within an organization. Underfunded and understaffed organizations benefit the most from a cloud architecture because it can help to alleviate ...
  • Wagner, Amber (University of Alabama Libraries, 2015)
    Computer Science (CS) educators frequently develop new methodologies, languages, and programming environments to teach novice programmers the fundamental concepts of CS. A recent trend has focused on new environments that ...
  • McCary, Eric Anthony (University of Alabama Libraries, 2015)
    The presented dissertation concentrates on the security landscape in smart grid and proposes works to create a more accountable environment in the smart grid home area network (HAN). The principal thought behind the research ...
  • Deng, Zhonghai (University of Alabama Libraries, 2014)
    Today with the advent of low-cost imaging devices, such as smart phones, digital cameras and surveillance video systems, digital images become quite common in our everyday life. People tend to believe the scene they have ...
  • Zunnurhain, Kazi (University of Alabama Libraries, 2014)
    The rate of acceptance of clouds each year is making cloud computing the leading IT computational technology. While cloud computing can be productive and economical, it is still vulnerable to different types of external ...
  • Chatterji, Debarshi (University of Alabama Libraries, 2014)
    Code Clones, also known as Software Clones are similar code fragments mostly formed due to reuse of code. The literature is abundant with ambiguous and vague fundamental definitions of code clones. Over the years, researchers ...

View more