Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Colorado State University" +contributor:("Turk, Daniel"). Showing records 1 – 17 of 17 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Colorado State University

1. Hewa Raga Munige, Thilina. Real time stream processing for Internet of Things and sensing environments.

Degree: MS(M.S.), Computer Science, 2016, Colorado State University

 Improvements in miniaturization and networking capabilities of sensors have contributed to the proliferation of Internet of Things (IoT) and continuous sensing environments. Data streams generated… (more)

Subjects/Keywords: high performance; Internet of Things; real time processing; stream processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hewa Raga Munige, T. (2016). Real time stream processing for Internet of Things and sensing environments. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/170303

Chicago Manual of Style (16th Edition):

Hewa Raga Munige, Thilina. “Real time stream processing for Internet of Things and sensing environments.” 2016. Masters Thesis, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/170303.

MLA Handbook (7th Edition):

Hewa Raga Munige, Thilina. “Real time stream processing for Internet of Things and sensing environments.” 2016. Web. 24 Jan 2020.

Vancouver:

Hewa Raga Munige T. Real time stream processing for Internet of Things and sensing environments. [Internet] [Masters thesis]. Colorado State University; 2016. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/170303.

Council of Science Editors:

Hewa Raga Munige T. Real time stream processing for Internet of Things and sensing environments. [Masters Thesis]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/170303


Colorado State University

2. Omar, Elmahdi. Constructing subtle Higher Order Mutants from Java and AspectJ programs.

Degree: PhD, Computer Science, 2016, Colorado State University

 Mutation testing is a fault-based testing technique that helps testers measure and improve the fault-detection effectiveness of their test suites. However, a majority of traditional… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Omar, E. (2016). Constructing subtle Higher Order Mutants from Java and AspectJ programs. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/170403

Chicago Manual of Style (16th Edition):

Omar, Elmahdi. “Constructing subtle Higher Order Mutants from Java and AspectJ programs.” 2016. Doctoral Dissertation, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/170403.

MLA Handbook (7th Edition):

Omar, Elmahdi. “Constructing subtle Higher Order Mutants from Java and AspectJ programs.” 2016. Web. 24 Jan 2020.

Vancouver:

Omar E. Constructing subtle Higher Order Mutants from Java and AspectJ programs. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/170403.

Council of Science Editors:

Omar E. Constructing subtle Higher Order Mutants from Java and AspectJ programs. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/170403


Colorado State University

3. Shah, Naman. Determining disease outbreak influence from voluminous epidemiology data on enhanced distributed graph-parallel system.

Degree: MS(M.S.), Computer Science, 2017, Colorado State University

 Historically, catastrophe has resulted from large-scale epidemiological outbreaks in livestock populations. Efforts to prepare for these inevitable disasters are critical, and these efforts primarily involve… (more)

Subjects/Keywords: Distributed Analytics; Epidemiological PageRank; NAADSM Influential Analysis; Enhanced Distributed Graph-parallel System; Disease Propagation Network; Extended Apache Spark GraphX

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shah, N. (2017). Determining disease outbreak influence from voluminous epidemiology data on enhanced distributed graph-parallel system. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/184038

Chicago Manual of Style (16th Edition):

Shah, Naman. “Determining disease outbreak influence from voluminous epidemiology data on enhanced distributed graph-parallel system.” 2017. Masters Thesis, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/184038.

MLA Handbook (7th Edition):

Shah, Naman. “Determining disease outbreak influence from voluminous epidemiology data on enhanced distributed graph-parallel system.” 2017. Web. 24 Jan 2020.

Vancouver:

Shah N. Determining disease outbreak influence from voluminous epidemiology data on enhanced distributed graph-parallel system. [Internet] [Masters thesis]. Colorado State University; 2017. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/184038.

Council of Science Editors:

Shah N. Determining disease outbreak influence from voluminous epidemiology data on enhanced distributed graph-parallel system. [Masters Thesis]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/184038

4. Bennett, Phillipa. Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A.

Degree: PhD, Computer Science, 2017, Colorado State University

 Many of today's computing systems must show evidence of conformance to rules. The rules may come from business protocol choices or from multi-jurisdictional sources. Some… (more)

Subjects/Keywords: Model Checking; Rule Conformance Analysis; Modeling and Analysis; HIPAA Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bennett, P. (2017). Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/183853

Chicago Manual of Style (16th Edition):

Bennett, Phillipa. “Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A.” 2017. Doctoral Dissertation, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/183853.

MLA Handbook (7th Edition):

Bennett, Phillipa. “Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A.” 2017. Web. 24 Jan 2020.

Vancouver:

Bennett P. Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/183853.

Council of Science Editors:

Bennett P. Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/183853

5. Luo, Mante. Horizontal scaling of video conferencing applications in virtualized environments.

Degree: MS(M.S.), Computer Science, 2017, Colorado State University

 Video conferencing is one of the most widely used services in the world. However, it usually requires dedicated hardware and expensive licenses. Cloud computing has… (more)

Subjects/Keywords: Distributed Systems; Cloud Computing; Video-conferencing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, M. (2017). Horizontal scaling of video conferencing applications in virtualized environments. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/178879

Chicago Manual of Style (16th Edition):

Luo, Mante. “Horizontal scaling of video conferencing applications in virtualized environments.” 2017. Masters Thesis, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/178879.

MLA Handbook (7th Edition):

Luo, Mante. “Horizontal scaling of video conferencing applications in virtualized environments.” 2017. Web. 24 Jan 2020.

Vancouver:

Luo M. Horizontal scaling of video conferencing applications in virtualized environments. [Internet] [Masters thesis]. Colorado State University; 2017. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/178879.

Council of Science Editors:

Luo M. Horizontal scaling of video conferencing applications in virtualized environments. [Masters Thesis]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/178879


Colorado State University

6. Sadhu, Devadatta. Random generation of valid object configurations for testing object-oriented programs.

Degree: MS(M.S.), Computer Science, 2007, Colorado State University

 A unit test case for an object-oriented program typically requires the creation of an object configuration on which the method under test is invoked. Certain… (more)

Subjects/Keywords: constraints; UML class diagram; random test generation; object configurations; domain coverage

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sadhu, D. (2007). Random generation of valid object configurations for testing object-oriented programs. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/66679

Chicago Manual of Style (16th Edition):

Sadhu, Devadatta. “Random generation of valid object configurations for testing object-oriented programs.” 2007. Masters Thesis, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/66679.

MLA Handbook (7th Edition):

Sadhu, Devadatta. “Random generation of valid object configurations for testing object-oriented programs.” 2007. Web. 24 Jan 2020.

Vancouver:

Sadhu D. Random generation of valid object configurations for testing object-oriented programs. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/66679.

Council of Science Editors:

Sadhu D. Random generation of valid object configurations for testing object-oriented programs. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/66679


Colorado State University

7. Abdunabi, Ramadan. Access control framework for mobile applications, An.

Degree: PhD, Computer Science, 2007, Colorado State University

 With the advent of wireless and mobile devices, many new applications are being developed that make use of the spatio-temporal information of a user in… (more)

Subjects/Keywords: access control; access control protocol; computer security; enforcement; policy model; RBAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdunabi, R. (2007). Access control framework for mobile applications, An. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/78814

Chicago Manual of Style (16th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2007. Doctoral Dissertation, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/78814.

MLA Handbook (7th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2007. Web. 24 Jan 2020.

Vancouver:

Abdunabi R. Access control framework for mobile applications, An. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/78814.

Council of Science Editors:

Abdunabi R. Access control framework for mobile applications, An. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/78814


Colorado State University

8. Stern, Ryan. On the role of topology in autonomously coping with failures in content dissemination systems.

Degree: MS(M.S.), Computer Science, 2007, Colorado State University

 Content dissemination systems provide a substrate that allows large numbers of entities to communicate with each other. These entities could be processes, sensors, and networked… (more)

Subjects/Keywords: autonomous failure resilience; topologies; small-world systems; power-laws; Content dissemination systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stern, R. (2007). On the role of topology in autonomously coping with failures in content dissemination systems. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/88605

Chicago Manual of Style (16th Edition):

Stern, Ryan. “On the role of topology in autonomously coping with failures in content dissemination systems.” 2007. Masters Thesis, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/88605.

MLA Handbook (7th Edition):

Stern, Ryan. “On the role of topology in autonomously coping with failures in content dissemination systems.” 2007. Web. 24 Jan 2020.

Vancouver:

Stern R. On the role of topology in autonomously coping with failures in content dissemination systems. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/88605.

Council of Science Editors:

Stern R. On the role of topology in autonomously coping with failures in content dissemination systems. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/88605


Colorado State University

9. Xie, Xing. Multilevel secure data stream management system.

Degree: PhD, Computer Science, 2007, Colorado State University

 With the advent of mobile and sensor devices, situation monitoring applications are now feasible. The data processing system should be able to collect large amount… (more)

Subjects/Keywords: distributed MLS; trusted MLS; replicated MLS; multilevel security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xie, X. (2007). Multilevel secure data stream management system. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/80188

Chicago Manual of Style (16th Edition):

Xie, Xing. “Multilevel secure data stream management system.” 2007. Doctoral Dissertation, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/80188.

MLA Handbook (7th Edition):

Xie, Xing. “Multilevel secure data stream management system.” 2007. Web. 24 Jan 2020.

Vancouver:

Xie X. Multilevel secure data stream management system. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/80188.

Council of Science Editors:

Xie X. Multilevel secure data stream management system. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/80188


Colorado State University

10. Ericson, Kathleen. Robust health stream processing.

Degree: PhD, Computer Science, 2007, Colorado State University

 As the cost of personal health sensors decrease along with improvements in battery life and connectivity, it becomes more feasible to allow patients to leave… (more)

Subjects/Keywords: interference detection; health stream processing; stream processing; distributed systems; fault-tolerance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ericson, K. (2007). Robust health stream processing. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/88427

Chicago Manual of Style (16th Edition):

Ericson, Kathleen. “Robust health stream processing.” 2007. Doctoral Dissertation, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/88427.

MLA Handbook (7th Edition):

Ericson, Kathleen. “Robust health stream processing.” 2007. Web. 24 Jan 2020.

Vancouver:

Ericson K. Robust health stream processing. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/88427.

Council of Science Editors:

Ericson K. Robust health stream processing. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/88427


Colorado State University

11. Rahman, Minhazur. Application of social networking algorithms in program analysis: understanding execution frequencies.

Degree: MS(M.S.), Computer Science, 2007, Colorado State University

 There may be some parts of a program that are more commonly used at runtime, whereas there may be other parts that are less commonly… (more)

Subjects/Keywords: coupling; static analysis; software engineering; social network metrics; empirical studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rahman, M. (2007). Application of social networking algorithms in program analysis: understanding execution frequencies. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/46906

Chicago Manual of Style (16th Edition):

Rahman, Minhazur. “Application of social networking algorithms in program analysis: understanding execution frequencies.” 2007. Masters Thesis, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/46906.

MLA Handbook (7th Edition):

Rahman, Minhazur. “Application of social networking algorithms in program analysis: understanding execution frequencies.” 2007. Web. 24 Jan 2020.

Vancouver:

Rahman M. Application of social networking algorithms in program analysis: understanding execution frequencies. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/46906.

Council of Science Editors:

Rahman M. Application of social networking algorithms in program analysis: understanding execution frequencies. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/46906


Colorado State University

12. Roberts, Mark. Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A.

Degree: PhD, Computer Science, 2007, Colorado State University

To view the abstract, please see the full text of the document. Advisors/Committee Members: Howe, Adele (advisor), Ray, Indrajit (advisor), Whitley, Darrell (committee member), Turk, Daniel (committee member).

Subjects/Keywords: artificial intelligence; classical planning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roberts, M. (2007). Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/80970

Chicago Manual of Style (16th Edition):

Roberts, Mark. “Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A.” 2007. Doctoral Dissertation, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/80970.

MLA Handbook (7th Edition):

Roberts, Mark. “Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A.” 2007. Web. 24 Jan 2020.

Vancouver:

Roberts M. Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/80970.

Council of Science Editors:

Roberts M. Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/80970


Colorado State University

13. Zaliva, Vadim. Applying static code analysis to firewall policies for the purpose of anomaly detection.

Degree: MS(M.S.), Computer Science, 2007, Colorado State University

 Treating modern firewall policy languages as imperative, special purpose programming languages, in this thesis we will try to apply static code analysis techniques for the… (more)

Subjects/Keywords: datalog language; firewall policy language; anomaly detection algorithms; static code analysis; Firewalls (Computer security)  – Programming; Anomaly detection (Computer security)  – Programming

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zaliva, V. (2007). Applying static code analysis to firewall policies for the purpose of anomaly detection. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/28638

Chicago Manual of Style (16th Edition):

Zaliva, Vadim. “Applying static code analysis to firewall policies for the purpose of anomaly detection.” 2007. Masters Thesis, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/28638.

MLA Handbook (7th Edition):

Zaliva, Vadim. “Applying static code analysis to firewall policies for the purpose of anomaly detection.” 2007. Web. 24 Jan 2020.

Vancouver:

Zaliva V. Applying static code analysis to firewall policies for the purpose of anomaly detection. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/28638.

Council of Science Editors:

Zaliva V. Applying static code analysis to firewall policies for the purpose of anomaly detection. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/28638


Colorado State University

14. Wilcox, Chris. Methodology for automated lookup table optimization of scientific applications, A.

Degree: PhD, Computer Science, 2007, Colorado State University

 Tuning the performance of scientific codes is challenging because of their math-intensive nature. Applications such as climate modeling and molecular biology simulate the behavior of… (more)

Subjects/Keywords: code generation; error analysis; lookup tables; performance optimization; scientific computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wilcox, C. (2007). Methodology for automated lookup table optimization of scientific applications, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/67659

Chicago Manual of Style (16th Edition):

Wilcox, Chris. “Methodology for automated lookup table optimization of scientific applications, A.” 2007. Doctoral Dissertation, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/67659.

MLA Handbook (7th Edition):

Wilcox, Chris. “Methodology for automated lookup table optimization of scientific applications, A.” 2007. Web. 24 Jan 2020.

Vancouver:

Wilcox C. Methodology for automated lookup table optimization of scientific applications, A. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/67659.

Council of Science Editors:

Wilcox C. Methodology for automated lookup table optimization of scientific applications, A. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/67659


Colorado State University

15. Kim, Dae-Kyoo. Meta-modeling approach to specifying patterns, A.

Degree: PhD, Computer Science, 2007, Colorado State University

 A major goal in software development is to produce quality products in less time and with less cost. Systematic reuse of software artifacts that encapsulate… (more)

Subjects/Keywords: RBML-PI; design patterns; Role-Based Metamodeling Language; RBML; Unified Modeling Language; UML; software development; RBML Pattern Instantiator; Software patterns

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, D. (2007). Meta-modeling approach to specifying patterns, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/26809

Chicago Manual of Style (16th Edition):

Kim, Dae-Kyoo. “Meta-modeling approach to specifying patterns, A.” 2007. Doctoral Dissertation, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/26809.

MLA Handbook (7th Edition):

Kim, Dae-Kyoo. “Meta-modeling approach to specifying patterns, A.” 2007. Web. 24 Jan 2020.

Vancouver:

Kim D. Meta-modeling approach to specifying patterns, A. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/26809.

Council of Science Editors:

Kim D. Meta-modeling approach to specifying patterns, A. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/26809


Colorado State University

16. Bandyopadhyay, Aritra. Mitigating the effect of coincidental correctness in spectrum based fault localization.

Degree: PhD, Computer Science, 2007, Colorado State University

 Coincidentally correct test cases are those that execute faulty program statements but do not result in failures. The presence of such test cases in a… (more)

Subjects/Keywords: software fault localization and debugging; test selection and classification; static and dynamic program analysis; software testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bandyopadhyay, A. (2007). Mitigating the effect of coincidental correctness in spectrum based fault localization. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/80137

Chicago Manual of Style (16th Edition):

Bandyopadhyay, Aritra. “Mitigating the effect of coincidental correctness in spectrum based fault localization.” 2007. Doctoral Dissertation, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/80137.

MLA Handbook (7th Edition):

Bandyopadhyay, Aritra. “Mitigating the effect of coincidental correctness in spectrum based fault localization.” 2007. Web. 24 Jan 2020.

Vancouver:

Bandyopadhyay A. Mitigating the effect of coincidental correctness in spectrum based fault localization. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/80137.

Council of Science Editors:

Bandyopadhyay A. Mitigating the effect of coincidental correctness in spectrum based fault localization. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/80137


Colorado State University

17. Andersen, Brady Dean. Single high-altitude training bout improves high-altitude aerobic performance following one week of low altitude training, A.

Degree: MS(M.S.), Health and Exercise Science, 2007, Colorado State University

 Consecutive bouts of aerobic exercise at high-altitude are known to improve subsequent aerobic exercise performance at high altitude due to a variety of acute and… (more)

Subjects/Keywords: acclimatization; high altitude

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andersen, B. D. (2007). Single high-altitude training bout improves high-altitude aerobic performance following one week of low altitude training, A. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/46276

Chicago Manual of Style (16th Edition):

Andersen, Brady Dean. “Single high-altitude training bout improves high-altitude aerobic performance following one week of low altitude training, A.” 2007. Masters Thesis, Colorado State University. Accessed January 24, 2020. http://hdl.handle.net/10217/46276.

MLA Handbook (7th Edition):

Andersen, Brady Dean. “Single high-altitude training bout improves high-altitude aerobic performance following one week of low altitude training, A.” 2007. Web. 24 Jan 2020.

Vancouver:

Andersen BD. Single high-altitude training bout improves high-altitude aerobic performance following one week of low altitude training, A. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2020 Jan 24]. Available from: http://hdl.handle.net/10217/46276.

Council of Science Editors:

Andersen BD. Single high-altitude training bout improves high-altitude aerobic performance following one week of low altitude training, A. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/46276

.