Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Mississippi State University" +contributor:("Edward B. Allen"). Showing records 1 – 30 of 32 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

▼ Search Limiters


Mississippi State University

1. Balasubramaniam, Mahadevan. Performance analysis and evaluation of divisible load theory and dynamic loop scheduling algorithms in parallel and distributed environments.

Degree: PhD, Computer Science and Engineering, 2015, Mississippi State University

  High performance parallel and distributed computing systems are used to solve large, complex, and data parallel scientific applications that require enormous computational power. Data… (more)

Subjects/Keywords: 3D torus; parallel and distributed computing; robustness; scalability; dynamic loop scheduling; divisible load theory; arbitrarily divisible workloads; data parallel workloads; cluster

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Balasubramaniam, M. (2015). Performance analysis and evaluation of divisible load theory and dynamic loop scheduling algorithms in parallel and distributed environments. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04282015-235336/ ;

Chicago Manual of Style (16th Edition):

Balasubramaniam, Mahadevan. “Performance analysis and evaluation of divisible load theory and dynamic loop scheduling algorithms in parallel and distributed environments.” 2015. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04282015-235336/ ;.

MLA Handbook (7th Edition):

Balasubramaniam, Mahadevan. “Performance analysis and evaluation of divisible load theory and dynamic loop scheduling algorithms in parallel and distributed environments.” 2015. Web. 11 Dec 2019.

Vancouver:

Balasubramaniam M. Performance analysis and evaluation of divisible load theory and dynamic loop scheduling algorithms in parallel and distributed environments. [Internet] [Doctoral dissertation]. Mississippi State University; 2015. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04282015-235336/ ;.

Council of Science Editors:

Balasubramaniam M. Performance analysis and evaluation of divisible load theory and dynamic loop scheduling algorithms in parallel and distributed environments. [Doctoral Dissertation]. Mississippi State University; 2015. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04282015-235336/ ;


Mississippi State University

2. Daggolu, Benjamin. DESIGNING AN AJAX-BASED WEB APPLICATION RESTFULLY.

Degree: MS, Computer Science and Engineering, 2010, Mississippi State University

 The development of an AJAX-based web application involves several challenges as the webpage is updated by using the AJAX calls without reloading the entire page… (more)

Subjects/Keywords: AJAX; Web services; State transfer; FSM; Mashup; Software engineering process; Resource; Representation; Representational State Tranfer; REST

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Daggolu, B. (2010). DESIGNING AN AJAX-BASED WEB APPLICATION RESTFULLY. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012010-003527/ ;

Chicago Manual of Style (16th Edition):

Daggolu, Benjamin. “DESIGNING AN AJAX-BASED WEB APPLICATION RESTFULLY.” 2010. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012010-003527/ ;.

MLA Handbook (7th Edition):

Daggolu, Benjamin. “DESIGNING AN AJAX-BASED WEB APPLICATION RESTFULLY.” 2010. Web. 11 Dec 2019.

Vancouver:

Daggolu B. DESIGNING AN AJAX-BASED WEB APPLICATION RESTFULLY. [Internet] [Masters thesis]. Mississippi State University; 2010. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012010-003527/ ;.

Council of Science Editors:

Daggolu B. DESIGNING AN AJAX-BASED WEB APPLICATION RESTFULLY. [Masters Thesis]. Mississippi State University; 2010. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012010-003527/ ;


Mississippi State University

3. Adhikari, Pooja. A domain specific language based approach for generating deadlock-free parallel load scheduling protocols for distributed systems.

Degree: PhD, Computer Science and Engineering, 2013, Mississippi State University

  In this dissertation, the concept of using domain specific language to develop error-free parallel asynchronous load scheduling protocols for distributed systems is studied. The… (more)

Subjects/Keywords: Model checking; Domain specific language; Load Scheduling Protocols; Asynchronous parallel applications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adhikari, P. (2013). A domain specific language based approach for generating deadlock-free parallel load scheduling protocols for distributed systems. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-03132013-153807/ ;

Chicago Manual of Style (16th Edition):

Adhikari, Pooja. “A domain specific language based approach for generating deadlock-free parallel load scheduling protocols for distributed systems.” 2013. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-03132013-153807/ ;.

MLA Handbook (7th Edition):

Adhikari, Pooja. “A domain specific language based approach for generating deadlock-free parallel load scheduling protocols for distributed systems.” 2013. Web. 11 Dec 2019.

Vancouver:

Adhikari P. A domain specific language based approach for generating deadlock-free parallel load scheduling protocols for distributed systems. [Internet] [Doctoral dissertation]. Mississippi State University; 2013. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03132013-153807/ ;.

Council of Science Editors:

Adhikari P. A domain specific language based approach for generating deadlock-free parallel load scheduling protocols for distributed systems. [Doctoral Dissertation]. Mississippi State University; 2013. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03132013-153807/ ;


Mississippi State University

4. Zhang, Yang. THE APPLICATION OF THE KEY-VALUE-REFERENCE MODEL IN DYNAMIC IRREGULAR PARALLEL COMPUTATION.

Degree: PhD, Computer Science and Engineering, 2009, Mississippi State University

 This dissertation studies the effects of the "key-value-ref" model in the computational field simulation software development process. The motivation of this study is rooted in… (more)

Subjects/Keywords: parallel programming; software composition; resource management; numerical simulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Y. (2009). THE APPLICATION OF THE KEY-VALUE-REFERENCE MODEL IN DYNAMIC IRREGULAR PARALLEL COMPUTATION. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04032009-160012/ ;

Chicago Manual of Style (16th Edition):

Zhang, Yang. “THE APPLICATION OF THE KEY-VALUE-REFERENCE MODEL IN DYNAMIC IRREGULAR PARALLEL COMPUTATION.” 2009. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04032009-160012/ ;.

MLA Handbook (7th Edition):

Zhang, Yang. “THE APPLICATION OF THE KEY-VALUE-REFERENCE MODEL IN DYNAMIC IRREGULAR PARALLEL COMPUTATION.” 2009. Web. 11 Dec 2019.

Vancouver:

Zhang Y. THE APPLICATION OF THE KEY-VALUE-REFERENCE MODEL IN DYNAMIC IRREGULAR PARALLEL COMPUTATION. [Internet] [Doctoral dissertation]. Mississippi State University; 2009. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04032009-160012/ ;.

Council of Science Editors:

Zhang Y. THE APPLICATION OF THE KEY-VALUE-REFERENCE MODEL IN DYNAMIC IRREGULAR PARALLEL COMPUTATION. [Doctoral Dissertation]. Mississippi State University; 2009. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04032009-160012/ ;


Mississippi State University

5. Mohanty, Somya Darsan. Ordered Merkle Tree - a versatile data-structure for security kernels.

Degree: PhD, Computer Science and Engineering, 2013, Mississippi State University

  Hidden undesired functionality is an unavoidable reality in any complex hardware or software component. Undesired functionality deliberately introduced Trojan horses or accidentally introduced bugsin… (more)

Subjects/Keywords: Authenticated Data-Structures; Trustworthy Computing; Security Kernels

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohanty, S. D. (2013). Ordered Merkle Tree - a versatile data-structure for security kernels. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;

Chicago Manual of Style (16th Edition):

Mohanty, Somya Darsan. “Ordered Merkle Tree - a versatile data-structure for security kernels.” 2013. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;.

MLA Handbook (7th Edition):

Mohanty, Somya Darsan. “Ordered Merkle Tree - a versatile data-structure for security kernels.” 2013. Web. 11 Dec 2019.

Vancouver:

Mohanty SD. Ordered Merkle Tree - a versatile data-structure for security kernels. [Internet] [Doctoral dissertation]. Mississippi State University; 2013. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;.

Council of Science Editors:

Mohanty SD. Ordered Merkle Tree - a versatile data-structure for security kernels. [Doctoral Dissertation]. Mississippi State University; 2013. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;

6. Rad, Shirin. Enhancing requirements-level defect detection and prevention with visual analytics.

Degree: MS, Computer Science and Engineering, 2014, Mississippi State University

  Keeping track of requirements from eliciting data to making decision needs an effective path from data to decision [43]. Visualization science helps to create… (more)

Subjects/Keywords: DDP model; defect detection and prevention; requirements-level; visual analytics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rad, S. (2014). Enhancing requirements-level defect detection and prevention with visual analytics. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012014-121044/ ;

Chicago Manual of Style (16th Edition):

Rad, Shirin. “Enhancing requirements-level defect detection and prevention with visual analytics.” 2014. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012014-121044/ ;.

MLA Handbook (7th Edition):

Rad, Shirin. “Enhancing requirements-level defect detection and prevention with visual analytics.” 2014. Web. 11 Dec 2019.

Vancouver:

Rad S. Enhancing requirements-level defect detection and prevention with visual analytics. [Internet] [Masters thesis]. Mississippi State University; 2014. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012014-121044/ ;.

Council of Science Editors:

Rad S. Enhancing requirements-level defect detection and prevention with visual analytics. [Masters Thesis]. Mississippi State University; 2014. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012014-121044/ ;

7. Walia, Gursimran Singh. USING ERROR MODELING TO IMPROVE AND CONTROL SOFTWARE QUALITY: AN EMPIRICAL INVESTIGATION.

Degree: PhD, Computer Science and Engineering, 2009, Mississippi State University

  Software quality, or the lack thereof, is a well-known problem faced by software engineers. To address the problem of poor software quality, many approaches… (more)

Subjects/Keywords: capture recapture; human cognition; software errors

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Walia, G. S. (2009). USING ERROR MODELING TO IMPROVE AND CONTROL SOFTWARE QUALITY: AN EMPIRICAL INVESTIGATION. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04032009-070637/ ;

Chicago Manual of Style (16th Edition):

Walia, Gursimran Singh. “USING ERROR MODELING TO IMPROVE AND CONTROL SOFTWARE QUALITY: AN EMPIRICAL INVESTIGATION.” 2009. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04032009-070637/ ;.

MLA Handbook (7th Edition):

Walia, Gursimran Singh. “USING ERROR MODELING TO IMPROVE AND CONTROL SOFTWARE QUALITY: AN EMPIRICAL INVESTIGATION.” 2009. Web. 11 Dec 2019.

Vancouver:

Walia GS. USING ERROR MODELING TO IMPROVE AND CONTROL SOFTWARE QUALITY: AN EMPIRICAL INVESTIGATION. [Internet] [Doctoral dissertation]. Mississippi State University; 2009. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04032009-070637/ ;.

Council of Science Editors:

Walia GS. USING ERROR MODELING TO IMPROVE AND CONTROL SOFTWARE QUALITY: AN EMPIRICAL INVESTIGATION. [Doctoral Dissertation]. Mississippi State University; 2009. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04032009-070637/ ;

8. He, Lulu. SOFTWARE MAINTAINABILITY MEASUREMENT: A TASK COMPLEXITY PERSPECTIVE.

Degree: PhD, Computer Science and Engineering, 2010, Mississippi State University

  Software maintainability is one of the most crucial quality attributes of a software product. Software engineering researchers and practitioners have devoted considerable effort to… (more)

Subjects/Keywords: measurement; maintainability; task complexity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

He, L. (2010). SOFTWARE MAINTAINABILITY MEASUREMENT: A TASK COMPLEXITY PERSPECTIVE. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-08032010-133342/ ;

Chicago Manual of Style (16th Edition):

He, Lulu. “SOFTWARE MAINTAINABILITY MEASUREMENT: A TASK COMPLEXITY PERSPECTIVE.” 2010. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-08032010-133342/ ;.

MLA Handbook (7th Edition):

He, Lulu. “SOFTWARE MAINTAINABILITY MEASUREMENT: A TASK COMPLEXITY PERSPECTIVE.” 2010. Web. 11 Dec 2019.

Vancouver:

He L. SOFTWARE MAINTAINABILITY MEASUREMENT: A TASK COMPLEXITY PERSPECTIVE. [Internet] [Doctoral dissertation]. Mississippi State University; 2010. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-08032010-133342/ ;.

Council of Science Editors:

He L. SOFTWARE MAINTAINABILITY MEASUREMENT: A TASK COMPLEXITY PERSPECTIVE. [Doctoral Dissertation]. Mississippi State University; 2010. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-08032010-133342/ ;

9. Reddivari, Sandeep. Visual analytics for software requirements engineering.

Degree: PhD, Computer Science and Engineering, 2014, Mississippi State University

  For many software projects, keeping requirements on track needs an effective and efficient path from data to decision. Visual analytics creates such a path… (more)

Subjects/Keywords: Visual analytics; Visual analytical reasoning; Requirements engineering visualization; Requirements management; Visual exploration; Visual exploitation; Decision making; Requirements clustering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reddivari, S. (2014). Visual analytics for software requirements engineering. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04042014-151615/ ;

Chicago Manual of Style (16th Edition):

Reddivari, Sandeep. “Visual analytics for software requirements engineering.” 2014. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04042014-151615/ ;.

MLA Handbook (7th Edition):

Reddivari, Sandeep. “Visual analytics for software requirements engineering.” 2014. Web. 11 Dec 2019.

Vancouver:

Reddivari S. Visual analytics for software requirements engineering. [Internet] [Doctoral dissertation]. Mississippi State University; 2014. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04042014-151615/ ;.

Council of Science Editors:

Reddivari S. Visual analytics for software requirements engineering. [Doctoral Dissertation]. Mississippi State University; 2014. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04042014-151615/ ;

10. Mahmoud, Anas. Toward an effective automated tracing process.

Degree: PhD, Computer Science and Engineering, 2014, Mississippi State University

  Traceability is defined as the ability to establish, record, and maintain dependency relations among various software artifacts in a software system, in both a… (more)

Subjects/Keywords: information foraging; refactoring; clustering; semantics; indexing; information retrieval; traceability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mahmoud, A. (2014). Toward an effective automated tracing process. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04212014-203030/ ;

Chicago Manual of Style (16th Edition):

Mahmoud, Anas. “Toward an effective automated tracing process.” 2014. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04212014-203030/ ;.

MLA Handbook (7th Edition):

Mahmoud, Anas. “Toward an effective automated tracing process.” 2014. Web. 11 Dec 2019.

Vancouver:

Mahmoud A. Toward an effective automated tracing process. [Internet] [Doctoral dissertation]. Mississippi State University; 2014. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04212014-203030/ ;.

Council of Science Editors:

Mahmoud A. Toward an effective automated tracing process. [Doctoral Dissertation]. Mississippi State University; 2014. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04212014-203030/ ;

11. Deo, Ajay Kumar. Assessing software defects using nano-patterns detection.

Degree: MS, Computer Science and Engineering, 2015, Mississippi State University

  Defects in software systems directly impact a products quality and overall customer satisfaction. Assessing defective code for the purpose of locating vulnerable areas and… (more)

Subjects/Keywords: Software Quality; Software Patterns; Traceable Patterns; Nano-Patterns

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deo, A. K. (2015). Assessing software defects using nano-patterns detection. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-03122015-155214/ ;

Chicago Manual of Style (16th Edition):

Deo, Ajay Kumar. “Assessing software defects using nano-patterns detection.” 2015. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-03122015-155214/ ;.

MLA Handbook (7th Edition):

Deo, Ajay Kumar. “Assessing software defects using nano-patterns detection.” 2015. Web. 11 Dec 2019.

Vancouver:

Deo AK. Assessing software defects using nano-patterns detection. [Internet] [Masters thesis]. Mississippi State University; 2015. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03122015-155214/ ;.

Council of Science Editors:

Deo AK. Assessing software defects using nano-patterns detection. [Masters Thesis]. Mississippi State University; 2015. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03122015-155214/ ;

12. Malhotra, Asheer. Calculating malware severity rating using threat tree analysis.

Degree: MS, Computer Science and Engineering, 2015, Mississippi State University

  Malware analysts and researchers around the world are looking for innovative means of malware detection and classification. However, one concept of malware analysis that… (more)

Subjects/Keywords: rating; attack trees; threat trees; malware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Malhotra, A. (2015). Calculating malware severity rating using threat tree analysis. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-03202015-153316/ ;

Chicago Manual of Style (16th Edition):

Malhotra, Asheer. “Calculating malware severity rating using threat tree analysis.” 2015. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-03202015-153316/ ;.

MLA Handbook (7th Edition):

Malhotra, Asheer. “Calculating malware severity rating using threat tree analysis.” 2015. Web. 11 Dec 2019.

Vancouver:

Malhotra A. Calculating malware severity rating using threat tree analysis. [Internet] [Masters thesis]. Mississippi State University; 2015. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03202015-153316/ ;.

Council of Science Editors:

Malhotra A. Calculating malware severity rating using threat tree analysis. [Masters Thesis]. Mississippi State University; 2015. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03202015-153316/ ;

13. Bandi, Ajay. Assessing code decay by detecting software architecture violations.

Degree: PhD, Computer Science and Engineering, 2014, Mississippi State University

  Code decay is a gradual process that negatively impacts the quality of a software system. Developers need trusted measurement techniques to evaluate whether their… (more)

Subjects/Keywords: architectural constraints; architectural violations; code decay; coupling; maintainability; metrics; reverse engineering; software architecture; software evolution

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bandi, A. (2014). Assessing code decay by detecting software architecture violations. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-07282014-154800/ ;

Chicago Manual of Style (16th Edition):

Bandi, Ajay. “Assessing code decay by detecting software architecture violations.” 2014. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07282014-154800/ ;.

MLA Handbook (7th Edition):

Bandi, Ajay. “Assessing code decay by detecting software architecture violations.” 2014. Web. 11 Dec 2019.

Vancouver:

Bandi A. Assessing code decay by detecting software architecture violations. [Internet] [Doctoral dissertation]. Mississippi State University; 2014. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07282014-154800/ ;.

Council of Science Editors:

Bandi A. Assessing code decay by detecting software architecture violations. [Doctoral Dissertation]. Mississippi State University; 2014. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07282014-154800/ ;

14. Wilson, Krystle Dianne. The effects of Gestalt principles on diagram comprehension: An empirical approach.

Degree: PhD, Computer Science and Engineering, 2012, Mississippi State University

  In the software engineering process some tasks of software engineers are to design software documents, analyze the documents, and comprehend component relationships within software… (more)

Subjects/Keywords: model-driven engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wilson, K. D. (2012). The effects of Gestalt principles on diagram comprehension: An empirical approach. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-10272012-124832/ ;

Chicago Manual of Style (16th Edition):

Wilson, Krystle Dianne. “The effects of Gestalt principles on diagram comprehension: An empirical approach.” 2012. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10272012-124832/ ;.

MLA Handbook (7th Edition):

Wilson, Krystle Dianne. “The effects of Gestalt principles on diagram comprehension: An empirical approach.” 2012. Web. 11 Dec 2019.

Vancouver:

Wilson KD. The effects of Gestalt principles on diagram comprehension: An empirical approach. [Internet] [Doctoral dissertation]. Mississippi State University; 2012. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10272012-124832/ ;.

Council of Science Editors:

Wilson KD. The effects of Gestalt principles on diagram comprehension: An empirical approach. [Doctoral Dissertation]. Mississippi State University; 2012. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10272012-124832/ ;

15. Thanthiriwatte, Chamali Lankara. A METHOD FOR INTEGRATING HETEROGENEOUS DATASETS BASED ON GO TERM SIMILARITY.

Degree: MS, Computer Science and Engineering, 2009, Mississippi State University

  This thesis presents a method for integrating heterogeneous gene/protein datasets at the functional level based on Gene Ontology term similarity. Often biologists want to… (more)

Subjects/Keywords: Functional Annotations; Similarity Matrix; Transcriptomics; Hierarchical Clustering; Gene Ontology; Proteomics; Semantic Similarity; Gene Expression; Protein Expression

Mississippi State University Libraries. Their kindness and assistance will always be remembered. iv… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thanthiriwatte, C. L. (2009). A METHOD FOR INTEGRATING HETEROGENEOUS DATASETS BASED ON GO TERM SIMILARITY. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-07312009-133904/ ;

Chicago Manual of Style (16th Edition):

Thanthiriwatte, Chamali Lankara. “A METHOD FOR INTEGRATING HETEROGENEOUS DATASETS BASED ON GO TERM SIMILARITY.” 2009. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07312009-133904/ ;.

MLA Handbook (7th Edition):

Thanthiriwatte, Chamali Lankara. “A METHOD FOR INTEGRATING HETEROGENEOUS DATASETS BASED ON GO TERM SIMILARITY.” 2009. Web. 11 Dec 2019.

Vancouver:

Thanthiriwatte CL. A METHOD FOR INTEGRATING HETEROGENEOUS DATASETS BASED ON GO TERM SIMILARITY. [Internet] [Masters thesis]. Mississippi State University; 2009. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07312009-133904/ ;.

Council of Science Editors:

Thanthiriwatte CL. A METHOD FOR INTEGRATING HETEROGENEOUS DATASETS BASED ON GO TERM SIMILARITY. [Masters Thesis]. Mississippi State University; 2009. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07312009-133904/ ;

16. Lamborn, Peter C. Efficient external-memory graph search for model checking.

Degree: PhD, Computer Science and Engineering, 2014, Mississippi State University

  Model checking problems suffer from state space explosion. State space explosion is the number of states in the graph increases exponentially with the number… (more)

Subjects/Keywords: Model Checking; External Memory; Search; Delayed Duplicate Detection; Sorting-based Delayed Duplicate Detection; Interlayer Locality; Hash-based Delayed Duplicate Detection; State Cache; Intralayer Locality; Immediate Duplicate Detection; Phased Delayed Duplicate Detection; Partial Delayed Duplicate Detection; Automatic Hash Function

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lamborn, P. C. (2014). Efficient external-memory graph search for model checking. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-03242014-205823/ ;

Chicago Manual of Style (16th Edition):

Lamborn, Peter C. “Efficient external-memory graph search for model checking.” 2014. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-03242014-205823/ ;.

MLA Handbook (7th Edition):

Lamborn, Peter C. “Efficient external-memory graph search for model checking.” 2014. Web. 11 Dec 2019.

Vancouver:

Lamborn PC. Efficient external-memory graph search for model checking. [Internet] [Doctoral dissertation]. Mississippi State University; 2014. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03242014-205823/ ;.

Council of Science Editors:

Lamborn PC. Efficient external-memory graph search for model checking. [Doctoral Dissertation]. Mississippi State University; 2014. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03242014-205823/ ;

17. Elliott, Robert A. Software requirements elicitation, verification, and documentation: an ontology based approach.

Degree: PhD, Computer Science and Engineering, 2012, Mississippi State University

  Software intensive systems are developed to provide solutions in some problem domain and software engineering principles are employed to develop and implement that system.… (more)

Subjects/Keywords: SWEBOK; systematic review; software engineering; requirements verification; requirements specification; requirements engineering; ontology engineering; ontology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elliott, R. A. (2012). Software requirements elicitation, verification, and documentation: an ontology based approach. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-10092012-192406/ ;

Chicago Manual of Style (16th Edition):

Elliott, Robert A. “Software requirements elicitation, verification, and documentation: an ontology based approach.” 2012. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10092012-192406/ ;.

MLA Handbook (7th Edition):

Elliott, Robert A. “Software requirements elicitation, verification, and documentation: an ontology based approach.” 2012. Web. 11 Dec 2019.

Vancouver:

Elliott RA. Software requirements elicitation, verification, and documentation: an ontology based approach. [Internet] [Doctoral dissertation]. Mississippi State University; 2012. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10092012-192406/ ;.

Council of Science Editors:

Elliott RA. Software requirements elicitation, verification, and documentation: an ontology based approach. [Doctoral Dissertation]. Mississippi State University; 2012. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10092012-192406/ ;


Mississippi State University

18. rapur, gayatri. Assessment of Open-Source Software for High-Performance Computing.

Degree: MS, Computer Science, 2003, Mississippi State University

 High quality software is a key component of various technology systems that are crucial to software producers, users, and society in general. Software application development… (more)

Subjects/Keywords: Datrix; SAS; MPICH; Open-source software; module-order model; Code-churn

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

rapur, g. (2003). Assessment of Open-Source Software for High-Performance Computing. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-08132003-140300/ ;

Chicago Manual of Style (16th Edition):

rapur, gayatri. “Assessment of Open-Source Software for High-Performance Computing.” 2003. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-08132003-140300/ ;.

MLA Handbook (7th Edition):

rapur, gayatri. “Assessment of Open-Source Software for High-Performance Computing.” 2003. Web. 11 Dec 2019.

Vancouver:

rapur g. Assessment of Open-Source Software for High-Performance Computing. [Internet] [Masters thesis]. Mississippi State University; 2003. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-08132003-140300/ ;.

Council of Science Editors:

rapur g. Assessment of Open-Source Software for High-Performance Computing. [Masters Thesis]. Mississippi State University; 2003. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-08132003-140300/ ;


Mississippi State University

19. Everett, Christopher E. Fundamentals of Software Patent Protection at a University.

Degree: MS, Computer Science, 2003, Mississippi State University

 Software protection by patents is an emerging field and thus is not completely understood by software developers, especially software developers in a university setting. University(more)

Subjects/Keywords: software patent; university patent; empirical study of patents

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Everett, C. E. (2003). Fundamentals of Software Patent Protection at a University. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-01062003-174536/ ;

Chicago Manual of Style (16th Edition):

Everett, Christopher E. “Fundamentals of Software Patent Protection at a University.” 2003. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-01062003-174536/ ;.

MLA Handbook (7th Edition):

Everett, Christopher E. “Fundamentals of Software Patent Protection at a University.” 2003. Web. 11 Dec 2019.

Vancouver:

Everett CE. Fundamentals of Software Patent Protection at a University. [Internet] [Masters thesis]. Mississippi State University; 2003. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-01062003-174536/ ;.

Council of Science Editors:

Everett CE. Fundamentals of Software Patent Protection at a University. [Masters Thesis]. Mississippi State University; 2003. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-01062003-174536/ ;


Mississippi State University

20. Gottipati, Sampath. EMPIRICAL VALIDATION OF THE USEFULNESS OF INFORMATION THEORY-BASED SOFTWARE METRICS.

Degree: MS, Computer Science, 2003, Mississippi State University

 Software designs consist of software components and their relationships. Graphs are abstraction of software designs. Graphs composed of nodes and hyperedges are attractive for depicting… (more)

Subjects/Keywords: hyperedges; graph abstraction; software metrics; counting metrics; information theory metrics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gottipati, S. (2003). EMPIRICAL VALIDATION OF THE USEFULNESS OF INFORMATION THEORY-BASED SOFTWARE METRICS. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-03262003-095159/ ;

Chicago Manual of Style (16th Edition):

Gottipati, Sampath. “EMPIRICAL VALIDATION OF THE USEFULNESS OF INFORMATION THEORY-BASED SOFTWARE METRICS.” 2003. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-03262003-095159/ ;.

MLA Handbook (7th Edition):

Gottipati, Sampath. “EMPIRICAL VALIDATION OF THE USEFULNESS OF INFORMATION THEORY-BASED SOFTWARE METRICS.” 2003. Web. 11 Dec 2019.

Vancouver:

Gottipati S. EMPIRICAL VALIDATION OF THE USEFULNESS OF INFORMATION THEORY-BASED SOFTWARE METRICS. [Internet] [Masters thesis]. Mississippi State University; 2003. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03262003-095159/ ;.

Council of Science Editors:

Gottipati S. EMPIRICAL VALIDATION OF THE USEFULNESS OF INFORMATION THEORY-BASED SOFTWARE METRICS. [Masters Thesis]. Mississippi State University; 2003. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03262003-095159/ ;


Mississippi State University

21. Chaudhary, Gautam. RZSWEEP: A NEW VOLUME-RENDERING TECHNIQUE FOR UNIFORM RECTILINEAR DATASETS.

Degree: MS, Computer Science, 2003, Mississippi State University

 A great challenge in the volume-rendering field is to achieve high-quality images in an acceptable amount of time. In the area of volume rendering, there… (more)

Subjects/Keywords: Scientific visualization; Volume rendering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chaudhary, G. (2003). RZSWEEP: A NEW VOLUME-RENDERING TECHNIQUE FOR UNIFORM RECTILINEAR DATASETS. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012003-141739/ ;

Chicago Manual of Style (16th Edition):

Chaudhary, Gautam. “RZSWEEP: A NEW VOLUME-RENDERING TECHNIQUE FOR UNIFORM RECTILINEAR DATASETS.” 2003. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012003-141739/ ;.

MLA Handbook (7th Edition):

Chaudhary, Gautam. “RZSWEEP: A NEW VOLUME-RENDERING TECHNIQUE FOR UNIFORM RECTILINEAR DATASETS.” 2003. Web. 11 Dec 2019.

Vancouver:

Chaudhary G. RZSWEEP: A NEW VOLUME-RENDERING TECHNIQUE FOR UNIFORM RECTILINEAR DATASETS. [Internet] [Masters thesis]. Mississippi State University; 2003. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012003-141739/ ;.

Council of Science Editors:

Chaudhary G. RZSWEEP: A NEW VOLUME-RENDERING TECHNIQUE FOR UNIFORM RECTILINEAR DATASETS. [Masters Thesis]. Mississippi State University; 2003. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012003-141739/ ;


Mississippi State University

22. Dhandapani, Mangayarkarasi. Performance Evaluation of High Performance Parallel I/O.

Degree: MS, Computer Science, 2003, Mississippi State University

 Performance of the I/O subsystem plays a significant role in parallel applications that need to access large amounts of data. I/O performance in such applications… (more)

Subjects/Keywords: MercutIO; ROMIO; MPI-IO; NFS; PVFS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dhandapani, M. (2003). Performance Evaluation of High Performance Parallel I/O. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-07072003-155031/ ;

Chicago Manual of Style (16th Edition):

Dhandapani, Mangayarkarasi. “Performance Evaluation of High Performance Parallel I/O.” 2003. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07072003-155031/ ;.

MLA Handbook (7th Edition):

Dhandapani, Mangayarkarasi. “Performance Evaluation of High Performance Parallel I/O.” 2003. Web. 11 Dec 2019.

Vancouver:

Dhandapani M. Performance Evaluation of High Performance Parallel I/O. [Internet] [Masters thesis]. Mississippi State University; 2003. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07072003-155031/ ;.

Council of Science Editors:

Dhandapani M. Performance Evaluation of High Performance Parallel I/O. [Masters Thesis]. Mississippi State University; 2003. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07072003-155031/ ;


Mississippi State University

23. Govindarajan, Rajiv. An Empirical Evaluation of Information Theory-Based Software Metrics in Comparison to Counting-Based Metrics:A Case-Study Approach.

Degree: MS, Computer Science, 2004, Mississippi State University

 The field of software engineering embraces measurement, analysis and modeling of software. Software metrics are often based on counting, whereas this thesis adopts information theory.… (more)

Subjects/Keywords: Counting-Based Metrics; Empirical study; Information Theory; Software Metrics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Govindarajan, R. (2004). An Empirical Evaluation of Information Theory-Based Software Metrics in Comparison to Counting-Based Metrics:A Case-Study Approach. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04052004-153325/ ;

Chicago Manual of Style (16th Edition):

Govindarajan, Rajiv. “An Empirical Evaluation of Information Theory-Based Software Metrics in Comparison to Counting-Based Metrics:A Case-Study Approach.” 2004. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04052004-153325/ ;.

MLA Handbook (7th Edition):

Govindarajan, Rajiv. “An Empirical Evaluation of Information Theory-Based Software Metrics in Comparison to Counting-Based Metrics:A Case-Study Approach.” 2004. Web. 11 Dec 2019.

Vancouver:

Govindarajan R. An Empirical Evaluation of Information Theory-Based Software Metrics in Comparison to Counting-Based Metrics:A Case-Study Approach. [Internet] [Masters thesis]. Mississippi State University; 2004. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04052004-153325/ ;.

Council of Science Editors:

Govindarajan R. An Empirical Evaluation of Information Theory-Based Software Metrics in Comparison to Counting-Based Metrics:A Case-Study Approach. [Masters Thesis]. Mississippi State University; 2004. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04052004-153325/ ;


Mississippi State University

24. Phadke, Amit Ashok. Predicting Open-Source Software Quality Using Statistical and Machine Learning Techniques.

Degree: MS, Computer Science, 2004, Mississippi State University

 Developing high quality software is the goal of every software development organization. Software quality models are commonly used to assess and improve the software quality.… (more)

Subjects/Keywords: software quality modeling; machine learning; logistic regression; principal components analysis; c4.5; nn; ga

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Phadke, A. A. (2004). Predicting Open-Source Software Quality Using Statistical and Machine Learning Techniques. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-11092004-105801/ ;

Chicago Manual of Style (16th Edition):

Phadke, Amit Ashok. “Predicting Open-Source Software Quality Using Statistical and Machine Learning Techniques.” 2004. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-11092004-105801/ ;.

MLA Handbook (7th Edition):

Phadke, Amit Ashok. “Predicting Open-Source Software Quality Using Statistical and Machine Learning Techniques.” 2004. Web. 11 Dec 2019.

Vancouver:

Phadke AA. Predicting Open-Source Software Quality Using Statistical and Machine Learning Techniques. [Internet] [Masters thesis]. Mississippi State University; 2004. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-11092004-105801/ ;.

Council of Science Editors:

Phadke AA. Predicting Open-Source Software Quality Using Statistical and Machine Learning Techniques. [Masters Thesis]. Mississippi State University; 2004. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-11092004-105801/ ;


Mississippi State University

25. Shrestha, Bijay. PARALLEL COMPOSITING OF MULTI-TEMPORAL SATELLITE IMAGERY USING TEMPORAL MAP ALGEBRA.

Degree: MS, Computer Science, 2008, Mississippi State University

 Spatio-temporal satellite image analysis is a technique for monitoring spatial and temporal changes of land cover and oceanic locations on earth. Temporal Map Algebra (TMA)… (more)

Subjects/Keywords: parallel processing; image compositing; temporal map algebra

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shrestha, B. (2008). PARALLEL COMPOSITING OF MULTI-TEMPORAL SATELLITE IMAGERY USING TEMPORAL MAP ALGEBRA. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-03042008-155451/ ;

Chicago Manual of Style (16th Edition):

Shrestha, Bijay. “PARALLEL COMPOSITING OF MULTI-TEMPORAL SATELLITE IMAGERY USING TEMPORAL MAP ALGEBRA.” 2008. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-03042008-155451/ ;.

MLA Handbook (7th Edition):

Shrestha, Bijay. “PARALLEL COMPOSITING OF MULTI-TEMPORAL SATELLITE IMAGERY USING TEMPORAL MAP ALGEBRA.” 2008. Web. 11 Dec 2019.

Vancouver:

Shrestha B. PARALLEL COMPOSITING OF MULTI-TEMPORAL SATELLITE IMAGERY USING TEMPORAL MAP ALGEBRA. [Internet] [Masters thesis]. Mississippi State University; 2008. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03042008-155451/ ;.

Council of Science Editors:

Shrestha B. PARALLEL COMPOSITING OF MULTI-TEMPORAL SATELLITE IMAGERY USING TEMPORAL MAP ALGEBRA. [Masters Thesis]. Mississippi State University; 2008. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-03042008-155451/ ;


Mississippi State University

26. Walia, Gursimran Singh. Empirical Validation of Requirement Error Abstraction and Classification: A Multidisciplinary Approach.

Degree: MS, Computer Science, 2006, Mississippi State University

 Software quality and reliability is a primary concern for successful development organizations. Over the years, researchers have focused on monitoring and controlling quality throughout the… (more)

Subjects/Keywords: Error Abstraction; Requirement Error Taxonomy.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Walia, G. S. (2006). Empirical Validation of Requirement Error Abstraction and Classification: A Multidisciplinary Approach. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-05152006-151903/ ;

Chicago Manual of Style (16th Edition):

Walia, Gursimran Singh. “Empirical Validation of Requirement Error Abstraction and Classification: A Multidisciplinary Approach.” 2006. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-05152006-151903/ ;.

MLA Handbook (7th Edition):

Walia, Gursimran Singh. “Empirical Validation of Requirement Error Abstraction and Classification: A Multidisciplinary Approach.” 2006. Web. 11 Dec 2019.

Vancouver:

Walia GS. Empirical Validation of Requirement Error Abstraction and Classification: A Multidisciplinary Approach. [Internet] [Masters thesis]. Mississippi State University; 2006. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-05152006-151903/ ;.

Council of Science Editors:

Walia GS. Empirical Validation of Requirement Error Abstraction and Classification: A Multidisciplinary Approach. [Masters Thesis]. Mississippi State University; 2006. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-05152006-151903/ ;


Mississippi State University

27. Thakur, Amritanshu. SEMANTIC CONSTRUCTION WITH PROVENANCE FOR MODEL CONFIGURATIONS IN SCIENTIFIC WORKFLOWS.

Degree: MS, Computer Science and Engineering, 2008, Mississippi State University

 In the computationally intensive and diverse scientific environment of geosciences, substantial volumes of data are generated by specialized complex processing systems called models. These datasets… (more)

Subjects/Keywords: model; SWRL; OWL; ontology; provenance; semantics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thakur, A. (2008). SEMANTIC CONSTRUCTION WITH PROVENANCE FOR MODEL CONFIGURATIONS IN SCIENTIFIC WORKFLOWS. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-07312008-092758/ ;

Chicago Manual of Style (16th Edition):

Thakur, Amritanshu. “SEMANTIC CONSTRUCTION WITH PROVENANCE FOR MODEL CONFIGURATIONS IN SCIENTIFIC WORKFLOWS.” 2008. Masters Thesis, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07312008-092758/ ;.

MLA Handbook (7th Edition):

Thakur, Amritanshu. “SEMANTIC CONSTRUCTION WITH PROVENANCE FOR MODEL CONFIGURATIONS IN SCIENTIFIC WORKFLOWS.” 2008. Web. 11 Dec 2019.

Vancouver:

Thakur A. SEMANTIC CONSTRUCTION WITH PROVENANCE FOR MODEL CONFIGURATIONS IN SCIENTIFIC WORKFLOWS. [Internet] [Masters thesis]. Mississippi State University; 2008. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07312008-092758/ ;.

Council of Science Editors:

Thakur A. SEMANTIC CONSTRUCTION WITH PROVENANCE FOR MODEL CONFIGURATIONS IN SCIENTIFIC WORKFLOWS. [Masters Thesis]. Mississippi State University; 2008. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07312008-092758/ ;


Mississippi State University

28. Li, Wei. An Approach to Graph-Based Modeling of Network Exploitations.

Degree: PhD, Computer Science, 2005, Mississippi State University

 Computer security professionals and researchers are investigating proactive techniques for studying network-based attack behavior. Attack modeling is one of these research areas. In this dissertation,… (more)

Subjects/Keywords: exploitation graph; e-graph; vulnerability assessment; network security; computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, W. (2005). An Approach to Graph-Based Modeling of Network Exploitations. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-08152005-092408/ ;

Chicago Manual of Style (16th Edition):

Li, Wei. “An Approach to Graph-Based Modeling of Network Exploitations.” 2005. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-08152005-092408/ ;.

MLA Handbook (7th Edition):

Li, Wei. “An Approach to Graph-Based Modeling of Network Exploitations.” 2005. Web. 11 Dec 2019.

Vancouver:

Li W. An Approach to Graph-Based Modeling of Network Exploitations. [Internet] [Doctoral dissertation]. Mississippi State University; 2005. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-08152005-092408/ ;.

Council of Science Editors:

Li W. An Approach to Graph-Based Modeling of Network Exploitations. [Doctoral Dissertation]. Mississippi State University; 2005. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-08152005-092408/ ;


Mississippi State University

29. Hossain, Mahmood. CLUSTERING MULTIPLE CONTEXTUALLY RELATED HETEROGENEOUS DATASETS.

Degree: PhD, Accountancy, School of, 2006, Mississippi State University

 Traditional clustering is typically based on a single feature set. In some domains, several feature sets may be available to represent the same objects, but… (more)

Subjects/Keywords: Ensemble Clustering; Heterogeneous Datasets; Graph Theoretic Clustering; Mutual Entropy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hossain, M. (2006). CLUSTERING MULTIPLE CONTEXTUALLY RELATED HETEROGENEOUS DATASETS. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-11052006-223424/ ;

Chicago Manual of Style (16th Edition):

Hossain, Mahmood. “CLUSTERING MULTIPLE CONTEXTUALLY RELATED HETEROGENEOUS DATASETS.” 2006. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-11052006-223424/ ;.

MLA Handbook (7th Edition):

Hossain, Mahmood. “CLUSTERING MULTIPLE CONTEXTUALLY RELATED HETEROGENEOUS DATASETS.” 2006. Web. 11 Dec 2019.

Vancouver:

Hossain M. CLUSTERING MULTIPLE CONTEXTUALLY RELATED HETEROGENEOUS DATASETS. [Internet] [Doctoral dissertation]. Mississippi State University; 2006. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-11052006-223424/ ;.

Council of Science Editors:

Hossain M. CLUSTERING MULTIPLE CONTEXTUALLY RELATED HETEROGENEOUS DATASETS. [Doctoral Dissertation]. Mississippi State University; 2006. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-11052006-223424/ ;


Mississippi State University

30. Kudikyala, Udai Kumar. Reducing Misunderstanding of Software Requirements by Conceptualization of Mental Models using Pathfinder Networks.

Degree: PhD, Computer Science, 2004, Mississippi State University

 Understanding and communicating user requirements in a software requirement analysis effort is very important. Misunderstandings of user requirements between stakeholders will cause problems in terms… (more)

Subjects/Keywords: Consensus; Software Requirements; Requirements Engineering; Pathfinder Networks; Mental Models; Information Theory; Metrics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kudikyala, U. K. (2004). Reducing Misunderstanding of Software Requirements by Conceptualization of Mental Models using Pathfinder Networks. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-07072004-165900/ ;

Chicago Manual of Style (16th Edition):

Kudikyala, Udai Kumar. “Reducing Misunderstanding of Software Requirements by Conceptualization of Mental Models using Pathfinder Networks.” 2004. Doctoral Dissertation, Mississippi State University. Accessed December 11, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07072004-165900/ ;.

MLA Handbook (7th Edition):

Kudikyala, Udai Kumar. “Reducing Misunderstanding of Software Requirements by Conceptualization of Mental Models using Pathfinder Networks.” 2004. Web. 11 Dec 2019.

Vancouver:

Kudikyala UK. Reducing Misunderstanding of Software Requirements by Conceptualization of Mental Models using Pathfinder Networks. [Internet] [Doctoral dissertation]. Mississippi State University; 2004. [cited 2019 Dec 11]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07072004-165900/ ;.

Council of Science Editors:

Kudikyala UK. Reducing Misunderstanding of Software Requirements by Conceptualization of Mental Models using Pathfinder Networks. [Doctoral Dissertation]. Mississippi State University; 2004. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07072004-165900/ ;

[1] [2]

.