Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(program analysis). Showing records 1 – 30 of 837 total matches.

[1] [2] [3] [4] [5] … [28]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters

1. Tarvo, Alexander. Automated Performance Modeling of Multithreaded Programs.

Degree: PhD, Computer Science, 2015, Brown University

 The performance of multithreaded programs is often difficult to understand and predict. Multiple threads use various locking operations, resulting in the parallel execution of some… (more)

Subjects/Keywords: Program analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tarvo, A. (2015). Automated Performance Modeling of Multithreaded Programs. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:419368/

Chicago Manual of Style (16th Edition):

Tarvo, Alexander. “Automated Performance Modeling of Multithreaded Programs.” 2015. Doctoral Dissertation, Brown University. Accessed March 05, 2021. https://repository.library.brown.edu/studio/item/bdr:419368/.

MLA Handbook (7th Edition):

Tarvo, Alexander. “Automated Performance Modeling of Multithreaded Programs.” 2015. Web. 05 Mar 2021.

Vancouver:

Tarvo A. Automated Performance Modeling of Multithreaded Programs. [Internet] [Doctoral dissertation]. Brown University; 2015. [cited 2021 Mar 05]. Available from: https://repository.library.brown.edu/studio/item/bdr:419368/.

Council of Science Editors:

Tarvo A. Automated Performance Modeling of Multithreaded Programs. [Doctoral Dissertation]. Brown University; 2015. Available from: https://repository.library.brown.edu/studio/item/bdr:419368/


University of Waterloo

2. Kuderski, Jakub. Scalable Context-Sensitive Pointer Analysis for LLVM.

Degree: 2019, University of Waterloo

 Pointer analysis is indispensable for effectively verifying heap-manipulating programs. Even though it has been studied extensively, there are no publicly available pointer analyses for low-level… (more)

Subjects/Keywords: pointer analysis; alias analysis; LLVM; program analysis; program verification; static analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuderski, J. (2019). Scalable Context-Sensitive Pointer Analysis for LLVM. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/14875

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuderski, Jakub. “Scalable Context-Sensitive Pointer Analysis for LLVM.” 2019. Thesis, University of Waterloo. Accessed March 05, 2021. http://hdl.handle.net/10012/14875.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuderski, Jakub. “Scalable Context-Sensitive Pointer Analysis for LLVM.” 2019. Web. 05 Mar 2021.

Vancouver:

Kuderski J. Scalable Context-Sensitive Pointer Analysis for LLVM. [Internet] [Thesis]. University of Waterloo; 2019. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10012/14875.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuderski J. Scalable Context-Sensitive Pointer Analysis for LLVM. [Thesis]. University of Waterloo; 2019. Available from: http://hdl.handle.net/10012/14875

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

3. Hirvisalo, Vesa. Using Static Program Analysis to Compile Fast Cache Simulators.

Degree: 2004, Helsinki University of Technology

This thesis presents a generic approach towards compiling fast execution-driven simulators, and applies this to cache simulation of programs. The resulting cache simulation method reduces… (more)

Subjects/Keywords: static analysis; program analysis; performance analysis; cache simulation; program slicing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hirvisalo, V. (2004). Using Static Program Analysis to Compile Fast Cache Simulators. (Thesis). Helsinki University of Technology. Retrieved from http://lib.tkk.fi/Diss/2004/isbn9512270137/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hirvisalo, Vesa. “Using Static Program Analysis to Compile Fast Cache Simulators.” 2004. Thesis, Helsinki University of Technology. Accessed March 05, 2021. http://lib.tkk.fi/Diss/2004/isbn9512270137/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hirvisalo, Vesa. “Using Static Program Analysis to Compile Fast Cache Simulators.” 2004. Web. 05 Mar 2021.

Vancouver:

Hirvisalo V. Using Static Program Analysis to Compile Fast Cache Simulators. [Internet] [Thesis]. Helsinki University of Technology; 2004. [cited 2021 Mar 05]. Available from: http://lib.tkk.fi/Diss/2004/isbn9512270137/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hirvisalo V. Using Static Program Analysis to Compile Fast Cache Simulators. [Thesis]. Helsinki University of Technology; 2004. Available from: http://lib.tkk.fi/Diss/2004/isbn9512270137/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Alden, B. E. P. An expert system approach to retrograde-analysis.

Degree: PhD, 1985, Open University

 This thesis presents a system called RETRO, which has the capability of solving a number of retrograde-analysis chess problems of varying degrees of difficulty. Retrograde-analysis(more)

Subjects/Keywords: 005; Programme for chess analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alden, B. E. P. (1985). An expert system approach to retrograde-analysis. (Doctoral Dissertation). Open University. Retrieved from http://oro.open.ac.uk/56919/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.374286

Chicago Manual of Style (16th Edition):

Alden, B E P. “An expert system approach to retrograde-analysis.” 1985. Doctoral Dissertation, Open University. Accessed March 05, 2021. http://oro.open.ac.uk/56919/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.374286.

MLA Handbook (7th Edition):

Alden, B E P. “An expert system approach to retrograde-analysis.” 1985. Web. 05 Mar 2021.

Vancouver:

Alden BEP. An expert system approach to retrograde-analysis. [Internet] [Doctoral dissertation]. Open University; 1985. [cited 2021 Mar 05]. Available from: http://oro.open.ac.uk/56919/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.374286.

Council of Science Editors:

Alden BEP. An expert system approach to retrograde-analysis. [Doctoral Dissertation]. Open University; 1985. Available from: http://oro.open.ac.uk/56919/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.374286

5. McCarthy, Jay. Static Analyses of Cryptographic Protocols.

Degree: PhD, Computer Science, 2008, Brown University

 Most protocol analyses only address security properties. However, other properties are important and can increase our understanding of protocols, as well as aid in the… (more)

Subjects/Keywords: Program analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McCarthy, J. (2008). Static Analyses of Cryptographic Protocols. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:65/

Chicago Manual of Style (16th Edition):

McCarthy, Jay. “Static Analyses of Cryptographic Protocols.” 2008. Doctoral Dissertation, Brown University. Accessed March 05, 2021. https://repository.library.brown.edu/studio/item/bdr:65/.

MLA Handbook (7th Edition):

McCarthy, Jay. “Static Analyses of Cryptographic Protocols.” 2008. Web. 05 Mar 2021.

Vancouver:

McCarthy J. Static Analyses of Cryptographic Protocols. [Internet] [Doctoral dissertation]. Brown University; 2008. [cited 2021 Mar 05]. Available from: https://repository.library.brown.edu/studio/item/bdr:65/.

Council of Science Editors:

McCarthy J. Static Analyses of Cryptographic Protocols. [Doctoral Dissertation]. Brown University; 2008. Available from: https://repository.library.brown.edu/studio/item/bdr:65/


Georgia Tech

6. Callan, Robert Locke. Analyzing software using unintentional electromagnetic emanations from computing devices.

Degree: PhD, Electrical and Computer Engineering, 2016, Georgia Tech

 This thesis develops methods to identify, quantify, and use information leaked in Electromagnetic (EM) emanations from a broad range of computing devices in a general… (more)

Subjects/Keywords: Electromagnetic emanations; Program analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Callan, R. L. (2016). Analyzing software using unintentional electromagnetic emanations from computing devices. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/56300

Chicago Manual of Style (16th Edition):

Callan, Robert Locke. “Analyzing software using unintentional electromagnetic emanations from computing devices.” 2016. Doctoral Dissertation, Georgia Tech. Accessed March 05, 2021. http://hdl.handle.net/1853/56300.

MLA Handbook (7th Edition):

Callan, Robert Locke. “Analyzing software using unintentional electromagnetic emanations from computing devices.” 2016. Web. 05 Mar 2021.

Vancouver:

Callan RL. Analyzing software using unintentional electromagnetic emanations from computing devices. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/1853/56300.

Council of Science Editors:

Callan RL. Analyzing software using unintentional electromagnetic emanations from computing devices. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/56300


Georgia Tech

7. Kulkarni, Sulekha Raghavendra. Accelerating program analyses by cross-program training.

Degree: MS, Computer Science, 2016, Georgia Tech

 Practical programs share large modules of code. However, many program analyses are ineffective at reusing analysis results for shared code across programs. We present POLYMER,… (more)

Subjects/Keywords: Program analysis; Optimization; Datalog

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kulkarni, S. R. (2016). Accelerating program analyses by cross-program training. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/56359

Chicago Manual of Style (16th Edition):

Kulkarni, Sulekha Raghavendra. “Accelerating program analyses by cross-program training.” 2016. Masters Thesis, Georgia Tech. Accessed March 05, 2021. http://hdl.handle.net/1853/56359.

MLA Handbook (7th Edition):

Kulkarni, Sulekha Raghavendra. “Accelerating program analyses by cross-program training.” 2016. Web. 05 Mar 2021.

Vancouver:

Kulkarni SR. Accelerating program analyses by cross-program training. [Internet] [Masters thesis]. Georgia Tech; 2016. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/1853/56359.

Council of Science Editors:

Kulkarni SR. Accelerating program analyses by cross-program training. [Masters Thesis]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/56359


Virginia Tech

8. Williamson, Eric Robert. Hybrid Analysis Tools for Computer Systems Education.

Degree: MS, Computer Science and Applications, 2018, Virginia Tech

 To learn about computer operating systems, students at Virginia Tech implement a command-line shell in their Computer Systems course. Successfully implementing the shell requires a… (more)

Subjects/Keywords: CS Education; Program Analysis; Tools

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Williamson, E. R. (2018). Hybrid Analysis Tools for Computer Systems Education. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/83894

Chicago Manual of Style (16th Edition):

Williamson, Eric Robert. “Hybrid Analysis Tools for Computer Systems Education.” 2018. Masters Thesis, Virginia Tech. Accessed March 05, 2021. http://hdl.handle.net/10919/83894.

MLA Handbook (7th Edition):

Williamson, Eric Robert. “Hybrid Analysis Tools for Computer Systems Education.” 2018. Web. 05 Mar 2021.

Vancouver:

Williamson ER. Hybrid Analysis Tools for Computer Systems Education. [Internet] [Masters thesis]. Virginia Tech; 2018. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10919/83894.

Council of Science Editors:

Williamson ER. Hybrid Analysis Tools for Computer Systems Education. [Masters Thesis]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/83894


University of Alberta

9. Thiessen, Rei. Expression data flow graph: precise flow-sensitive pointer analysis for C programs.

Degree: MS, Department of Computing Science, 2011, University of Alberta

 Pointer analysis is a program analysis that determines the memory locations pointed to by individual pointers. Imprecise pointer information is a major impediment to data-flow… (more)

Subjects/Keywords: Alias analysis; Points-to analysis; Flow-sensitive; Pointer analysis; Program analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thiessen, R. (2011). Expression data flow graph: precise flow-sensitive pointer analysis for C programs. (Masters Thesis). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/2v23vt39w

Chicago Manual of Style (16th Edition):

Thiessen, Rei. “Expression data flow graph: precise flow-sensitive pointer analysis for C programs.” 2011. Masters Thesis, University of Alberta. Accessed March 05, 2021. https://era.library.ualberta.ca/files/2v23vt39w.

MLA Handbook (7th Edition):

Thiessen, Rei. “Expression data flow graph: precise flow-sensitive pointer analysis for C programs.” 2011. Web. 05 Mar 2021.

Vancouver:

Thiessen R. Expression data flow graph: precise flow-sensitive pointer analysis for C programs. [Internet] [Masters thesis]. University of Alberta; 2011. [cited 2021 Mar 05]. Available from: https://era.library.ualberta.ca/files/2v23vt39w.

Council of Science Editors:

Thiessen R. Expression data flow graph: precise flow-sensitive pointer analysis for C programs. [Masters Thesis]. University of Alberta; 2011. Available from: https://era.library.ualberta.ca/files/2v23vt39w


McMaster University

10. Chen, Wen. A Hybrid Software Change Impact Analysis for Large-scale Enterprise Systems.

Degree: PhD, 2015, McMaster University

 This work is concerned with analysing the potential impact of direct changes to large- scale enterprise systems, and, in particular, how to minimise testing efforts… (more)

Subjects/Keywords: software impact analysis; static analysis; dynamic analysis; reachability analysis; alias analysis; program analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, W. (2015). A Hybrid Software Change Impact Analysis for Large-scale Enterprise Systems. (Doctoral Dissertation). McMaster University. Retrieved from http://hdl.handle.net/11375/18275

Chicago Manual of Style (16th Edition):

Chen, Wen. “A Hybrid Software Change Impact Analysis for Large-scale Enterprise Systems.” 2015. Doctoral Dissertation, McMaster University. Accessed March 05, 2021. http://hdl.handle.net/11375/18275.

MLA Handbook (7th Edition):

Chen, Wen. “A Hybrid Software Change Impact Analysis for Large-scale Enterprise Systems.” 2015. Web. 05 Mar 2021.

Vancouver:

Chen W. A Hybrid Software Change Impact Analysis for Large-scale Enterprise Systems. [Internet] [Doctoral dissertation]. McMaster University; 2015. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/11375/18275.

Council of Science Editors:

Chen W. A Hybrid Software Change Impact Analysis for Large-scale Enterprise Systems. [Doctoral Dissertation]. McMaster University; 2015. Available from: http://hdl.handle.net/11375/18275

11. Wu, Tong. La relativisation prénominale : Prenominal Relative Clause.

Degree: Docteur es, Sciences du langage, 2011, Université Sorbonne Nouvelle – Paris III

Notre étude porte sur la proposition relative prénominale (Prpré), dans le cadre de la typologique et du modèle minimaliste de la grammaire générative. Le premier… (more)

Subjects/Keywords: Proposition relative prénominale; Programme minimaliste; Analyse de la Montée de Tête; Hypothèse de SD; Spécifieurs multiples; Prenominal relative clause; Minimalist Program; Head Raising Analysis; DP-Hypothesis; Multiple specifier; 400.1

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, T. (2011). La relativisation prénominale : Prenominal Relative Clause. (Doctoral Dissertation). Université Sorbonne Nouvelle – Paris III. Retrieved from http://www.theses.fr/2011PA030210

Chicago Manual of Style (16th Edition):

Wu, Tong. “La relativisation prénominale : Prenominal Relative Clause.” 2011. Doctoral Dissertation, Université Sorbonne Nouvelle – Paris III. Accessed March 05, 2021. http://www.theses.fr/2011PA030210.

MLA Handbook (7th Edition):

Wu, Tong. “La relativisation prénominale : Prenominal Relative Clause.” 2011. Web. 05 Mar 2021.

Vancouver:

Wu T. La relativisation prénominale : Prenominal Relative Clause. [Internet] [Doctoral dissertation]. Université Sorbonne Nouvelle – Paris III; 2011. [cited 2021 Mar 05]. Available from: http://www.theses.fr/2011PA030210.

Council of Science Editors:

Wu T. La relativisation prénominale : Prenominal Relative Clause. [Doctoral Dissertation]. Université Sorbonne Nouvelle – Paris III; 2011. Available from: http://www.theses.fr/2011PA030210

12. Cohen, Joël. Deux résultats d'analyse harmonique sur un groupe P-adique tordu : Two results of Harmonic Anlysis on a twisted p-adic group.

Degree: Docteur es, Mathématiques, 2013, Aix Marseille Université

Dans cette thèse, nous montrons deux résultats d'analyse harmonique sur un groupe réductif p-adique tordu.Le premier résultat est un analogue non connexe au théorème matriciel… (more)

Subjects/Keywords: Mathématiques; Analyse Harmonique p-adique; Théorie des Représentations; Groupes tordus; Programme de Langlands; Endoscopie; Mathematics; P-adic Harmonic analysis; Representation Theory; Twisted groups; Langlands program; Endoscopy; 510

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cohen, J. (2013). Deux résultats d'analyse harmonique sur un groupe P-adique tordu : Two results of Harmonic Anlysis on a twisted p-adic group. (Doctoral Dissertation). Aix Marseille Université. Retrieved from http://www.theses.fr/2013AIXM4088

Chicago Manual of Style (16th Edition):

Cohen, Joël. “Deux résultats d'analyse harmonique sur un groupe P-adique tordu : Two results of Harmonic Anlysis on a twisted p-adic group.” 2013. Doctoral Dissertation, Aix Marseille Université. Accessed March 05, 2021. http://www.theses.fr/2013AIXM4088.

MLA Handbook (7th Edition):

Cohen, Joël. “Deux résultats d'analyse harmonique sur un groupe P-adique tordu : Two results of Harmonic Anlysis on a twisted p-adic group.” 2013. Web. 05 Mar 2021.

Vancouver:

Cohen J. Deux résultats d'analyse harmonique sur un groupe P-adique tordu : Two results of Harmonic Anlysis on a twisted p-adic group. [Internet] [Doctoral dissertation]. Aix Marseille Université 2013. [cited 2021 Mar 05]. Available from: http://www.theses.fr/2013AIXM4088.

Council of Science Editors:

Cohen J. Deux résultats d'analyse harmonique sur un groupe P-adique tordu : Two results of Harmonic Anlysis on a twisted p-adic group. [Doctoral Dissertation]. Aix Marseille Université 2013. Available from: http://www.theses.fr/2013AIXM4088


Université de Grenoble

13. Pietrek, Artur. TIREX : une représentation textuelle intermédiaire pour un environnement d'exécution virtuel, échanger des informations du compilateur et d'analyse du programme : TIREX : A textual target-level intermediate representation for virtual execution environment, compiler information exchange and program analysis.

Degree: Docteur es, Informatique, 2012, Université de Grenoble

Certains environnements ont besoin de plusieurs compilateurs, par exemple un pour le système d'exploitation, supportant la norme C/C++ complète, et l'autre pour les applications, qui… (more)

Subjects/Keywords: Représentation intermédiaire; Compilation; Interpretation SSA; Just-In-Time; Langage de programmation; Analyse du programme; Intermediate representation; Compilation; Interpretation SSA; Just-In-Time; Programming languages; Program analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pietrek, A. (2012). TIREX : une représentation textuelle intermédiaire pour un environnement d'exécution virtuel, échanger des informations du compilateur et d'analyse du programme : TIREX : A textual target-level intermediate representation for virtual execution environment, compiler information exchange and program analysis. (Doctoral Dissertation). Université de Grenoble. Retrieved from http://www.theses.fr/2012GRENM046

Chicago Manual of Style (16th Edition):

Pietrek, Artur. “TIREX : une représentation textuelle intermédiaire pour un environnement d'exécution virtuel, échanger des informations du compilateur et d'analyse du programme : TIREX : A textual target-level intermediate representation for virtual execution environment, compiler information exchange and program analysis.” 2012. Doctoral Dissertation, Université de Grenoble. Accessed March 05, 2021. http://www.theses.fr/2012GRENM046.

MLA Handbook (7th Edition):

Pietrek, Artur. “TIREX : une représentation textuelle intermédiaire pour un environnement d'exécution virtuel, échanger des informations du compilateur et d'analyse du programme : TIREX : A textual target-level intermediate representation for virtual execution environment, compiler information exchange and program analysis.” 2012. Web. 05 Mar 2021.

Vancouver:

Pietrek A. TIREX : une représentation textuelle intermédiaire pour un environnement d'exécution virtuel, échanger des informations du compilateur et d'analyse du programme : TIREX : A textual target-level intermediate representation for virtual execution environment, compiler information exchange and program analysis. [Internet] [Doctoral dissertation]. Université de Grenoble; 2012. [cited 2021 Mar 05]. Available from: http://www.theses.fr/2012GRENM046.

Council of Science Editors:

Pietrek A. TIREX : une représentation textuelle intermédiaire pour un environnement d'exécution virtuel, échanger des informations du compilateur et d'analyse du programme : TIREX : A textual target-level intermediate representation for virtual execution environment, compiler information exchange and program analysis. [Doctoral Dissertation]. Université de Grenoble; 2012. Available from: http://www.theses.fr/2012GRENM046

14. Kiepas, Patryk. Analyses de performances et transformations de code pour les applications MATLAB : Performance analyses and code transformations for MATLAB applications.

Degree: Docteur es, Informatique temps réel, robotique et automatique, 2019, Paris Sciences et Lettres (ComUE)

MATLAB est un environnement informatique doté d'un langage de programmation simple et d'une vaste bibliothèque de fonctions couramment utilisées en science et ingénierie (CSE) pour… (more)

Subjects/Keywords: Optimisation du programme; Analyse de performance; Compteurs de performance; MATLAB; Modèle d'exécution; Transformation de code; Program optimisation; Performance analysis; Performance counters; MATLAB; Execution model; Code transformation; 005.13

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kiepas, P. (2019). Analyses de performances et transformations de code pour les applications MATLAB : Performance analyses and code transformations for MATLAB applications. (Doctoral Dissertation). Paris Sciences et Lettres (ComUE). Retrieved from http://www.theses.fr/2019PSLEM063

Chicago Manual of Style (16th Edition):

Kiepas, Patryk. “Analyses de performances et transformations de code pour les applications MATLAB : Performance analyses and code transformations for MATLAB applications.” 2019. Doctoral Dissertation, Paris Sciences et Lettres (ComUE). Accessed March 05, 2021. http://www.theses.fr/2019PSLEM063.

MLA Handbook (7th Edition):

Kiepas, Patryk. “Analyses de performances et transformations de code pour les applications MATLAB : Performance analyses and code transformations for MATLAB applications.” 2019. Web. 05 Mar 2021.

Vancouver:

Kiepas P. Analyses de performances et transformations de code pour les applications MATLAB : Performance analyses and code transformations for MATLAB applications. [Internet] [Doctoral dissertation]. Paris Sciences et Lettres (ComUE); 2019. [cited 2021 Mar 05]. Available from: http://www.theses.fr/2019PSLEM063.

Council of Science Editors:

Kiepas P. Analyses de performances et transformations de code pour les applications MATLAB : Performance analyses and code transformations for MATLAB applications. [Doctoral Dissertation]. Paris Sciences et Lettres (ComUE); 2019. Available from: http://www.theses.fr/2019PSLEM063


Universiteit Utrecht

15. Hulshof, L.P. Gatekeepers in Innovation Networks. Who are the gatekeepers in innovation networks of the German biotechnology sector?.

Degree: 2012, Universiteit Utrecht

 In this study, the process of innovation through knowledge transfer is investigated by identifying gatekeepers in cognitive innovation networks in the biotech industry in Germany,… (more)

Subjects/Keywords: Geowetenschappen; Gatekeepers, Innovation Networks, Network Analysis, Knowledge Transfer, Innovation Policy, Germany, Framework Programme, Subsidy Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hulshof, L. P. (2012). Gatekeepers in Innovation Networks. Who are the gatekeepers in innovation networks of the German biotechnology sector?. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/256346

Chicago Manual of Style (16th Edition):

Hulshof, L P. “Gatekeepers in Innovation Networks. Who are the gatekeepers in innovation networks of the German biotechnology sector?.” 2012. Masters Thesis, Universiteit Utrecht. Accessed March 05, 2021. http://dspace.library.uu.nl:8080/handle/1874/256346.

MLA Handbook (7th Edition):

Hulshof, L P. “Gatekeepers in Innovation Networks. Who are the gatekeepers in innovation networks of the German biotechnology sector?.” 2012. Web. 05 Mar 2021.

Vancouver:

Hulshof LP. Gatekeepers in Innovation Networks. Who are the gatekeepers in innovation networks of the German biotechnology sector?. [Internet] [Masters thesis]. Universiteit Utrecht; 2012. [cited 2021 Mar 05]. Available from: http://dspace.library.uu.nl:8080/handle/1874/256346.

Council of Science Editors:

Hulshof LP. Gatekeepers in Innovation Networks. Who are the gatekeepers in innovation networks of the German biotechnology sector?. [Masters Thesis]. Universiteit Utrecht; 2012. Available from: http://dspace.library.uu.nl:8080/handle/1874/256346


Universidade Federal de Viçosa

16. Cláudia Valéria Távora Cabral. Análise de dimensionamento estocástico e determinístico de sistemas fotovoltaicos isolados.

Degree: 2006, Universidade Federal de Viçosa

This paper presents the photovoltaic systems modeling (photovoltaic generators and batteries) and a new methodology for the sizing of stand-alone photovoltaic systems using a stochastic… (more)

Subjects/Keywords: Dimensionamento; Sistemas voltaicos; Programa computacional; ENERGIZACAO RURAL; Sizing analysis; Photovoltaic systems; Computer programme

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cabral, C. V. T. (2006). Análise de dimensionamento estocástico e determinístico de sistemas fotovoltaicos isolados. (Thesis). Universidade Federal de Viçosa. Retrieved from http://www.tede.ufv.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=425

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cabral, Cláudia Valéria Távora. “Análise de dimensionamento estocástico e determinístico de sistemas fotovoltaicos isolados.” 2006. Thesis, Universidade Federal de Viçosa. Accessed March 05, 2021. http://www.tede.ufv.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=425.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cabral, Cláudia Valéria Távora. “Análise de dimensionamento estocástico e determinístico de sistemas fotovoltaicos isolados.” 2006. Web. 05 Mar 2021.

Vancouver:

Cabral CVT. Análise de dimensionamento estocástico e determinístico de sistemas fotovoltaicos isolados. [Internet] [Thesis]. Universidade Federal de Viçosa; 2006. [cited 2021 Mar 05]. Available from: http://www.tede.ufv.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=425.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cabral CVT. Análise de dimensionamento estocástico e determinístico de sistemas fotovoltaicos isolados. [Thesis]. Universidade Federal de Viçosa; 2006. Available from: http://www.tede.ufv.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=425

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Victoria University of Wellington

17. Grams, Mark. Active Investment: Evaluating the Benefits and Costs of Investing in Active Travel in the Urban New Zealand Context.

Degree: 2015, Victoria University of Wellington

 Increased uptake of active travel is widely acknowledged to promote improved health, environmental and community outcomes. Although active travel participation rates in New Zealand compare… (more)

Subjects/Keywords: Active travel; Cost-benefit analysis; Model Communities Programme; Walking; Cycling; Economic evaluation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grams, M. (2015). Active Investment: Evaluating the Benefits and Costs of Investing in Active Travel in the Urban New Zealand Context. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/8760

Chicago Manual of Style (16th Edition):

Grams, Mark. “Active Investment: Evaluating the Benefits and Costs of Investing in Active Travel in the Urban New Zealand Context.” 2015. Masters Thesis, Victoria University of Wellington. Accessed March 05, 2021. http://hdl.handle.net/10063/8760.

MLA Handbook (7th Edition):

Grams, Mark. “Active Investment: Evaluating the Benefits and Costs of Investing in Active Travel in the Urban New Zealand Context.” 2015. Web. 05 Mar 2021.

Vancouver:

Grams M. Active Investment: Evaluating the Benefits and Costs of Investing in Active Travel in the Urban New Zealand Context. [Internet] [Masters thesis]. Victoria University of Wellington; 2015. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10063/8760.

Council of Science Editors:

Grams M. Active Investment: Evaluating the Benefits and Costs of Investing in Active Travel in the Urban New Zealand Context. [Masters Thesis]. Victoria University of Wellington; 2015. Available from: http://hdl.handle.net/10063/8760


University of Toronto

18. Wong, Michelle Yan Yi. Targeted Dynamic Analysis for Android Malware.

Degree: 2015, University of Toronto

The identification and analysis of Android malware involves either static or dynamic program analysis of the malware binary. While static analysis has good code coverage,… (more)

Subjects/Keywords: android; constraint solving; dynamic analysis; malware; program analysis; static analysis; 0464

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wong, M. Y. Y. (2015). Targeted Dynamic Analysis for Android Malware. (Masters Thesis). University of Toronto. Retrieved from http://hdl.handle.net/1807/69183

Chicago Manual of Style (16th Edition):

Wong, Michelle Yan Yi. “Targeted Dynamic Analysis for Android Malware.” 2015. Masters Thesis, University of Toronto. Accessed March 05, 2021. http://hdl.handle.net/1807/69183.

MLA Handbook (7th Edition):

Wong, Michelle Yan Yi. “Targeted Dynamic Analysis for Android Malware.” 2015. Web. 05 Mar 2021.

Vancouver:

Wong MYY. Targeted Dynamic Analysis for Android Malware. [Internet] [Masters thesis]. University of Toronto; 2015. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/1807/69183.

Council of Science Editors:

Wong MYY. Targeted Dynamic Analysis for Android Malware. [Masters Thesis]. University of Toronto; 2015. Available from: http://hdl.handle.net/1807/69183


University of Pretoria

19. [No author]. The experiences of students participating in an HIV/AIDS teacher education pilot programme .

Degree: 2012, University of Pretoria

 The current research study was a qualitative investigation to explore and describe how students, registered for the Education 364 module, experienced the HIV/AIDS teacher education… (more)

Subjects/Keywords: Content analysis; Experiences; Curriculum development; Heaids; Hiv; Aids; Pilot programme; Secondary data; Teachers training; Teachers; Thematic analysis; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2012). The experiences of students participating in an HIV/AIDS teacher education pilot programme . (Masters Thesis). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-12192011-153108/

Chicago Manual of Style (16th Edition):

author], [No. “The experiences of students participating in an HIV/AIDS teacher education pilot programme .” 2012. Masters Thesis, University of Pretoria. Accessed March 05, 2021. http://upetd.up.ac.za/thesis/available/etd-12192011-153108/.

MLA Handbook (7th Edition):

author], [No. “The experiences of students participating in an HIV/AIDS teacher education pilot programme .” 2012. Web. 05 Mar 2021.

Vancouver:

author] [. The experiences of students participating in an HIV/AIDS teacher education pilot programme . [Internet] [Masters thesis]. University of Pretoria; 2012. [cited 2021 Mar 05]. Available from: http://upetd.up.ac.za/thesis/available/etd-12192011-153108/.

Council of Science Editors:

author] [. The experiences of students participating in an HIV/AIDS teacher education pilot programme . [Masters Thesis]. University of Pretoria; 2012. Available from: http://upetd.up.ac.za/thesis/available/etd-12192011-153108/


University of Pretoria

20. Jonker, Carine-Mari. The experiences of students participating in an HIV/AIDS teacher education pilot programme.

Degree: Educational Psychology, 2012, University of Pretoria

 The current research study was a qualitative investigation to explore and describe how students, registered for the Education 364 module, experienced the HIV/AIDS teacher education… (more)

Subjects/Keywords: Content analysis; Experiences; Curriculum development; Heaids; Hiv; Aids; Pilot programme; Secondary data; Teachers training; Teachers; Thematic analysis; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jonker, C. (2012). The experiences of students participating in an HIV/AIDS teacher education pilot programme. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/30434

Chicago Manual of Style (16th Edition):

Jonker, Carine-Mari. “The experiences of students participating in an HIV/AIDS teacher education pilot programme.” 2012. Masters Thesis, University of Pretoria. Accessed March 05, 2021. http://hdl.handle.net/2263/30434.

MLA Handbook (7th Edition):

Jonker, Carine-Mari. “The experiences of students participating in an HIV/AIDS teacher education pilot programme.” 2012. Web. 05 Mar 2021.

Vancouver:

Jonker C. The experiences of students participating in an HIV/AIDS teacher education pilot programme. [Internet] [Masters thesis]. University of Pretoria; 2012. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/2263/30434.

Council of Science Editors:

Jonker C. The experiences of students participating in an HIV/AIDS teacher education pilot programme. [Masters Thesis]. University of Pretoria; 2012. Available from: http://hdl.handle.net/2263/30434


University of Minnesota

21. Sharma, Vaibhav. Adapter Synthesis: Synthesizing And Repairing Programs Using Scalable Symbolic Execution.

Degree: PhD, Computer Science, 2020, University of Minnesota

 Independently developed codebases typically contain many segments of code that perform the same or closely related operations (semantic clones). Finding functionally equivalent segments enables applications… (more)

Subjects/Keywords: adapter synthesis; binary analysis; cegis; program repair; program synthesis; symbolic execution

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sharma, V. (2020). Adapter Synthesis: Synthesizing And Repairing Programs Using Scalable Symbolic Execution. (Doctoral Dissertation). University of Minnesota. Retrieved from http://hdl.handle.net/11299/213126

Chicago Manual of Style (16th Edition):

Sharma, Vaibhav. “Adapter Synthesis: Synthesizing And Repairing Programs Using Scalable Symbolic Execution.” 2020. Doctoral Dissertation, University of Minnesota. Accessed March 05, 2021. http://hdl.handle.net/11299/213126.

MLA Handbook (7th Edition):

Sharma, Vaibhav. “Adapter Synthesis: Synthesizing And Repairing Programs Using Scalable Symbolic Execution.” 2020. Web. 05 Mar 2021.

Vancouver:

Sharma V. Adapter Synthesis: Synthesizing And Repairing Programs Using Scalable Symbolic Execution. [Internet] [Doctoral dissertation]. University of Minnesota; 2020. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/11299/213126.

Council of Science Editors:

Sharma V. Adapter Synthesis: Synthesizing And Repairing Programs Using Scalable Symbolic Execution. [Doctoral Dissertation]. University of Minnesota; 2020. Available from: http://hdl.handle.net/11299/213126


University of Waterloo

22. Fang, Zheng. Test Clone Detection via Assertion Fingerprints.

Degree: 2014, University of Waterloo

 Large software systems require large test suites to achieve high coverage. Test suites often employ closed unit tests that are self-contained and have no input… (more)

Subjects/Keywords: Software testing; Program analysis; Program comprehension and visualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fang, Z. (2014). Test Clone Detection via Assertion Fingerprints. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/8831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fang, Zheng. “Test Clone Detection via Assertion Fingerprints.” 2014. Thesis, University of Waterloo. Accessed March 05, 2021. http://hdl.handle.net/10012/8831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fang, Zheng. “Test Clone Detection via Assertion Fingerprints.” 2014. Web. 05 Mar 2021.

Vancouver:

Fang Z. Test Clone Detection via Assertion Fingerprints. [Internet] [Thesis]. University of Waterloo; 2014. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10012/8831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fang Z. Test Clone Detection via Assertion Fingerprints. [Thesis]. University of Waterloo; 2014. Available from: http://hdl.handle.net/10012/8831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universiteit Utrecht

23. Naus, N. Dynamic type inference for JavaScript.

Degree: 2015, Universiteit Utrecht

 With this master thesis, we have shown that Dynamic Type Inference is a feasi- ble method for doing type inference for JavaScript. The idea of… (more)

Subjects/Keywords: JavaScript; Type Inference; Automatic Program Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naus, N. (2015). Dynamic type inference for JavaScript. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/319986

Chicago Manual of Style (16th Edition):

Naus, N. “Dynamic type inference for JavaScript.” 2015. Masters Thesis, Universiteit Utrecht. Accessed March 05, 2021. http://dspace.library.uu.nl:8080/handle/1874/319986.

MLA Handbook (7th Edition):

Naus, N. “Dynamic type inference for JavaScript.” 2015. Web. 05 Mar 2021.

Vancouver:

Naus N. Dynamic type inference for JavaScript. [Internet] [Masters thesis]. Universiteit Utrecht; 2015. [cited 2021 Mar 05]. Available from: http://dspace.library.uu.nl:8080/handle/1874/319986.

Council of Science Editors:

Naus N. Dynamic type inference for JavaScript. [Masters Thesis]. Universiteit Utrecht; 2015. Available from: http://dspace.library.uu.nl:8080/handle/1874/319986


Penn State University

24. Kilmer, Eric David. Extending Vulnerability Discovery with Fuzzing and Symbolic Execution to Realistic Applications.

Degree: 2017, Penn State University

 In 2016, DARPA held the Cyber Grand Challenge (CGC) using a special execution and evaluation environment to compare the results of different techniques in automated… (more)

Subjects/Keywords: Symbolic Execution; Vulnerability Discovery; Program Analysis; Fuzzing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kilmer, E. D. (2017). Extending Vulnerability Discovery with Fuzzing and Symbolic Execution to Realistic Applications. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/14016eyk5120

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kilmer, Eric David. “Extending Vulnerability Discovery with Fuzzing and Symbolic Execution to Realistic Applications.” 2017. Thesis, Penn State University. Accessed March 05, 2021. https://submit-etda.libraries.psu.edu/catalog/14016eyk5120.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kilmer, Eric David. “Extending Vulnerability Discovery with Fuzzing and Symbolic Execution to Realistic Applications.” 2017. Web. 05 Mar 2021.

Vancouver:

Kilmer ED. Extending Vulnerability Discovery with Fuzzing and Symbolic Execution to Realistic Applications. [Internet] [Thesis]. Penn State University; 2017. [cited 2021 Mar 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/14016eyk5120.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kilmer ED. Extending Vulnerability Discovery with Fuzzing and Symbolic Execution to Realistic Applications. [Thesis]. Penn State University; 2017. Available from: https://submit-etda.libraries.psu.edu/catalog/14016eyk5120

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

25. Liu, Shen. Quantitative Privilege Separation with Pointer Supports.

Degree: 2020, Penn State University

 Partitioning a security-sensitive application into least-privileged components and putting each into a separate protection domain have long been a goal of security practitioners and researchers.… (more)

Subjects/Keywords: Privilege Separation; Program Analysis; Software Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, S. (2020). Quantitative Privilege Separation with Pointer Supports. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/17582sxl463

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Shen. “Quantitative Privilege Separation with Pointer Supports.” 2020. Thesis, Penn State University. Accessed March 05, 2021. https://submit-etda.libraries.psu.edu/catalog/17582sxl463.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Shen. “Quantitative Privilege Separation with Pointer Supports.” 2020. Web. 05 Mar 2021.

Vancouver:

Liu S. Quantitative Privilege Separation with Pointer Supports. [Internet] [Thesis]. Penn State University; 2020. [cited 2021 Mar 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/17582sxl463.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu S. Quantitative Privilege Separation with Pointer Supports. [Thesis]. Penn State University; 2020. Available from: https://submit-etda.libraries.psu.edu/catalog/17582sxl463

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Addis Ababa University

26. Kefyalew, Mergiya. Causes of Failure of Projects under Universal Electricity Access Program of Ethiopian Electric Power: The Case of Projects Financed by the Ethiopian Government .

Degree: 2015, Addis Ababa University

 Achieving 75% electricity access coverage target of the nation by the end of year 2015 is given to Ethiopian Electric Power Corporation and to meet… (more)

Subjects/Keywords: Universal Electricity access program; regression analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kefyalew, M. (2015). Causes of Failure of Projects under Universal Electricity Access Program of Ethiopian Electric Power: The Case of Projects Financed by the Ethiopian Government . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/6860

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kefyalew, Mergiya. “Causes of Failure of Projects under Universal Electricity Access Program of Ethiopian Electric Power: The Case of Projects Financed by the Ethiopian Government .” 2015. Thesis, Addis Ababa University. Accessed March 05, 2021. http://etd.aau.edu.et/dspace/handle/123456789/6860.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kefyalew, Mergiya. “Causes of Failure of Projects under Universal Electricity Access Program of Ethiopian Electric Power: The Case of Projects Financed by the Ethiopian Government .” 2015. Web. 05 Mar 2021.

Vancouver:

Kefyalew M. Causes of Failure of Projects under Universal Electricity Access Program of Ethiopian Electric Power: The Case of Projects Financed by the Ethiopian Government . [Internet] [Thesis]. Addis Ababa University; 2015. [cited 2021 Mar 05]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/6860.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kefyalew M. Causes of Failure of Projects under Universal Electricity Access Program of Ethiopian Electric Power: The Case of Projects Financed by the Ethiopian Government . [Thesis]. Addis Ababa University; 2015. Available from: http://etd.aau.edu.et/dspace/handle/123456789/6860

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Colorado

27. Price, Graham David. Dynamic Trace Analysis with Zero-Suppressed BDDs.

Degree: PhD, Electrical, Computer & Energy Engineering, 2011, University of Colorado

  Instruction level parallelism (ILP) limitations have forced processor manufacturers to develop multi-core platforms with the expectation that programs will be able to exploit thread… (more)

Subjects/Keywords: Dynamic Program Analysis; Parallelism; Computer Sciences; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Price, G. D. (2011). Dynamic Trace Analysis with Zero-Suppressed BDDs. (Doctoral Dissertation). University of Colorado. Retrieved from https://scholar.colorado.edu/ecen_gradetds/27

Chicago Manual of Style (16th Edition):

Price, Graham David. “Dynamic Trace Analysis with Zero-Suppressed BDDs.” 2011. Doctoral Dissertation, University of Colorado. Accessed March 05, 2021. https://scholar.colorado.edu/ecen_gradetds/27.

MLA Handbook (7th Edition):

Price, Graham David. “Dynamic Trace Analysis with Zero-Suppressed BDDs.” 2011. Web. 05 Mar 2021.

Vancouver:

Price GD. Dynamic Trace Analysis with Zero-Suppressed BDDs. [Internet] [Doctoral dissertation]. University of Colorado; 2011. [cited 2021 Mar 05]. Available from: https://scholar.colorado.edu/ecen_gradetds/27.

Council of Science Editors:

Price GD. Dynamic Trace Analysis with Zero-Suppressed BDDs. [Doctoral Dissertation]. University of Colorado; 2011. Available from: https://scholar.colorado.edu/ecen_gradetds/27


University of Illinois – Chicago

28. Monshizadeh, Maliheh -. Inferring Specifications for Web Application Security.

Degree: 2017, University of Illinois – Chicago

 Over the past two decades, we have been witnessing the evolution of the web applications from simple static pages into complex, interactive platforms. With increasing… (more)

Subjects/Keywords: Program Analysis; Web Applications; Software Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Monshizadeh, M. -. (2017). Inferring Specifications for Web Application Security. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/21846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Monshizadeh, Maliheh -. “Inferring Specifications for Web Application Security.” 2017. Thesis, University of Illinois – Chicago. Accessed March 05, 2021. http://hdl.handle.net/10027/21846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Monshizadeh, Maliheh -. “Inferring Specifications for Web Application Security.” 2017. Web. 05 Mar 2021.

Vancouver:

Monshizadeh M-. Inferring Specifications for Web Application Security. [Internet] [Thesis]. University of Illinois – Chicago; 2017. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10027/21846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Monshizadeh M-. Inferring Specifications for Web Application Security. [Thesis]. University of Illinois – Chicago; 2017. Available from: http://hdl.handle.net/10027/21846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Iowa State University

29. Holland, Benjamin Robert. Computing homomorphic program invariants.

Degree: 2018, Iowa State University

Program invariants are properties that are true at a particular program point or points. Program invariants are often undocumented assertions made by a programmer that… (more)

Subjects/Keywords: invariants; program analysis; software security; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Holland, B. R. (2018). Computing homomorphic program invariants. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/16818

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Holland, Benjamin Robert. “Computing homomorphic program invariants.” 2018. Thesis, Iowa State University. Accessed March 05, 2021. https://lib.dr.iastate.edu/etd/16818.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Holland, Benjamin Robert. “Computing homomorphic program invariants.” 2018. Web. 05 Mar 2021.

Vancouver:

Holland BR. Computing homomorphic program invariants. [Internet] [Thesis]. Iowa State University; 2018. [cited 2021 Mar 05]. Available from: https://lib.dr.iastate.edu/etd/16818.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Holland BR. Computing homomorphic program invariants. [Thesis]. Iowa State University; 2018. Available from: https://lib.dr.iastate.edu/etd/16818

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Tennessee – Knoxville

30. Zhou, Tong. Slot-based Calling Context Encoding.

Degree: MS, Computer Science, 2018, University of Tennessee – Knoxville

 Calling context is widely used in software engineering areas such as profiling, debugging and event logging. It can also enhance some dynamic analysis such as… (more)

Subjects/Keywords: calling context encoding; context sensitivity; program analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhou, T. (2018). Slot-based Calling Context Encoding. (Thesis). University of Tennessee – Knoxville. Retrieved from https://trace.tennessee.edu/utk_gradthes/5131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhou, Tong. “Slot-based Calling Context Encoding.” 2018. Thesis, University of Tennessee – Knoxville. Accessed March 05, 2021. https://trace.tennessee.edu/utk_gradthes/5131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhou, Tong. “Slot-based Calling Context Encoding.” 2018. Web. 05 Mar 2021.

Vancouver:

Zhou T. Slot-based Calling Context Encoding. [Internet] [Thesis]. University of Tennessee – Knoxville; 2018. [cited 2021 Mar 05]. Available from: https://trace.tennessee.edu/utk_gradthes/5131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhou T. Slot-based Calling Context Encoding. [Thesis]. University of Tennessee – Knoxville; 2018. Available from: https://trace.tennessee.edu/utk_gradthes/5131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [28]

.