Browsing by Subject "Computer engineering"
Now showing items 1-8 of 8
-
A Constraint-Based Method For Flow-Sensitive Static Type Analysis Of PHP Using The Rascal Meta-Programming Platform
(East Carolina University, 2015)PHP is a dynamically typed language, and is very popular among developers for building websites. The dynamic features of PHP allow for many kinds of type related errors to be made by developers. Since PHP does not feature ... -
Applying Mutable Object Snapshots to a High-level Object-Oriented Language
(East Carolina University, 2018-11-30)Software Engineers are familiar with mutable and immutable object state. Mutable objects shared across modules may lead to unexpected results as changes to the object in one module are visible to other modules sharing the ... -
Migration of Legacy Web Application Using NoSQL Databases
(East Carolina University, 2013)The Migration of the legacy web application to Content Management Systems (CMS) is inevitable because of the overload of managing the content. Traditionally, Content Management Systems are built with RDBMSes and the migration ... -
Modeling and Testing of Aspect-Oriented Systems
(East Carolina University, 2011)Aspect-Oriented programming modularizes crosscutting concerns into Aspects, which are automatically weaved to the specified points of a program. Although Aspect-Oriented programming improves program maintainability and the ... -
Optimization of Web Services for Cloud Deployment and Mobile Consumption
(East Carolina University, 2013)Research performed for this thesis indicates an impedance mismatch between prevailing approaches to development of service-oriented enterprise applications and the consumption capabilities of mobile devices. The rich ... -
Overhauling Legacy Enterprise Software Applications with a Concept Refinement Process Model
(East Carolina University, 2013)Currently, there are many legacy enterprise software applications in active deployment that are outdated. These large legacy applications are rapidly becoming less practical for both the organizations they service, and for ... -
A Protocol and Tool for Developing a Descriptive Behavioral Model
(East Carolina University, 2012)Fuzzy rules have been used to model complex human behavior in order to develop sophisticated industrial control systems. The use of fuzzy rules to create a behavioral model provides a quantitative basis for discussing the ... -
Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System
(East Carolina University, 2011)Cloud computing offers massive scalability, immediate availability, and low cost services as major benefits, but as with most new technologies, it introduces new risks and vulnerabilities too. Despite the fact that different ...