Search
Now showing items 21-29 of 29
Exploring the Usability Issues Encountered by Individuals with Visual Impairments on Social Networking Sites: Problem Description, System Evaluation and Semantic Web Solution
(East Carolina University, 2014-08-28)
While social networking sites (SNSs) like Facebook are widely used and have been broadly studied, investigations of their use by individuals with visual impairments are scarce within the academic literature. Anecdotal ...
A Constraint-Based Method For Flow-Sensitive Static Type Analysis Of PHP Using The Rascal Meta-Programming Platform
(East Carolina University, 2015)
PHP is a dynamically typed language, and is very popular among developers for building websites. The dynamic features of PHP allow for many kinds of type related errors to be made by developers. Since PHP does not feature ...
Runtime Monitoring On Hard Real-Time Operating Systems
(East Carolina University, 2015)
This thesis will compare and evaluate different approaches in integrating runtime monitors into processes running on a hard real-time operating system. The host system is a single board computer (SBC) with a VxWorks 653 ...
Gesture Prediction Model for the Guitar Fingering Problem
(East Carolina University, 2014)
In this thesis we provide a method for finding the fingering of a music piece on any type of guitar using a hand model. Adapting to the real world conditions by deploying a model of the user's hand, and considering the ...
miRDiabetes : A microRNA-Diabetes Association Database Constructed With Data Mining on Literature
(East Carolina University, 2014)
MicroRNAs (miRNAs) are a growing class of non-coding RNAs that regulate gene expression by translational repression. A role for miRNA in diabetes was first established in 2004 and research in miRNA-diabetes association has ...
Treasure Island Security framework : A Generic Security Framework for public clouds
(East Carolina University, 2014)
In this thesis we introduce a generic security framework for public clouds called Treasure Island Security framework that is designed to address the issues related to cloud computing security and specifically key-management ...
Using The Morphological Analysis Perspective (MAP) In Software Engineering Project Management
(East Carolina University, 2015)
Corporations require well defined strategies and successful implementation of strategic solutions in order to survive, facilitate growth, and remain competitive. In the current internet enabled economy, software development ...
Overhauling Legacy Enterprise Software Applications with a Concept Refinement Process Model
(East Carolina University, 2013)
Currently, there are many legacy enterprise software applications in active deployment that are outdated. These large legacy applications are rapidly becoming less practical for both the organizations they service, and for ...
Using n-grams to identify time periods of cultural influence
(East Carolina University, 2012)
An author's literary style is influenced by the cultural time period in which the author lives. The author's ideas, and the words chosen to express them, can help identify the cultural time period that most influenced the ...