Searched for: contributor%3A%22Zaidman%2C+A.+%28mentor%29%22
(1 - 16 of 16)
document
Akchich, M. (author), Dumasy, S. (author), Los, B. (author), Overklift, T. (author)
bachelor thesis 2017
document
Dandi, T. (author)
In the recent past, a new agile methodology, Behaviour-Driven Development (BDD) has been developed which aims to describe a system in terms of behaviour, which helps stakeholders understand the system behaviour and in communication with project members. However, existing projects do not have the advantage of explaining the system in terms of...
master thesis 2016
document
Lopez Barbosa, P.I. (author)
For mobile messaging service providers to endure in a competitive and dynamic market, it is vital to be flexible, which involves keeping up to date to technological developments, and to be cost effective. In order for service providers to provide highly available service, the use of Cloud computing technology is a well-suited solution. Cloud...
master thesis 2015
document
Marsavina, C. (author)
In this thesis we perform a study that, following a mixed methods approach, investigates fine-grained co-evolution patterns of production and test code. First, we mine fine-grained changes from the evolution of 5 open-source systems. Then, we use an association rule mining algorithm to generate the co-evolution patterns. Finally, we interpret...
master thesis 2014
document
Fresen, J. (author)
In todays society, it is impossible to imagine life without web applications such as our webmail client or online word processors. These applications are becoming increasingly complex, which makes it hard to maintain a thorough understanding of the application by their developers. Therefore, a need has arisen for tools that support the...
master thesis 2013
document
Kalouda, M. (author)
Recent studies have investigated the use of source code metrics to predict the change- and defect-proneness of source code. While the indicative power of these metrics was validated for several systems, it has not been tested on Service-Oriented Architectures (SOA). In particular, the SOA paradigm prescribes the development of systems through...
master thesis 2013
document
Korstanje, M.P. (author)
A variety of agent programming languages have been proposed in the literature but only few comparative studies have been performed to evaluate the strengths and weaknesses of these languages. In order to gain a better understanding of the programming features and the use of these features by programmers it is imperative to perform studies on...
master thesis 2013
document
Willems, W.F.P. (author)
Testing software is an important factor in application development. Without proper testing, software can be unreliable and show failures with drastic consequences. There have been attempts to measure how much time is spent on testing but these methods are not accurate as they depend on incomplete or subjective data. An Eclipse plugin called ...
master thesis 2013
document
Alidarso, R. (author)
Software systems are getting larger and more complex. It takes therefore more time and money to maintain these systems. The maintenance effort is strongly related to the quality of the implementation during the development phase. Providing qualitative numbers to developers about their previous im- plementations could help increase the quality of...
master thesis 2012
document
Bouma, G. (author)
The practice of code cloning is something every software developer has to deal with at some point. The evolution of code clones is of particular interest, because the effects of cloning code show up later in the lifetime of a project. We research the effects a clone's properties have on its evolutionary behavior. For this purpose an approach to...
master thesis 2012
document
Van Beek, J. (author), Print, R.J. (author), Timmermans, T. (author)
We have created a Secure Access Control System, named Glados. The goal of this system is to limit the access to a building, and separate 'zones' in that building, to authorized persons only. Our primary concerns were security and maintainability. Special care has been taken in identifying possible attack vectors and defending against those. This...
bachelor thesis 2011
document
Metselaar, P.A. (author)
By evaluating the architecture of a software system, ways to improve the system's quality attributes (such as its performance and modifiability) can be identified and valuable lessons can be learned which may also be applied to other systems. An architecture evaluation requires an up-to-date description of the architecture, which is often...
master thesis 2010
document
Matthijssen, N.A. (author)
Ajax is an umbrella term for a set of technologies that allows web developers to create highly interactive web applications. Ajax applications are complex; they consist of multiple heterogeneous artifacts which are combined in a highly dynamic fashion. This complexity makes Ajax applications hard to understand, and thus to maintain. For this...
master thesis 2010
document
Luijten, B.J.H. (author)
Ensuring maintainability is an important aspect of the software development cycle. Maintainable software will be easier to understand and change correctly. The Software Improvement Group (SIG) has developed a method to measure a software system's maintainability based on well-known code metrics. In this thesis we explore the relationships...
master thesis 2010
document
Mulder, F. (author)
Cross-cutting concerns are pieces of functionality that have not been captured into a separate module. They form a problem as they hinder program comprehension and maintainability. Solving this problem requires first identifying these cross-cutting concerns in pieces of software. Several methods for doing this have been proposed but the option...
master thesis 2009
document
De Wit, M.C. (author)
By many, code cloning is nowadays recognized as a threat to the maintainability of source code. Many clone detection strategies have been proposed and a considerable number of removal strategies, mostly based on refactoring techniques, has been shown. However, recent research has showed that clones can often not be removed easily and other...
master thesis 2009
Searched for: contributor%3A%22Zaidman%2C+A.+%28mentor%29%22
(1 - 16 of 16)