Searched for: contributor%3A%22van+Deursen%2C+A.+%28mentor%29%22
(1 - 20 of 38)

Pages

document
van Oort, Bart (author)
Artificial Intelligence (AI) and Machine Learning (ML) are pervasive in the current computer science landscape. Yet, there still exists a lack of Software Engineering (SE) experience and best practices in this field. One such best practice, static code analysis, can be used to find code smells, i.e., (potential) defects in the source code,...
master thesis 2021
document
ASHOK KUMAR VATTEKKAT, RAVISANKAR (author)
Quantum software development is the process of conceiving, specifying, designing, programming, documenting, and testing executable quantum programs that are meant to run on practical quantum hardware. Even though quantum software development research has gained traction over the years, it is still mainly focused on problem analysis, language...
master thesis 2021
document
Patil, Pradyot (author)
Building predictive models using cloud metrics for a task like incident prediction in the cloud is becoming ubiquitous in cloud monitoring. For such a forecasting task, if we know beforehand which system metrics are predictable then we can easily build good models. Quantifying the predictability of cloud metrics can help us rank the available...
master thesis 2021
document
Haakman, M.P.A. (author)
As organizations start to adopt machine learning in critical business scenarios, the development processes change and the reliability of the applications becomes more important. To investigate these changes and improve the reliability of those applications, we conducted two studies in this thesis. The first study aims to understand the evolution...
master thesis 2020
document
Gamvrinos, S. (author)
Code duplication is a form of technical debt frequently observed in software systems. Its existence negatively affects the maintainability of a system in numerous ways. In order to tackle the issues that come with it, various automated clone detection techniques have been proposed throughout the years. However, the vast majority of them operate...
master thesis 2020
document
Scholten, Lizzy (author)
As computer science lies at the heart of almost all technological progress, widespread computer science education, and particularly programming education, is of great importance. In order to reach a large group of students, secondary schools can play an important role. However, students have difficulty learning programming concepts. Programming...
master thesis 2020
document
Steenbergen, Martijn (author)
Online controlled experimentation (OCE), also called A/B testing, is an often used tool in industry to determine if deploying changes into production is the right decision to make. Running experiments has shown an immense impact to the revenue of companies in industry, however this type of experimentation comes with a lot of pitfalls, of which...
master thesis 2020
document
Lan, Yikai (author)
Monitoring the release logs of modern online software is a challenging topic because of the enormous amount of release logs and the complicated release process. The goal of this thesis is to develop a pipeline that can monitor the release logs and find anomalous logs, automating this step with anomaly detection and reducing the required manual...
master thesis 2018
document
Rogalla, M.J. (author)
Modern software is becoming more and more complex and manual testing cannot keep up with the need for high-quality reliable software: often due to the complexity of event-driven software, manual testing is done. This comes with many disadvantages in comparison with automated testing. The increased importance of having a secure, reliable online...
master thesis 2017
document
Evers, P. (author)
Logs play an important role in debugging and maintaining large applications. When a system fails, developers investigate the log records to gain insight to identify the problem. Traditionally developers used tools like grep and tail to identify irregular behavior. This approach is time consuming for large companies that can generate over 600GB...
master thesis 2017
document
Duijn, M. (author)
Automated tests have always been essential for changing a piece of software. They let developers detect and locate faults early on and provide confidence in the product’s quality. With the rise of Continuous Delivery (CD) in software development, changes are being deployed multiple times a day. Maintaining a high quality test suite has therefore...
master thesis 2016
document
Slag, R. (author)
Recently microservices have emerged as a new architectural pattern which promises many advantages. Services are modeled along business entities, which should result in a flexible system. Apart from that the pattern promises better fault resilience against outages and better performance regarding scalability. In this paper we explore the...
master thesis 2016
document
De Jong, M. (author)
When a web service or application evolves, its database schema --- tables, constraints, and indices --- often need to evolve along with it. Depending on the database, some of these changes require a full table lock, preventing the service from accessing the tables under change. To deal with this, web services are typically taken offline...
master thesis 2015
document
Hejderup, J.I. (author)
Web-enabled services hold valuable information that attracts attackers to exploit services for unauthorized access. The transparency of Open-Source projects, shallow screening of hosted projects on public software repositories and access to vulnerability databases pave the way for attackers to gain strategic information to exploit software...
master thesis 2015
document
Brenkman, C.F. (author)
Anomaly (or outlier) detection techniques can be used to find occurrences in data that are surprising or unusual, arousing the suspicion of being generated by an aberrant mechanism. A collective anomaly is a collection of data instances of which the individual data instances may not be anomalies by themselves, but their occurrence together is...
master thesis 2015
document
Oosterwaal, S. (author)
With the increasing popularity of open-source version control platforms like GitHub, developers get more feedback on the changes they make. A common tool in version control systems is the highlighted difference view of the source code. This enables reviewers to quickly view the changes made. A missing feature is comparison of the test coverage....
master thesis 2015
document
Cadariu, M.D. (author)
Known security vulnerabilities are introduced in software systems as a result of depending on third-party components. These documented software weaknesses are hiding in plain sight and represent the lowest hanging fruit for attackers. Despite the risk they introduce for software systems, it has been shown that developers consistently download...
master thesis 2014
document
Hartveld, D.L. (author)
Microsoft has introduced the async/await keywords in C# 5.0 to support developers that need to apply asynchronous programming techniques. However, do developers really use the new keywords, and do they use them correctly? An empirical survey of 1378 open source repositories from GitHub and CodePlex shows that developers often make mistakes. By...
master thesis 2014
document
Van Eyk, E.D.C. (author), Van Leeuwen, W.J. (author)
Crawljax is a crawler, which not only finds states via regular links, but also states that are hidden by JavaScript actions. However, this leads to a gigantic number of states with many duplicates. A near-duplicate detection algorithm can be a solution to limit the number of states found by Crawljax, while crawling the most essential, unique...
bachelor thesis 2014
document
Laanstra, J.P. (author)
Because of the increase in the number of connected devices used, developers are increasingly building mobile applications. These applications primarily connect users to information that comes from the internet. Mobile Backend as a Service ((M)BaaS) providers started providing developers with hosted backends that are easy to set up and can be...
master thesis 2014
Searched for: contributor%3A%22van+Deursen%2C+A.+%28mentor%29%22
(1 - 20 of 38)

Pages