Searched for: contributor%3Adeursen
(81 - 100 of 114)

Pages

document
Castelein, Jeroen (author)
Software testing is an important, well-researched field.<br/>With the majority of modern-day applications using relational databases to manipulate their data, it is crucial that database interactions are tested as well.<br/>This is a complex task to perform manually, and thus researchers have been attempting to tackle this problem by means of...
master thesis 2017
document
Banken, Herman (author)
Reactive Programming is a way of programming designed to provide developers with the right abstractions for creating systems that use streams of data. Traditional debug tools lack support for the abstractions provided, causing developers to fallback to the most rudimentary debug tool available: printf-debugging. In this work, we design a...
master thesis 2017
document
Dreef, Kaj (author)
Understanding the dynamic behavior of a software system is one of the most important and time-consuming tasks for today’s software maintainers. In practice, understanding the inner workings of software requires studying the source code and documentation and inserting logging code to map high-level descriptions of the program behavior with low...
master thesis 2017
document
de Waard, Mike (author)
The aviation industry is vastly growing, as travelling by air is more common today than it ever was. However due too inefficiency and lack of communication of accurate flight information between airports, congestion and delays are occurring on a daily basis. While Collaborative Decision Making (CDM) is developed by Euro control to address this...
master thesis 2017
document
Rogalla, M.J. (author)
Modern software is becoming more and more complex and manual testing cannot keep up with the need for high-quality reliable software: often due to the complexity of event-driven software, manual testing is done. This comes with many disadvantages in comparison with automated testing. The increased importance of having a secure, reliable online...
master thesis 2017
document
Evers, P. (author)
Logs play an important role in debugging and maintaining large applications. When a system fails, developers investigate the log records to gain insight to identify the problem. Traditionally developers used tools like grep and tail to identify irregular behavior. This approach is time consuming for large companies that can generate over 600GB...
master thesis 2017
document
Aué, Joop (author)
Using logs to detect and diagnose problems in software systems is no longer a feasible human process. The ever increasing amount of logs produced by present-day systems calls for more advanced techniques to enable log analysis. A great deal of log research has since then been focused on abstracting over log messages, clever analysis techniques...
master thesis 2016
document
Duijn, M. (author)
Automated tests have always been essential for changing a piece of software. They let developers detect and locate faults early on and provide confidence in the product’s quality. With the rise of Continuous Delivery (CD) in software development, changes are being deployed multiple times a day. Maintaining a high quality test suite has therefore...
master thesis 2016
document
Slag, R. (author)
Recently microservices have emerged as a new architectural pattern which promises many advantages. Services are modeled along business entities, which should result in a flexible system. Apart from that the pattern promises better fault resilience against outages and better performance regarding scalability. In this paper we explore the...
master thesis 2016
document
De Jong, M. (author)
When a web service or application evolves, its database schema --- tables, constraints, and indices --- often need to evolve along with it. Depending on the database, some of these changes require a full table lock, preventing the service from accessing the tables under change. To deal with this, web services are typically taken offline...
master thesis 2015
document
Hejderup, J.I. (author)
Web-enabled services hold valuable information that attracts attackers to exploit services for unauthorized access. The transparency of Open-Source projects, shallow screening of hosted projects on public software repositories and access to vulnerability databases pave the way for attackers to gain strategic information to exploit software...
master thesis 2015
document
Brenkman, C.F. (author)
Anomaly (or outlier) detection techniques can be used to find occurrences in data that are surprising or unusual, arousing the suspicion of being generated by an aberrant mechanism. A collective anomaly is a collection of data instances of which the individual data instances may not be anomalies by themselves, but their occurrence together is...
master thesis 2015
document
Oosterwaal, S. (author)
With the increasing popularity of open-source version control platforms like GitHub, developers get more feedback on the changes they make. A common tool in version control systems is the highlighted difference view of the source code. This enables reviewers to quickly view the changes made. A missing feature is comparison of the test coverage....
master thesis 2015
document
Cadariu, M.D. (author)
Known security vulnerabilities are introduced in software systems as a result of depending on third-party components. These documented software weaknesses are hiding in plain sight and represent the lowest hanging fruit for attackers. Despite the risk they introduce for software systems, it has been shown that developers consistently download...
master thesis 2014
document
Hartveld, D.L. (author)
Microsoft has introduced the async/await keywords in C# 5.0 to support developers that need to apply asynchronous programming techniques. However, do developers really use the new keywords, and do they use them correctly? An empirical survey of 1378 open source repositories from GitHub and CodePlex shows that developers often make mistakes. By...
master thesis 2014
document
Laanstra, J.P. (author)
Because of the increase in the number of connected devices used, developers are increasingly building mobile applications. These applications primarily connect users to information that comes from the internet. Mobile Backend as a Service ((M)BaaS) providers started providing developers with hosted backends that are easy to set up and can be...
master thesis 2014
document
Nederlof, A. (author)
Due to the increased usage of JavaScript in web applications and the speed at which web technologies and browsers are evolving, web applications are be- coming ever more complex. Our hypothesis is that these applications contain severe errors, take unnecessary performance penalties, and violate accessibility standards. This study analyzes such...
master thesis 2013
document
De Swart, J. (author)
Many software companies see their code grow into legacy code. Making changes to such code is risky, as existing functionality elsewhere can easily be broken. By reengineering the code and covering it with unit tests, the code can be brought back into a maintainable state. In this study we measure the effect of reengineering and unit testing code...
master thesis 2013
document
García García, J.M. (author)
Large and complex projects, such as infrastructure, often require the collaboration of multiple parties and disciplines, where an structured interdisciplinary methodology is necessary: Systems Engineering. This field traditionally relied on a document based approach, but is currently transitioning to a model based variant, with the Systems...
master thesis 2013
document
Sedee, B.M.W. (author)
When a company is in need of a reporting tool, the most commonly made decision is to choose for Excel. In fact, over 90% of the world’s companies base their decisions on a report made using Excel. This shows that the number of spreadsheet designers, of end-user programmers, is large. It has been estimated to be 5 times as large as the number of...
master thesis 2013
Searched for: contributor%3Adeursen
(81 - 100 of 114)

Pages