Indiana University-Purdue University Indianapolis (IUPUI)Software requirements, for complex projects, often contain specifications of non-functional attributes (e.g., security-related features). The process of analyzing such requirements for standards compliance is laborious and error prone. Due to the inherent free-flowing nature of software requirements, it is tempting to apply Natural Language Processing (NLP) and Machine Learning (ML) based techniques for analyzing these documents. In this thesis, we propose a novel semi-automatic methodology that assesses the security requirements of the software system with respect to completeness and ambiguity, creating a bridge between the requirements documents and being in compliance. Security s...
With the aviation industry shifting from paper based maintenance instructions to digital maintenance...
A 14-bit Hybrid DAC circuit is created with the goal of being low power yet maintaining high resolut...
The dominant way of interacting with tablets, smartphones, or wearable devices are through touchscre...
Traditional usability testing requires using human subjects to perform designed tasks and measuring ...
Indiana University-Purdue University Indianapolis (IUPUI)Reproducible computing and research are of ...
A central problem faced in distributed data storage and in peer to peer applications is the efficien...
Simplifying network security data to the point that it is readily accessible and usable by a wider a...
Clearly conveying and enforcing the proper ordering of method calls on objects has become a common p...
This study introduced an interaction technique that used tangible interaction for 3D modeling. A hyb...
Security is critical to a wide range of applications and services. Numerous security mechanisms and ...
Monolithic, single-die processors dominate today’s computing landscape. High performance systems ach...
Digital forensics investigations become more time consuming as the amount of data to be investigated...
A precise simulation requires a large amount of input data such as geometrical descriptions of the c...
Due to the significant limitations of static analysis and the dynamic nature of pointers in weakly t...
The inventory management system used at the Network Department in Sabah Net is currently using the m...
With the aviation industry shifting from paper based maintenance instructions to digital maintenance...
A 14-bit Hybrid DAC circuit is created with the goal of being low power yet maintaining high resolut...
The dominant way of interacting with tablets, smartphones, or wearable devices are through touchscre...
Traditional usability testing requires using human subjects to perform designed tasks and measuring ...
Indiana University-Purdue University Indianapolis (IUPUI)Reproducible computing and research are of ...
A central problem faced in distributed data storage and in peer to peer applications is the efficien...
Simplifying network security data to the point that it is readily accessible and usable by a wider a...
Clearly conveying and enforcing the proper ordering of method calls on objects has become a common p...
This study introduced an interaction technique that used tangible interaction for 3D modeling. A hyb...
Security is critical to a wide range of applications and services. Numerous security mechanisms and ...
Monolithic, single-die processors dominate today’s computing landscape. High performance systems ach...
Digital forensics investigations become more time consuming as the amount of data to be investigated...
A precise simulation requires a large amount of input data such as geometrical descriptions of the c...
Due to the significant limitations of static analysis and the dynamic nature of pointers in weakly t...
The inventory management system used at the Network Department in Sabah Net is currently using the m...
With the aviation industry shifting from paper based maintenance instructions to digital maintenance...
A 14-bit Hybrid DAC circuit is created with the goal of being low power yet maintaining high resolut...
The dominant way of interacting with tablets, smartphones, or wearable devices are through touchscre...