Browsing Computing and Software Systems (UW Bothell) by Title
Now showing items 11-25 of 25
-
Eat This Book: User-centered research and software design using the information diet metaphor to examine media consumption and design an ambient technology display for stashes of to-be-read ebooks
(2013-07-25)There are widespread concerns about how changes in media and technologies are affecting people's media habits. Clay Johnson (2012) proposes using the metaphor of an "information diet" to consider this as a health issue, ... -
Effects of Peer Feedback on Password Strength
This thesis is a study on the effects of peer-feedback on a user’s password strength. Passwords are a common sight in everyday use of an average end user. Text-based passwords are heavily relied upon when it comes to user ... -
Evaluating the Architecture Centric Traceability for Stakeholders (ACTS) Holistically from the Economic, Social, and Technical Perspectives
Software traceability has the capability of relating various artifacts produced throughout the development to assist with understanding the system from different viewpoints and abstraction levels. The Architecture Centric ... -
Exploratory Wayfinding in Wide Field Ethnography
This thesis focuses on what wayfinding means in Wide Field Ethnography (WFE), and how to improve wayfinding activities in WFE datasets. WFE datasets are too large, unstructured and complex for researchers to easily understand, ... -
Eye tracking and game mechanics: An evaluation of unmodified tablet computers for use in vision screening software for children
Binocular vision issues are a primary cause of reading and writing difficulties among children, with as many at 25 percent of school-aged children needing vision therapy. Vision issues are a better predictor of academic ... -
Field-Based Job Dispatch and Migration
(2013-04-17)AgentTeamwork-Lite is a mobile-agent-based job scheduling and monitoring framework that has been developed in the concept of field-based job dispatch and migration where agents migrate over a computing-resource field to ... -
MASS CUDA: ABSTRACTING MANY CORE PARALLEL PROGRAMMING FROM AGENT BASED MODELING FRAMEWORKS
Agent based modeling is the practice of simulating complex interactions by modeling the behavior of a single agent in the interaction, then observing the emergent behavior that occurs when many of those Agents interact. ... -
Mobile Agent based Intrusion Detection for Smart and Connected Medical Devices
The advent of wearable and implantable devices have fostered recent advances in healthcare. Medical devices equipped with wireless connectivity to remote monitoring features are increasingly becoming connected to each other ... -
Object Manipulation with Tangible User Interface for Head Mounted Augmented Reality Devices
Recent advances in technology enabled a new generation of Augmented Reality (AR) development where the near seamless integration and interaction between computer generated virtual and real-world physical objects can be ... -
Real-Time Traffic Prediction Improvement through Semantic Mining of Social Networks
(2012-09-13)Many years of research have yielded computer modeling techniques that can predict the behavior of complex systems, such as traffic speeds in regional transportation systems, with high accuracy. However, the prediction ... -
Smart-Transfer: A Cost-Minimized Inter-Service Data Storage and Transfer Scheme
Cloud storage services are a widely used tool in both industry and research. However, the wide variety of services offered by cloud providers raises the question of which storage services can most cheaply meet the needs ... -
The Impact of Consumer Privacy Behavior on the Purchase Decision Process of Smart Home Internet of Things (IoT) Devices
Privacy issues in smart home Internet of Things (IoT) devices remain unresolved despite its fast growth in the technological and business front. Notwithstanding federal institutions’ initiatives to increase consumer awareness ... -
Thimblerig: Architectural Moving Target Defense and a framework for its Game theoretic analysis
Enterprises today are rapidly moving their internal server infrastructure to cloud providers such as AWS and Azure. Migrating to IaaS providers raises a different set of security threats when compared to in-house IT ... -
Tracing Domain Data Concepts in Layered Applications
A goal of reusing source code is to lower development cost; however, reuse techniques usually require additional costs in creating generic source code and retrieving the appropriate source code from a code repository. This ... -
VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES
The use of Internet of Things (IoT) devices has grown significantly in the past decade. While IoT is expected to improve life for many by enabling smart living spaces, the number of security risks that consumers and ...