Essays about: "software process improvement thesis"
Showing result 1 - 5 of 155 essays containing the words software process improvement thesis.
-
1. Designing a reactive feedback feature for end-users in web-based media software
University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronikAbstract : Customer feedback is essential for improving a company's products or services and increasing customer satisfaction. Despite its value, user involvement faces many challenges, such as low user motivation and feedback with missing context information. READ MORE
-
2. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE
-
3. Evaluating Process Mining Techniques on PACS Command Usage Data : Exploring common process mining techniques and evaluating their applicability on PACS event log data for domain-specific workflow analysis
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Many software companies today collect command usage data by monitoring and logging user interactions within their applications. This is not always utilised to its full potential, but with the use of state-of-the-art process mining techniques, this command usage log data can be used to gain insights about the users' workflows. READ MORE
-
4. Vulnerability Management of Open-Source Libraries
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE
-
5. Function Computation via Over-the-Air Computation: Practical System Design
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Future wireless networks will need to contain millions of nodes, machines, and devices and provide high-speed and low-latency communication services. The traditional wireless network architecture design separates the communication and computation process, which has low utilization of wireless resources. READ MORE