Search
Skip to Search Results- 17Graduate and Postdoctoral Studies (GPS), Faculty of
- 17Graduate and Postdoctoral Studies (GPS), Faculty of /Theses and Dissertations
- 5Computing Science, Department of
- 3Computing Science, Department of/Journal Articles (Computing Science)
- 3Concordia University of Edmonton
- 2Computing Science, Department of/Conference Papers (Computing Science)
-
Spring 2017
With the rise of smartphones and the increasing impact of mobile applications on everyday life, mobile software engineering has become a popular research topic. A desired outcome of these research efforts is efficient application development with lower cost, but with high-quality software...
-
2018
Saborido, R., Khomh, F., Hindle, Abram, Alba, E.
On mobile phones, users and developers use apps official marketplaces serving as repositories of apps. The Google Play Store and Apple Store are the official marketplaces of Android and Apple products which offer more than a million apps. Although both repositories offer description of apps,...
-
2018
Chowdhury, S.A., Nardo, S.D., Hindle, Abram, Jiang, Z.M.
Execution logs are debug statements that developers insert into their code. Execution logs are used widely to monitor and diagnose the health of software applications. However, logging comes with costs, as it uses computing resources and can have an impact on an application’s performance....
-
2020
Mobile antivirus technologies incorporate static analysis which involves the analysis of programs without its execution. This technique relies on pattern matching against a signature repository to identify malware, which can be easily tricked by transformation techniques such as obfuscation....
-
2021-06-01
Patel, Himanshu, Kapoor, Vaishali, Harmanjot, Patel, Deep, Narasimhan, Karthik, Singh,Harmanpreet, Ahluwalia, Jaspreet, Reddy, Gadi Harshitha, Peruboina, Sai Sushma
Malware is rapidly spreading on mobile platforms, causing problems for users. Worldwide, 72.72% of users are using android-based smartphones. New malware is created rapidly: obfuscation techniques can evade the signaturebased mechanism implemented in current antimalware technology. This paper...
-
Spring 2013
Research was undertaken into the organic semiconductors tris(8- hydroxyquinoline)aluminum (Alq3) as well as bis(8-hydroxyquinoline)zinc (Znq2) to the effect of improving achievable morphological control using an inexpensive evaporation based solution synthesis method. By varying experimental...
-
Fall 2014
In this thesis, a new technique named vapour-liquid-solid glancing angle deposition (VLS-GLAD) will be used to enhance structural control over branched nanowire (NW) arrays. NWs are 1D crystals that have been extensively applied in sensors, photovoltaic devices, and transistors. The functional...
-
GreenMiner: a hardware based mining software repositories software energy consumption framework
Download2014
Hindle, Abram, Wilson, A., Rasmussen, K., Barlow, E.J., Campbell, J., Romansky, S.
Green Mining is a field of MSR that studies software energy consumption and relies on software performance data. Unfortunately there is a severe lack of publicly available software power use performance data. This means that green mining researchers must generate this data themselves by writing...
-
High Performance Germanium-based Anode Materials for Lithium-ion and Sodium-ion Rechargeable Batteries
DownloadFall 2014
In this thesis the electrochemical performance of germanium nanowires (GeNWs) as anode for lithium-ion batteries (LIBs) and tin-germanium-antimony (Sn-Ge-Sb) thin films as anode for sodium-ion batteries (NIBs) have been investigated. Scientific literature shows a substantial study-to-study...