This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 80
151694-Thumbnail Image.png
Description
This document is intended to show the various kinds of stylistically appropriate melodic and rhythmic ornamentation that can be used in the improvisation of the Sarabandes by J.S. Bach. Traditional editions of Bach's and other Baroque-era keyboard works have reflected evolving historical trends. The historical performance movement and other attempts

This document is intended to show the various kinds of stylistically appropriate melodic and rhythmic ornamentation that can be used in the improvisation of the Sarabandes by J.S. Bach. Traditional editions of Bach's and other Baroque-era keyboard works have reflected evolving historical trends. The historical performance movement and other attempts to "clean up" pre-1950s romanticized performances have greatly limited the freedom and experimentation that was the original intention of these dances. Prior to this study, few ornamented editions of these works have been published. Although traditional practices do not necessarily encourage classical improvisation in performance I argue that manipulation of the melodic and rhythmic layers over the established harmonic progressions will not only provide diversity within the individual dance movements, but also further engage the ears of the performer and listener which encourages further creative exploration. I will focus this study on the ornamentation of all six Sarabandes from J.S. Bach's French Suites and show how various types of melodic and rhythmic variation can provide aurally pleasing alternatives to the composed score without disrupting the harmonic fluency. The author intends this document to be used as a pedagogical tool and the fully ornamented Sarabandes from J.S. Bach's French Suites are included with this document.
ContributorsOakley, Ashley (Author) / Meir, Baruch (Thesis advisor) / Campbell, Andrew (Committee member) / Norton, Kay (Committee member) / Pagano, Caio (Committee member) / Ryan, Russell (Committee member) / Arizona State University (Publisher)
Created2013
151640-Thumbnail Image.png
Description
The purpose of the paper is to outline the process that was used to write a reduction for Henry Brant's Concerto for Alto Saxophone and Orchestra, to describe the improvements in saxophone playing since the premiere of the piece, and to demonstrate the necessity of having a reduction in the

The purpose of the paper is to outline the process that was used to write a reduction for Henry Brant's Concerto for Alto Saxophone and Orchestra, to describe the improvements in saxophone playing since the premiere of the piece, and to demonstrate the necessity of having a reduction in the process of learning a concerto. The Concerto was inspired by internationally known saxophonist, Sigurd Rascher, who demonstrated for Brant the extent of his abilities on the saxophone. These abilities included use of four-octave range and two types of extended techniques: slap-tonguing and flutter-tonguing. Brant incorporated all three elements in his Concerto, and believed that only Rascher had the command over the saxophone needed to perform the piece. To prevent the possibility of an unsuccessful performance, Brant chose to make the piece unavailable to saxophonists by leaving the Concerto without a reduction. Subsequently, there were no performances of this piece between 1953 and 2001. In 2011, the two directors of Brant's Estate decided to allow for a reduction to be written for the piece so that it would become more widely available to saxophonists.
ContributorsAmes, Elizabeth (Pianist) (Author) / Ryan, Russell (Thesis advisor) / Levy, Benjamin (Committee member) / Hill, Gary (Committee member) / Campbell, Andrew (Committee member) / Arizona State University (Publisher)
Created2013
151551-Thumbnail Image.png
Description
The teaching of singing remained remarkably stable until, at the end of the twentieth century, advances in the understanding of voice science stimulated dramatic changes in approach to vocal pedagogy. Previously, the technology needed to accurately measure physiologic change within the larynx and breath-support musculature during the process of singing

The teaching of singing remained remarkably stable until, at the end of the twentieth century, advances in the understanding of voice science stimulated dramatic changes in approach to vocal pedagogy. Previously, the technology needed to accurately measure physiologic change within the larynx and breath-support musculature during the process of singing simply did not exist. Any prior application of scientific study to the voice was based primarily upon auditory evaluation, rather than objective data accumulation and assessment. After a centuries-long history, within a span of twenty years, vocal pedagogy evolved from an approach solely derived from subjective, auditory evidence to an application grounded in scientific data. By means of analysis of significant publications by Richard Miller, Robert Sataloff, and Ingo Titze, as well as articles from The Journal of Singing and The Journal of Voice, I establish a baseline of scientific knowledge and pedagogic practice ca. 1980. Analysis and comparison of a timeline of advancement in scientific insight and the discussion of science in pedagogical texts, 1980-2000, reveal the extent to which voice teachers have dramatically changed their method of instruction. I posit that voice pedagogy has undergone a fundamental change, from telling the student only what to do, via auditory demonstration and visual imagery, to validating with scientific data how and why students should change their vocal approach. The consequence of this dramatic pedagogic evolution has produced singers who comprehend more fully the science of their art.
ContributorsVelarde, Rachel (Author) / Doan, Jerry (Thesis advisor) / Campbell, Andrew (Committee member) / Solis, Theodore (Committee member) / Elgar Kopta, Anne (Committee member) / Britton, David (Committee member) / Arizona State University (Publisher)
Created2013
152731-Thumbnail Image.png
Description
The Sonata for Violin and Piano in E-flat Major, Op. 18 (1888), was the last major work of chamber music by Richard Strauss (1864-1949). Although for only two instruments, the Sonata reflects Strauss's growing interest in symphonic writing both in his tone poems and orchestral songs, anticipating his style of

The Sonata for Violin and Piano in E-flat Major, Op. 18 (1888), was the last major work of chamber music by Richard Strauss (1864-1949). Although for only two instruments, the Sonata reflects Strauss's growing interest in symphonic writing both in his tone poems and orchestral songs, anticipating his style of orchestration and his expressive use of tone colors. This study examines instances of orchestral writing in the piano and makes suggestions for their performance. An overview of Strauss's compositions, from his early chamber music to the `heroic' symphonic works, places the Sonata in context. An analytical description of each of the Sonata's three movements shows the structure and content of this large work and provides the framework for examination of the orchestral effects in the piano. Comparison of excerpts from the Sonata with passages from Strauss's orchestral writing in Don Juan (1889), "Cäcilie," "Morgen!," and "Lied der Frauen" leads to suggestions for the collaborative pianist of ways to re-create the various orchestral effects.
ContributorsNixon, Thomas (Pianist) (Author) / Ryan, Russell R (Thesis advisor) / Campbell, Andrew (Committee member) / FitzPatrick, Carole (Committee member) / Hamilton, Robert (Committee member) / Holbrook, Amy (Committee member) / Arizona State University (Publisher)
Created2014
153335-Thumbnail Image.png
Description
With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands.

With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands. However, with the introduction and rising use of wear- able technology and evolving uses of smart-phones, the concept of Internet of Things (IoT) has become a prevailing notion in the currently growing technology industry. Cisco Inc. has projected a data creation of approximately 403 Zetabytes (ZB) by 2018. The combination of bringing benign devices and connecting them to the web has resulted in exploding service and data aggregation requirements, thus requiring a new and innovative computing platform. This platform should have the capability to provide robust real-time data analytics and resource provisioning to clients, such as IoT users, on-demand. Such a computation model would need to function at the edge-of-the-network, forming a bridge between the large cloud data centers and the distributed connected devices.

This research expands on the notion of bringing computational power to the edge- of-the-network, and then integrating it with the cloud computing paradigm whilst providing services to diverse IoT-based applications. This expansion is achieved through the establishment of a new computing model that serves as a platform for IoT-based devices to communicate with services in real-time. We name this paradigm as Gateway-Oriented Reconfigurable Ecosystem (GORE) computing. Finally, this thesis proposes and discusses the development of a policy management framework for accommodating our proposed computational paradigm. The policy framework is designed to serve both the hosted applications and the GORE paradigm by enabling them to function more efficiently. The goal of the framework is to ensure uninterrupted communication and service delivery between users and their applications.
ContributorsDsouza, Clinton (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2015
153094-Thumbnail Image.png
Description
Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and

Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and performing forensics on application behavior. This research sheds light on several security aspects, including the use of inter-process communications (IPC) to perform permission re-delegation attacks.

Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack.

This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications.
ContributorsGollapudi, Narasimha Aditya (Author) / Dasgupta, Partha (Thesis advisor) / Xue, Guoliang (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
153126-Thumbnail Image.png
Description
The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The

The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The information provided is vastly more up to date than that of a census and allows civil authorities to be more agile and preemptive with planning. Privately, advertisers take advantage of a persons stated opinions, demographics, and contextual (where and when) information in order to formulate and present pertinent offers.

Regardless of its use this information can be sensitive in nature and should therefore be under the control of the user. Currently, a user has little say in the manner that their information is processed once it has been released. An ad-hoc approach is currently in use, where the location based service providers each maintain their own policy over personal information usage.

In order to allow more user control over their personal information while still providing for targeted advertising, a systematic approach to the release of the information is needed. It is for that reason we propose a User-Centric Context Aware Spatiotemporal Anonymization framework. At its core the framework will unify the current spatiotemporal anonymization with that of traditional anonymization so that user specified anonymization requirement is met or exceeded while allowing for more demographic information to be released.
ContributorsSanchez, Michael Andrew (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014
153147-Thumbnail Image.png
Description
The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from

The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from these attacks. The large number of new malware samples received daily by computer security companies require Security Analysts to quickly determine the type, threat, and countermeasure for newly identied samples. Our approach provides for a visualization tool to assist the Security Analyst in these tasks that allows the Analyst to visually identify relationships between malware samples.

This approach consists of three steps. First, the received samples are processed by a sandbox environment to perform a dynamic behavior analysis. Second, the reports of the dynamic behavior analysis are parsed to extract identifying features which are matched against other known and analyzed samples. Lastly, those matches that are determined to express a relationship are visualized as an edge connected pair of nodes in an undirected graph.
ContributorsHolmes, James Edward (Author) / Ahn, Gail-Joon (Thesis advisor) / Dasgupta, Partha (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
150292-Thumbnail Image.png
Description
Bohuslav Martinù (1890-1959) was a prolific composer who wrote nearly 100 works for piano. His highly imaginative and eclectic style blends elements of the Baroque, Impressionism, Twentieth-century idioms and Czech folk music. His music is fresh and appealing to the listener, yet it remains intriguing as to how all the

Bohuslav Martinù (1890-1959) was a prolific composer who wrote nearly 100 works for piano. His highly imaginative and eclectic style blends elements of the Baroque, Impressionism, Twentieth-century idioms and Czech folk music. His music is fresh and appealing to the listener, yet it remains intriguing as to how all the elements are combined in a cohesive manner. Martinù himself provides clues to his compositional process. He believed in pure musical expression and the intensity of the musical idea, without the need for extra-musical or programmatic connotations. He espoused holistic and organic views toward musical perception and composition, at times referring to a work as an "organism." This study examines Martinù's piano style in light of his many diverse influences and personal philosophy. The first portion of this paper discusses Martinù's overall style through several piano miniatures written throughout his career. It takes into consideration the composer's personal background, musical influences and aesthetic convictions. The second portion focuses specifically on Martinù's first large-scale work for piano, the Fantasie et Toccata, H. 281. Written during a time in which Martinù was black-listed by the Nazis and forced to flee Europe, this piece bears witness to the chaotic events of WWII through its complexity and intensity of character. The discussion and analysis of the Fantasie et Toccata intends to serve as a guide to interpretation for the performer or listener and also seeks to promote the piano music of Bohuslav Martinù to a wider audience.
ContributorsCrane-Waleczek, Jennifer (Author) / Hamilton, Robert (Thesis advisor) / Hackbarth, Glenn (Committee member) / Meyer Thompson, Janice (Committee member) / Norton, Kay (Committee member) / Campbell, Andrew (Committee member) / Arizona State University (Publisher)
Created2011
150294-Thumbnail Image.png
Description
Despite a quickly growing repertoire list for the brass quintet, the music of the early Argentine tango has remained relatively neglected by brass quintet arrangers and performers. With the goal of bringing a neglected art form to the brass quintet repertoire, three arrangements based on early twentieth century Argentine tango

Despite a quickly growing repertoire list for the brass quintet, the music of the early Argentine tango has remained relatively neglected by brass quintet arrangers and performers. With the goal of bringing a neglected art form to the brass quintet repertoire, three arrangements based on early twentieth century Argentine tango songs are presented here: "Elegante Papirusa" by Tito Roccatagliata, "A La Gran Muñeca" by Jesús Ventura, and "La Cotorrita" by Samuel Castriota. The arrangements follow the style of three early recordings produced by The Victor Talking Machine in 1920 and 1922, as performed by two authentic Argentine orquesta típicas: Orquesta Típica Select and Orquesta Típica Fresedo. A brief history of the style and instrumental evolution of tango music from its influences and origins up until 1920 is discussed, followed by a detailed account of the musicians and circumstances involved in the three early recordings. An explanation of the issues encountered by the author in adapting the early tango style to the brass quintet setting is discussed, along with the solutions realized in order to make the project successful and practical for a moderately advanced brass quintet. The full brass quintet scores are provided as part of the Appendix.
ContributorsCamacho, Gustavo (Musician) (Author) / Ericson, John Q (Thesis advisor) / Pilafian, Samuel (Committee member) / Schuring, Martin (Committee member) / Campbell, Andrew (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2011