This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 80
Description
CYOA is a prototype of an iPhone application that produces a single, generative, musical work. This document details some of the thoughts and practices that informed its design, and specifically addresses the overlap between application structure and musical form. The concept of composed instruments is introduced and briefly discussed, some

CYOA is a prototype of an iPhone application that produces a single, generative, musical work. This document details some of the thoughts and practices that informed its design, and specifically addresses the overlap between application structure and musical form. The concept of composed instruments is introduced and briefly discussed, some features of video game design that relate to this project are considered, and some specifics of hardware implementation are addressed.
ContributorsPeterson, Julian (Author) / Hackbarth, Glenn (Thesis advisor) / DeMars, James (Committee member) / Feisst, Sabine (Committee member) / Levy, Benjamin (Committee member) / Tobias, Evan (Committee member) / Arizona State University (Publisher)
Created2013
Description
Johann Sebastian Bach's violin Sonata I in G minor, BWV 1001, is a significant and widely performed work that exists in numerous editions and also as transcriptions or arrangements for various other instruments, including the guitar. A pedagogical guitar performance edition of this sonata, however, has yet to be published.

Johann Sebastian Bach's violin Sonata I in G minor, BWV 1001, is a significant and widely performed work that exists in numerous editions and also as transcriptions or arrangements for various other instruments, including the guitar. A pedagogical guitar performance edition of this sonata, however, has yet to be published. Therefore, the core of my project is a transcription and pedagogical edition of this work for guitar. The transcription is supported by an analysis, performance and pedagogical practice guide, and a recording. The analysis and graphing of phrase structures illuminate Bach's use of compositional devices and the architectural function of the work's harmonic gravities. They are intended to guide performers in their assessment of the surface ornamentation and suggest a reduction toward its fundamental purpose. The end result is a clarification of the piece through the organization of phrase structures and the prioritization of harmonic tensions and resolutions. The compiling process is intended to assist the performer in "seeing the forest from the trees." Based on markings from Bach's original autograph score, the transcription considers fingering ease on the guitar that is critical to render the music to a functional and practical level. The goal is to preserve the composer's indications to the highest degree possible while still adhering to the technical confines that allow for actual execution on the guitar. The performance guide provides suggestions for articulation, phrasing, ornamentation, and other interpretive decisions. Considering the limitations of the guitar, the author's suggestions are grounded in various concepts of historically informed performance, and also relate to today's early-music sensibilities. The pedagogical practice guide demonstrates procedures to break down and assimilate the musical material as applied toward the various elements of guitar technique and practice. The CD recording is intended to demonstrate the transcription and the connection to the concepts discussed. It is hoped that this pedagogical edition will provide a rational that serves to support technical decisions within the transcription and generate meaningful interpretive realizations based on principles of historically informed performance.
ContributorsFelice, Joseph Philip (Author) / Koonce, Frank (Thesis advisor) / Feisst, Sabine (Committee member) / Swartz, Jonathan (Committee member) / Arizona State University (Publisher)
Created2013
151778-Thumbnail Image.png
Description
This project features three new pieces for clarinet commissioned from three different composers. Two are for unaccompanied clarinet and one is for clarinet, bass clarinet, and laptop. These pieces are Storm's a Comin' by Chris Burton, Light and Shadows by Theresa Martin, and My Own Agenda by Robbie McCarthy. These

This project features three new pieces for clarinet commissioned from three different composers. Two are for unaccompanied clarinet and one is for clarinet, bass clarinet, and laptop. These pieces are Storm's a Comin' by Chris Burton, Light and Shadows by Theresa Martin, and My Own Agenda by Robbie McCarthy. These three solos challenge the performer in various ways including complex rhythm, use of extended techniques such as growling, glissando, and multiphonics, and the incorporation of technology into a live performance. In addition to background information, a performance practice guide has also been included for each of the pieces. This guide provides recommendations and suggestions for future performers wishing to study and perform these works. Also included are transcripts of interviews done with each of the composers as well as full scores for each of the pieces. Accompanying this document are recordings of each of the three pieces, performed by the author.
ContributorsVaughan, Melissa Lynn (Author) / Spring, Robert (Thesis advisor) / Micklich, Albie (Committee member) / Gardner, Joshua (Committee member) / Hill, Gary (Committee member) / Feisst, Sabine (Committee member) / Arizona State University (Publisher)
Created2013
151795-Thumbnail Image.png
Description
Three Meditations on the Philosophy of Boethius is a musical piece for guitar, piano interior, and computer. Each of the three movements, or meditations, reflects one level of music according to the medieval philosopher Boethius: Musica Mundana, Musica Humana, and Musica Instrumentalis. From spatial aspects, through the human element, to

Three Meditations on the Philosophy of Boethius is a musical piece for guitar, piano interior, and computer. Each of the three movements, or meditations, reflects one level of music according to the medieval philosopher Boethius: Musica Mundana, Musica Humana, and Musica Instrumentalis. From spatial aspects, through the human element, to letting sound evolve freely, different movements revolve around different sounds and sound producing techniques.
ContributorsDori, Gil (Contributor) / Hackbarth, Glenn (Thesis advisor) / DeMars, James (Committee member) / Feisst, Sabine (Committee member) / Arizona State University (Publisher)
Created2013
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
152563-Thumbnail Image.png
Description
Piano Quintet> is a three movement piece, inspired by music of Eastern Europe. Sunrise in Hungary starts with a legato song in the first violin unfolding over slow moving sustained harmonics in the rest of the strings. This is contrasted with a lively Hungarian dance which starts in the piano

Piano Quintet> is a three movement piece, inspired by music of Eastern Europe. Sunrise in Hungary starts with a legato song in the first violin unfolding over slow moving sustained harmonics in the rest of the strings. This is contrasted with a lively Hungarian dance which starts in the piano and jumps throughout all of the voices. Armenian Lament introduces a mournful melody performed over a subtly shifting pedal tone in the cello. The rest of the voices are slowly introduced until the movement builds into a canonic threnody. Evening in Bulgaria borrows from the vast repertoire of Bulgarian dances, including rhythms from the horo and rachenitsa. Each time that the movement returns to the primary theme, it incorporates aspects of the dance that directly preceded it. The final return is the crux of the piece, with the first violin playing a virtuosic ornaments run on the melody.
ContributorsGiese, Adam (Composer) / Hackbarth, Glenn (Thesis advisor) / DeMars, James (Committee member) / Feisst, Sabine (Committee member) / Arizona State University (Publisher)
Created2014
152302-Thumbnail Image.png
Description
The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to

The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to achieve greening of the data centers. This thesis deals with cooling energy management in data centers running data-processing frameworks. In particular, we propose ther- mal aware scheduling for MapReduce framework and its Hadoop implementation to reduce cooling energy in data centers. Data-processing frameworks run many low- priority batch processing jobs, such as background log analysis, that do not have strict completion time requirements; they can be delayed by a bounded amount of time. Cooling energy savings are possible by being able to temporally spread the workload, and assign it to the computing equipments which reduce the heat recirculation in data center room and therefore the load on the cooling systems. We implement our scheme in Hadoop and performs some experiments using both CPU-intensive and I/O-intensive workload benchmarks in order to evaluate the efficiency of our scheme. The evaluation results highlight that our thermal aware scheduling reduces hot-spots and makes uniform temperature distribution within the data center possible. Sum- marizing the contribution, we incorporated thermal awareness in Hadoop MapReduce framework by enhancing the native scheduler to make it thermally aware, compare the Thermal Aware Scheduler(TAS) with the Hadoop scheduler (FCFS) by running PageRank and TeraSort benchmarks in the BlueTool data center of Impact lab and show that there is reduction in peak temperature and decrease in cooling power using TAS over FCFS scheduler.
ContributorsKole, Sayan (Author) / Gupta, Sandeep (Thesis advisor) / Huang, Dijiang (Committee member) / Varsamopoulos, Georgios (Committee member) / Arizona State University (Publisher)
Created2013
153475-Thumbnail Image.png
Description
The focus of this in-depth study is to look at the gestation, performance history, and reception of Giacomo Puccini's evening of three one-act operas called Il Trittico and differentiate the particular components, Il Tabarro, Suor Angelica, and Gianni Schicchi to analyze them for their individual stylistic elements of Italian Opera.

The focus of this in-depth study is to look at the gestation, performance history, and reception of Giacomo Puccini's evening of three one-act operas called Il Trittico and differentiate the particular components, Il Tabarro, Suor Angelica, and Gianni Schicchi to analyze them for their individual stylistic elements of Italian Opera. These were the styles of verismo, pathos and sentimentality, and opera buffa. As substantiated by written criticism, the audience and the critics did not fully comprehend the hidden meaning behind the individual works of Il Trittico. Puccini, enigmatically, had chosen to present one last glimpse of outmoded Italian operatic traditions. In order to evaluate Il Trittico's importance in the history of Italian opera, this study will first review the musically changing landscape in Italy during the early to mid-nineteenth century, then the second part of the nineteenth and beginning of the twentieth-century when German, French, and eventually Russian music were starting to influence audience taste. Puccini who, over the course of his compositional life, absorbed and incorporated these different styles realized that long held Italian operatic tradition had reached a fork in the road. One path would ensure Italian composers a place in this new order and the other a stagnant dead end.

Even though Puccini's triptych garnered primarily negative reviews, the basis for this negativity was the perception that Il Trittico had broken with the historically traditional Italian musical styles. Though the present study acknowledges that break to a degree, it will also present a historically based rationale for the deviation, one left largely unnoticed by Puccini's critics. In the end, this author plans to realize their symbolic importance as a farewell to three uniquely Italian styles and a departure point for a new operatic tradition. Looking forward to the centenary of the work, this author seeks to illuminate how Puccini reached the pinnacle of firmly rooted genres of Italian opera. Ultimately this might help to unravel the enigma of Il Trittico while it continues to secure its rightful place as one of the masterpieces of the Puccini canon.
ContributorsScovasso, Stephen (Author) / Oldani, Robert W. (Thesis advisor) / Feisst, Sabine (Committee member) / Norton, Kay (Committee member) / Arizona State University (Publisher)
Created2015
153032-Thumbnail Image.png
Description
Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.
ContributorsZhao, Ziming (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2014
153046-Thumbnail Image.png
Description
This study examines the effectiveness of various types of alternative resources in organ building in order to determine whether a change to more sustainable materials would benefit or hinder the overall sound production of the instrument. The qualities of the metals and woods currently used in organ production (e.g. lead,

This study examines the effectiveness of various types of alternative resources in organ building in order to determine whether a change to more sustainable materials would benefit or hinder the overall sound production of the instrument. The qualities of the metals and woods currently used in organ production (e.g. lead, walnut, etc.) have been prized for centuries, so the substitution of different, more sustainable materials must be considered with regards to the sonic alterations, as well as the financial implications, of using alternatives to make the organ more “green.”



Five organ builders were interviewed regarding their views on sustainable materials. In addition, the author consulted the websites of nine national and four international organ builders for information about sustainability, indicating that each organ builder defines the term somewhat differently. Decisions on the woods and metals to be used in building or refurbishing an existing organ are based more on the visual appearance, the sound desired, and the potential for reuse of existing materials. A number of sustainability practices are currently in use by organ builders in the United States and Europe. These include the reuse of transportation boxes, efforts towards recycled metal and wood pipework, and the use of high efficiency lighting.

The investigations into sustainable practice that are presented here document a variety of approaches to sustainability in organ building in the United States, Canada and Europe. This research should assist in the evaluation of further efforts to conserve valuable resources while ensuring the high quality of sound that has characterized the organ throughout its long history.
ContributorsGregoire, Jonathan M (Author) / Marshall, Kimberly (Thesis advisor) / Feisst, Sabine (Committee member) / Ryan, Russell (Committee member) / Arizona State University (Publisher)
Created2014