This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 112
Filtering by

Clear all filters

151703-Thumbnail Image.png
Description
The repertoire of the saxophone has advanced significantly since its invention circa 1840. Performers are required to adapt to the demands of composers - many of whom are exploring new and unconventional sounds and techniques. Numerous texts exist to identify and explain these so-called "extended" techniques, but there are very

The repertoire of the saxophone has advanced significantly since its invention circa 1840. Performers are required to adapt to the demands of composers - many of whom are exploring new and unconventional sounds and techniques. Numerous texts exist to identify and explain these so-called "extended" techniques, but there are very few resources for the initial stages of performance. In order to offer performers a resource, the author of this text composed forty original etudes (or studies) that incorporate extended techniques in a variety of ways. After identifying common extended techniques that a performer might face, the author focused on four different ways each individual technique might appear in actual repertoire. The resulting work is entitled Pushing Boundaries: Forty Etudes on Extended Techniques. Each etude offers a practical approach to what is generally a single extended technique. Although this text is not pedagogical in the sense of identifying the mechanics and anatomical requirements of each technique, it does contain a performance analysis of each etude. This analysis identifies areas where performers might struggle and offers helpful suggestions. To this end, the etudes accompanied by performance analysis provide a paced, systematic approach to the mastery of each technique.
ContributorsMurphy, Patrick Joseph (Author) / Hill, Gary (Thesis advisor) / Spring, Robert (Committee member) / McAllister, Timothy (Committee member) / Micklich, Albie (Committee member) / DeMars, James (Committee member) / Arizona State University (Publisher)
Created2013
Description
Several contemporary clarinet works use Chinese folk music elements from different regions in new compositions to entice listener's and performer's appreciation of Chinese culture. However, to date, limited academic research on this topic exists. This research paper introduces six contemporary clarinet works by six Chinese composers: Qigang Chen's Morning Song,

Several contemporary clarinet works use Chinese folk music elements from different regions in new compositions to entice listener's and performer's appreciation of Chinese culture. However, to date, limited academic research on this topic exists. This research paper introduces six contemporary clarinet works by six Chinese composers: Qigang Chen's Morning Song, Yan Wang's Mu ma zhi ge (The Song of Grazing Horses), An-lun Huang's Capriccio for Clarinet and Strings Op. 41, Bijing Hu's The Sound of Pamir Clarinet Concerto, Mei-Mi Lan's Concerto for Clarinet and String Orchestra with Harp and Percussion, and Yu-Hui Chang's Three Fantasias for Solo Clarinet in B-flat. They are examined from different perspectives, including general structure, style, and rejuvenated folk music use. The focus of this research paper is to investigate the use of Chinese folk music in several works in collaboration with the composers. The author found that although contemporary composers use Chinese folk music differently in their works (i.e., some use melodies, others use harmony, while others use modes), each work celebrates the music and culture of the folk music on which the pieces are based. It is the author's hope to stimulate people's interest in music using Chinese folk music elements, and bring these lesser known works into the common clarinet repertoire.
ContributorsFeng, Chiao-Ting (Author) / Spring, Robert (Thesis advisor) / Gardner, Joshua (Committee member) / Micklich, Albie (Committee member) / Rogers, Rodney (Committee member) / Schuring, Martin (Committee member) / Arizona State University (Publisher)
Created2013
151778-Thumbnail Image.png
Description
This project features three new pieces for clarinet commissioned from three different composers. Two are for unaccompanied clarinet and one is for clarinet, bass clarinet, and laptop. These pieces are Storm's a Comin' by Chris Burton, Light and Shadows by Theresa Martin, and My Own Agenda by Robbie McCarthy. These

This project features three new pieces for clarinet commissioned from three different composers. Two are for unaccompanied clarinet and one is for clarinet, bass clarinet, and laptop. These pieces are Storm's a Comin' by Chris Burton, Light and Shadows by Theresa Martin, and My Own Agenda by Robbie McCarthy. These three solos challenge the performer in various ways including complex rhythm, use of extended techniques such as growling, glissando, and multiphonics, and the incorporation of technology into a live performance. In addition to background information, a performance practice guide has also been included for each of the pieces. This guide provides recommendations and suggestions for future performers wishing to study and perform these works. Also included are transcripts of interviews done with each of the composers as well as full scores for each of the pieces. Accompanying this document are recordings of each of the three pieces, performed by the author.
ContributorsVaughan, Melissa Lynn (Author) / Spring, Robert (Thesis advisor) / Micklich, Albie (Committee member) / Gardner, Joshua (Committee member) / Hill, Gary (Committee member) / Feisst, Sabine (Committee member) / Arizona State University (Publisher)
Created2013
151816-Thumbnail Image.png
Description
A common concern among musical performers in today'’s musical market pertains to their capacity to adapt to the constantly changing climate of the music business. This document focuses on one aspect of the development of a sustainable, entrepreneurship skill set: the production of a recording. While producing the recording Chocolates,

A common concern among musical performers in today'’s musical market pertains to their capacity to adapt to the constantly changing climate of the music business. This document focuses on one aspect of the development of a sustainable, entrepreneurship skill set: the production of a recording. While producing the recording Chocolates, the author examined and documented the multiplicity of skills encompassed with a recording project. The first part of the document includes a discussion of various aspects of the recording project, Chocolates, through an entrepreneurial lens, and an evaluation of the skill sets acquired through the recording process. Additionally, the inspiration and relevance behind the recording project and the process of collaboration between the two composers from whom I commissioned new compositions, Noah Taylor and James Grant, and myself is considered. Finally, I describe the recording and editing processes, including the planning involved within each process, how I achieved the final product, and the entrepreneurial skills involved. The second portion of this document examines a broad range of applications of entrepreneurship, marketing, and career management skills not only within the confines of this particular project, but also in relation to the overall sustainability of a twenty-–first century music-–performing career.
ContributorsStuckemeyer, Mary (Author) / Micklich, Albie (Thesis advisor) / Carpenter, Ellon (Committee member) / Hill, Gary (Committee member) / Schuring, Martin (Committee member) / Spring, Robert (Committee member) / Arizona State University (Publisher)
Created2013
151653-Thumbnail Image.png
Description
Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling

Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling language in order to enhance expressivity, such as incorporating aggregates and interfaces with ontologies. Also, in order to overcome the grounding bottleneck of computation in ASP, there are increasing interests in integrating ASP with other computing paradigms, such as Constraint Programming (CP) and Satisfiability Modulo Theories (SMT). Due to the non-monotonic nature of the ASP semantics, such enhancements turned out to be non-trivial and the existing extensions are not fully satisfactory. We observe that one main reason for the difficulties rooted in the propositional semantics of ASP, which is limited in handling first-order constructs (such as aggregates and ontologies) and functions (such as constraint variables in CP and SMT) in natural ways. This dissertation presents a unifying view on these extensions by viewing them as instances of formulas with generalized quantifiers and intensional functions. We extend the first-order stable model semantics by by Ferraris, Lee, and Lifschitz to allow generalized quantifiers, which cover aggregate, DL-atoms, constraints and SMT theory atoms as special cases. Using this unifying framework, we study and relate different extensions of ASP. We also present a tight integration of ASP with SMT, based on which we enhance action language C+ to handle reasoning about continuous changes. Our framework yields a systematic approach to study and extend non-monotonic languages.
ContributorsMeng, Yunsong (Author) / Lee, Joohyung (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Baral, Chitta (Committee member) / Fainekos, Georgios (Committee member) / Lifschitz, Vladimir (Committee member) / Arizona State University (Publisher)
Created2013
152264-Thumbnail Image.png
Description
In order to cope with the decreasing availability of symphony jobs and collegiate faculty positions, many musicians are starting to pursue less traditional career paths. Also, to combat declining audiences, musicians are exploring ways to cultivate new and enthusiastic listeners through relevant and engaging performances. Due to these challenges, many

In order to cope with the decreasing availability of symphony jobs and collegiate faculty positions, many musicians are starting to pursue less traditional career paths. Also, to combat declining audiences, musicians are exploring ways to cultivate new and enthusiastic listeners through relevant and engaging performances. Due to these challenges, many community-based chamber music ensembles have been formed throughout the United States. These groups not only focus on performing classical music, but serve the needs of their communities as well. The problem, however, is that many musicians have not learned the business skills necessary to create these career opportunities. In this document I discuss the steps ensembles must take to develop sustainable careers. I first analyze how groups build a strong foundation through getting to know their communities and creating core values. I then discuss branding and marketing so ensembles can develop a public image and learn how to publicize themselves. This is followed by an investigation of how ensembles make and organize their money. I then examine the ways groups ensure long-lasting relationships with their communities and within the ensemble. I end by presenting three case studies of professional ensembles to show how groups create and maintain successful careers. Ensembles must develop entrepreneurship skills in addition to cultivating their artistry. These business concepts are crucial to the longevity of chamber groups. Through interviews of successful ensemble members and my own personal experiences in the Tetra String Quartet, I provide a guide for musicians to use when creating a community-based ensemble.
ContributorsDalbey, Jenna (Author) / Landschoot, Thomas (Thesis advisor) / McLin, Katherine (Committee member) / Ryan, Russell (Committee member) / Solis, Theodore (Committee member) / Spring, Robert (Committee member) / Arizona State University (Publisher)
Created2013
152422-Thumbnail Image.png
Description
With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may

With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may lead adversaries to access critical information by circumventing security practices. In order to ensure security, considerable efforts have been spent to develop security regulations by facilitating security best-practices. Applying shared security standards to the system is critical to understand vulnerabilities and prevent well-known threats from exploiting vulnerabilities. However, many end users tend to change configurations of their systems without paying attention to the security. Hence, it is not straightforward to protect systems from being changed by unconscious users in a timely manner. Detecting the installation of harmful applications is not sufficient since attackers may exploit risky software as well as commonly used software. In addition, checking the assurance of security configurations periodically is disadvantageous in terms of time and cost due to zero-day attacks and the timing attacks that can leverage the window between each security checks. Therefore, event-driven monitoring approach is critical to continuously assess security of a target system without ignoring a particular window between security checks and lessen the burden of exhausted task to inspect the entire configurations in the system. Furthermore, the system should be able to generate a vulnerability report for any change initiated by a user if such changes refer to the requirements in the standards and turn out to be vulnerable. Assessing various systems in distributed environments also requires to consistently applying standards to each environment. Such a uniformed consistent assessment is important because the way of assessment approach for detecting security vulnerabilities may vary across applications and operating systems. In this thesis, I introduce an automated event-driven security assessment framework to overcome and accommodate the aforementioned issues. I also discuss the implementation details that are based on the commercial-off-the-self technologies and testbed being established to evaluate approach. Besides, I describe evaluation results that demonstrate the effectiveness and practicality of the approaches.
ContributorsSeo, Jeong-Jin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Lee, Joohyung (Committee member) / Arizona State University (Publisher)
Created2014
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
152278-Thumbnail Image.png
Description
The digital forensics community has neglected email forensics as a process, despite the fact that email remains an important tool in the commission of crime. Current forensic practices focus mostly on that of disk forensics, while email forensics is left as an analysis task stemming from that practice. As there

The digital forensics community has neglected email forensics as a process, despite the fact that email remains an important tool in the commission of crime. Current forensic practices focus mostly on that of disk forensics, while email forensics is left as an analysis task stemming from that practice. As there is no well-defined process to be used for email forensics the comprehensiveness, extensibility of tools, uniformity of evidence, usefulness in collaborative/distributed environments, and consistency of investigations are hindered. At present, there exists little support for discovering, acquiring, and representing web-based email, despite its widespread use. To remedy this, a systematic process which includes discovering, acquiring, and representing web-based email for email forensics which is integrated into the normal forensic analysis workflow, and which accommodates the distinct characteristics of email evidence will be presented. This process focuses on detecting the presence of non-obvious artifacts related to email accounts, retrieving the data from the service provider, and representing email in a well-structured format based on existing standards. As a result, developers and organizations can collaboratively create and use analysis tools that can analyze email evidence from any source in the same fashion and the examiner can access additional data relevant to their forensic cases. Following, an extensible framework implementing this novel process-driven approach has been implemented in an attempt to address the problems of comprehensiveness, extensibility, uniformity, collaboration/distribution, and consistency within forensic investigations involving email evidence.
ContributorsPaglierani, Justin W (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Santanam, Raghu T (Committee member) / Arizona State University (Publisher)
Created2013
152495-Thumbnail Image.png
Description
Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server

Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server to enforce access policies on the data, services and other such resources fairly easily. It also accommodates new policies and changes to existing policies gracefully, thereby making it a potentially good mechanism for implementing access control in large systems, particularly in today's age of Cloud Computing. However management of the attributes in ABAC environment is an area that has been little touched upon. Having a mechanism to allow multiple ABAC based systems to share data and resources can go a long way in making ABAC scalable. At the same time each system should be able to specify their own attribute sets independently. In the research presented in this document a new mechanism is proposed that would enable users to share resources and data in a cloud environment using ABAC techniques in a distributed manner. The focus is mainly on decentralizing the access policy specifications for the shared data so that each data owner can specify the access policy independent of others. The concept of ontologies and semantic web is introduced in the ABAC paradigm that would help in giving a scalable structure to the attributes and also allow systems having different sets of attributes to communicate and share resources.
ContributorsPrabhu Verleker, Ashwin Narayan (Author) / Huang, Dijiang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014