This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 70
151703-Thumbnail Image.png
Description
The repertoire of the saxophone has advanced significantly since its invention circa 1840. Performers are required to adapt to the demands of composers - many of whom are exploring new and unconventional sounds and techniques. Numerous texts exist to identify and explain these so-called "extended" techniques, but there are very

The repertoire of the saxophone has advanced significantly since its invention circa 1840. Performers are required to adapt to the demands of composers - many of whom are exploring new and unconventional sounds and techniques. Numerous texts exist to identify and explain these so-called "extended" techniques, but there are very few resources for the initial stages of performance. In order to offer performers a resource, the author of this text composed forty original etudes (or studies) that incorporate extended techniques in a variety of ways. After identifying common extended techniques that a performer might face, the author focused on four different ways each individual technique might appear in actual repertoire. The resulting work is entitled Pushing Boundaries: Forty Etudes on Extended Techniques. Each etude offers a practical approach to what is generally a single extended technique. Although this text is not pedagogical in the sense of identifying the mechanics and anatomical requirements of each technique, it does contain a performance analysis of each etude. This analysis identifies areas where performers might struggle and offers helpful suggestions. To this end, the etudes accompanied by performance analysis provide a paced, systematic approach to the mastery of each technique.
ContributorsMurphy, Patrick Joseph (Author) / Hill, Gary (Thesis advisor) / Spring, Robert (Committee member) / McAllister, Timothy (Committee member) / Micklich, Albie (Committee member) / DeMars, James (Committee member) / Arizona State University (Publisher)
Created2013
Description
CYOA is a prototype of an iPhone application that produces a single, generative, musical work. This document details some of the thoughts and practices that informed its design, and specifically addresses the overlap between application structure and musical form. The concept of composed instruments is introduced and briefly discussed, some

CYOA is a prototype of an iPhone application that produces a single, generative, musical work. This document details some of the thoughts and practices that informed its design, and specifically addresses the overlap between application structure and musical form. The concept of composed instruments is introduced and briefly discussed, some features of video game design that relate to this project are considered, and some specifics of hardware implementation are addressed.
ContributorsPeterson, Julian (Author) / Hackbarth, Glenn (Thesis advisor) / DeMars, James (Committee member) / Feisst, Sabine (Committee member) / Levy, Benjamin (Committee member) / Tobias, Evan (Committee member) / Arizona State University (Publisher)
Created2013
151795-Thumbnail Image.png
Description
Three Meditations on the Philosophy of Boethius is a musical piece for guitar, piano interior, and computer. Each of the three movements, or meditations, reflects one level of music according to the medieval philosopher Boethius: Musica Mundana, Musica Humana, and Musica Instrumentalis. From spatial aspects, through the human element, to

Three Meditations on the Philosophy of Boethius is a musical piece for guitar, piano interior, and computer. Each of the three movements, or meditations, reflects one level of music according to the medieval philosopher Boethius: Musica Mundana, Musica Humana, and Musica Instrumentalis. From spatial aspects, through the human element, to letting sound evolve freely, different movements revolve around different sounds and sound producing techniques.
ContributorsDori, Gil (Contributor) / Hackbarth, Glenn (Thesis advisor) / DeMars, James (Committee member) / Feisst, Sabine (Committee member) / Arizona State University (Publisher)
Created2013
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
152563-Thumbnail Image.png
Description
Piano Quintet> is a three movement piece, inspired by music of Eastern Europe. Sunrise in Hungary starts with a legato song in the first violin unfolding over slow moving sustained harmonics in the rest of the strings. This is contrasted with a lively Hungarian dance which starts in the piano

Piano Quintet> is a three movement piece, inspired by music of Eastern Europe. Sunrise in Hungary starts with a legato song in the first violin unfolding over slow moving sustained harmonics in the rest of the strings. This is contrasted with a lively Hungarian dance which starts in the piano and jumps throughout all of the voices. Armenian Lament introduces a mournful melody performed over a subtly shifting pedal tone in the cello. The rest of the voices are slowly introduced until the movement builds into a canonic threnody. Evening in Bulgaria borrows from the vast repertoire of Bulgarian dances, including rhythms from the horo and rachenitsa. Each time that the movement returns to the primary theme, it incorporates aspects of the dance that directly preceded it. The final return is the crux of the piece, with the first violin playing a virtuosic ornaments run on the melody.
ContributorsGiese, Adam (Composer) / Hackbarth, Glenn (Thesis advisor) / DeMars, James (Committee member) / Feisst, Sabine (Committee member) / Arizona State University (Publisher)
Created2014
152290-Thumbnail Image.png
Description
Concerto for Piano and Chamber Orchestra was conceived in February of 2013, and conceptually it is my attempt to fuse personal expressions of jazz and classical music into one fully realized statement. It is a three movement work (fast, slow, fast) for 2 fl., 2 ob., 2 cl., bsn., 2

Concerto for Piano and Chamber Orchestra was conceived in February of 2013, and conceptually it is my attempt to fuse personal expressions of jazz and classical music into one fully realized statement. It is a three movement work (fast, slow, fast) for 2 fl., 2 ob., 2 cl., bsn., 2 hrn., 2 tpt., tbn., pno., perc., str. (6,4,2,2,1). The work is approximately 27 minutes in duration. The first movement of the Concerto is written in a fluid sonata form. A fugato begins where the second theme would normally appear, and the second theme does not fully appear until near the end of the solo piano section. The result is that the second theme when finally revealed is so reminiscent of the history of jazz and classical synthesis that it does not sound completely new, and in fact is a return of something that was heard before, but only hinted at in this piece. The second movement is a kind of deconstructive set of variations, with a specific theme and harmonic pattern implied throughout the movement. However, the full theme is not disclosed until the final variation. The variations are interrupted by moments of pure rhythmic music, containing harmony made up of major chords with an added fourth, defying resolution, and dissolving each time back into a new variation. The third movement is in rondo form, using rhythmic and harmonic influences from jazz. The percussion plays a substantial role in this movement, acting as a counterpoint to the piano part throughout. This movement and the piece concludes with an extended coda, inspired indirectly by the simple complexities of an improvisational piano solo, building in complexity as the concerto draws to a close.
ContributorsSneider, Elliot (Author) / Rogers, Rodney (Thesis advisor) / DeMars, James (Committee member) / Hackbarth, Glenn (Committee member) / Solis, Theodore (Committee member) / Arizona State University (Publisher)
Created2013
152302-Thumbnail Image.png
Description
The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to

The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to achieve greening of the data centers. This thesis deals with cooling energy management in data centers running data-processing frameworks. In particular, we propose ther- mal aware scheduling for MapReduce framework and its Hadoop implementation to reduce cooling energy in data centers. Data-processing frameworks run many low- priority batch processing jobs, such as background log analysis, that do not have strict completion time requirements; they can be delayed by a bounded amount of time. Cooling energy savings are possible by being able to temporally spread the workload, and assign it to the computing equipments which reduce the heat recirculation in data center room and therefore the load on the cooling systems. We implement our scheme in Hadoop and performs some experiments using both CPU-intensive and I/O-intensive workload benchmarks in order to evaluate the efficiency of our scheme. The evaluation results highlight that our thermal aware scheduling reduces hot-spots and makes uniform temperature distribution within the data center possible. Sum- marizing the contribution, we incorporated thermal awareness in Hadoop MapReduce framework by enhancing the native scheduler to make it thermally aware, compare the Thermal Aware Scheduler(TAS) with the Hadoop scheduler (FCFS) by running PageRank and TeraSort benchmarks in the BlueTool data center of Impact lab and show that there is reduction in peak temperature and decrease in cooling power using TAS over FCFS scheduler.
ContributorsKole, Sayan (Author) / Gupta, Sandeep (Thesis advisor) / Huang, Dijiang (Committee member) / Varsamopoulos, Georgios (Committee member) / Arizona State University (Publisher)
Created2013
152754-Thumbnail Image.png
Description
Preservation Symphony is a short, multi-movement, orchestral composition that explores the versatility of the [016] pitch class set as the dominant unifying force of this cyclical work. The composition is scored for Piccolo, two Flutes, two Oboes, English Horn, two Clarinets, Bass Clarinet, full complement of Brass, Timpani, two Percussionists,

Preservation Symphony is a short, multi-movement, orchestral composition that explores the versatility of the [016] pitch class set as the dominant unifying force of this cyclical work. The composition is scored for Piccolo, two Flutes, two Oboes, English Horn, two Clarinets, Bass Clarinet, full complement of Brass, Timpani, two Percussionists, and Strings. Movement one is in sonata form; the [016] set is used in structuring its overall formal scheme. The primary focus of the movement is on the tritone [0 6] as a replacement for the traditional tonic and dominant polarity. The movement features a driving force that alternates between pulse subdivisions of even sixteenth notes and sixteenth-note triplets. Movement two is in simple binary form with a central tonality of A. An English Horn solo functions as both the opening of the movement and a transition from the tonality of movement one (F) into the new tonal center of A. The unifying pitch class set [016] is used in this movement in a Phrygian context. Movement two has a contemplative and dark tone, which is in stark contrast to the outer movements. Movement three has a lighter, upbeat nature. The movement is in rondo form with its main theme written in a folk-like character. This movement returns to F as the central tonality, completing the overall tonal plan of the work. As in movement one, it explores the tritone polarity of F and B. The movement also revisits the chromatic mediant relationship found in the middle of movement two in the oboes. The pitch class set is now used in the context of a Lydian-Mixolydian (or acoustic) scale, from which both the central and secondary themes of the rondo are derived.
ContributorsKemp, Tyler (Composer) / Rogers, Rodney (Thesis advisor) / DeMars, James (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2014
153128-Thumbnail Image.png
Description
This project presents eight harpsichord sonatas, 3, 5, 10, 12, 13, 18, 19, and 21, by Sebastián de Albero (1722-1756), arranged for the classical guitar. These pieces were chosen because of the success of other eighteenth-century Iberian harpsichord music that has been arranged for guitar, including works by composers such

This project presents eight harpsichord sonatas, 3, 5, 10, 12, 13, 18, 19, and 21, by Sebastián de Albero (1722-1756), arranged for the classical guitar. These pieces were chosen because of the success of other eighteenth-century Iberian harpsichord music that has been arranged for guitar, including works by composers such as Domenico Scarlatti, Carlos Seixas, and Antonio Soler. The popularity and enjoyment of Scarlatti's harpsichord sonatas on the guitar today was the inspiration for this project.

Historically, guitarists have used arrangements as a means to expand the guitar's repertoire. The late eighteenth century, especially, was a time in which the instrument was undergoing significant changes from being a five-course instrument into becoming the standard six single string instrument of today. Also, composer/guitarists at that time were beginning to abandon tablature in favor of modern staff notation. Because of these changes, the amount of music originally written for the guitar from this period that is suitable to be played on a modern instrument is limited.

I chose to focus on eight selected sonatas from Sebastián Albero's Treinta Sonatas para Clavicordio because of the influence of Domenico Scarlatti's harpsichord arrangements for solo guitar. It is intriguing to note that Albero and Scarlatti both held positions at the Spanish Royal Chapel for a number of years and, in this capacity, may have influenced one another in their musical compositions and style. Certain similarities are documented in this paper.

Since Scarlatti's music has been successfully arranged, and is popular to play on modern guitar, it is hoped that these sonatas by Albero may enjoy similar success.
ContributorsSloyka, Erik Robert (Author) / Koonce, Frank (Thesis advisor) / McLin, Katherine (Committee member) / DeMars, James (Committee member) / Arizona State University (Publisher)
Created2014
153032-Thumbnail Image.png
Description
Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.
ContributorsZhao, Ziming (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2014