Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
13086 open access dissertations and theses found for:
if(Automatic verification)  »   Refine Search
1.
Verification of Business Process Specifications With Arithmetic and Data Dependencies
by Damaggio, Elio, Ph.D.  University of California, San Diego. 2011: 155 pages; 3475417.
2.
Automatic verification of string manipulating programs
by Yu, Fang, Ph.D.  University of California, Santa Barbara. 2010: 239 pages; 3422651.
4.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
5.
6.
Verifying Scope 3 Greenhouse Gases in the Federal Supply Chain
by Buzzelle, Stanley Adelbert, III, LL.M.  The George Washington University. 2012: 96 pages; 1531548.
7.
Real-Time Synchronized Automata for Cooperative Mobile Robots in Dynamic Networks
by Barjasteh, Sina, M.S.  California State University, Long Beach. 2018: 35 pages; 10978741.
8.
An Automata-Theoretic Approach to Hardware/Software Co-verification
by Li, Juncao, Ph.D.  Portland State University. 2010: 215 pages; 3439215.
10.
NLF wing design by adjoint method and automatic transition prediction
by Lee, Jen-Der, Ph.D.  Stanford University. 2009: 98 pages; 3364504.
11.
Automated Quantification of Biological Microstructures Using Unbiased Stereology
by Bonam, Om Pavithra, M.S.C.S.  University of South Florida. 2011: 68 pages; 1496759.
12.
Effects of clipping distortion on an Automatic Speaker Recognition system
by Ramirez, Jose Luis, M.S.  University of Colorado at Denver. 2016: 51 pages; 10112619.
13.
Efficient Public-Key Watermark Techniques for Authentication
by Jiang, Feng, Ph.D.  Purdue University. 2017: 124 pages; 10618833.
14.
Resilient TDMA-based Communication Algorithm for Dynamic Ad-hoc Networks and Formal Verification
by Tyagi, Neha, M.S.  California State University, Long Beach. 2018: 65 pages; 10752255.
15.
Automatic Age Estimation from Real-World and Wild Face Images by Using Deep Neural Networks
by Qawaqneh, Zakariya, Ph.D.  University of Bridgeport. 2017: 99 pages; 10689195.
16.
Authenticating executions for trusted systems
by Aktas, Erdem, Ph.D.  State University of New York at Binghamton. 2013: 215 pages; 3596989.
17.
Finite safety models for high -assurance systems
by Sloan, John C., Ph.D.  Florida Atlantic University. 2010: 266 pages; 3420062.
18.
A methodology for the integration of design teams for the development of complex systems
by Zummo, Kevin J., Ph.D.  Southern Methodist University. 2010: 141 pages; 3453864.
20.
A Compositional Automation Engine for Verifying Complex System Software
by Wu, Xiongnan Newman, Ph.D.  Yale University. 2018: 211 pages; 13851930.
21.
Models for Accountability to Combat Non-Compliance in Carbon Trading
by Werber, Jessica Marin, LL.M.  The George Washington University. 2011: 69 pages; 1502055.
22.
Mining explosion identification as an application to treaty verification
by Arrowsmith, Marie, Ph.D.  Southern Methodist University. 2009: 519 pages; 3356199.
23.
Application of systems engineering in installation process for the service industry
by Tavazoei, Saeid, M.S.  California State University, Long Beach. 2014: 96 pages; 1526961.
24.
The Interpersonal Foundations of Anti-Atheist Prejudice
by Magee, Michael W., Ph.D.  City University of New York. 2011: 103 pages; 3481750.
25.
An ontology-based knowledge management framework for heterogeneous verification
by Kumar, Rajesh, Ph.D.  Carnegie Mellon University. 2007: 174 pages; 3264769.
26.
A device to validate concentration measured by direct reading instruments for aerosols
by Saleh, Sabah Khalid, M.S.  The University of Iowa. 2011: 46 pages; 1505907.
27.
Automatic calibration of baseline models for energy conservation measure analysis
by Alspector, David E., M.S.  University of Colorado at Boulder. 2008: 132 pages; 1460900.
28.
Application of systems engineering in design control process for medical devices
by Varshoei, Payam, M.S.  California State University, Long Beach. 2012: 115 pages; 1522266.
29.
Modeling and verification techniques for ad hoc network protocols
by Singh, Anu, Ph.D.  State University of New York at Stony Brook. 2009: 130 pages; 3401731.
30.
An Agile Framework to Develop Safety Critical Software for Aircraft
by Bacon, Duane Lee, Ph.D.  State University of New York at Binghamton. 2018: 179 pages; 10981623.
1 - 30 of 13086 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest