Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
15264 open access dissertations and theses found for:
if(Cloud storage)  »   Refine Search
1.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
2.
Restoration of data in a cloud environment
by Namoshi, Deepti, M.S.  California State University, Long Beach. 2011: 57 pages; 1499282.
4.
Wide-Area Software-Defined Storage
by Nelson, Jude Christopher, Ph.D.  Princeton University. 2018: 266 pages; 10824272.
5.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
6.
Automated Configuration and Deployment of Applications in Heterogeneous Cloud Environments
by Bunch, Chris, Ph.D.  University of California, Santa Barbara. 2012: 245 pages; 3553710.
7.
A study of security in cloud computing
by Bhayal, Savita, M.S.  California State University, Long Beach. 2011: 68 pages; 1504430.
9.
Secure storage via information dispersal across network overlays
by Johnston, Reece G., M.S.  The University of Alabama in Huntsville. 2016: 78 pages; 10157562.
11.
Resource Allocation and Scheduling in Heterogeneous Cloud Environments
by Lee, Gunho, Ph.D.  University of California, Berkeley. 2012: 111 pages; 3527037.
12.
Moving office document processing into the cloud
by Wen, Jiafei, M.S.  California State University, Long Beach. 2012: 89 pages; 1507666.
13.
Protecting Digital Evidence during Natural Disasters: Why It Is Important
by Dodrill, Charles A., M.S.  Utica College. 2018: 66 pages; 10788395.
14.
Cost-Efficient Video On Demand (VOD) Streaming Using Cloud Services
by Darwich, Mahmoud K., Ph.D.  University of Louisiana at Lafayette. 2017: 152 pages; 10682876.
15.
High Performance On-Demand Video Transcoding Using Cloud Services
by Li, Xiangbo, Ph.D.  University of Louisiana at Lafayette. 2016: 147 pages; 10245247.
16.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
18.
Secure Semantic Search over Encrypted Big Data in the Cloud
by Woodworth, Jason W., M.S.  University of Louisiana at Lafayette. 2017: 71 pages; 10286646.
19.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
20.
An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments
by Pauley, Wayne A., Jr., Ph.D.  Nova Southeastern University. 2012: 222 pages; 3499794.
21.
Orchestration of wireless sensor network in the cloud
by Shahbazian, Amir, M.S.  California State University, Long Beach. 2013: 68 pages; 1524160.
22.
Effect of Pectin Methylesterase and pH on Carrot Juice Cloud Stability
by Schultz, Alison K., M.S.  University of California, Davis. 2012: 107 pages; 1534923.
23.
Foundations for Provenance-Aware Systems
by Muniswamy-Reddy, Kiran-Kumar, Ph.D.  Harvard University. 2010: 181 pages; 3435575.
24.
Alluxio: A Virtual Distributed File System
by Li, Haoyuan, Ph.D.  University of California, Berkeley. 2018: 93 pages; 10814792.
25.
Anonymous routing for privacy-preserving distributed computing
by Xiaolu, Zhu, M.S.  National University of Singapore (Singapore). 2015: 62 pages; 10006135.
26.
Real-Time Adaptive Data-Driven Perception for Anomaly Priority Scoring at Scale
by Miraftabzadeh, Seyed Ali, Ph.D.  The University of Texas at San Antonio. 2017: 142 pages; 10686275.
28.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
29.
The Google Chrome operating system forensic artifacts
by Corbin, George, M.S.  Utica College. 2014: 68 pages; 1571599.
1 - 30 of 15264 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest