Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
28228 open access dissertations and theses found for:
if(Computer Vison)  »   Refine Search
61.
Adding Intelligence to a Floor Based Array Personnel Detector
by Muheidat, Fadi, M.S.  University of Missouri - Columbia. 2015: 122 pages; 13849576.
62.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
63.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
64.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
65.
Enhanced Secondary Bus Microarchitecture
by O'Farrell, John William, Ph.D.  Auburn University. 2011: 96 pages; 3480707.
66.
An implementation of a multi-touch draw-a-secret password schema for windows-based computers
by Lichtenberger, Matthew, M.Eng.  University of Louisville. 2011: 89 pages; 1504201.
67.
Exploiting Structure in Data: Sampling and Signal Processing on Graphs
by Varma, Rohan Anilkumar, Ph.D.  Carnegie Mellon University. 2020: 211 pages; 27739115.
68.
Fast Mobile Network Characterization: Design, Implementation and Evaluation
by Song, Lixing, Ph.D.  University of Notre Dame. 2018: 181 pages; 13836376.
69.
Pediatric heart sound segmentation
by Sedighian, Pouye, M.S.  California State University, Long Beach. 2014: 54 pages; 1526952.
70.
Improving usability of pedagogical computer emulation interfaces
by Williams, Stephen D., M.S.  American University. 2013: 164 pages; 1545764.
71.
Cyber-based behavioral modeling
by Robinson, David John, Ph.D.  Dartmouth College. 2010: 225 pages; 3426407.
72.
The diffusion of computer-based technology in K-12 schools: Teachers' perspectives
by Colandrea, John Louis, Ed.D.  Fordham University. 2012: 141 pages; 3518848.
73.
Fuzzing the Berkeley Packet Filter
by Nilsen, Benjamin Curt, M.S.  University of California, Davis. 2020: 53 pages; 28000762.
74.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
75.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
76.
Antikernel: A decentralized secure hardware-software operating system architecture
by Zonenberg, Andrew D., Ph.D.  Rensselaer Polytechnic Institute. 2015: 148 pages; 3705663.
77.
Application-Specific Topology-Independent Routing for Multi-hop Wireless Networks
by Kilavuz, Mustafa Omer, Ph.D.  University of Nevada, Reno. 2013: 117 pages; 3608740.
78.
Algorithms for DNA Sequence Assembly and Motif Search
by Dinh, Hieu Trung, Ph.D.  University of Connecticut. 2012: 95 pages; 3533974.
79.
80.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
81.
Duck Hunt FPGA game, a project on UML and digital design
by Nguyen, Vuong D., M.S.  California State University, Long Beach. 2016: 65 pages; 10137441.
82.
Toward a Hardware Accelerated Future
by Lyons, Michael John, Ph.D.  Harvard University. 2013: 162 pages; 3600206.
83.
Light-Weight Accountable Privacy Preserving Protocol in Cloud Computing Based on a Third-Party Auditor
by Ben Haj Frej, Mohamed, Ph.D.  University of Bridgeport. 2019: 110 pages; 27743650.
84.
85.
86.
Quality cost oriented software testing
by Komma, Ravi C., M.S.  California State University, Long Beach. 2010: 63 pages; 1490301.
87.
Design and architecture of automatically-generated energy-reducing coprocessors
by Sampson, John Morgan, Ph.D.  University of California, San Diego. 2010: 119 pages; 3422889.
88.
Localizing the effects of link flooding attacks in the Internet
by Lee, Soo Bum, Ph.D.  University of Maryland, College Park. 2009: 142 pages; 3397793.
89.
Random testing of open source C compilers
by Yang, Xuejun, Ph.D.  The University of Utah. 2015: 145 pages; 3704288.
90.
How well is EAGLE-Net aligned with the National Broadband Plan?
by Ballantine, Chris, M.S.  University of Colorado at Boulder. 2014: 61 pages; 1583285.
61 - 90 of 28228 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest