Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10239 open access dissertations and theses found for:
if(Computing)  »   Refine Search
91.
Decentralized and scalable resource management for desktop grids
by Kim, Jik-Soo, Ph.D.  University of Maryland, College Park. 2009: 210 pages; 3359393.
92.
Computational thinking and women in computer science
by Prottsman, Christie Lee Lili, M.S.  University of Oregon. 2011: 50 pages; 1497132.
93.
Autonomic Performance Optimization with Application to Self-Architecting Software Systems
by Ewing, John M., Ph.D.  George Mason University. 2015: 207 pages; 3706982.
95.
Mobility and Traffic Correlations in Device-to-Device (D2D) Communication Networks
by Li, Yujin, Ph.D.  North Carolina State University. 2014: 156 pages; 3690209.
96.
97.
Behavior of VNC in high-latency environments and techniques for improvement
by Tan-atichat, Taurin Pete, M.S.  University of California, San Diego. 2008: 53 pages; 1459924.
99.
Moving office document processing into the cloud
by Wen, Jiafei, M.S.  California State University, Long Beach. 2012: 89 pages; 1507666.
100.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
101.
Efficient Data Processing from Network Camera and its Application
by Koh, Youngsol, M.S.E.C.E.  Purdue University. 2017: 38 pages; 10255592.
102.
Black box methods for inferring parallel applications' properties in virtual environments
by Gupta, Ashish, Ph.D.  Northwestern University. 2008: 289 pages; 3303812.
103.
Restoration of data in a cloud environment
by Namoshi, Deepti, M.S.  California State University, Long Beach. 2011: 57 pages; 1499282.
104.
Ambient programming
by Elumeze, Nwanua Onochie, Ph.D.  University of Colorado at Boulder. 2010: 160 pages; 3433288.
106.
Information Security Risk Analysis and Advanced Persistent Threat: A Multiple Case Study
by Zuhdi, Barham, D.B.A.  Northcentral University. 2018: 178 pages; 10837747.
107.
Real-Time Adaptive Data-Driven Perception for Anomaly Priority Scoring at Scale
by Miraftabzadeh, Seyed Ali, Ph.D.  The University of Texas at San Antonio. 2017: 142 pages; 10686275.
108.
Digital vigilance: Pervasive technology for children with Type 1 diabetes
by Toscos, Tammy, Ph.D.  Indiana University. 2011: 276 pages; 3488119.
109.
Automatically tuning collective communication for one-sided programming models
by Nishtala, Rajesh, Ph.D.  University of California, Berkeley. 2009: 176 pages; 3402682.
110.
Parallelization of Entity-Based Models in Computational Social Science: A Hardware Perspective
by Brearcliffe, Dale K., M.A.I.S.  George Mason University. 2017: 77 pages; 10684969.
111.
Multi-level adaptation for performability in dynamic web service workflows
by Ramakrishnan, Lavanya, Ph.D.  Indiana University. 2009: 315 pages; 3378395.
113.
Separating control from specification for parallel and distributed search algorithms
by See, Andrew G., Ph.D.  University of Connecticut. 2009: 173 pages; 3384551.
114.
Exploration of lock-based software transactional memory
by Gottschlich, Justin, M.S.  University of Colorado at Boulder. 2007: 144 pages; 1447658.
115.
Wide-Area Visual Modeling and Tracking for Mobile Augmented Reality
by Ventura, Jonathan Daniel, Ph.D.  University of California, Santa Barbara. 2012: 157 pages; 3505311.
116.
HipHopathy, A Socio-Curricular Study of Introductory Computer Science
by Miller, Omoju Adesola, Ph.D.  University of California, Berkeley. 2015: 207 pages; 10188100.
117.
A Smart Design Framework for a Novel Reconfigurable Multi-Processor Systems-on-Chip (ASREM) Architecture
by Dutta, Anandi, Ph.D.  University of Louisiana at Lafayette. 2016: 127 pages; 10163349.
118.
Strengthening System Security on the ARMv7 Processor Architecture with Hypervisor-Based Security Mechanisms
by Vetter, Julian, Ph.D.  Technische Universitaet Berlin (Germany). 2017: 115 pages; 27610268.
119.
Post-Industrial Engineering: Computer Science and the Organization of White-Collar Work, 1945–1975
by Mamo, Andrew Benedict, Ph.D.  University of California, Berkeley. 2011: 242 pages; 3469448.
120.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
91 - 120 of 10239 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest