Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
338 open access dissertations and theses found for:
if(Concurrency)  »   Refine Search
121.
Dissertation beyond shared memory loop parallelism in the polyhedral model
by Yuki, Tomofumi, Ph.D.  Colorado State University. 2013: 137 pages; 3565471.
122.
Methods for performance optimization of latency-insensitive systems
by Li, Cheng-Hong, Ph.D.  Columbia University. 2010: 214 pages; 3401048.
124.
The computational content of isomorphisms
by James, Roshan P., Ph.D.  Indiana University. 2013: 197 pages; 3587675.
125.
Random testing of open source C compilers
by Yang, Xuejun, Ph.D.  The University of Utah. 2015: 145 pages; 3704288.
126.
Game relations, metrics and refinements
by Raman, Vishwanath, Ph.D.  University of California, Santa Cruz. 2010: 294 pages; 3421295.
127.
Adopting Workgroup Collaboration Tools in 3D Virtual Worlds
by Schott, Thomas R., D.Sc.  Robert Morris University. 2013: 125 pages; 3629005.
128.
User inspired management of scientific jobs in grids and clouds
by Withana, Eran Chinthaka, Ph.D.  Indiana University. 2011: 151 pages; 3488334.
129.
A deontic analysis of inter -organizational control requirements
by Nguyen, Vu, Ph.D.  Florida International University. 2008: 433 pages; 3348919.
130.
132.
Computational modeling of biological neural networks on GPUS: Strategies and performance
by Galbraith, Byron V., M.S.  Marquette University. 2010: 130 pages; 1479117.
133.
Reliable and Efficient Routing for Wireless Sensor Networks
by Sinha, Saket, M.S.  California State University, Long Beach. 2017: 55 pages; 10263570.
134.
Intrinsic conflict between management and leadership
by McCall, Dean Walton, Ed.D.  Pepperdine University. 2013: 375 pages; 3565363.
135.
Change management and process improvement impacts on on-time starts in the surgical department
by Tran, Vi, M.S.  California State University, Long Beach. 2012: 48 pages; 1520932.
136.
Use of GPU architecture to optimize Rabin fingerprint data chunking algorithm by concurrent programming
by Wang, Sean, M.S.  California State University, Long Beach. 2016: 48 pages; 10108186.
137.
Real-Time Synchronized Automata for Cooperative Mobile Robots in Dynamic Networks
by Barjasteh, Sina, M.S.  California State University, Long Beach. 2018: 35 pages; 10978741.
138.
Enhancement of detection performance of wireless sensor networks using codes for an optimized complex field network
by Raghunathan, Divya, M.S.  California State University, Long Beach. 2016: 49 pages; 10196397.
139.
Scheduling and locking in multiprocessor real-time operating systems
by Brandenburg, Bjorn B., Ph.D.  The University of North Carolina at Chapel Hill. 2011: 614 pages; 3502550.
140.
Multi-level adaptation for performability in dynamic web service workflows
by Ramakrishnan, Lavanya, Ph.D.  Indiana University. 2009: 315 pages; 3378395.
142.
Social stability and HIV risk: Exploring the role of multidimensional social vulnerability
by German, Danielle, Ph.D.  The Johns Hopkins University. 2009: 198 pages; 3357168.
143.
A methodology for uncertainty quantification in quantitative technology valuation based on expert elicitation
by Akram, Muhammad Farooq Bin, Ph.D.  Georgia Institute of Technology. 2012: 225 pages; 3571444.
144.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
145.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
146.
Modeling and analyzing service-oriented enterprise architectural styles
by Tang, Longji, Ph.D.  The University of Texas at Dallas. 2011: 269 pages; 3494567.
147.
Architecture and performance evaluation of data storage systems
by Ren, Jin, Ph.D.  University of Rhode Island. 2011: 186 pages; 3449275.
149.
Finite safety models for high -assurance systems
by Sloan, John C., Ph.D.  Florida Atlantic University. 2010: 266 pages; 3420062.
150.
A Multivariate Bayesian Approach to Modeling Vulnerability Discovery in the Software Security Lifecycle
by Johnston, Reuben Aaron, Ph.D.  The George Washington University. 2018: 205 pages; 10828524.
121 - 150 of 338 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest