Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
29118 open access dissertations and theses found for:
if(Default network)  »   Refine Search
331.
Accessing the semantics of Japanese numeral classifiers
by Ngo, Nancy T., M.A.  California State University, Long Beach. 2015: 78 pages; 1586876.
332.
Development of PHP to UMPL transformer
by Hu, Zili, Ed.D.  Ball State University. 2013: 245 pages; 3590414.
334.
Orchestration of wireless sensor network in the cloud
by Shahbazian, Amir, M.S.  California State University, Long Beach. 2013: 68 pages; 1524160.
336.
A program for school-based interventions dealing with childhood trauma: A grant proposal
by Hernandez, Krystal, M.S.W.  California State University, Long Beach. 2014: 70 pages; 1569586.
337.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
338.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
339.
The geography of global Internet hyperlink networks and cultural content analysis
by Chung, Chung Joo, Ph.D.  State University of New York at Buffalo. 2011: 92 pages; 3460741.
340.
341.
The Affordable Care Act's Unfulfilled Promises for People Living with HIV
by Theiss, Joanna, LL.M.  The George Washington University. 2015: 86 pages; 1595823.
342.
Towards Scalable Community Networks
by Hasan, Shaddi, Ph.D.  University of California, Berkeley. 2019: 135 pages; 13886358.
343.
FLIHI: Fuzzy Logic Implemented HIll-based muscle model
by O'Brien, Amy Joy, D.Sc.  The George Washington University. 2006: 202 pages; 3304088.
344.
Version Control and Product Lines in Model-Driven Software Engineering
by Schwägerl, Felix, Dr.Nat.  Universitaet Bayreuth (Germany). 2018: 430 pages; 27600479.
345.
Computational inference of genetic regulatory networks in human cancer cells
by Margolin, Adam Arne, Ph.D.  Columbia University. 2008: 282 pages; 3299359.
346.
The Effectiveness of the Student Loan Safety Net: An Evaluation of Income-Driven Loan Repayment
by Peek, Audrey, Ed.D.  The George Washington University. 2018: 154 pages; 10785890.
347.
Antecedents and consequences of performance information use in collaborative networks
by Nakashima, Manabu, Ph.D.  State University of New York at Albany. 2017: 232 pages; 10255743.
348.
Role of erythrocyte tropomodulin in the biomechanics and topology of the erythrocyte membrane skeletal network
by Green, Terrell Ann, Ph.D.  University of California, San Diego. 2010: 123 pages; 3412425.
350.
Stable Queue Management in TCP/IP Networks Using Feedback Control Theory
by Pourmohammad, Sajjad, Ph.D.  University of Louisiana at Lafayette. 2015: 135 pages; 3712833.
351.
Social Network Analysis in an Extended Structural Equation Modeling Framework
by Liu, Haiyan, Ph.D.  University of Notre Dame. 2018: 168 pages; 13836262.
352.
Application of a Hidden Bayes Naïve Multiclass Classifier in Network Intrusion Detection
by Koc, Levent, Ph.D.  The George Washington University. 2013: 146 pages; 3546303.
353.
Real-Time Communication with TDMA on Distributed Systems
by Khan, Luqman F., M.S.  California State University, Long Beach. 2018: 38 pages; 10978912.
354.
Creation of a covert communications network for evasion of surveillance
by Nish, Rose, M.S.  University of the Pacific. 2016: 65 pages; 10117064.
355.
Project protect and nurture: A grant proposal
by Asher, Courtani, M.S.W.  California State University, Long Beach. 2016: 73 pages; 10076460.
356.
On the feasibility of intrusion detection system in wireless sensor network
by Murarka, Kishore Ramkisan, M.S.  California State University, Long Beach. 2012: 86 pages; 1517746.
357.
Trust: A Pathway to Overcome Tacit Knowledge Transfer Barriers
by Fuller, Lajuan Perronoski, Ph.D.  Trident University International. 2018: 107 pages; 10788944.
358.
Optimal design and scheduling of unsteady state material recovery networks
by Rabie, Arwa H., Ph.D.  Texas A&M University. 2008: 131 pages; 3347869.
360.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
331 - 360 of 29118 displayed.
« First < Previous |   9    10    11    12    13    14    15    16    17    18    19   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest