Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
46708 open access dissertations and theses found for:
if(Fountain code)  »   Refine Search
2.
Using Code Inspection, Code Modification, and Machine Learning to prevent SQL Injection
by Trumble, Brandon, M.S.  Kutztown University of Pennsylvania. 2015: 50 pages; 1590429.
3.
Paleo-fluid migration and diagenesis in the Pennsylvanian-Permian Fountain Formation
by Hogan, Ian, M.S.  Colorado State University. 2013: 178 pages; 1544780.
6.
Code-Switching among Music Educators: An Exploratory Study
by Dillon, Mark A., Ed.D.  The University of North Carolina at Greensboro. 2018: 131 pages; 10751313.
7.
Numerical study of Gamma-Ray Bursts: Relativistic radiation hydrodynamics simulation
by Kwak, Kyujin, Ph.D.  State University of New York at Stony Brook. 2007: 129 pages; 3299714.
8.
Modularizing crosscutting concerns in software
by Saigal, Nalin, Ph.D.  University of South Florida. 2011: 70 pages; 3449499.
9.
Search-based optimization for compiler machine-code generation
by Clauson, Aran, Ph.D.  University of Oregon. 2013: 121 pages; 3600071.
10.
The South Carolina Black Code and its legacy
by McIntyre, Larry, M.A.  The University of North Carolina at Charlotte. 2016: 92 pages; 10117988.
12.
Censorship and Holocaust film in the Hollywood studio system
by Halbgewachs, Nancy Copeland, Ph.D.  The University of New Mexico. 2011: 236 pages; 3499299.
13.
Deployment of a semi-automatic Java Refactoring tool
by Jakob, Ingmar, M.S.  California State University, Long Beach. 2016: 43 pages; 10182130.
14.
Improvement in Orientation Predictions of High-Aspect Ratio Particles in Injection Mold Filling Simulations
by Mazahir, Syed Makhmoor, Ph.D.  Virginia Polytechnic Institute and State University. 2013: 194 pages; 10668590.
15.
Modal types for mobile code
by Murphy, Tom VII, Ph.D.  Carnegie Mellon University. 2008: 376 pages; 3314655.
16.
Assessing code decay by detecting software architecture violations
by Bandi, Ajay, Ph.D.  Mississippi State University. 2014: 194 pages; 3665453.
17.
Integrating "Code Smells" Detection with Refactoring Tool Support
by Nongpong, Kwankamol, Ph.D.  The University of Wisconsin - Milwaukee. 2012: 153 pages; 3523928.
18.
Automatic code refactoring techniques for Java programs
by Tran, Phuoc, M.S.  California State University, Long Beach. 2016: 39 pages; 10096073.
19.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
20.
Progress on deciphering the retinal code
by Sadeghi, Kolia Siamack, Ph.D.  Princeton University. 2009: 90 pages; 3388084.
21.
Diffuser augmented wind turbine analysis code
by Carroll, Jonathan, M.S.  University of Kansas. 2014: 124 pages; 1558999.
22.
The Composition and Emergence of an Organizational Code
by Bulger, Emily Patrice, Ph.D.  University of Pittsburgh. 2018: 134 pages; 13804201.
23.
Exectracer: Bytecode Instrumentation to Trace Java Code Execution
by ShanmugaVelayutham, ArunKumar, M.S.  California State University, Long Beach. 2019: 35 pages; 13425988.
24.
Fully countering trusting trust through Diverse Double-Compiling
by Wheeler, David A., Ph.D.  George Mason University. 2010: 199 pages; 3393623.
25.
CHORUS-MHD Code for Solar and Planetary Magnetohydrodynamics
by Zhang, Xiaoliang, Ph.D.  The George Washington University. 2019: 149 pages; 22618894.
26.
Finding duplicate code in Java using beacons and idioms
by Morales, Esteban J., M.S.  California State University, Long Beach. 2011: 68 pages; 1507689.
27.
An analysis of Title 22 of the California Code of Regulations
by White, Alyson, M.S.W.  California State University, Long Beach. 2010: 94 pages; 1486535.
28.
Deterministic Parallelization of Object-Oriented Code Through Out-of-Order Execution
by Jenista, James C., Ph.D.  University of California, Irvine. 2012: 291 pages; 3523925.
29.
A community risk assessment of the 90806 zip code
by Estrada, Mariana Isis, M.S.W.  California State University, Long Beach. 2012: 126 pages; 1517622.
30.
Data Transmission Using Image Steganography in Quick Response (QR) Code
by Shah, Sunny K., M.S.  California State University, Long Beach. 2017: 66 pages; 10638623.
1 - 30 of 46708 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest