Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5127 open access dissertations and theses found for:
if(Hardware)  »   Refine Search
1.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
2.
Hardware Support for Productive Partitioned Global Address Space (PGAS) Programming
by Serres, Olivier, Ph.D.  The George Washington University. 2016: 122 pages; 3746724.
3.
Beneath the Attack Surface
by Mowery, Keaton, Ph.D.  University of California, San Diego. 2015: 200 pages; 3712726.
4.
Antikernel: A decentralized secure hardware-software operating system architecture
by Zonenberg, Andrew D., Ph.D.  Rensselaer Polytechnic Institute. 2015: 148 pages; 3705663.
5.
Productive Design of Extensible On-Chip Memory Hierarchies
by Cook, Henry Michael, Ph.D.  University of California, Berkeley. 2016: 153 pages; 10150942.
6.
Parallelization of Entity-Based Models in Computational Social Science: A Hardware Perspective
by Brearcliffe, Dale K., M.A.I.S.  George Mason University. 2017: 77 pages; 10684969.
7.
Architectures for transactional memory
by McDonald, Austen, Ph.D.  Stanford University. 2009: 143 pages; 3364506.
8.
A study on virtualization technology and its impact on computer hardware
by Semnanian, Amir Ali, M.S.  California State University, Long Beach. 2013: 76 pages; 1523065.
9.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
10.
Flexible Architectures for Enhanced Security
by Chang, Jed Kao-Tung, Ph.D.  University of California, Irvine. 2012: 149 pages; 3518799.
11.
Application hardware-software co-design for reconfigurable computing systems
by Saha, Proshanta, Ph.D.  The George Washington University. 2008: 151 pages; 3297468.
12.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
13.
Algorithms and hardware designs for decimal multiplication
by Erle, Mark A., Ph.D.  Lehigh University. 2009: 229 pages; 3344791.
14.
Acceleration of streaming applications on FPGAs from high level constructs
by Mitra, Abhishek, Ph.D.  University of California, Riverside. 2008: 192 pages; 3341851.
15.
Smart memories: A reconfigurable memory system architecture
by Firoozshahian, Amin, Ph.D.  Stanford University. 2009: 196 pages; 3343953.
16.
An Automata-Theoretic Approach to Hardware/Software Co-verification
by Li, Juncao, Ph.D.  Portland State University. 2010: 215 pages; 3439215.
18.
Fast modular exponentiation using residue domain representation: A hardware implementation and analysis
by Nguyen, Christopher Dinh, M.S.  University of Maryland, Baltimore County. 2013: 129 pages; 1551346.
19.
Symbiotic virtualization
by Lange, John Russell, Ph.D.  Northwestern University. 2010: 224 pages; 3426601.
20.
Modification of an asynchronous dexterous hand movement decoder for hardware implementation
by Bosen, Adam Kevin, M.S.  Rochester Institute of Technology. 2010: 72 pages; 1480273.
21.
A hybrid hardware & software simulation environment for relative orbit motion studies
by Dunn, Daniel, M.S.  University of Colorado at Boulder. 2011: 100 pages; 1493860.
22.
Performance analysis of software and hardware based firewalls against DDoS attacks
by Agus, Ruben, M.S.  California State University, Long Beach. 2014: 66 pages; 1568899.
23.
Hardware/Software Co-Design via Specification Refinement
by Peck, Wesley G., Ph.D.  University of Kansas. 2011: 183 pages; 3489442.
25.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
26.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
27.
Opportunities for near data computing in MapReduce workloads
by Pugsley, Seth Hintze, Ph.D.  The University of Utah. 2015: 98 pages; 3704952.
28.
Hardware-Assisted Protection and Isolation
by Wang, Jiang, Ph.D.  George Mason University. 2011: 126 pages; 3471624.
30.
Three-Power Power System State Estimation Using Extended Kalman Filter with CompactRIO Implementation
by Le, Raymond, M.S.  Southern Illinois University at Edwardsville. 2015: 73 pages; 1600571.
1 - 30 of 5127 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest