Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
47280 open access dissertations and theses found for:
if(Honor code)  »   Refine Search
1.
Cultural implications behind honor killings
by Shaikh, Tayeba, Psy.D.  Union Institute and University. 2014: 91 pages; 3637182.
2.
Meeting the mission: Enhancing character education at Tower Hill School
by Medeiros, Trisha Stevenson, D.Ed.  University of Delaware. 2010: 97 pages; 3423412.
3.
Using Code Inspection, Code Modification, and Machine Learning to prevent SQL Injection
by Trumble, Brandon, M.S.  Kutztown University of Pennsylvania. 2015: 50 pages; 1590429.
4.
Absence of Honor: Dowry's Persistence in the South Indian Family
by Hebert, Lindsay, M.A.  The American University of Paris (France). 2013: 202 pages; 10305832.
6.
Search-based optimization for compiler machine-code generation
by Clauson, Aran, Ph.D.  University of Oregon. 2013: 121 pages; 3600071.
8.
Code-Switching among Music Educators: An Exploratory Study
by Dillon, Mark A., Ed.D.  The University of North Carolina at Greensboro. 2018: 131 pages; 10751313.
10.
Censorship and Holocaust film in the Hollywood studio system
by Halbgewachs, Nancy Copeland, Ph.D.  The University of New Mexico. 2011: 236 pages; 3499299.
12.
The Mafia's system of silence in communication, film and literature: Perversions of society and transgressions of Omertà
by Cerami, Adriana Nicole, M.A.  The University of North Carolina at Chapel Hill. 2009: 50 pages; 1463858.
13.
Numerical study of Gamma-Ray Bursts: Relativistic radiation hydrodynamics simulation
by Kwak, Kyujin, Ph.D.  State University of New York at Stony Brook. 2007: 129 pages; 3299714.
15.
Permeable Socialization Flow and Hacker Code Switching Practice: A Metacognitive, Situated Approach
by DiGiovanni, Frank Christopher, Ed.D.  University of Pennsylvania. 2018: 283 pages; 10977668.
16.
The Multicultural Aspects of the Caldecott and Honor Books
by Kaltenbach, Sara Louise, M.Ed.  Bowling Green State University. 2005: 69 pages; 10817792.
17.
Metaphors of adaptation: Honor killing in Shakespeare and Webster
by Bowman, Elizabeth Kelley, Ph.D.  Northern Illinois University. 2012: 216 pages; 3540564.
18.
The South Carolina Black Code and its legacy
by McIntyre, Larry, M.A.  The University of North Carolina at Charlotte. 2016: 92 pages; 10117988.
19.
Modularizing crosscutting concerns in software
by Saigal, Nalin, Ph.D.  University of South Florida. 2011: 70 pages; 3449499.
20.
21.
An analysis of Title 22 of the California Code of Regulations
by White, Alyson, M.S.W.  California State University, Long Beach. 2010: 94 pages; 1486535.
23.
Customer experience in online higher education: A study of adult online college honor students
by Brakhage, Harold H., D.B.A.  Baker College (Michigan). 2015: 250 pages; 3738530.
24.
Fully countering trusting trust through Diverse Double-Compiling
by Wheeler, David A., Ph.D.  George Mason University. 2010: 199 pages; 3393623.
25.
Deployment of a semi-automatic Java Refactoring tool
by Jakob, Ingmar, M.S.  California State University, Long Beach. 2016: 43 pages; 10182130.
27.
Exploring Saudi Journalists’ Attitudes Towards Ethical Issues of Mobile Journalism
by Deen, Ahmed, M.S.M.C.  Arkansas State University. 2019: 94 pages; 13903596.
28.
Modal types for mobile code
by Murphy, Tom VII, Ph.D.  Carnegie Mellon University. 2008: 376 pages; 3314655.
29.
Breaking the Criminogenic Code: A Frame Analysis of Neo-Nazi and Violent Jihadi Propaganda
by Morris, William Travis, Ph.D.  University of Nebraska at Omaha. 2011: 305 pages; 3465747.
1 - 30 of 47280 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest