Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
3012 open access dissertations and theses found for:
if(Kernel)  »   Refine Search
1.
Stopping data races using Redflag
by Duggal, Abhinav, M.S.  State University of New York at Stony Brook. 2010: 38 pages; 1477351.
2.
Trajectory Similarity Based Prediction for Remaining Useful Life Estimation
by Wang, Tianyi, Ph.D.  University of Cincinnati. 2010: 141 pages; 3432353.
3.
KMux: Kernel Extension At The Hardware Interface
by Hossain, Tareque, M.S.  The George Washington University. 2011: 54 pages; 1492034.
4.
Kernel Based Relevance Vector Machine for Classification of Diseases
by Tcheimegni, Elie, D.Sc.  Bowie State University. 2013: 202 pages; 3558597.
6.
Mathematical Modeling of Moisture Movement within a Rice Kernel during Convective and Infrared Drying
by Prakash, Bhagwati, Ph.D.  University of California, Davis. 2011: 210 pages; 3474451.
9.
Large margin transformation learning
by Howard, Andrew G., Ph.D.  Columbia University. 2009: 90 pages; 3388470.
10.
Controlling with Model Trees
by Kemerling, Robert Alan, Ph.D.  Nova Southeastern University. 2011: 121 pages; 3478677.
12.
Module-Based Analysis for "Omics" Data
by Wang, Zhi, Ph.D.  North Carolina State University. 2013: 187 pages; 3690212.
13.
Inverse transport with angularly averaged measurements
by Langmore, Ian, Ph.D.  University of Washington. 2008: 103 pages; 3318209.
14.
Evaluation of an augmentation of Rocky Mountain bighorn sheep at Badlands National Park, South Dakota
by Zimmerman, Teresa J., Ph.D.  South Dakota State University. 2008: 157 pages; 3377947.
16.
Fusion of Evolution Constructed Features for Computer Vision
by Price, Stanton Robert, Ph.D.  Mississippi State University. 2018: 157 pages; 10746451.
17.
Theory of Graph Traversal Edit Distance, Extensions, and Applications
by Ebrahimpour Boroojeny, Ali, M.S.  Colorado State University. 2019: 67 pages; 13812734.
18.
Geometric representations and deep Gaussian conditional random field networks for computer vision
by Vemulapalli, Raviteja, Ph.D.  University of Maryland, College Park. 2016: 185 pages; 10192530.
20.
Mitigating Privilege Escalation
by Brookes, Scott, Ph.D.  Dartmouth College. 2018: 215 pages; 10822683.
21.
The Nonnegative Matrix Factorization: Methods and Applications
by Landi, Amanda Kim, Ph.D.  North Carolina State University. 2015: 120 pages; 10586642.
22.
Strengthening System Security on the ARMv7 Processor Architecture with Hypervisor-Based Security Mechanisms
by Vetter, Julian, Ph.D.  Technische Universitaet Berlin (Germany). 2017: 115 pages; 27610268.
23.
Graph-based learning for information systems
by Li, Xin, Ph.D.  The University of Arizona. 2009: 197 pages; 3352368.
24.
A Functional Approach to Memory-Safe Operating Systems
by Leslie, Rebekah, Ph.D.  Portland State University. 2011: 342 pages; 3481882.
25.
Formal End-to-End Verification of Information-Flow Security for Complex Systems
by Costanzo, David, Ph.D.  Yale University. 2016: 165 pages; 10584941.
26.
Generative Probabilistic Models for Analysis of Communication Event Data with Applications to Email Behavior
by Navaroli, Nicholas Martin, Ph.D.  University of California, Irvine. 2014: 249 pages; 3668831.
27.
Parallelizing a data intensive Lagrangian stochastic particle model using graphics processing units
by Hurst, Jonathan George, M.S.  University of Colorado at Boulder. 2010: 101 pages; 1481219.
28.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
29.
Region-based memory management for expressive GPU programming
by Holk, Eric, Ph.D.  Indiana University. 2016: 154 pages; 10132089.
30.
Securing Operating Systems Through Utility Virtual Machines
by Denz, Robert, Ph.D.  Dartmouth College. 2016: 222 pages; 10190644.
1 - 30 of 3012 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest