Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10705 open access dissertations and theses found for:
if(Linux networking stack)  »   Refine Search
1.
Characterizing Latencies of Edge Video Streaming
by Balhaj, Mohamed, M.S.  The University of North Carolina at Charlotte. 2017: 64 pages; 10280746.
2.
Stopping data races using Redflag
by Duggal, Abhinav, M.S.  State University of New York at Stony Brook. 2010: 38 pages; 1477351.
3.
Symbiotic virtualization
by Lange, John Russell, Ph.D.  Northwestern University. 2010: 224 pages; 3426601.
4.
System on chip: Two design paths explained
by Tamayo, Jose, M.S.  California State University, Long Beach. 2012: 99 pages; 1520930.
5.
Improving anonymity networks via end-to-end design
by Viecco, Camilo Hernan, Ph.D.  Indiana University. 2011: 140 pages; 3509948.
6.
Types for the Chain of Trust: No (Loader) Write Left Behind
by Shapiro, Rebecca, Ph.D.  Dartmouth College. 2018: 221 pages; 10811531.
7.
Post-silicon Functional Validation with Virtual Prototypes
by Cong, Kai, Ph.D.  Portland State University. 2015: 143 pages; 3712209.
8.
Defeating memory error exploits using automated software diversity
by Bhatkar, Sandeep, Ph.D.  State University of New York at Stony Brook. 2007: 123 pages; 3337612.
9.
Smart home control using Raspberry Pi in Internet of things environment
by Addimulam, Sushanth Chandra, M.S.  California State University, Long Beach. 2015: 70 pages; 1603977.
10.
Using cognitive radio as an intrusion detection for ZigBee networks
by Sarakbi, Lelass, M.S.  California State University, Long Beach. 2012: 84 pages; 1507781.
11.
IslaNet: An isolated and secure approach to implementing computer networking laboratories
by Cruz-Zendejas, Rogelio, M.S.  California State University, Long Beach. 2013: 121 pages; 1527541.
12.
Social network coding rate control in information centric delay tolerant networks
by Wood, Samuel Bennett, M.S.  University of California, Santa Cruz. 2014: 50 pages; 1583279.
13.
Relativistic Causal Ordering A Memory Model for Scalable Concurrent Data Structures
by Triplett, Josh, Ph.D.  Portland State University. 2012: 154 pages; 3502650.
14.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
15.
Mitigating Privilege Escalation
by Brookes, Scott, Ph.D.  Dartmouth College. 2018: 215 pages; 10822683.
16.
Enhancing networking protocols in widely deployed devices
by Verkaik, Patrick, Ph.D.  University of California, San Diego. 2010: 136 pages; 3408028.
17.
KMux: Kernel Extension At The Hardware Interface
by Hossain, Tareque, M.S.  The George Washington University. 2011: 54 pages; 1492034.
18.
Programmable and Scalable Software-Defined Networking Controllers
by Voellmy, Andreas Richard, Ph.D.  Yale University. 2014: 219 pages; 3580888.
19.
Flexible Debugging with Controllable Overhead
by Callanan, Sean, Ph.D.  State University of New York at Stony Brook. 2009: 85 pages; 3448464.
20.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
21.
Scheduling and locking in multiprocessor real-time operating systems
by Brandenburg, Bjorn B., Ph.D.  The University of North Carolina at Chapel Hill. 2011: 614 pages; 3502550.
22.
Peephole superoptimization
by Bansal, Sorav, Ph.D.  Stanford University. 2008: 95 pages; 3332986.
24.
Introduction to SDN, Openflow and Mininet and Creating Custom Topologies in Mininet
by Pandraka, Rohun, M.S.  University of Louisiana at Lafayette. 2017: 64 pages; 10280353.
25.
Detecting Fine-Grained Similarity in Binaries
by Saebjornsen, Andreas, Ph.D.  University of California, Davis. 2014: 107 pages; 3646391.
26.
Deep Dynamic Analysis of Android Applications
by Gustafson, Eric David, M.S.  University of California, Davis. 2014: 48 pages; 1565669.
27.
Efficiently managing the computer engineering and Computer Science labs
by Pickrell, Nathan, M.S.  California State University, Long Beach. 2013: 113 pages; 1522647.
28.
Secure system simulation - Internet of Things
by Verma, Yukti, M.S.  California State University, Long Beach. 2016: 48 pages; 10116148.
29.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
30.
Software-Defined Architectures for Spectrally Efficient Cognitive Networking in Extreme Environments
by Sklivanitis, Georgios, Ph.D.  State University of New York at Buffalo. 2018: 182 pages; 10744705.
1 - 30 of 10705 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest