COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
48908 open access dissertations and theses found for:
if(Network Science)  »   Refine Search
121.
Enforcing role-based access control on a social network
by Anderson, James Carold, M.S.  East Carolina University. 2012: 240 pages; 1518475.
122.
Meanings teachers make of teaching science outdoors as they explore citizen science
by Benavides, Aerin Benavides, Ph.D.  The University of North Carolina at Greensboro. 2016: 343 pages; 10123698.
123.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
124.
Application of a Hidden Bayes Naïve Multiclass Classifier in Network Intrusion Detection
by Koc, Levent, Ph.D.  The George Washington University. 2013: 146 pages; 3546303.
125.
Performance analysis of IPv4 versus IPv6 in a simple campus network
by Muniyappa, Vinay Kumar, M.Sc.  California State University, Long Beach. 2012: 107 pages; 1517745.
126.
Insights from Respondent Driven Sampling Datasets Via Complex Network Analysis
by Grubb, Jacob, M.S.  Southern Illinois University at Edwardsville. 2020: 37 pages; 28031133.
127.
BCAP: An Artificial Neural Network Pruning Technique to Reduce Overfitting
by Brantley, Kiante, M.S.  University of Maryland, Baltimore County. 2016: 71 pages; 10140605.
128.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
129.
Developing 21st century skills through the use of student personal learning networks
by Miller, Robert D., Ed.D.  Northcentral University. 2009: 191 pages; 3383118.
130.
Using visualization tools to mitigate Information Overload on the internet
by Tate, Charles C., M.A.  Georgetown University. 2009: 95 pages; 1461128.
131.
Retrieving quantifiable social media data from human sensor networks for disaster modeling and crisis mapping
by Aulov, Oleg, Ph.D.  University of Maryland, Baltimore County. 2014: 116 pages; 3637303.
132.
Practical Black-Box Analysis for Network Functions and Services
by Moon, Soo-Jin, Ph.D.  Carnegie Mellon University. 2020: 202 pages; 28148170.
133.
Abstractions and algorithms for control of extensible and heterogeneous virtualized network infrastructures
by Wiseman, Charles Gordon, Ph.D.  Washington University in St. Louis. 2010: 205 pages; 3412319.
134.
Towards Network False Identity Detection in Online Social Networks
by Vallapu, Sai Krishna, M.S.  Southern Illinois University at Edwardsville. 2016: 66 pages; 10246101.
135.
Toward Automated Worldwide Monitoring of Network-Level Censorship
by Weinberg, Zachary, Ph.D.  Carnegie Mellon University. 2018: 112 pages; 13425933.
136.
An Event Management Framework to Aid Solution Providers in Cybersecurity
by Leon, Ryan James, D.Engr.  The George Washington University. 2018: 114 pages; 10745141.
137.
Evolving Convolutional Neural Network Topologies for Image Recognition
by Strauch, Yaron Leander, M.S.  University of Southampton (United Kingdom). 2019: 92 pages; 28150656.
138.
Internet of Things Device Cybersecurity and National Security
by England, Suzanne K., M.S.  Utica College. 2020: 62 pages; 28094260.
140.
Optimizing frequency domain contention in wireless network
by Abdnoor Al-zurfi, Huda Kadhem, M.S.  The University of North Carolina at Greensboro. 2014: 85 pages; 1558125.
141.
Information theoretic approaches towards regulatory network inference
by Chaitankar, VIjender, Ph.D.  Virginia Commonwealth University. 2012: 125 pages; 3550865.
142.
Electroencephalogram classification by forecasting with recurrent neural networks
by Forney, Elliott M., M.S.  Colorado State University. 2011: 79 pages; 1503664.
143.
Statistical analysis and information leakage attacks on encrypted network traffic
by Wright, Charles V., III, Ph.D.  The Johns Hopkins University. 2008: 210 pages; 3309817.
144.
Supporting Network Rational Democracy with information and communication technologies
by Savelzon, Igor, M.S.  University of Colorado at Boulder. 2009: 58 pages; 1473657.
145.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
146.
Creation of a covert communications network for evasion of surveillance
by Nish, Rose, M.S.  University of the Pacific. 2016: 65 pages; 10117064.
147.
A Body Area Network as a Pre-Screening Surrogate to the Polysomnography
by LaFleur, Sheryl, Ph.D.  Florida Atlantic University. 2014: 122 pages; 3691819.
148.
Building a Fully Distributed Social Network
by Barentine, Christian, M.S.  University of Colorado Colorado Springs. 2020: 68 pages; 28149660.
149.
M-AdaBoost-A Based Ensemble System for Network Intrusion Detection
by Zhou, Ying, Ph.D.  The George Washington University. 2021: 128 pages; 28256014.
150.
Finding Critical and Gradient-Flat Points of Deep Neural Network Loss Functions
by Frye, Charles Gearhart, Ph.D.  University of California, Berkeley. 2020: 90 pages; 27957645.
121 - 150 of 48908 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest