Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
7007 open access dissertations and theses found for:
if(Schemes)  »   Refine Search
271.
Communication and estimation in noisy networks
by Vedantam, Satish, Ph.D.  University of Southern California. 2009: 168 pages; 3355383.
272.
Using educational connoisseurship and criticism to evaluate YouTube videos on the formal definition of limit
by Wolbert, Roger S., Ph.D.  State University of New York at Buffalo. 2016: 330 pages; 10163774.
273.
A study on precoded adaptive transmission over different polarized MIMO-OFDM architectures
by Nemani, Sai Krishna, M.S.  California State University, Long Beach. 2016: 35 pages; 10140476.
275.
Application-Specific Topology-Independent Routing for Multi-hop Wireless Networks
by Kilavuz, Mustafa Omer, Ph.D.  University of Nevada, Reno. 2013: 117 pages; 3608740.
276.
Considerations on the optimal and efficient processing of information-bearing signals
by Harms, Herbert Andrew, Ph.D.  Princeton University. 2013: 174 pages; 3597492.
277.
Affine processes in finance: Numerical approximation, simulation and model properties
by Kim, Kyoung-Kuk, Ph.D.  Columbia University. 2008: 187 pages; 3333483.
278.
Rayleigh-Scattering-Induced Noise in Analog RF-Photonic Links
by Cahill, James P., Ph.D.  University of Maryland, Baltimore County. 2015: 109 pages; 3707242.
279.
Perspectives on phrase rhythm in J. S. Bach's keyboard fugues
by Reef, John S., Ph.D.  Indiana University. 2014: 266 pages; 3623241.
280.
A multidimensional systems approach to grid sensor networks
by Sumanasena, M.G. Buddika, Ph.D.  University of Notre Dame. 2012: 208 pages; 3578994.
281.
Multiscale Modeling of the Mammalian Respiratory System
by Kabilan, Senthil, Ph.D.  University of Washington. 2011: 137 pages; 3501872.
282.
284.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
285.
An exploration of varying conditions in a Hopfield Neural Network and applications to a DNA implementation
by Hughes, Bradley Steven, Ph.D.  University of California, Riverside. 2010: 233 pages; 3426183.
286.
Nietzsche, Mann, and Modernism: A Framework for Morality in Raymond Chandler's Detective Fiction
by Coulter, Caitlin Brooke, M.A.  The University of North Carolina at Greensboro. 2019: 69 pages; 13812986.
287.
Spin dynamics and opto-electronic properties of some novel semiconductor systems
by De, Amritanand, Ph.D.  The University of Iowa. 2009: 135 pages; 3390236.
288.
Scaling Undergraduate Scientific Writing via Prominent Feature Analysis
by Gallo, Katarzyna Zaruska, Ph.D.  Mississippi State University. 2018: 150 pages; 10974642.
289.
Power-controlled channel access and routing protocols for MIMO-capable wireless networks
by Siam, Mohammad Zakariya Abdel Rahman, Ph.D.  The University of Arizona. 2009: 152 pages; 3352371.
290.
Models for Accountability to Combat Non-Compliance in Carbon Trading
by Werber, Jessica Marin, LL.M.  The George Washington University. 2011: 69 pages; 1502055.
291.
Uncommon historical object appraisals: appraising the south street museum collection
by Eames, Brittany A., M.A.  Sotheby's Institute of Art - New York. 2014: 74 pages; 1554301.
292.
Partitioned Polytopal Finite-Element Methods for Nonlinear Solid Mechanics
by Giffin, Brian Doran, Ph.D.  University of California, Davis. 2018: 148 pages; 10752138.
294.
Localizing the effects of link flooding attacks in the Internet
by Lee, Soo Bum, Ph.D.  University of Maryland, College Park. 2009: 142 pages; 3397793.
295.
Reduced order techniques for sensitivity analysis and design optimization of aerospace systems
by Parrish, Jefferson Carter, Ph.D.  Mississippi State University. 2014: 199 pages; 3618312.
296.
3-D numerical simulation of dam-break flows over movable beds
by Marsooli, Reza, Ph.D.  The University of Mississippi. 2013: 181 pages; 3595529.
297.
Location awareness in cognitive radio networks
by Celebi, Hasari, Ph.D.  University of South Florida. 2008: 134 pages; 3347302.
298.
A Tree Search Approach to Detection and Estimation with Application to Communications and Tracking
by Roufarshbaf, Hossein, Ph.D.  George Mason University. 2011: 158 pages; 3471058.
299.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
300.
271 - 300 of 7007 displayed.
« First < Previous |   7    8    9    10    11    12    13    14    15    16    17   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest