Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
22632 open access dissertations and theses found for:
if(Secure architecture)  »   Refine Search
61.
Modeling and analyzing service-oriented enterprise architectural styles
by Tang, Longji, Ph.D.  The University of Texas at Dallas. 2011: 269 pages; 3494567.
62.
Reconfigurable computing: Power consumption optimization in embedded systems
by Varadarajan, Srihari, M.S.  California State University, Long Beach. 2014: 78 pages; 1569997.
63.
A Methodology for Making Early Comparative Architecture Performance Evaluations
by Doyle, Gerald S., Ph.D.  George Mason University. 2010: 269 pages; 3437816.
64.
Beneath the Attack Surface
by Mowery, Keaton, Ph.D.  University of California, San Diego. 2015: 200 pages; 3712726.
65.
System Design and Information Logistics: Following the Business Process Using a Context Aware Framework
by Williams, Joi Young, D.Engr.  The George Washington University. 2018: 86 pages; 10682142.
66.
Gothic Style in American Arts & Crafts: The Rose Valley Community and Its Furniture, 1901-1906
by Penzo, Mary Jane, M.A.  The George Washington University. 2019: 149 pages; 13883722.
67.
Scalable Web Service Development with Amazon Web Services
by McElhiney, Patrick R., M.S.  University of New Hampshire. 2018: 83 pages; 10931435.
68.
Securing Operating Systems Through Utility Virtual Machines
by Denz, Robert, Ph.D.  Dartmouth College. 2016: 222 pages; 10190644.
69.
Interpreting architecture: A Krauszian approach
by Fox, Richard N., M.A.  California State University, Long Beach. 2009: 152 pages; 1472275.
71.
Securing mobile ad hoc networks
by Gudapati, Supriya, M.S.  California State University, Long Beach. 2015: 31 pages; 1604882.
72.
73.
The use of organizational self-design to coordinate multiagent systems
by Kamboj, Sachin, Ph.D.  University of Delaware. 2009: 236 pages; 3397070.
74.
“Writing our own program”: The USC experiment in modern architectural pedagogy, 1930 to 1960
by Howell-Ardila, Deborah, M.H.P.  University of Southern California. 2010: 277 pages; 1484253.
76.
Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications
by Azhar, Mahmood Javed, Ph.D.  University of South Florida. 2018: 100 pages; 10980455.
77.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
78.
Effects of Fiber Architecture on Damage and Failure in C/SiC Composites
by Shaw, John Henry, Ph.D.  University of California, Santa Barbara. 2014: 229 pages; 3682976.
79.
A Location-Aware Architecture Supporting Intelligent Real-Time Mobile Applications
by Barbeau, Sean J., Ph.D.  University of South Florida. 2012: 245 pages; 3518695.
80.
Concrete solutions: Architecture of public high schools during the “urban crisis”
by Wiley, Amber N., Ph.D.  The George Washington University. 2011: 278 pages; 3449192.
81.
82.
A systems thinking approach to cloud computing that complements the NIST guidance
by Brow, Raymond A., Dr.sc.  Capitol College. 2012: 250 pages; 3585011.
83.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
87.
Virtual progression: The High Line as verdant infoscape
by Martin, Aja, M.A.  Southern Methodist University. 2011: 139 pages; 1495163.
89.
Secure storage via information dispersal across network overlays
by Johnston, Reece G., M.S.  The University of Alabama in Huntsville. 2016: 78 pages; 10157562.
90.
Computational REST: A new model for decentralized, Internet-scale applications
by Erenkrantz, Justin Ryan, Ph.D.  University of California, Irvine. 2009: 208 pages; 3372349.
61 - 90 of 22632 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest