Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
23152 open access dissertations and theses found for:
if(Secure architecture)  »   Refine Search
601.
An Approach to Dynamic Resource Allocation for Electric Power Disaster Response Management
by Kargbo, Abdulai Hassan, D.Engr.  The George Washington University. 2019: 102 pages; 10981665.
602.
Attachment style and motivation to volunteer among emerging adult college students
by Smith, Jennifer R., M.S.  Mississippi State University. 2015: 66 pages; 1596100.
603.
A simulation study of hierarchical wireless sensor networks
by Tsai, Chi-Nan, M.S.  California State University, Long Beach. 2012: 64 pages; 1520933.
604.
We Won't Be Here Long: A Study of Anticipated Mobility in the Rabbithole Mining District, Nevada
by Tiede, Kristen M., M.A.  University of Nevada, Reno. 2017: 148 pages; 10622262.
605.
On-Chip Diagnosis of Generalized Delay Failures using Compact Fault Dictionaries
by Beckler, Matthew Layne, Ph.D.  Carnegie Mellon University. 2017: 132 pages; 10283822.
606.
Improving usability of pedagogical computer emulation interfaces
by Williams, Stephen D., M.S.  American University. 2013: 164 pages; 1545764.
607.
Application of systems engineering principles for analysis of utility baseline development process
by Johnson, Benjamin D., M.S.  California State University, Long Beach. 2017: 85 pages; 10252428.
608.
A Functional Approach to Memory-Safe Operating Systems
by Leslie, Rebekah, Ph.D.  Portland State University. 2011: 342 pages; 3481882.
609.
Wearable human activity recognition systems
by Ameri-Daragheh, Alireza, M.S.  California State University, Long Beach. 2015: 104 pages; 1595755.
610.
Object Ranking Algorithms for Improved Decision Making
by Duggimpudi, Maria Bala, Ph.D.  University of Louisiana at Lafayette. 2017: 135 pages; 10684385.
611.
Resilience Analysis of Inertial Navigation Systems (INS) through an Enhanced INS Tool Kit
by Stavish, Kenneth V., D.Engr.  The George Washington University. 2018: 70 pages; 10743838.
612.
The geometry of evolutionary constraints on dynamic structure-function relationships
by Smith, Cameron Ray, Ph.D.  Yeshiva University. 2015: 176 pages; 3664551.
613.
Tideflow: A dataflow-inspired execution model for high performance computing programs
by Orozco, Daniel A., Ph.D.  University of Delaware. 2012: 163 pages; 3527015.
615.
Novel fast locking digital phase locked loop: Behavioral modeling and simulations using VHDL-AMS
by Nannaka, Anurag, M.S.  California State University, Long Beach. 2010: 84 pages; 1490320.
616.
System of systems engineering: Prescribing the technical development effort to engineer a constituent system
by Gomez, Darryl Anthony, Ph.D.  The George Washington University. 2010: 313 pages; 3433358.
617.
Scalable role & organization based access control and its administration
by Zhang, Zhixiong, Ph.D.  George Mason University. 2008: 131 pages; 3313522.
618.
Toward a software pipelining framework for many-core chips
by Ributzka, Juergen, M.S.  University of Delaware. 2009: 97 pages; 1469538.
619.
On the Commons: Poetic Afterlives of Eighteenth-century Property Forms
by Hyland, Marie-Christine, Ph.D.  New York University. 2019: 245 pages; 13811326.
620.
Issues on Romano-Campanian wall painting: The Villa Bottaro as a case study
by Brown, Nancy Elizabeth, M.A.  California State University, Long Beach. 2009: 108 pages; 1466128.
621.
Enhanced Secondary Bus Microarchitecture
by O'Farrell, John William, Ph.D.  Auburn University. 2011: 96 pages; 3480707.
622.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
623.
An Unpowered Exoskeleton to Reduce Astronaut Hand Fatigue during Microgravity EVA
by Carey, Alan John, M.S.  University of California, Davis. 2016: 164 pages; 10165880.
624.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
625.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
626.
Lower Bound Resource Requirements for Machine Intelligence
by Gilmanov, Timur, Ph.D.  Indiana University. 2018: 149 pages; 10980279.
628.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
629.
Programming Agent-Based Models by Demonstration
by Budhraja, Karan K., Ph.D.  University of Maryland, Baltimore County. 2019: 258 pages; 13428284.
630.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
601 - 630 of 23152 displayed.
« First < Previous |   18    19    20    21    22    23    24    25    26    27    28   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest