Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
537 open access dissertations and theses found for:
if(Timestamp)  »   Refine Search
91.
A QoS Diagnosis Methodology Based on Dependency Matrix with Reputation Factor in SOA
by Chang, Yi-Chin, M.S.  University of California, Irvine. 2011: 63 pages; 1496589.
92.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
93.
Constructing a creative self-efficacy inventory: A mixed methods inquiry
by Abbott, Daniel H., Ph.D.  The University of Nebraska - Lincoln. 2010: 282 pages; 3402936.
94.
Elastic Prefetching for High-Performance Storage Devices
by Uppal, Ahsen, M.S.  The George Washington University. 2011: 80 pages; 1497827.
95.
IDnet Mesh: Towards user accountability for the Internet
by Deng, Leiwen, Ph.D.  Northwestern University. 2010: 134 pages; 3402413.
96.
Reliability-based fatigue assessment of mast-arm sign support structures
by Diekfuss, Joseph A., Ph.D.  Marquette University. 2013: 423 pages; 3560292.
98.
RCAT: A Restful Client-scalable Architectural style for Massively Multiuser Virtual Environments
by Valadares, Arthur Rodrigo Sawazachi, M.S.  University of California, Irvine. 2013: 98 pages; 1535770.
99.
Indoor object localization system
by Marulkar, Sameer, M.S.  California State University, Long Beach. 2016: 42 pages; 10116157.
100.
Temporal and topological analysis of Open Source Software networks
by Van Antwerp, Matthew, Ph.D.  University of Notre Dame. 2013: 166 pages; 3733803.
102.
Hardware acceleration of database applications
by Moussalli, Roger, Ph.D.  University of California, Riverside. 2013: 193 pages; 3559997.
103.
Generating narrative variation in interactive fiction
by Montfort, Nick, Ph.D.  University of Pennsylvania. 2007: 216 pages; 3271851.
104.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
105.
A forensic investigation of the electrical properties of digital audio recording
by LeRoi, Jack, M.S.  University of Colorado at Denver. 2014: 71 pages; 1556863.
106.
An exploration of mechanisms and policies for gateways in real-time embedded systems
by Ray, Justin David, Ph.D.  Carnegie Mellon University. 2013: 248 pages; 3578657.
107.
Capturing tree crown attributes from high resolution remotely sensed data
by Kato, Akira, Ph.D.  University of Washington. 2008: 171 pages; 3345744.
108.
The temporal organization of syllabic structure
by Shaw, Jason A., Ph.D.  New York University. 2010: 221 pages; 3408355.
109.
Fully countering trusting trust through Diverse Double-Compiling
by Wheeler, David A., Ph.D.  George Mason University. 2010: 199 pages; 3393623.
110.
Software signature derivation from sequential digital forensic analysis
by Nelson, Alexander J., Ph.D.  University of California, Santa Cruz. 2016: 177 pages; 10140317.
111.
Multiple Grid Multiple Time-Scale (MGMT) Simulations in Linear Structural Dynamics
by Ruparel, Tejas, Ph.D.  The George Washington University. 2015: 374 pages; 3669113.
112.
Blood Glucose Regulation System for Type 1 Diabetic Rats by using Time Series Neural Network Based Model Predictive Control
by Kirilmaz, Omer Batuhan, M.S.  Southern Illinois University at Edwardsville. 2020: 55 pages; 28030990.
113.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
114.
Extending Relativistic Programming to Multiple Writers
by Howard, Philip William, Ph.D.  Portland State University. 2012: 167 pages; 3502918.
115.
Engineered Synchrony of Bacterial Lysis and its Applications
by Zanulabe Din, Muhammad Omar, Ph.D.  University of California, San Diego. 2017: 125 pages; 10624775.
116.
Human-Inspired Robotic Hand-Eye Coordination
by Olson, Stephanie T., M.S.  Florida Atlantic University. 2018: 195 pages; 10928904.
117.
Retrieving quantifiable social media data from human sensor networks for disaster modeling and crisis mapping
by Aulov, Oleg, Ph.D.  University of Maryland, Baltimore County. 2014: 116 pages; 3637303.
118.
Architecture and protocols for a high-performance, secure IEEE 802.11-based wireless mesh network
by Raniwala, Ashish, Ph.D.  State University of New York at Stony Brook. 2009: 215 pages; 3401726.
119.
Approximating application performances in cloud data centers and simulated machines
by Islam, Mohammad Shahedul, Ph.D.  The University of Texas at San Antonio. 2016: 113 pages; 10249769.
120.
Cyber-based behavioral modeling
by Robinson, David John, Ph.D.  Dartmouth College. 2010: 225 pages; 3426407.
91 - 120 of 537 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest