Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
39148 open access dissertations and theses found for:
if(User behavior)  »   Refine Search
1.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
3.
4.
Prediction and recommendation in online media
by Yin, Dawei, Ph.D.  Lehigh University. 2013: 256 pages; 3598939.
5.
Impact of responsive and directive adaptation on local dialog processing
by Stoyanchev, Svetlana, Ph.D.  State University of New York at Stony Brook. 2009: 184 pages; 3401733.
6.
Beyond Who and What: Data Driven Approaches for User Behavior Modeling
by Nigam, Aastha, Ph.D.  University of Notre Dame. 2018: 257 pages; 13836458.
7.
Simulating the Effect of Microclimate on Human Behavior in Small Urban Spaces
by Lam, Fung Ki, Ph.D.  University of California, Berkeley. 2011: 132 pages; 3499000.
8.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
9.
Command Language for Single-User, Multi-Robot Swarm Control
by Shultz, Abraham M., Sc.D.  University of Massachusetts Lowell. 2019: 327 pages; 13859845.
10.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
11.
Cyber-based behavioral modeling
by Robinson, David John, Ph.D.  Dartmouth College. 2010: 225 pages; 3426407.
12.
13.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
14.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
16.
An Empirical Study on User Acceptance of Simulation Techniques for Business Process
by Ladeinde, Olurotimi Adeboye, Ph.D.  Walden University. 2011: 191 pages; 3457003.
17.
Analysis of clickstream modeling using a Continuous Time Finite State Markov Chain
by Tjiputra, Jeff, D.Sc.  The George Washington University. 2008: 93 pages; 3315048.
18.
A Prudent Access Control Behavioral Intention Model for the Healthcare Domain
by Mussa, Constance C., Ph.D.  Nova Southeastern University. 2011: 247 pages; 3474092.
19.
Blind and Visually Impaired Users Adaptation to Web Environments: A Qualitative Study
by Saqr, Raneem R., Ph.D.  University of South Florida. 2016: 154 pages; 10142378.
21.
A Comprehensive View of Home Energy Management
by Lachut, David S., Ph.D.  University of Maryland, Baltimore County. 2018: 120 pages; 10825526.
23.
Cyberpal: A mobile resource for cyberbullying
by Shieh, Beverly S., Psy.D.  Pepperdine University. 2016: 212 pages; 10100577.
25.
An evaluation of users' views of food diary applications
by Sauceda, Amanda, M.S.  California State University, Long Beach. 2013: 57 pages; 1523050.
26.
Web usage mining: Application to an online educational digital library service
by Palmer, Bart C., Ph.D.  Utah State University. 2012: 262 pages; 3507476.
29.
Large-Scale, Hybrid Approaches for Recommending Web Pages Based on Content and User's Previous Click Patterns
by Sharif, Mohammad Amir, Ph.D.  University of Louisiana at Lafayette. 2015: 108 pages; 10002452.
30.
Temporal-informatics of the WWW
by Adar, Eytan, Ph.D.  University of Washington. 2009: 213 pages; 3394202.
1 - 30 of 39148 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest