Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
7685 open access dissertations and theses found for:
if(Verification)  »   Refine Search
33.
Design and Verification of a DFI-AXI DDR4 Memory PHY Bridge Suitable for FPGA Based RTL Emulation and Prototyping
by Mayekar, Pallavi Avinash, M.S.  Rochester Institute of Technology. 2019: 122 pages; 22615759.
36.
A device to validate concentration measured by direct reading instruments for aerosols
by Saleh, Sabah Khalid, M.S.  The University of Iowa. 2011: 46 pages; 1505907.
37.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
38.
39.
The effect of job performance aids on quality assurance
by Fosshage, Erik, M.S.I.E.  Purdue University. 2014: 131 pages; 1564868.
40.
Toward Consistent Robotics Simulation Through Validation
by Taylor, James R., Ph.D.  The George Washington University. 2018: 136 pages; 10929572.
41.
Program inconsistency detection: Universal reachability analysis and conditional slicing
by Tomb, Aaron, Ph.D.  University of California, Santa Cruz. 2011: 182 pages; 3471818.
42.
Finite safety models for high -assurance systems
by Sloan, John C., Ph.D.  Florida Atlantic University. 2010: 266 pages; 3420062.
43.
Modular and Safe Event-driven Programming
by Desai, Ankush Pankaj, Ph.D.  University of California, Berkeley. 2019: 206 pages; 27672106.
44.
Cyber Physical System Modeling of Smart Charging Process
by Langschwager, Matthew T., M.S.  University of Louisiana at Lafayette. 2018: 98 pages; 13420593.
45.
Satisfiability checking for quality assurance in relational data processing
by Heller, Kelly K., M.S.  California State University, Long Beach. 2013: 234 pages; 1524200.
46.
A self-verifying theorem prover
by Davis, Jared Curran, Ph.D.  The University of Texas at Austin. 2009: 554 pages; 3407549.
47.
ROVER: A DNS-based method to detect and prevent IP hijacks
by Gersch, Joseph E., Ph.D.  Colorado State University. 2013: 179 pages; 3608195.
48.
ONIX: An Open-source Burnup Code for Nuclear Archaeology
by de Troullioud de Lanversin, Julien, Ph.D.  Princeton University. 2019: 176 pages; 22621414.
49.
Gatekeepers to healthcare quality and patient safety: Veritas Credentials
by Veerkamp, Celeste Goff, M.S.  California State University, Long Beach. 2016: 59 pages; 10158999.
50.
Authenticating executions for trusted systems
by Aktas, Erdem, Ph.D.  State University of New York at Binghamton. 2013: 215 pages; 3596989.
52.
Designing, Verifying, and Evolving Commitment-based Protocols for Business
by Gerard, Scott Neal, Ph.D.  North Carolina State University. 2013: 150 pages; 3575895.
53.
54.
Quantifying the Impacts of Initial Condition and Model Uncertainty on Hydrological Forecasts
by DeChant, Caleb Matthew, Ph.D.  Portland State University. 2014: 185 pages; 3628148.
56.
Improving Software Productivity and Quality via Mining Source Code
by Thummalapenta, Suresh, Ph.D.  North Carolina State University. 2011: 185 pages; 3442531.
57.
A Compositional Automation Engine for Verifying Complex System Software
by Wu, Xiongnan Newman, Ph.D.  Yale University. 2018: 211 pages; 13851930.
58.
Validating Petri Net Models of Cyberattacks
by Christensen, Nicholas M., M.S.  The University of Alabama in Huntsville. 2017: 102 pages; 10608103.
59.
Application of systems engineering in installation process for the service industry
by Tavazoei, Saeid, M.S.  California State University, Long Beach. 2014: 96 pages; 1526961.
60.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
31 - 60 of 7685 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest