Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
4523 open access dissertations and theses found for:
if(Virtualization interfaces)  »   Refine Search
1.
Symbiotic virtualization
by Lange, John Russell, Ph.D.  Northwestern University. 2010: 224 pages; 3426601.
3.
A study on virtualization technology and its impact on computer hardware
by Semnanian, Amir Ali, M.S.  California State University, Long Beach. 2013: 76 pages; 1523065.
5.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
6.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
8.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
9.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
10.
Mitigating Privilege Escalation
by Brookes, Scott, Ph.D.  Dartmouth College. 2018: 215 pages; 10822683.
11.
Modeling and analyzing service-oriented enterprise architectural styles
by Tang, Longji, Ph.D.  The University of Texas at Dallas. 2011: 269 pages; 3494567.
12.
Performance comparison between x86 virtualization technologies
by Pham, Duy M., M.S.  California State University, Long Beach. 2014: 73 pages; 1528024.
13.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
14.
Scalable virtual machine multiplexing
by Gupta, Diwaker, Ph.D.  University of California, San Diego. 2009: 183 pages; 3338860.
15.
Introduction to SDN, Openflow and Mininet and Creating Custom Topologies in Mininet
by Pandraka, Rohun, M.S.  University of Louisiana at Lafayette. 2017: 64 pages; 10280353.
17.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
18.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
19.
IslaNet: An isolated and secure approach to implementing computer networking laboratories
by Cruz-Zendejas, Rogelio, M.S.  California State University, Long Beach. 2013: 121 pages; 1527541.
21.
Abstractions and algorithms for control of extensible and heterogeneous virtualized network infrastructures
by Wiseman, Charles Gordon, Ph.D.  Washington University in St. Louis. 2010: 205 pages; 3412319.
23.
Light-Weight Virtualization Driven Runtimes for Big Data Applications
by Chen, Wei, Ph.D.  University of Colorado Colorado Springs. 2019: 194 pages; 13862451.
24.
Securing Operating Systems Through Utility Virtual Machines
by Denz, Robert, Ph.D.  Dartmouth College. 2016: 222 pages; 10190644.
26.
Hydrophobicity, heat transfer, and momentum transfer at hard and soft aqueous interfaces
by Acharya, Hari, Ph.D.  Rensselaer Polytechnic Institute. 2013: 126 pages; 3600990.
28.
A systems thinking approach to cloud computing that complements the NIST guidance
by Brow, Raymond A., Dr.sc.  Capitol College. 2012: 250 pages; 3585011.
29.
Improving usability of pedagogical computer emulation interfaces
by Williams, Stephen D., M.S.  American University. 2013: 164 pages; 1545764.
30.
A child-centric interface: Graffiti or not graffiti
by Brunner, Kevin D., Ph.D.  Nova Southeastern University. 2007: 210 pages; 3268371.
1 - 30 of 4523 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest