Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
266 open access dissertations and theses found for:
if(Virtualization)  »   Refine Search
121.
The Google Chrome operating system forensic artifacts
by Corbin, George, M.S.  Utica College. 2014: 68 pages; 1571599.
122.
Leveraging Model-Based Techniques for Component Level Architecture Analysis in Product-Based Systems
by McKean, David Keith, Ph.D.  The George Washington University. 2019: 209 pages; 13812870.
123.
Post-silicon Functional Validation with Virtual Prototypes
by Cong, Kai, Ph.D.  Portland State University. 2015: 143 pages; 3712209.
124.
Solid State Disk forensics: Is there a path forward?
by Fulton, John William, M.S.  Utica College. 2014: 47 pages; 1555597.
126.
Configuration management using Expect (TCL/TK)
by Vallamsetla, Karthik, M.S.  California State University, Long Beach. 2016: 120 pages; 1606701.
128.
On-Chip Diagnosis of Generalized Delay Failures using Compact Fault Dictionaries
by Beckler, Matthew Layne, Ph.D.  Carnegie Mellon University. 2017: 132 pages; 10283822.
130.
High Performance On-Demand Video Transcoding Using Cloud Services
by Li, Xiangbo, Ph.D.  University of Louisiana at Lafayette. 2016: 147 pages; 10245247.
131.
A Load Balancing Algorithm for Flow Management in Hybrid-SDN Networks
by Wang, Xuan, M.S.  University of South Dakota. 2018: 77 pages; 10937380.
132.
Core Flight System Cryptography Library
by Lucas, John Patrick, M.S.  West Virginia University. 2017: 115 pages; 10268719.
133.
Lightweight Programming Abstractions for Increased Safety and Performance
by Osvald, Leo, Ph.D.  Purdue University. 2018: 147 pages; 10808010.
134.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
135.
A semantic approach for building sentient spaces
by Massaguer, Daniel, Ph.D.  University of California, Irvine. 2009: 132 pages; 3386636.
136.
A study of security in cloud computing
by Bhayal, Savita, M.S.  California State University, Long Beach. 2011: 68 pages; 1504430.
137.
A Functional Approach to Memory-Safe Operating Systems
by Leslie, Rebekah, Ph.D.  Portland State University. 2011: 342 pages; 3481882.
139.
Real-Time Adaptive Data-Driven Perception for Anomaly Priority Scoring at Scale
by Miraftabzadeh, Seyed Ali, Ph.D.  The University of Texas at San Antonio. 2017: 142 pages; 10686275.
141.
Exploration of Complexities for Migration of Software-Licensing Models
by Mulchahey, Kenneth E., D.B.A.  Capella University. 2019: 157 pages; 13806407.
142.
The semiconductor industry and emerging technologies: A study using a modified Delphi method
by Jordan, Edgar A., D.B.A.  University of Phoenix. 2010: 183 pages; 3442759.
143.
Strong-DISM: A First Attempt to a Dynamically Typed Assembly Language (D-TAL)
by Hernandez, Ivory, M.S.C.S.  University of South Florida. 2017: 65 pages; 10640802.
144.
A cross cultural comparison of smartphone use in the United States and the Kingdom of Saudi Arabia
by Almahfud, Mohammed Zaidan, Ed.D.  Montana State University. 2014: 98 pages; 3630529.
145.
Online Distributed Depository Selection in Opportunistic Device-to-Device Networks
by Bashar, A. M. A. Elman, Ph.D.  University of Louisiana at Lafayette. 2016: 80 pages; 10163336.
146.
Robust Resource Allocation of Independent Tasks in Heterogeneous Computing Systems via Probabilistic Task Pruning
by Gentry, James A. S., M.S.  University of Louisiana at Lafayette. 2018: 88 pages; 10843501.
148.
Provably Efficient Algorithms for Numerical Tensor Algebra
by Solomonik, Edgar, Ph.D.  University of California, Berkeley. 2014: 256 pages; 3686016.
149.
Adaptive Grid Computing
by Zhang, Juemin, Ph.D.  Northeastern University. 2010: 178 pages; 3443847.
121 - 150 of 266 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest