Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
95 open access dissertations and theses found for:
if(Vmware)  »   Refine Search
1.
Performance comparison between x86 virtualization technologies
by Pham, Duy M., M.S.  California State University, Long Beach. 2014: 73 pages; 1528024.
3.
A study on virtualization technology and its impact on computer hardware
by Semnanian, Amir Ali, M.S.  California State University, Long Beach. 2013: 76 pages; 1523065.
4.
Study of W32/NetSky.Q worm and malicious website detection using packed malware string search
by Dongre, Ankush, M.S.  California State University, Long Beach. 2011: 94 pages; 1504450.
5.
Multiphase assessment of respiratory function
by Fry, Michael W., M.S.  California State University, Long Beach. 2015: 84 pages; 1596462.
6.
Mounting a Windows software raid as a virtual disk
by Ducharme, Daniel N., M.S.  University of Rhode Island. 2012: 227 pages; 1516158.
7.
The Google Chrome operating system forensic artifacts
by Corbin, George, M.S.  Utica College. 2014: 68 pages; 1571599.
8.
Scalable virtual machine multiplexing
by Gupta, Diwaker, Ph.D.  University of California, San Diego. 2009: 183 pages; 3338860.
9.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
10.
Dynamic Load-Based Power and Clock Gating Techniques for High-Speed Digital Circuits
by Farah, Salim, Ph.D.  University of Louisiana at Lafayette. 2014: 128 pages; 3622218.
11.
12.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
13.
Black box methods for inferring parallel applications' properties in virtual environments
by Gupta, Ashish, Ph.D.  Northwestern University. 2008: 289 pages; 3303812.
14.
Configuration management using Expect (TCL/TK)
by Vallamsetla, Karthik, M.S.  California State University, Long Beach. 2016: 120 pages; 1606701.
15.
Resource provisioning in large-scale self-organizing distributed systems
by Reynolds, M. Brent, Ph.D.  Air Force Institute of Technology. 2012: 228 pages; 3512041.
16.
Enhanced acquisition of data in the presence of transfaulty nodes in a wireless sensor network
by Gupta, Purva, M.S.  California State University, Long Beach. 2017: 38 pages; 10253169.
17.
Packet adaptive routing in communication network
by Bankapura, Sagar, M.S.  California State University, Long Beach. 2016: 49 pages; 10004161.
18.
Performance and security in VOIP
by Patel, Malkesh M., M.S.  California State University, Long Beach. 2016: 38 pages; 10141531.
19.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
20.
Securing Operating Systems Through Utility Virtual Machines
by Denz, Robert, Ph.D.  Dartmouth College. 2016: 222 pages; 10190644.
21.
Experimental analysis of the interference impact of Wi-Fi on ZigBee using cognitive radio
by Younan, Harvy, M.S.  California State University, Long Beach. 2011: 105 pages; 1511398.
22.
A Saudi Female Perspective on the Adoption of Online Banking with Saudi Arabian Banks
by Alabdan, Rana I., D.Sc.  Robert Morris University. 2017: 116 pages; 10283048.
25.
Workload-Driven Design and Evaluation of Large-Scale Data-Centric Systems
by Chen, Yanpei, Ph.D.  University of California, Berkeley. 2012: 158 pages; 3527081.
26.
Symbiotic virtualization
by Lange, John Russell, Ph.D.  Northwestern University. 2010: 224 pages; 3426601.
27.
IslaNet: An isolated and secure approach to implementing computer networking laboratories
by Cruz-Zendejas, Rogelio, M.S.  California State University, Long Beach. 2013: 121 pages; 1527541.
28.
Improving usability of pedagogical computer emulation interfaces
by Williams, Stephen D., M.S.  American University. 2013: 164 pages; 1545764.
29.
Light-Weight Virtualization Driven Runtimes for Big Data Applications
by Chen, Wei, Ph.D.  University of Colorado Colorado Springs. 2019: 194 pages; 13862451.
30.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
1 - 30 of 95 displayed.
  1    2    3    4   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest