Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
6776 open access dissertations and theses found for:
sub(Computer Engineering)  »   Refine Search
1.
Problem-Based Privacy Analysis (ProPAn): A Computer-aided Privacy Requirements Engineering Method
by Meis, Rene, Ph.D.  Universitaet Duisburg-Essen (Germany). 2018: 509 pages; 13844395.
2.
Exploiting Structure in Data: Sampling and Signal Processing on Graphs
by Varma, Rohan Anilkumar, Ph.D.  Carnegie Mellon University. 2020: 211 pages; 27739115.
3.
Adaptive Strategies of Multi-Objective Optimization for Greener Networks
by Yazbek, Hatem, Ph.D.  Nova Southeastern University. 2019: 107 pages; 27667186.
4.
Measuring and Analyzing Typosquatting Toward Fighting Abusive Domain Registrations
by Szurdi, Janos, Ph.D.  Carnegie Mellon University. 2020: 148 pages; 27994260.
5.
Unlocking Design Reuse with Hardware Compiler Frameworks
by Izraelevitz, Adam, Ph.D.  University of California, Berkeley. 2019: 150 pages; 27663969.
6.
Facilitating Frame Injection Exploits through SiK Radio Firmware Modification
by WIss, Victor Gordon, M.S.  Christopher Newport University. 2020: 72 pages; 27956517.
7.
Collaborative Object Identification in Multi-Modal IoT Systems
by Ruiz Dominguez, Carlos, Ph.D.  Carnegie Mellon University. 2019: 160 pages; 27737184.
8.
Hardware Acceleration to Address the Costs of Data Movement
by Valavi, Hossein, Ph.D.  Princeton University. 2020: 254 pages; 27548046.
9.
Non-invasive Hyperglycemia Detection Using ECG and Deep Learning
by Silveira Cordeiro, Renato, M.S.  San Jose State University. 2019: 55 pages; 27736399.
10.
Computer Aided Analysis of Prostate Histopathology Images
by Ren, Jian, Ph.D.  Rutgers The State University of New Jersey, School of Graduate Studies. 2019: 142 pages; 22623293.
11.
An Optical Flow Derived Nowcasting Approach with Fuzzy Logic and Model Wind Field Vectors
by Olden, Joseph , M.S.  Southern Illinois University at Edwardsville. 2020: 62 pages; 27957931.
12.
Using a Cell Phone Camera to Improve Performance While Walking and Texting
by Martinez, Kristina Rae, M.S.  California State University, Long Beach. 2020: 46 pages; 27834182.
13.
Out-of-order Parallel Discrete Event Simulation for Electronic System-Level Design
by Chen, Weiwei, Ph.D.  University of California, Irvine. 2013: 194 pages; 3597427.
14.
Real-Time Software Electric Guitar Audio Transcription
by Fiss, Xander, M.S.  Rochester Institute of Technology. 2011: 55 pages; 1493588.
15.
Enhancing IoT Security with Blockchain
by Liu, Chunchi, Ph.D.  The George Washington University. 2020: 133 pages; 28091048.
16.
Detection of Canine Bone Cancer Using Artificial Neural Networks
by Gorre, Naveena, M.S.  Southern Illinois University at Edwardsville. 2020: 70 pages; 27957796.
17.
Light-Weight Accountable Privacy Preserving Protocol in Cloud Computing Based on a Third-Party Auditor
by Ben Haj Frej, Mohamed, Ph.D.  University of Bridgeport. 2019: 110 pages; 27743650.
19.
Graphical User Interface for the CVIP MATLAB Toolbox with Application to Syrinx Detection in Veterinary Thermographic Images
by Cuellar Buritica, Julian Rene, M.S.  Southern Illinois University at Edwardsville. 2019: 132 pages; 13900325.
20.
Application Layer Authentication Using a Time-Based Password Effect upon the Smart Home Automation Controller
by Bringardner, Alan Scott, D.Sc.  Capitol Technology University. 2017: 227 pages; 27739945.
21.
Energy-Efficient Architectures Based on STT-MRAM
by Guo, Xiaochen, Ph.D.  University of Rochester. 2015: 150 pages; 3723260.
22.
Multi-GPU Graph Processing
by Pan, Yuechao, Ph.D.  University of California, Davis. 2019: 136 pages; 13809782.
23.
UV3: Re-engineering the unravel program slicing tool
by Lamoreaux, Candace M., M.S.  California State University, Long Beach. 2016: 63 pages; 10140465.
24.
25.
Fuzzing the Berkeley Packet Filter
by Nilsen, Benjamin Curt, M.S.  University of California, Davis. 2020: 53 pages; 28000762.
26.
Digital Image Source Authentication
by Schippers, David A., D.Sc.  Capitol Technology University. 2018: 223 pages; 27828526.
27.
Rethinking Existing Cybersecurity Frameworks: How to Incentivise Companies to Better Defend against Cyber Threats
by Wang, BaoFa, M.S.  University of London, Royal Holloway, University of London (United Kingdom). 2020: 106 pages; 28087173.
28.
A Highly Accurate and Reliable Data Fusion Framework for Guiding the Visually Impaired
by Elmannai, Wafa, Ph.D.  University of Bridgeport. 2018: 192 pages; 10931368.
29.
Consumer Preference: A Study of Mobile Digital Wallet
by Oyewole, Anas Olateju, D.B.A.  Capitol Technology University. 2018: 175 pages; 22624060.
30.
Practical Black-Box Analysis for Network Functions and Services
by Moon, Soo-Jin, Ph.D.  Carnegie Mellon University. 2020: 202 pages; 28148170.
1 - 30 of 6776 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest