Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
6041 open access dissertations and theses found for:
sub(Computer science)  »   Refine Search
361.
Optimizing frequency domain contention in wireless network
by Abdnoor Al-zurfi, Huda Kadhem, M.S.  The University of North Carolina at Greensboro. 2014: 85 pages; 1558125.
362.
Optimizing Jython using invokedynamic and Gradual Typing
by Bharadwaj, Shashank, M.S.  University of Colorado at Boulder. 2012: 74 pages; 1533380.
363.
A Location-Aware Architecture Supporting Intelligent Real-Time Mobile Applications
by Barbeau, Sean J., Ph.D.  University of South Florida. 2012: 245 pages; 3518695.
364.
A control framework for continuous time adaptation in modern day embedded systems
by Kallakuri, Sankalp, Ph.D.  State University of New York at Stony Brook. 2007: 147 pages; 3334943.
365.
A Quantitative Examination of Gender Bias and Language Paradigm in the Evaluation of Source Code
by Rangel, Pamela J., Ph.D.  Northcentral University. 2018: 204 pages; 10784617.
366.
Intelligent cache management techniques for reducing memory systemwaste
by Khan, Samira M., Ph.D.  The University of Texas at San Antonio. 2012: 109 pages; 3527415.
367.
Metrics for Aspect Mining Visualization
by Jorgensen, Gisle J., Ph.D.  Nova Southeastern University. 2018: 85 pages; 10842982.
368.
Efficient Actor Recovery Paradigm for Wireless Sensor and Actor Networks
by Mahjoub, Reem Khalid, Ph.D.  University of Bridgeport. 2017: 141 pages; 10745143.
369.
Smart Robotics Prosthesis Using Deep Learning and Musculoskeletal Modeling
by Chaudhari, Dipti K., M.S.  California State University, Long Beach. 2017: 56 pages; 10690581.
370.
371.
Practical robust MIMO OFDM communication system for high-speed mobile communication
by Grabner, Mitchell John James, M.S.  University of North Texas. 2015: 70 pages; 10034688.
372.
Use of near field communication technology to prevent consumption and usage of expired products
by Khayyat, Ahmed M., M.S.  California State University, Long Beach. 2015: 47 pages; 1604871.
373.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
374.
Efficient Gain-Driven Routing-Assisted Mechanisms for Network-wide Traffic Monitoring
by Chang, Chia-Wei, Ph.D.  University of California, San Diego. 2011: 143 pages; 3487322.
375.
Generic, deformable models for 3-d vehicle surveillance
by Leotta, Matthew J., Ph.D.  Brown University. 2010: 248 pages; 3430195.
376.
Eye Movement Prediction by Oculomotor Plant Modeling with Kalman Filter 2003-2007
by Oleg, Komogortsev Vladimirovich, Ph.D.  Kent State University. 2007: 121 pages; 10817889.
377.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
378.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
379.
Antikernel: A decentralized secure hardware-software operating system architecture
by Zonenberg, Andrew D., Ph.D.  Rensselaer Polytechnic Institute. 2015: 148 pages; 3705663.
380.
Remote sensing of vegetation structure using computer vision
by Dandois, Jonathan P., Ph.D.  University of Maryland, Baltimore County. 2014: 266 pages; 3637314.
381.
Application-Specific Topology-Independent Routing for Multi-hop Wireless Networks
by Kilavuz, Mustafa Omer, Ph.D.  University of Nevada, Reno. 2013: 117 pages; 3608740.
382.
Algorithms for DNA Sequence Assembly and Motif Search
by Dinh, Hieu Trung, Ph.D.  University of Connecticut. 2012: 95 pages; 3533974.
383.
Examining the Generality of Self-Explanation
by Wylie, Ruth, Ph.D.  Carnegie Mellon University. 2011: 122 pages; 3515570.
384.
Perceptually motivated automatic dance motion generation for music
by Kim, Jae Woo, D.Sc.  The George Washington University. 2009: 77 pages; 3349630.
385.
Learning to segment images into material and object classes
by McHenry, Kenton Guadron, Ph.D.  University of Illinois at Urbana-Champaign. 2008: 104 pages; 3314967.
388.
Refining Bounding-Box Regression for Object Localization
by Dickerson, Naomi Lynn, M.S.  Portland State University. 2017: 55 pages; 10602491.
390.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
361 - 390 of 6041 displayed.
« First < Previous |   10    11    12    13    14    15    16    17    18    19    20   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest