Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5277 open access dissertations and theses found for:
sub(Computer science)  »   Refine Search
121.
Early prediction of student goals and affect in narrative-centered learning environments
by Lee, Sunyoung, Ph.D.  North Carolina State University. 2008: 98 pages; 3329207.
124.
Data-Driven Methods for Deriving Insight from Educational Problem Solving Environments
by Eagle, Michael John, Ph.D.  North Carolina State University. 2015: 114 pages; 10110648.
125.
Performance through social context displays
by Ding, Xianghua (Sharon), Ph.D.  University of California, Irvine. 2010: 164 pages; 3398860.
126.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
127.
Fair cost sharing auction mechanisms in last mile ridesharing
by Nguyen, Duc Thien, M.Sc.  Singapore Management University (Singapore). 2013: 88 pages; 1548073.
128.
A viewshed accuracy assessment: Comparison of field-derived and computer-derived viewsheds
by Sims, Brian Russell, M.A.  California State University, Long Beach. 2011: 83 pages; 1493059.
129.
African-American males in computer science—Examining the pipeline for clogs
by Stone, Daryl Bryant, D.Sc.  The George Washington University. 2008: 350 pages; 3341359.
130.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
131.
Toward Rapid Flood Mapping Using Modeled Inundation Libraries
by Dobbs, Kevin, Ph.D.  University of Kansas. 2017: 209 pages; 10256557.
134.
Data preservation in intermittently connected sensor networks via data aggregation
by Hsu, Tiffany, M.S.  California State University, Long Beach. 2013: 44 pages; 1527382.
135.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
136.
137.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
138.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
139.
Time-Slicing of Movement Data for Efficient Trajectory Clustering
by Edens, Jared M., M.S.  Southern Illinois University at Edwardsville. 2014: 46 pages; 1560760.
140.
Applications and extensions of pClust to big microbial proteomic data
by Lockwood, Svetlana, Ph.D.  Washington State University. 2016: 100 pages; 10139743.
142.
Post-Industrial Engineering: Computer Science and the Organization of White-Collar Work, 1945–1975
by Mamo, Andrew Benedict, Ph.D.  University of California, Berkeley. 2011: 242 pages; 3469448.
143.
Using visualization tools to mitigate Information Overload on the internet
by Tate, Charles C., M.A.  Georgetown University. 2009: 95 pages; 1461128.
144.
Mechanical Inference in Dynamic Ecosystems
by Langendorf, R. E., Ph.D.  University of Colorado at Boulder. 2018: 138 pages; 10792156.
145.
Play Design
by Gingold, Chaim, Ph.D.  University of California, Santa Cruz. 2016: 593 pages; 10140206.
147.
Towards an optimal core optical network using overflow channels
by Menon, Pratibha, Ph.D.  University of Pittsburgh. 2009: 245 pages; 3375241.
149.
121 - 150 of 5277 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest