Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5497 open access dissertations and theses found for:
sub(Computer science)  »   Refine Search
121.
Modflows: Methods for studying and managing mesh editing workflows
by Denning, Jonathan D., Ph.D.  Dartmouth College. 2014: 129 pages; 3633485.
122.
Uncovering the network -centric organization
by Abrams, Robert Steven, Ph.D.  University of California, Irvine. 2009: 204 pages; 3369629.
123.
Early prediction of student goals and affect in narrative-centered learning environments
by Lee, Sunyoung, Ph.D.  North Carolina State University. 2008: 98 pages; 3329207.
124.
Data science for imbalanced data: Methods and applications
by Johnson, Reid A., Ph.D.  University of Notre Dame. 2016: 181 pages; 10004968.
125.
Post-Industrial Engineering: Computer Science and the Organization of White-Collar Work, 1945–1975
by Mamo, Andrew Benedict, Ph.D.  University of California, Berkeley. 2011: 242 pages; 3469448.
126.
Play Design
by Gingold, Chaim, Ph.D.  University of California, Santa Cruz. 2016: 593 pages; 10140206.
127.
Towards an optimal core optical network using overflow channels
by Menon, Pratibha, Ph.D.  University of Pittsburgh. 2009: 245 pages; 3375241.
128.
A method for evaluating and standardizing ontologies
by Seyed, Ali Patrice, Ph.D.  State University of New York at Buffalo. 2012: 235 pages; 3495226.
129.
Factors Influencing the Decision to Adopt a Digital Identity: A Correlational Study
by Cespiva, Richard B., D.I.T.  Capella University. 2018: 117 pages; 10937601.
130.
An Event Management Framework to Aid Solution Providers in Cybersecurity
by Leon, Ryan James, D.Engr.  The George Washington University. 2018: 114 pages; 10745141.
131.
Clustering transient data streams by example and by variable
by Chaovalit, Pimwadee, Ph.D.  University of Maryland, Baltimore County. 2009: 224 pages; 3359104.
132.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
133.
Information Weighted Consensus for Distributed Estimation in Vision Networks
by Kamal, Ahmed Tashrif, Ph.D.  University of California, Riverside. 2013: 130 pages; 3600575.
134.
Continuous and adaptive cartographic generalization of river networks
by Gutman, Moshe, Ph.D.  The University of Oklahoma. 2012: 170 pages; 3507854.
135.
Towards a theory on the sustainability and performance of FLOSS communities
by AlMarzouq, Mohammad, Ph.D.  Clemson University. 2009: 238 pages; 3389634.
137.
Development of Unintended Radiated Emissions (URE) Threat Identification System
by Friedel, Joseph E., D.Engr.  The George Washington University. 2018: 190 pages; 10743603.
138.
Community-based Networks for Challenged Environments
by Vigil-Hayes, Morgan Ashlee, Ph.D.  University of California, Santa Barbara. 2017: 238 pages; 10600330.
139.
Force field development with GOMC, a fast new Monte Carlo molecular simulation code
by Mick, Jason Richard, Ph.D.  Wayne State University. 2016: 171 pages; 10105010.
140.
Data-Driven Methods for Deriving Insight from Educational Problem Solving Environments
by Eagle, Michael John, Ph.D.  North Carolina State University. 2015: 114 pages; 10110648.
141.
Performance through social context displays
by Ding, Xianghua (Sharon), Ph.D.  University of California, Irvine. 2010: 164 pages; 3398860.
142.
Ant colony inspired models for trust-based recommendations
by Alathel, Deema, Ph.D.  The George Washington University. 2015: 193 pages; 3686815.
143.
Moving beyond the desktop: Searching for information with limited display size
by Marcial, Laura Haak, Ph.D.  The University of North Carolina at Chapel Hill. 2012: 340 pages; 3549635.
144.
Freedom of Information in the Age of Terrorism: The Mosaic Theory in Practice
by Cooper, Harry R., Ph.D.  Capitol Technology University. 2018: 173 pages; 10902463.
145.
Empirical study on technical debt as viewed by software practitioners
by Taksande, Nitin, M.S.  University of Maryland, Baltimore County. 2011: 106 pages; 1506267.
146.
147.
Toward Rapid Flood Mapping Using Modeled Inundation Libraries
by Dobbs, Kevin, Ph.D.  University of Kansas. 2017: 209 pages; 10256557.
150.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
121 - 150 of 5497 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest