Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5271 open access dissertations and theses found for:
sub(Computer science)  »   Refine Search
181.
Adding Intelligence to a Floor Based Array Personnel Detector
by Muheidat, Fadi, M.S.  University of Missouri - Columbia. 2015: 122 pages; 13849576.
182.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
183.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
184.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
185.
Evaluating the performance of iPhoto facial recognition at the biometric verification task
by Patmore, Keegan P., M.S.  Colorado State University. 2012: 28 pages; 1511042.
186.
An implementation of a multi-touch draw-a-secret password schema for windows-based computers
by Lichtenberger, Matthew, M.Eng.  University of Louisville. 2011: 89 pages; 1504201.
187.
A cooperative approach to continuous calibration in multi-projector displays
by Johnson, Tyler M., Ph.D.  The University of North Carolina at Chapel Hill. 2009: 126 pages; 3387973.
188.
Metrics for Aspect Mining Visualization
by Jorgensen, Gisle J., Ph.D.  Nova Southeastern University. 2018: 85 pages; 10842982.
189.
Efficient Actor Recovery Paradigm for Wireless Sensor and Actor Networks
by Mahjoub, Reem Khalid, Ph.D.  University of Bridgeport. 2017: 141 pages; 10745143.
190.
Smart Robotics Prosthesis Using Deep Learning and Musculoskeletal Modeling
by Chaudhari, Dipti K., M.S.  California State University, Long Beach. 2017: 56 pages; 10690581.
191.
192.
Practical robust MIMO OFDM communication system for high-speed mobile communication
by Grabner, Mitchell John James, M.S.  University of North Texas. 2015: 70 pages; 10034688.
193.
Use of near field communication technology to prevent consumption and usage of expired products
by Khayyat, Ahmed M., M.S.  California State University, Long Beach. 2015: 47 pages; 1604871.
194.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
195.
Efficient Gain-Driven Routing-Assisted Mechanisms for Network-wide Traffic Monitoring
by Chang, Chia-Wei, Ph.D.  University of California, San Diego. 2011: 143 pages; 3487322.
196.
Development of a protocol for 3-D reconstruction of brain aneurysms from volumetric image data
by Welch, David Michael, M.S.  The University of Iowa. 2010: 100 pages; 1499566.
197.
Generic, deformable models for 3-d vehicle surveillance
by Leotta, Matthew J., Ph.D.  Brown University. 2010: 248 pages; 3430195.
199.
Eye Movement Prediction by Oculomotor Plant Modeling with Kalman Filter 2003-2007
by Oleg, Komogortsev Vladimirovich, Ph.D.  Kent State University. 2007: 121 pages; 10817889.
200.
Ultra-Low Power RFIC for Space/Medical/Mobile Applications
by Yasami, Saeid, Ph.D.  University of Louisiana at Lafayette. 2015: 114 pages; 10003754.
201.
Beneath the Attack Surface
by Mowery, Keaton, Ph.D.  University of California, San Diego. 2015: 200 pages; 3712726.
202.
A study of cell-based genetic algorithms with applications to neural networks
by Dinh, Hoa, M.S.  California State University, Long Beach. 2013: 62 pages; 1527480.
203.
Authenticating executions for trusted systems
by Aktas, Erdem, Ph.D.  State University of New York at Binghamton. 2013: 215 pages; 3596989.
204.
A Framework for Quality of Service and Fault Management in Service-Oriented Architecture
by Zhang, Jing, Ph.D.  University of California, Irvine. 2013: 151 pages; 3566058.
205.
Result Distribution in Big Data Systems
by Cheelangi, Madhusudan, M.S.  University of California, Irvine. 2013: 63 pages; 1539891.
206.
Hardware/Software Co-Design via Specification Refinement
by Peck, Wesley G., Ph.D.  University of Kansas. 2011: 183 pages; 3489442.
207.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
208.
Comparative Analysis of Space-Grade Processors
by Lovelly, Tyler Michael, Ph.D.  University of Florida. 2017: 85 pages; 13847472.
209.
Improving SAT Solvers by Exploiting Empirical Characteristics of CDCL
by Oh, Chanseok, Ph.D.  New York University. 2016: 145 pages; 10025676.
181 - 210 of 5271 displayed.
« First < Previous |   4    5    6    7    8    9    10    11    12    13    14   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest