Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5271 open access dissertations and theses found for:
sub(Computer science)  »   Refine Search
241.
Pediatric heart sound segmentation
by Sedighian, Pouye, M.S.  California State University, Long Beach. 2014: 54 pages; 1526952.
242.
Improving usability of pedagogical computer emulation interfaces
by Williams, Stephen D., M.S.  American University. 2013: 164 pages; 1545764.
243.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
244.
Architectures for Stateful Data-intensive Analytics
by Logothetis, Dionysios, Ph.D.  University of California, San Diego. 2011: 129 pages; 3486845.
245.
Cyber-based behavioral modeling
by Robinson, David John, Ph.D.  Dartmouth College. 2010: 225 pages; 3426407.
248.
Unsupervised Learning under Uncertainty
by Mathieu, Michaël, Ph.D.  New York University. 2017: 159 pages; 10261120.
249.
Robustly modeling the world from photos
by Wilson, Kyle Lyndon, Ph.D.  Cornell University. 2016: 123 pages; 10183873.
250.
Promoting common ground in a clinical setting: The impact of designing for the secondary user experience
by Tunnell, Harry D., IV, Ph.D.  Indiana University - Purdue University Indianapolis. 2016: 197 pages; 10181724.
251.
The data narrativist: Leading analytics organizations in value creation using data driven communication
by Bradbury, Judd D., Ph.D.  The University of Texas at Dallas. 2016: 164 pages; 10113850.
252.
A Differential Geometric Approach using Orientation Fields for Shape from Shading
by Kunsberg, Benjamin, Ph.D.  Yale University. 2014: 136 pages; 3580738.
253.
Architecture and performance evaluation of data storage systems
by Ren, Jin, Ph.D.  University of Rhode Island. 2011: 186 pages; 3449275.
254.
Fully countering trusting trust through Diverse Double-Compiling
by Wheeler, David A., Ph.D.  George Mason University. 2010: 199 pages; 3393623.
255.
An “active vision” computational model of visual search for human -computer interaction
by Halverson, Timothy E., Ph.D.  University of Oregon. 2008: 191 pages; 3346648.
256.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
257.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
258.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
259.
Antikernel: A decentralized secure hardware-software operating system architecture
by Zonenberg, Andrew D., Ph.D.  Rensselaer Polytechnic Institute. 2015: 148 pages; 3705663.
260.
Remote sensing of vegetation structure using computer vision
by Dandois, Jonathan P., Ph.D.  University of Maryland, Baltimore County. 2014: 266 pages; 3637314.
261.
Application-Specific Topology-Independent Routing for Multi-hop Wireless Networks
by Kilavuz, Mustafa Omer, Ph.D.  University of Nevada, Reno. 2013: 117 pages; 3608740.
262.
Algorithms for DNA Sequence Assembly and Motif Search
by Dinh, Hieu Trung, Ph.D.  University of Connecticut. 2012: 95 pages; 3533974.
263.
Examining the Generality of Self-Explanation
by Wylie, Ruth, Ph.D.  Carnegie Mellon University. 2011: 122 pages; 3515570.
264.
Perceptually motivated automatic dance motion generation for music
by Kim, Jae Woo, D.Sc.  The George Washington University. 2009: 77 pages; 3349630.
265.
Learning to segment images into material and object classes
by McHenry, Kenton Guadron, Ph.D.  University of Illinois at Urbana-Champaign. 2008: 104 pages; 3314967.
266.
WPCA: The Wreath Product Cognitive Architecture
by Joshi, Anshul, Ph.D.  The University of Utah. 2016: 137 pages; 10242991.
267.
A framework for computer aided diagnosis and analysis of the neuro-vasculature
by Chowriappa, Ashirwad, Ph.D.  State University of New York at Buffalo. 2014: 203 pages; 3612958.
268.
Fast modular exponentiation using residue domain representation: A hardware implementation and analysis
by Nguyen, Christopher Dinh, M.S.  University of Maryland, Baltimore County. 2013: 129 pages; 1551346.
269.
On the Modular Verification and Design of Firewalls
by Bhattacharya, Hrishikesh, Ph.D.  The University of Texas at Austin. 2012: 118 pages; 3572873.
270.
241 - 270 of 5271 displayed.
« First < Previous |   6    7    8    9    10    11    12    13    14    15    16   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest