Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
6050 open access dissertations and theses found for:
sub(Computer science)  »   Refine Search
151.
Play Design
by Gingold, Chaim, Ph.D.  University of California, Santa Cruz. 2016: 593 pages; 10140206.
152.
Towards an optimal core optical network using overflow channels
by Menon, Pratibha, Ph.D.  University of Pittsburgh. 2009: 245 pages; 3375241.
153.
Traffic pattern in negatively curved network
by Lou, Mingji, Ph.D.  University of Southern California. 2008: 124 pages; 3341712.
154.
Academic library Web portals: Does the use of images influence users' perception of the use experience
by Smith, James Patrick, Ph.D.  Long Island University, C. W. Post Center. 2007: 242 pages; 3337580.
156.
Time-Slicing of Movement Data for Efficient Trajectory Clustering
by Edens, Jared M., M.S.  Southern Illinois University at Edwardsville. 2014: 46 pages; 1560760.
157.
160.
Atomistic Monte Carlo Simulation and Machine Learning Data Analysis of Eutectic Alkali Metal Alloys
by Reitz, Doug, Ph.D.  George Mason University. 2018: 118 pages; 10982615.
161.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
162.
A Deep Learning Approach to Detecting Covert Channels in the Domain Name System
by Peña, Tomás Antonio, T.D.  Capitol Technology University. 2020: 206 pages; 27735496.
163.
Investigating Accuracy of the Reconfigurable Optical Computer (ROC) in Metatronics for Solving Partial Differential Equations
by Crandall, Joseph Warren, M.S.  The George Washington University. 2019: 82 pages; 13864207.
164.
Analyzing Consumer’s Awareness of Protecting Personally Identifiable Information on Android Smartphones
by Capellman, Douglas D., D.B.A.  Capitol Technology University. 2018: 184 pages; 27547726.
165.
Development of Unintended Radiated Emissions (URE) Threat Identification System
by Friedel, Joseph E., D.Engr.  The George Washington University. 2018: 190 pages; 10743603.
166.
Toward Rapid Flood Mapping Using Modeled Inundation Libraries
by Dobbs, Kevin, Ph.D.  University of Kansas. 2017: 209 pages; 10256557.
169.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
170.
Data preservation in intermittently connected sensor networks via data aggregation
by Hsu, Tiffany, M.S.  California State University, Long Beach. 2013: 44 pages; 1527382.
171.
A viewshed accuracy assessment: Comparison of field-derived and computer-derived viewsheds
by Sims, Brian Russell, M.A.  California State University, Long Beach. 2011: 83 pages; 1493059.
172.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
173.
DevOps Software Quality - Are Researchers and Practitioners in Sync?
by Marwaha, Archana, D.Sc.  Robert Morris University. 2020: 311 pages; 28149272.
175.
Health Data Analysis and Predictions
by Pandya, Nisarg P., M.S.  California State University, Long Beach. 2018: 41 pages; 10689789.
177.
Communication complexity and information complexity
by Pankratov, Denis, Ph.D.  The University of Chicago. 2015: 188 pages; 3711791.
178.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
179.
Hybrid Model for Interpretable Time Series Analysis
by Rosales, Ruben, M.S.  California State University, Long Beach. 2020: 28 pages; 27835218.
180.
Internet of Things Device Cybersecurity and National Security
by England, Suzanne K., M.S.  Utica College. 2020: 62 pages; 28094260.
151 - 180 of 6050 displayed.
« First < Previous |   3    4    5    6    7    8    9    10    11    12    13   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest