Follow

Theses from 2017

PDF

A Security Evaluation Methodology for Container Images, Brendan Michael Abbott

PDF

Measuring The Robustness of Forensic Tools' Ability to Detect Data Hiding Techniques, Samuel Isaiah Moses

Theses from 2016

PDF

Recognition of Infrastructure Events Using Principal Component Analysis, Lane David Broadbent

PDF

A Comparison of Gestures for Virtual Object Rotation, Brandon Michael Garner

PDF

FitPlay Games: Increasing Exercise Motivation Through Asynchronous Social Gaming, Dario Carlos Gonzalez

PDF

Computing Research in Academia: Classifications, Keywords, Perceptions, and Connections, Sung Han Kim

PDF

Selecting Cloud Platform Services Based On Application Requirements, Bridger Ronald Larson

Theses from 2015

PDF

Evaluating the Security of Smart Home Hubs, Steven A. Christiaens

PDF

Service Dependency Analysis via TCP/UDP Port Tracing, John K. Clawson

PDF

Deriving System Vulnerabilities Using Log Analytics, Matthew Somers Higbee

PDF

Terminological Mediation in Information Technology and Related Fields, Jessica Smith Richards

PDF

An Extensible Technology Framework for Cyber Security Education, Frank Jordan Sheen

Theses from 2014

PDF

Online Course Management System for WIC Nutrition Education and Study of Its Effectiveness in Behavioral and Attitude Changes, Ryan A. Amy

PDF

Analysis of Data Center Network Convergence Technologies, Robert-Lee Daniel LeBlanc

PDF

Framework to Implement Authentication, Authorization and Secure Communications in a Multiuser Collaborative CAx Environment, Francis Mensah

PDF

Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems, William B. Miller

PDF

A Privacy Risk Scoring Framework for Mobile, Jedidiah Spencer Montgomery

PDF

Multi-Rotor--Aided Three-Dimensional 802.11 Wireless Heat Mapping, Scott James Pack

PDF

Termediator-II: Identification of Interdisciplinary Term Ambiguity Through Hierarchical Cluster Analysis, Owen G. Riley

Theses from 2013

PDF

Online Survey System for Image-Based Clinical Guideline Studies Using the Delphi Method, Todd Martin Harper

PDF

Distributed Agent Cloud-Sourced Malware Reporting Framework, Kellie Elizabeth Kercher

PDF

User Experience Engineering Adoption and Practice: A Longitudinal Case Study, Brady Edwin Redfearn

PDF

Face Tracking User Interfaces Using Vision-Based Consumer Devices, Norman Villaroman

Theses from 2012

PDF

Website Adaptive Navigation Effects on User Experiences, James C. Speirs

PDF

Improving Filtering of Email Phishing Attacks by Using Three-Way Text Classifiers, Alberto Trevino

Theses from 2011

PDF

Naive Bayesian Spam Filters for Log File Analysis, Russel William Havens

PDF

Framework to Secure Cloud-based Medical Image Storage and Management System Communications, Timothy James Rostrom

PDF

A Framework for Studying the Physical Degradation Characteristics of DVDs and Their Relationship to Digital Errors, Brian K. Saville

Theses from 2010

PDF

Representing Multi-Parent Organizational Structures for Use in High Performance Computing Resource Scheduling Algorithms, Lloyd T. Brown

Theses from 2009

PDF

State of Secure Application Development for 802.15.4, Janell Armstrong

PDF

A Functional Framework for Content Management, Robert Emer Broadbent

PDF

Research in Information Technology: Analysis of Existing Graduate Research, Christopher John Cole

PDF

Finding Alternatives to the Hard Disk Drive for Virtual Memory, Bruce Albert Embry

PDF

Open Access Fiber to the Home Networking, Roger E. Timmerman

Theses from 2008

PDF

An Infrastructure for Performance Measurement and Comparison of Information Retrieval Solutions, Gary Saunders

PDF

Predicting the Longevity of DVDR Media by Periodic Analysis of Parity, Jitter, and ECC Performance Parameters, Daniel Patrick Wells

Theses from 2007

PDF

Lifetime Testing of Wire-Grid Polarizers with Selected Over-Coatings, Steven J. Malone

PDF

Web Based Resource Management for Multi-Tiered Web Applications, Bryce Daniel Ott

PDF

Objective Test Methods for Waveguide Audio Synthesis, Steven Gregory Wood

Theses from 2006

PDF

On-Line Electronic Document Collaboration and Annotation, Trev R. Harmon

PDF

A User-Centric Tabular Multi-Column Sorting Interface For Intact Transposition Of Columnar Data, David B. L. Miles

PDF

Encryption of Computer Peripheral Devices, Kelly Robert Norman

PDF

Analysis of Near-Infrared Phase Effects on Biometric Iris Data, Brady Roos Stevenson

Theses from 2005

PDF

Establishing Public Confidence in the Viability of Fingerprint Biometric Technology, Nathan Alan Green

PDF

A Software Development Environment for Building Context-Aware Systems for Family Technology, Jeremiah Kenton Jones

PDF

Java Performance of the Rijndael Encryption Algorithm Across Compilers and Virtual Machines, Gregory Leavitt Orgill

PDF

A Statistical Performance Model of Homogeneous Raidb Clusters, Brandon Lamar Rogers

Theses from 2004

PDF

The ContexTable: Building and Testing an Intelligent, Context-Aware Kitchen Table, Daniel Matthew Hoopes

PDF

Improved Signal Integrity in IEEE 1149.1 Boundary Scan Designs, Efren De Jesus Rangel Taboada

PDF

A Review of Setup Practices and Procedures for Creating IEEE 802.11 Wireless Community Networks, Jae M. Theobald

Theses from 2003

PDF

A Descriptive Performance Model of Small, Low Cost, Diskless Beowulf Clusters, Curtis R. Nielson