Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Arkansas" +contributor:("Brajendra Panda"). Showing records 1 – 11 of 11 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Arkansas

1. Wu, Yongkai. Achieving Causal Fairness in Machine Learning.

Degree: PhD, 2020, University of Arkansas

  Fairness is a social norm and a legal requirement in today's society. Many laws and regulations (e.g., the Equal Credit Opportunity Act of 1974)… (more)

Subjects/Keywords: Algorithmic Bias; Causal Inference; Fairness; Machine Learning; Artificial Intelligence and Robotics; Theory and Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, Y. (2020). Achieving Causal Fairness in Machine Learning. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/3632

Chicago Manual of Style (16th Edition):

Wu, Yongkai. “Achieving Causal Fairness in Machine Learning.” 2020. Doctoral Dissertation, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/3632.

MLA Handbook (7th Edition):

Wu, Yongkai. “Achieving Causal Fairness in Machine Learning.” 2020. Web. 30 Nov 2020.

Vancouver:

Wu Y. Achieving Causal Fairness in Machine Learning. [Internet] [Doctoral dissertation]. University of Arkansas; 2020. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/3632.

Council of Science Editors:

Wu Y. Achieving Causal Fairness in Machine Learning. [Doctoral Dissertation]. University of Arkansas; 2020. Available from: https://scholarworks.uark.edu/etd/3632


University of Arkansas

2. Almakdi, Sultan Ahmed A. Secure and Efficient Models for Retrieving Data from Encrypted Databases in Cloud.

Degree: PhD, 2020, University of Arkansas

  Recently, database users have begun to use cloud database services to outsource their databases. The reason for this is the high computation speed and… (more)

Subjects/Keywords: Cloud Databases; Cloud Security; Database Security; Encrypted Databases; Outsourced Databases; Query Processing; Databases and Information Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Almakdi, S. A. A. (2020). Secure and Efficient Models for Retrieving Data from Encrypted Databases in Cloud. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/3578

Chicago Manual of Style (16th Edition):

Almakdi, Sultan Ahmed A. “Secure and Efficient Models for Retrieving Data from Encrypted Databases in Cloud.” 2020. Doctoral Dissertation, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/3578.

MLA Handbook (7th Edition):

Almakdi, Sultan Ahmed A. “Secure and Efficient Models for Retrieving Data from Encrypted Databases in Cloud.” 2020. Web. 30 Nov 2020.

Vancouver:

Almakdi SAA. Secure and Efficient Models for Retrieving Data from Encrypted Databases in Cloud. [Internet] [Doctoral dissertation]. University of Arkansas; 2020. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/3578.

Council of Science Editors:

Almakdi SAA. Secure and Efficient Models for Retrieving Data from Encrypted Databases in Cloud. [Doctoral Dissertation]. University of Arkansas; 2020. Available from: https://scholarworks.uark.edu/etd/3578


University of Arkansas

3. Rothmeyer, Matthew Patrick. An Innovative Approach Towards Applying Chaum Mixing to SMS.

Degree: MSCmpE, 2014, University of Arkansas

  Currently there are few user-friendly applications for anonymous communication across multiple platforms, leaving data that is often both personal and private vulnerable to malicious… (more)

Subjects/Keywords: Anonymity; Chaum; Peer to Peer; Privacy; Secrecy; Smartphone; Digital Communications and Networking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rothmeyer, M. P. (2014). An Innovative Approach Towards Applying Chaum Mixing to SMS. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2357

Chicago Manual of Style (16th Edition):

Rothmeyer, Matthew Patrick. “An Innovative Approach Towards Applying Chaum Mixing to SMS.” 2014. Masters Thesis, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/2357.

MLA Handbook (7th Edition):

Rothmeyer, Matthew Patrick. “An Innovative Approach Towards Applying Chaum Mixing to SMS.” 2014. Web. 30 Nov 2020.

Vancouver:

Rothmeyer MP. An Innovative Approach Towards Applying Chaum Mixing to SMS. [Internet] [Masters thesis]. University of Arkansas; 2014. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/2357.

Council of Science Editors:

Rothmeyer MP. An Innovative Approach Towards Applying Chaum Mixing to SMS. [Masters Thesis]. University of Arkansas; 2014. Available from: https://scholarworks.uark.edu/etd/2357


University of Arkansas

4. Morovat, Katanosh. Designing Secure Access Control Model in Cyber Social Networks.

Degree: PhD, 2017, University of Arkansas

  Nowadays, information security in online communication has become an indisputable topic. People prefer pursuing their connection and public relations due to the greater flexibility… (more)

Subjects/Keywords: Access Control Methods; Cybersecurity; Social Network; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Morovat, K. (2017). Designing Secure Access Control Model in Cyber Social Networks. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2390

Chicago Manual of Style (16th Edition):

Morovat, Katanosh. “Designing Secure Access Control Model in Cyber Social Networks.” 2017. Doctoral Dissertation, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/2390.

MLA Handbook (7th Edition):

Morovat, Katanosh. “Designing Secure Access Control Model in Cyber Social Networks.” 2017. Web. 30 Nov 2020.

Vancouver:

Morovat K. Designing Secure Access Control Model in Cyber Social Networks. [Internet] [Doctoral dissertation]. University of Arkansas; 2017. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/2390.

Council of Science Editors:

Morovat K. Designing Secure Access Control Model in Cyber Social Networks. [Doctoral Dissertation]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/2390


University of Arkansas

5. Fuentes Tello, Victor. Enforcing database security on cloud using a trusted third party based model.

Degree: MS, 2017, University of Arkansas

  Cloud computing offers a considerable number of advantages to clients and organizations that use several capabilities to store sensitive data, interact with applications, or… (more)

Subjects/Keywords: Cloud computing; Database; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fuentes Tello, V. (2017). Enforcing database security on cloud using a trusted third party based model. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2438

Chicago Manual of Style (16th Edition):

Fuentes Tello, Victor. “Enforcing database security on cloud using a trusted third party based model.” 2017. Masters Thesis, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/2438.

MLA Handbook (7th Edition):

Fuentes Tello, Victor. “Enforcing database security on cloud using a trusted third party based model.” 2017. Web. 30 Nov 2020.

Vancouver:

Fuentes Tello V. Enforcing database security on cloud using a trusted third party based model. [Internet] [Masters thesis]. University of Arkansas; 2017. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/2438.

Council of Science Editors:

Fuentes Tello V. Enforcing database security on cloud using a trusted third party based model. [Masters Thesis]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/2438


University of Arkansas

6. Ragavan, Harini. Insider Threat Mitigation Models Based on Thresholds and Dependencies.

Degree: MS, 2012, University of Arkansas

  Insider threat causes great damage to data in any organization and is considered a serious issue. In spite of the presence of threat prevention… (more)

Subjects/Keywords: Applied sciences; Database security; Insider threats; Databases and Information Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ragavan, H. (2012). Insider Threat Mitigation Models Based on Thresholds and Dependencies. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/313

Chicago Manual of Style (16th Edition):

Ragavan, Harini. “Insider Threat Mitigation Models Based on Thresholds and Dependencies.” 2012. Masters Thesis, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/313.

MLA Handbook (7th Edition):

Ragavan, Harini. “Insider Threat Mitigation Models Based on Thresholds and Dependencies.” 2012. Web. 30 Nov 2020.

Vancouver:

Ragavan H. Insider Threat Mitigation Models Based on Thresholds and Dependencies. [Internet] [Masters thesis]. University of Arkansas; 2012. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/313.

Council of Science Editors:

Ragavan H. Insider Threat Mitigation Models Based on Thresholds and Dependencies. [Masters Thesis]. University of Arkansas; 2012. Available from: https://scholarworks.uark.edu/etd/313


University of Arkansas

7. Yaseen, Qussai. Mitigating Insider Threat in Relational Database Systems.

Degree: PhD, 2012, University of Arkansas

  The dissertation concentrates on addressing the factors and capabilities that enable insiders to violate systems security. It focuses on modeling the accumulative knowledge that… (more)

Subjects/Keywords: Applied sciences; Information security; Insider threat; Relational database; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yaseen, Q. (2012). Mitigating Insider Threat in Relational Database Systems. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/370

Chicago Manual of Style (16th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Doctoral Dissertation, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/370.

MLA Handbook (7th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Web. 30 Nov 2020.

Vancouver:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Internet] [Doctoral dissertation]. University of Arkansas; 2012. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/370.

Council of Science Editors:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Doctoral Dissertation]. University of Arkansas; 2012. Available from: https://scholarworks.uark.edu/etd/370


University of Arkansas

8. Joseph, Ann Smittu. Conceptual, Impact-Based Publications Recommendations.

Degree: MS, 2013, University of Arkansas

  CiteSeerx is a digital library for scientific publications by computer science researchers. It also functions as a search engine with several features including autonomous… (more)

Subjects/Keywords: Communication and the arts; Applied sciences; Information retrieval; Recommender system; Graphics and Human Computer Interfaces

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joseph, A. S. (2013). Conceptual, Impact-Based Publications Recommendations. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/919

Chicago Manual of Style (16th Edition):

Joseph, Ann Smittu. “Conceptual, Impact-Based Publications Recommendations.” 2013. Masters Thesis, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/919.

MLA Handbook (7th Edition):

Joseph, Ann Smittu. “Conceptual, Impact-Based Publications Recommendations.” 2013. Web. 30 Nov 2020.

Vancouver:

Joseph AS. Conceptual, Impact-Based Publications Recommendations. [Internet] [Masters thesis]. University of Arkansas; 2013. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/919.

Council of Science Editors:

Joseph AS. Conceptual, Impact-Based Publications Recommendations. [Masters Thesis]. University of Arkansas; 2013. Available from: https://scholarworks.uark.edu/etd/919


University of Arkansas

9. Anand, Santhosh S. A Secure and Fair Resource Sharing Model for Community Clouds.

Degree: MS, 2013, University of Arkansas

  Cloud computing has gained a lot of importance and has been one of the most discussed segment of today's IT industry. As enterprises explore… (more)

Subjects/Keywords: Applied sciences; Cloud computing; Security; Databases and Information Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anand, S. S. (2013). A Secure and Fair Resource Sharing Model for Community Clouds. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/675

Chicago Manual of Style (16th Edition):

Anand, Santhosh S. “A Secure and Fair Resource Sharing Model for Community Clouds.” 2013. Masters Thesis, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/675.

MLA Handbook (7th Edition):

Anand, Santhosh S. “A Secure and Fair Resource Sharing Model for Community Clouds.” 2013. Web. 30 Nov 2020.

Vancouver:

Anand SS. A Secure and Fair Resource Sharing Model for Community Clouds. [Internet] [Masters thesis]. University of Arkansas; 2013. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/675.

Council of Science Editors:

Anand SS. A Secure and Fair Resource Sharing Model for Community Clouds. [Masters Thesis]. University of Arkansas; 2013. Available from: https://scholarworks.uark.edu/etd/675


University of Arkansas

10. Morovat, Katanosh. Data Integrity Verification in Cloud Computing.

Degree: MS, 2015, University of Arkansas

  Cloud computing is an architecture model which provides computing and storage capacity as a service over the internet. Cloud computing should provide secure services… (more)

Subjects/Keywords: Applied sciences; Cloud computing; Database management systems; Security; Computer and Systems Architecture; Data Storage Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Morovat, K. (2015). Data Integrity Verification in Cloud Computing. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/1125

Chicago Manual of Style (16th Edition):

Morovat, Katanosh. “Data Integrity Verification in Cloud Computing.” 2015. Masters Thesis, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/1125.

MLA Handbook (7th Edition):

Morovat, Katanosh. “Data Integrity Verification in Cloud Computing.” 2015. Web. 30 Nov 2020.

Vancouver:

Morovat K. Data Integrity Verification in Cloud Computing. [Internet] [Masters thesis]. University of Arkansas; 2015. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/1125.

Council of Science Editors:

Morovat K. Data Integrity Verification in Cloud Computing. [Masters Thesis]. University of Arkansas; 2015. Available from: https://scholarworks.uark.edu/etd/1125


University of Arkansas

11. Omran, Osama M. Data Partitioning Methods to Process Queries on Encrypted Databases on the Cloud.

Degree: PhD, 2016, University of Arkansas

  Many features and advantages have been brought to organizations and computer users by Cloud computing. It allows different service providers to distribute many applications… (more)

Subjects/Keywords: Applied sciences; Cloud; Database security; Databases; Encrypted; Partitioning; Queries; Databases and Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Omran, O. M. (2016). Data Partitioning Methods to Process Queries on Encrypted Databases on the Cloud. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/1580

Chicago Manual of Style (16th Edition):

Omran, Osama M. “Data Partitioning Methods to Process Queries on Encrypted Databases on the Cloud.” 2016. Doctoral Dissertation, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/1580.

MLA Handbook (7th Edition):

Omran, Osama M. “Data Partitioning Methods to Process Queries on Encrypted Databases on the Cloud.” 2016. Web. 30 Nov 2020.

Vancouver:

Omran OM. Data Partitioning Methods to Process Queries on Encrypted Databases on the Cloud. [Internet] [Doctoral dissertation]. University of Arkansas; 2016. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/1580.

Council of Science Editors:

Omran OM. Data Partitioning Methods to Process Queries on Encrypted Databases on the Cloud. [Doctoral Dissertation]. University of Arkansas; 2016. Available from: https://scholarworks.uark.edu/etd/1580

.