Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of North Carolina" +contributor:("Reiter, Michael"). Showing records 1 – 10 of 10 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of North Carolina

1. Wei, Lei. Privacy-Preserving Regular Expression Evaluation on Encrypted Data.

Degree: Computer Science, 2013, University of North Carolina

 Motivated by the need to outsource file storage to untrusted clouds while still permitting controlled use of that data by authorized third parties, in this… (more)

Subjects/Keywords: College of Arts and Sciences; Department of Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wei, L. (2013). Privacy-Preserving Regular Expression Evaluation on Encrypted Data. (Thesis). University of North Carolina. Retrieved from https://cdr.lib.unc.edu/record/uuid:dba33161-5b28-426d-a105-9d79aa2aca7b

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wei, Lei. “Privacy-Preserving Regular Expression Evaluation on Encrypted Data.” 2013. Thesis, University of North Carolina. Accessed April 13, 2021. https://cdr.lib.unc.edu/record/uuid:dba33161-5b28-426d-a105-9d79aa2aca7b.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wei, Lei. “Privacy-Preserving Regular Expression Evaluation on Encrypted Data.” 2013. Web. 13 Apr 2021.

Vancouver:

Wei L. Privacy-Preserving Regular Expression Evaluation on Encrypted Data. [Internet] [Thesis]. University of North Carolina; 2013. [cited 2021 Apr 13]. Available from: https://cdr.lib.unc.edu/record/uuid:dba33161-5b28-426d-a105-9d79aa2aca7b.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wei L. Privacy-Preserving Regular Expression Evaluation on Encrypted Data. [Thesis]. University of North Carolina; 2013. Available from: https://cdr.lib.unc.edu/record/uuid:dba33161-5b28-426d-a105-9d79aa2aca7b

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Carolina

2. Bartel, Jacob. Predictions to Ease Users' Effort in Scalable Sharing.

Degree: Computer Science, 2015, University of North Carolina

 Significant user effort is required to choose recipients of shared information, which grows as the scale of the number of potential or target recipients increases.… (more)

Subjects/Keywords: Computer science; College of Arts and Sciences; Department of Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bartel, J. (2015). Predictions to Ease Users' Effort in Scalable Sharing. (Thesis). University of North Carolina. Retrieved from https://cdr.lib.unc.edu/record/uuid:279a0cd5-ee7e-4045-8be2-2bf2323107ff

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bartel, Jacob. “Predictions to Ease Users' Effort in Scalable Sharing.” 2015. Thesis, University of North Carolina. Accessed April 13, 2021. https://cdr.lib.unc.edu/record/uuid:279a0cd5-ee7e-4045-8be2-2bf2323107ff.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bartel, Jacob. “Predictions to Ease Users' Effort in Scalable Sharing.” 2015. Web. 13 Apr 2021.

Vancouver:

Bartel J. Predictions to Ease Users' Effort in Scalable Sharing. [Internet] [Thesis]. University of North Carolina; 2015. [cited 2021 Apr 13]. Available from: https://cdr.lib.unc.edu/record/uuid:279a0cd5-ee7e-4045-8be2-2bf2323107ff.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bartel J. Predictions to Ease Users' Effort in Scalable Sharing. [Thesis]. University of North Carolina; 2015. Available from: https://cdr.lib.unc.edu/record/uuid:279a0cd5-ee7e-4045-8be2-2bf2323107ff

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Carolina

3. Bethea, Darrell. WACCO and LOKO: Strong Consistency at Global Scale.

Degree: Computer Science, 2015, University of North Carolina

 Motivated by a vision for future global-scale services supporting frequent updates and widespread concurrent reads, we propose a scalable object-sharing system called WACCO offering strong… (more)

Subjects/Keywords: Computer science; College of Arts and Sciences; Department of Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bethea, D. (2015). WACCO and LOKO: Strong Consistency at Global Scale. (Thesis). University of North Carolina. Retrieved from https://cdr.lib.unc.edu/record/uuid:fb59db21-f991-4145-9b42-2445d5df0f06

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bethea, Darrell. “WACCO and LOKO: Strong Consistency at Global Scale.” 2015. Thesis, University of North Carolina. Accessed April 13, 2021. https://cdr.lib.unc.edu/record/uuid:fb59db21-f991-4145-9b42-2445d5df0f06.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bethea, Darrell. “WACCO and LOKO: Strong Consistency at Global Scale.” 2015. Web. 13 Apr 2021.

Vancouver:

Bethea D. WACCO and LOKO: Strong Consistency at Global Scale. [Internet] [Thesis]. University of North Carolina; 2015. [cited 2021 Apr 13]. Available from: https://cdr.lib.unc.edu/record/uuid:fb59db21-f991-4145-9b42-2445d5df0f06.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bethea D. WACCO and LOKO: Strong Consistency at Global Scale. [Thesis]. University of North Carolina; 2015. Available from: https://cdr.lib.unc.edu/record/uuid:fb59db21-f991-4145-9b42-2445d5df0f06

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Carolina

4. White, Andrew. Practical Analysis of Encrypted Network Traffic.

Degree: Computer Science, 2015, University of North Carolina

 The growing use of encryption in network communications is an undoubted boon for user privacy. However, the limitations of real-world encryption schemes are still not… (more)

Subjects/Keywords: Computer science; College of Arts and Sciences; Department of Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

White, A. (2015). Practical Analysis of Encrypted Network Traffic. (Thesis). University of North Carolina. Retrieved from https://cdr.lib.unc.edu/record/uuid:a009d909-d0f3-4870-a49c-294cd966ab5a

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

White, Andrew. “Practical Analysis of Encrypted Network Traffic.” 2015. Thesis, University of North Carolina. Accessed April 13, 2021. https://cdr.lib.unc.edu/record/uuid:a009d909-d0f3-4870-a49c-294cd966ab5a.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

White, Andrew. “Practical Analysis of Encrypted Network Traffic.” 2015. Web. 13 Apr 2021.

Vancouver:

White A. Practical Analysis of Encrypted Network Traffic. [Internet] [Thesis]. University of North Carolina; 2015. [cited 2021 Apr 13]. Available from: https://cdr.lib.unc.edu/record/uuid:a009d909-d0f3-4870-a49c-294cd966ab5a.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

White A. Practical Analysis of Encrypted Network Traffic. [Thesis]. University of North Carolina; 2015. Available from: https://cdr.lib.unc.edu/record/uuid:a009d909-d0f3-4870-a49c-294cd966ab5a

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Carolina

5. Heorhiadi, Victor. Expression and Composition of Optimization-Based Applications for Software-Defined Networking.

Degree: Computer Science, 2017, University of North Carolina

 Motivated by the adoption of the Software Defined Networking and its increasing focus on applications for resource management, we propose a novel framework for expressing… (more)

Subjects/Keywords: College of Arts and Sciences; Department of Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Heorhiadi, V. (2017). Expression and Composition of Optimization-Based Applications for Software-Defined Networking. (Thesis). University of North Carolina. Retrieved from https://cdr.lib.unc.edu/record/uuid:d97c7cc7-e50e-4de7-a6bc-55da2dc63cd6

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Heorhiadi, Victor. “Expression and Composition of Optimization-Based Applications for Software-Defined Networking.” 2017. Thesis, University of North Carolina. Accessed April 13, 2021. https://cdr.lib.unc.edu/record/uuid:d97c7cc7-e50e-4de7-a6bc-55da2dc63cd6.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Heorhiadi, Victor. “Expression and Composition of Optimization-Based Applications for Software-Defined Networking.” 2017. Web. 13 Apr 2021.

Vancouver:

Heorhiadi V. Expression and Composition of Optimization-Based Applications for Software-Defined Networking. [Internet] [Thesis]. University of North Carolina; 2017. [cited 2021 Apr 13]. Available from: https://cdr.lib.unc.edu/record/uuid:d97c7cc7-e50e-4de7-a6bc-55da2dc63cd6.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Heorhiadi V. Expression and Composition of Optimization-Based Applications for Software-Defined Networking. [Thesis]. University of North Carolina; 2017. Available from: https://cdr.lib.unc.edu/record/uuid:d97c7cc7-e50e-4de7-a6bc-55da2dc63cd6

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Carolina

6. Cochran, Robert. Symbolic Verification of Remote Client Behavior in Distributed Systems.

Degree: Computer Science, 2016, University of North Carolina

 A malicious client in a distributed system can undermine the integrity of the larger distributed application in a number of different ways. For example, a… (more)

Subjects/Keywords: College of Arts and Sciences; Department of Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cochran, R. (2016). Symbolic Verification of Remote Client Behavior in Distributed Systems. (Thesis). University of North Carolina. Retrieved from https://cdr.lib.unc.edu/record/uuid:cece40cb-c644-4c69-8afd-8e86c31017bd

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cochran, Robert. “Symbolic Verification of Remote Client Behavior in Distributed Systems.” 2016. Thesis, University of North Carolina. Accessed April 13, 2021. https://cdr.lib.unc.edu/record/uuid:cece40cb-c644-4c69-8afd-8e86c31017bd.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cochran, Robert. “Symbolic Verification of Remote Client Behavior in Distributed Systems.” 2016. Web. 13 Apr 2021.

Vancouver:

Cochran R. Symbolic Verification of Remote Client Behavior in Distributed Systems. [Internet] [Thesis]. University of North Carolina; 2016. [cited 2021 Apr 13]. Available from: https://cdr.lib.unc.edu/record/uuid:cece40cb-c644-4c69-8afd-8e86c31017bd.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cochran R. Symbolic Verification of Remote Client Behavior in Distributed Systems. [Thesis]. University of North Carolina; 2016. Available from: https://cdr.lib.unc.edu/record/uuid:cece40cb-c644-4c69-8afd-8e86c31017bd

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Carolina

7. Cochran, Robert. Symbolic Verification of Remote Client Behavior in Distributed Systems.

Degree: Computer Science, 2016, University of North Carolina

 A malicious client in a distributed system can undermine the integrity of the larger distributed application in a number of different ways. For example, a… (more)

Subjects/Keywords: College of Arts and Sciences; Department of Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cochran, R. (2016). Symbolic Verification of Remote Client Behavior in Distributed Systems. (Thesis). University of North Carolina. Retrieved from https://cdr.lib.unc.edu/record/uuid:cf4c9320-985d-4abc-8816-c4758d4dbd1c

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cochran, Robert. “Symbolic Verification of Remote Client Behavior in Distributed Systems.” 2016. Thesis, University of North Carolina. Accessed April 13, 2021. https://cdr.lib.unc.edu/record/uuid:cf4c9320-985d-4abc-8816-c4758d4dbd1c.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cochran, Robert. “Symbolic Verification of Remote Client Behavior in Distributed Systems.” 2016. Web. 13 Apr 2021.

Vancouver:

Cochran R. Symbolic Verification of Remote Client Behavior in Distributed Systems. [Internet] [Thesis]. University of North Carolina; 2016. [cited 2021 Apr 13]. Available from: https://cdr.lib.unc.edu/record/uuid:cf4c9320-985d-4abc-8816-c4758d4dbd1c.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cochran R. Symbolic Verification of Remote Client Behavior in Distributed Systems. [Thesis]. University of North Carolina; 2016. Available from: https://cdr.lib.unc.edu/record/uuid:cf4c9320-985d-4abc-8816-c4758d4dbd1c

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Carolina

8. Li, Peng. Replication and placement for security in distributed systems.

Degree: Computer Science, 2014, University of North Carolina

 In this thesis we show how the security of replicated objects in distributed systems, in terms of either the objects' confidentiality or availability, can be… (more)

Subjects/Keywords: Computer science; College of Arts and Sciences; Department of Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, P. (2014). Replication and placement for security in distributed systems. (Thesis). University of North Carolina. Retrieved from https://cdr.lib.unc.edu/record/uuid:d921b2eb-3e59-469f-bffe-dcfa3871f6e4

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Peng. “Replication and placement for security in distributed systems.” 2014. Thesis, University of North Carolina. Accessed April 13, 2021. https://cdr.lib.unc.edu/record/uuid:d921b2eb-3e59-469f-bffe-dcfa3871f6e4.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Peng. “Replication and placement for security in distributed systems.” 2014. Web. 13 Apr 2021.

Vancouver:

Li P. Replication and placement for security in distributed systems. [Internet] [Thesis]. University of North Carolina; 2014. [cited 2021 Apr 13]. Available from: https://cdr.lib.unc.edu/record/uuid:d921b2eb-3e59-469f-bffe-dcfa3871f6e4.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li P. Replication and placement for security in distributed systems. [Thesis]. University of North Carolina; 2014. Available from: https://cdr.lib.unc.edu/record/uuid:d921b2eb-3e59-469f-bffe-dcfa3871f6e4

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Carolina

9. Erickson, Jeremy. Tardiness Bounds and Overload in Soft Real-Time Systems.

Degree: Computer Science, 2014, University of North Carolina

 In some systems, such as future generations of unmanned aerial vehicles (UAVs), different software running on the same machine will require different timing guarantees. For… (more)

Subjects/Keywords: Computer science; College of Arts and Sciences; Department of Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Erickson, J. (2014). Tardiness Bounds and Overload in Soft Real-Time Systems. (Thesis). University of North Carolina. Retrieved from https://cdr.lib.unc.edu/record/uuid:e6aed178-9402-46d4-b3a6-11e4a4f54973

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Erickson, Jeremy. “Tardiness Bounds and Overload in Soft Real-Time Systems.” 2014. Thesis, University of North Carolina. Accessed April 13, 2021. https://cdr.lib.unc.edu/record/uuid:e6aed178-9402-46d4-b3a6-11e4a4f54973.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Erickson, Jeremy. “Tardiness Bounds and Overload in Soft Real-Time Systems.” 2014. Web. 13 Apr 2021.

Vancouver:

Erickson J. Tardiness Bounds and Overload in Soft Real-Time Systems. [Internet] [Thesis]. University of North Carolina; 2014. [cited 2021 Apr 13]. Available from: https://cdr.lib.unc.edu/record/uuid:e6aed178-9402-46d4-b3a6-11e4a4f54973.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Erickson J. Tardiness Bounds and Overload in Soft Real-Time Systems. [Thesis]. University of North Carolina; 2014. Available from: https://cdr.lib.unc.edu/record/uuid:e6aed178-9402-46d4-b3a6-11e4a4f54973

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Carolina

10. Zhang, Yinqian. Cache-based Side-Channel Attacks in Multi-Tenant Public Clouds and Their Countermeasures.

Degree: Computer Science, 2014, University of North Carolina

 Cloud computing is gaining traction due to the business agility, resource scalability and operational efficiency that it enables. However, the murkiness of the security assurances… (more)

Subjects/Keywords: Computer science; College of Arts and Sciences; Department of Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Y. (2014). Cache-based Side-Channel Attacks in Multi-Tenant Public Clouds and Their Countermeasures. (Thesis). University of North Carolina. Retrieved from https://cdr.lib.unc.edu/record/uuid:2679dbf2-09d5-4c39-98c5-65d40ce22391

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Yinqian. “Cache-based Side-Channel Attacks in Multi-Tenant Public Clouds and Their Countermeasures.” 2014. Thesis, University of North Carolina. Accessed April 13, 2021. https://cdr.lib.unc.edu/record/uuid:2679dbf2-09d5-4c39-98c5-65d40ce22391.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Yinqian. “Cache-based Side-Channel Attacks in Multi-Tenant Public Clouds and Their Countermeasures.” 2014. Web. 13 Apr 2021.

Vancouver:

Zhang Y. Cache-based Side-Channel Attacks in Multi-Tenant Public Clouds and Their Countermeasures. [Internet] [Thesis]. University of North Carolina; 2014. [cited 2021 Apr 13]. Available from: https://cdr.lib.unc.edu/record/uuid:2679dbf2-09d5-4c39-98c5-65d40ce22391.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang Y. Cache-based Side-Channel Attacks in Multi-Tenant Public Clouds and Their Countermeasures. [Thesis]. University of North Carolina; 2014. Available from: https://cdr.lib.unc.edu/record/uuid:2679dbf2-09d5-4c39-98c5-65d40ce22391

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.