Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Virtual computer system). Showing records 1 – 30 of 34 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


University of South Africa

1. Mukwevho, Mukosi Abraham. A virtual intergrated networks emulator on xen (viNex) .

Degree: 2010, University of South Africa

 Network research experiments have traditionally been conducted in emulated or simulated environments. Emulators are frequently deployed on physical networks. Network simulators provide a self-contained and… (more)

Subjects/Keywords: Virtual computer system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mukwevho, M. A. (2010). A virtual intergrated networks emulator on xen (viNex) . (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/4038

Chicago Manual of Style (16th Edition):

Mukwevho, Mukosi Abraham. “A virtual intergrated networks emulator on xen (viNex) .” 2010. Masters Thesis, University of South Africa. Accessed October 22, 2019. http://hdl.handle.net/10500/4038.

MLA Handbook (7th Edition):

Mukwevho, Mukosi Abraham. “A virtual intergrated networks emulator on xen (viNex) .” 2010. Web. 22 Oct 2019.

Vancouver:

Mukwevho MA. A virtual intergrated networks emulator on xen (viNex) . [Internet] [Masters thesis]. University of South Africa; 2010. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/10500/4038.

Council of Science Editors:

Mukwevho MA. A virtual intergrated networks emulator on xen (viNex) . [Masters Thesis]. University of South Africa; 2010. Available from: http://hdl.handle.net/10500/4038

2. Ferreira, Fernando Teubl. Um sistema de multiprojeção escalável.

Degree: PhD, Sistemas Eletrônicos, 2011, University of São Paulo

Sistemas de multiprojeção podem oferecer alta resolução e grande quantidade de brilho por fundamentarem-se no uso de aglomerado de projetores e podem proporcionar uma qualidade… (more)

Subjects/Keywords: Multi-projector system; Realidade virtual; Sistema de multiprojeção; Virtual reality; Visão computacional; Visual computer

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ferreira, F. T. (2011). Um sistema de multiprojeção escalável. (Doctoral Dissertation). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/3/3142/tde-07112011-112407/ ;

Chicago Manual of Style (16th Edition):

Ferreira, Fernando Teubl. “Um sistema de multiprojeção escalável.” 2011. Doctoral Dissertation, University of São Paulo. Accessed October 22, 2019. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-07112011-112407/ ;.

MLA Handbook (7th Edition):

Ferreira, Fernando Teubl. “Um sistema de multiprojeção escalável.” 2011. Web. 22 Oct 2019.

Vancouver:

Ferreira FT. Um sistema de multiprojeção escalável. [Internet] [Doctoral dissertation]. University of São Paulo; 2011. [cited 2019 Oct 22]. Available from: http://www.teses.usp.br/teses/disponiveis/3/3142/tde-07112011-112407/ ;.

Council of Science Editors:

Ferreira FT. Um sistema de multiprojeção escalável. [Doctoral Dissertation]. University of São Paulo; 2011. Available from: http://www.teses.usp.br/teses/disponiveis/3/3142/tde-07112011-112407/ ;

3. 정, 은영. Evaluation of Practical Exercises Using an Intravenous Simulator Incorporating Virtual Reality and Haptic Technologies.

Degree: 2012, Ajou University

 Medical simulators enable to experience clinical environment which can affect students educationally on emergency clinical situations. Even though increase of it’s necessity, evidences of educative… (more)

Subjects/Keywords: Virtual System; Virtual Reality; Venipuncture; Intravenous Injection; Computer simulation; Medical education; Haptics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

정, . (2012). Evaluation of Practical Exercises Using an Intravenous Simulator Incorporating Virtual Reality and Haptic Technologies. (Thesis). Ajou University. Retrieved from http://repository.ajou.ac.kr/handle/201003/7573 ; http://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000012177

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

정, 은영. “Evaluation of Practical Exercises Using an Intravenous Simulator Incorporating Virtual Reality and Haptic Technologies.” 2012. Thesis, Ajou University. Accessed October 22, 2019. http://repository.ajou.ac.kr/handle/201003/7573 ; http://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000012177.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

정, 은영. “Evaluation of Practical Exercises Using an Intravenous Simulator Incorporating Virtual Reality and Haptic Technologies.” 2012. Web. 22 Oct 2019.

Vancouver:

정 . Evaluation of Practical Exercises Using an Intravenous Simulator Incorporating Virtual Reality and Haptic Technologies. [Internet] [Thesis]. Ajou University; 2012. [cited 2019 Oct 22]. Available from: http://repository.ajou.ac.kr/handle/201003/7573 ; http://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000012177.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

정 . Evaluation of Practical Exercises Using an Intravenous Simulator Incorporating Virtual Reality and Haptic Technologies. [Thesis]. Ajou University; 2012. Available from: http://repository.ajou.ac.kr/handle/201003/7573 ; http://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000012177

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Michigan

4. Yang, Jisoo. Separating Information Protection from Resource Management.

Degree: PhD, Computer Science & Engineering, 2010, University of Michigan

 Securing information in a computer system is becoming an intractable problem. Exacerbating the situation is the current paradigm of trusting an operating system for both… (more)

Subjects/Keywords: Operating System Security; Virtual Machine Monitor; Application Protection; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, J. (2010). Separating Information Protection from Resource Management. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/75886

Chicago Manual of Style (16th Edition):

Yang, Jisoo. “Separating Information Protection from Resource Management.” 2010. Doctoral Dissertation, University of Michigan. Accessed October 22, 2019. http://hdl.handle.net/2027.42/75886.

MLA Handbook (7th Edition):

Yang, Jisoo. “Separating Information Protection from Resource Management.” 2010. Web. 22 Oct 2019.

Vancouver:

Yang J. Separating Information Protection from Resource Management. [Internet] [Doctoral dissertation]. University of Michigan; 2010. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/2027.42/75886.

Council of Science Editors:

Yang J. Separating Information Protection from Resource Management. [Doctoral Dissertation]. University of Michigan; 2010. Available from: http://hdl.handle.net/2027.42/75886


Unitec New Zealand

5. Kaur, Navneet. Security effectiveness of virtual DMZ in private clouds.

Degree: 2014, Unitec New Zealand

 Cloud Computing is being considered as emerging technology in recent times and defines a new IT model that delivers the services over internet. Big IT… (more)

Subjects/Keywords: virtual DMZ; cloud computing; computer security; 080303 Computer System Security; 080501 Distributed and Grid Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kaur, N. (2014). Security effectiveness of virtual DMZ in private clouds. (Thesis). Unitec New Zealand. Retrieved from http://hdl.handle.net/10652/2582

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kaur, Navneet. “Security effectiveness of virtual DMZ in private clouds.” 2014. Thesis, Unitec New Zealand. Accessed October 22, 2019. http://hdl.handle.net/10652/2582.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kaur, Navneet. “Security effectiveness of virtual DMZ in private clouds.” 2014. Web. 22 Oct 2019.

Vancouver:

Kaur N. Security effectiveness of virtual DMZ in private clouds. [Internet] [Thesis]. Unitec New Zealand; 2014. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/10652/2582.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kaur N. Security effectiveness of virtual DMZ in private clouds. [Thesis]. Unitec New Zealand; 2014. Available from: http://hdl.handle.net/10652/2582

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Wayne State University

6. Sadeghi, Hamid. Implementation Of Camera Arm Control By An Oculus Rift On A Da Vinci Surgical System Simulation.

Degree: MS, Electrical and Computer Engineering, 2016, Wayne State University

  Camera control methods play a significant role in remote surgery. Two methods have been developed to control the camera arm of the da Vinci… (more)

Subjects/Keywords: Camera Control; da Vinci Surgical System; Surgical Robotics; Virtual Reality; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sadeghi, H. (2016). Implementation Of Camera Arm Control By An Oculus Rift On A Da Vinci Surgical System Simulation. (Masters Thesis). Wayne State University. Retrieved from https://digitalcommons.wayne.edu/oa_theses/506

Chicago Manual of Style (16th Edition):

Sadeghi, Hamid. “Implementation Of Camera Arm Control By An Oculus Rift On A Da Vinci Surgical System Simulation.” 2016. Masters Thesis, Wayne State University. Accessed October 22, 2019. https://digitalcommons.wayne.edu/oa_theses/506.

MLA Handbook (7th Edition):

Sadeghi, Hamid. “Implementation Of Camera Arm Control By An Oculus Rift On A Da Vinci Surgical System Simulation.” 2016. Web. 22 Oct 2019.

Vancouver:

Sadeghi H. Implementation Of Camera Arm Control By An Oculus Rift On A Da Vinci Surgical System Simulation. [Internet] [Masters thesis]. Wayne State University; 2016. [cited 2019 Oct 22]. Available from: https://digitalcommons.wayne.edu/oa_theses/506.

Council of Science Editors:

Sadeghi H. Implementation Of Camera Arm Control By An Oculus Rift On A Da Vinci Surgical System Simulation. [Masters Thesis]. Wayne State University; 2016. Available from: https://digitalcommons.wayne.edu/oa_theses/506


University of Colorado

7. Ababneh, Ehab N. Automatic Scaling of Cloud Applications via Transparently Elasticizing Virtual Memory.

Degree: PhD, 2018, University of Colorado

  This dissertation addresses the topic of how to achieve elasticity of an operating system so that networked resources in the form of remote memory… (more)

Subjects/Keywords: cloud computing; elasticity; execution transfer; virtual memory; system; Computer Sciences; OS and Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ababneh, E. N. (2018). Automatic Scaling of Cloud Applications via Transparently Elasticizing Virtual Memory. (Doctoral Dissertation). University of Colorado. Retrieved from https://scholar.colorado.edu/csci_gradetds/180

Chicago Manual of Style (16th Edition):

Ababneh, Ehab N. “Automatic Scaling of Cloud Applications via Transparently Elasticizing Virtual Memory.” 2018. Doctoral Dissertation, University of Colorado. Accessed October 22, 2019. https://scholar.colorado.edu/csci_gradetds/180.

MLA Handbook (7th Edition):

Ababneh, Ehab N. “Automatic Scaling of Cloud Applications via Transparently Elasticizing Virtual Memory.” 2018. Web. 22 Oct 2019.

Vancouver:

Ababneh EN. Automatic Scaling of Cloud Applications via Transparently Elasticizing Virtual Memory. [Internet] [Doctoral dissertation]. University of Colorado; 2018. [cited 2019 Oct 22]. Available from: https://scholar.colorado.edu/csci_gradetds/180.

Council of Science Editors:

Ababneh EN. Automatic Scaling of Cloud Applications via Transparently Elasticizing Virtual Memory. [Doctoral Dissertation]. University of Colorado; 2018. Available from: https://scholar.colorado.edu/csci_gradetds/180


Unitec New Zealand

8. Singh, Shiv Raj. Virtualization and information security : a virtualized DMZ design consideration using VMware ESXi 4.1.

Degree: 2012, Unitec New Zealand

 RESEARCH QUESTION: Is it secure to implement DMZ in a virtual network infrastructure? Sub-questions:  How can virtualized DMZs be implemented?  Which is the… (more)

Subjects/Keywords: virtualisation; virtual DMZ; information security; comparison; quantitative research; vulnerability assessment; 080303 Computer System Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Singh, S. R. (2012). Virtualization and information security : a virtualized DMZ design consideration using VMware ESXi 4.1. (Thesis). Unitec New Zealand. Retrieved from http://hdl.handle.net/10652/2017

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Singh, Shiv Raj. “Virtualization and information security : a virtualized DMZ design consideration using VMware ESXi 4.1.” 2012. Thesis, Unitec New Zealand. Accessed October 22, 2019. http://hdl.handle.net/10652/2017.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Singh, Shiv Raj. “Virtualization and information security : a virtualized DMZ design consideration using VMware ESXi 4.1.” 2012. Web. 22 Oct 2019.

Vancouver:

Singh SR. Virtualization and information security : a virtualized DMZ design consideration using VMware ESXi 4.1. [Internet] [Thesis]. Unitec New Zealand; 2012. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/10652/2017.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Singh SR. Virtualization and information security : a virtualized DMZ design consideration using VMware ESXi 4.1. [Thesis]. Unitec New Zealand; 2012. Available from: http://hdl.handle.net/10652/2017

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

9. Nantes, Alfredo. Computational approaches to the visual validation of 3D virtual environments.

Degree: 2011, Queensland University of Technology

Virtual environments can provide, through digital games and online social interfaces, extremely exciting forms of interactive entertainment. Because of their capability in displaying and manipulating… (more)

Subjects/Keywords: virtual environment testing; virtual environment validation; virtual environment consistency; rendering system validation; computer game testing; visual bug detection; visual inconsistency detection; synthetic image processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nantes, A. (2011). Computational approaches to the visual validation of 3D virtual environments. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/48341/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nantes, Alfredo. “Computational approaches to the visual validation of 3D virtual environments.” 2011. Thesis, Queensland University of Technology. Accessed October 22, 2019. https://eprints.qut.edu.au/48341/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nantes, Alfredo. “Computational approaches to the visual validation of 3D virtual environments.” 2011. Web. 22 Oct 2019.

Vancouver:

Nantes A. Computational approaches to the visual validation of 3D virtual environments. [Internet] [Thesis]. Queensland University of Technology; 2011. [cited 2019 Oct 22]. Available from: https://eprints.qut.edu.au/48341/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nantes A. Computational approaches to the visual validation of 3D virtual environments. [Thesis]. Queensland University of Technology; 2011. Available from: https://eprints.qut.edu.au/48341/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Yusuf, Adewale. Challenges associated with effective task execution in a Virtual Learning Environment: A case study of Graduate Students of a University.

Degree: 2017, , Department of Creative Technologies

  Context: In recent years, more and more people have started showing an increasing interest in distance or web-based education. Some of the reasons for… (more)

Subjects/Keywords: Task execution; Virtual learning environment; Computer mediated communication (CMC); learning management system; Open start free pace (OSFP); Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yusuf, A. (2017). Challenges associated with effective task execution in a Virtual Learning Environment: A case study of Graduate Students of a University. (Thesis). , Department of Creative Technologies. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14058

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yusuf, Adewale. “Challenges associated with effective task execution in a Virtual Learning Environment: A case study of Graduate Students of a University.” 2017. Thesis, , Department of Creative Technologies. Accessed October 22, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14058.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yusuf, Adewale. “Challenges associated with effective task execution in a Virtual Learning Environment: A case study of Graduate Students of a University.” 2017. Web. 22 Oct 2019.

Vancouver:

Yusuf A. Challenges associated with effective task execution in a Virtual Learning Environment: A case study of Graduate Students of a University. [Internet] [Thesis]. , Department of Creative Technologies; 2017. [cited 2019 Oct 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14058.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yusuf A. Challenges associated with effective task execution in a Virtual Learning Environment: A case study of Graduate Students of a University. [Thesis]. , Department of Creative Technologies; 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14058

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

11. Stahl, David J., Jr. Bag-of-particles as a deformable model.

Degree: PhD, Computer science, 2001, Georgia Tech

Subjects/Keywords: Particles Computer simulation; Virtual reality; Cardiovascular system Computer simulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stahl, David J., J. (2001). Bag-of-particles as a deformable model. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/32952

Chicago Manual of Style (16th Edition):

Stahl, David J., Jr. “Bag-of-particles as a deformable model.” 2001. Doctoral Dissertation, Georgia Tech. Accessed October 22, 2019. http://hdl.handle.net/1853/32952.

MLA Handbook (7th Edition):

Stahl, David J., Jr. “Bag-of-particles as a deformable model.” 2001. Web. 22 Oct 2019.

Vancouver:

Stahl, David J. J. Bag-of-particles as a deformable model. [Internet] [Doctoral dissertation]. Georgia Tech; 2001. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/1853/32952.

Council of Science Editors:

Stahl, David J. J. Bag-of-particles as a deformable model. [Doctoral Dissertation]. Georgia Tech; 2001. Available from: http://hdl.handle.net/1853/32952


Northeastern University

12. Alshawabkeh, Malak. Hypothesis margin based weighting for feature selection using boosting: theory, algorithms and applications.

Degree: PhD, Department of Electrical and Computer Engineering, 2013, Northeastern University

 Feature selection (FS) is a preprocessing process aimed at identifying a small subset of highly predictive features out of a large set of raw input… (more)

Subjects/Keywords: Boosting; Feature Selection; Imbalanced data; Intrusion detection system; Margin; Virtual machine monitor; Computer and Systems Architecture; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alshawabkeh, M. (2013). Hypothesis margin based weighting for feature selection using boosting: theory, algorithms and applications. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/d20003110

Chicago Manual of Style (16th Edition):

Alshawabkeh, Malak. “Hypothesis margin based weighting for feature selection using boosting: theory, algorithms and applications.” 2013. Doctoral Dissertation, Northeastern University. Accessed October 22, 2019. http://hdl.handle.net/2047/d20003110.

MLA Handbook (7th Edition):

Alshawabkeh, Malak. “Hypothesis margin based weighting for feature selection using boosting: theory, algorithms and applications.” 2013. Web. 22 Oct 2019.

Vancouver:

Alshawabkeh M. Hypothesis margin based weighting for feature selection using boosting: theory, algorithms and applications. [Internet] [Doctoral dissertation]. Northeastern University; 2013. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/2047/d20003110.

Council of Science Editors:

Alshawabkeh M. Hypothesis margin based weighting for feature selection using boosting: theory, algorithms and applications. [Doctoral Dissertation]. Northeastern University; 2013. Available from: http://hdl.handle.net/2047/d20003110


University of Washington

13. Chawla, Shiven. Deep Learning based Intrusion Detection System for Internet of Things.

Degree: 2017, University of Washington

 With the increase in number of Internet connected devices, security and privacy concerns are the major obstacles impeding the widespread adoption of Internet of Things… (more)

Subjects/Keywords: Deep Learning; Internet of Things; Intrusion Detection System; Machine Learning; Smart Things; Virtual Network; Computer science; To Be Assigned

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chawla, S. (2017). Deep Learning based Intrusion Detection System for Internet of Things. (Thesis). University of Washington. Retrieved from http://hdl.handle.net/1773/39829

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chawla, Shiven. “Deep Learning based Intrusion Detection System for Internet of Things.” 2017. Thesis, University of Washington. Accessed October 22, 2019. http://hdl.handle.net/1773/39829.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chawla, Shiven. “Deep Learning based Intrusion Detection System for Internet of Things.” 2017. Web. 22 Oct 2019.

Vancouver:

Chawla S. Deep Learning based Intrusion Detection System for Internet of Things. [Internet] [Thesis]. University of Washington; 2017. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/1773/39829.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chawla S. Deep Learning based Intrusion Detection System for Internet of Things. [Thesis]. University of Washington; 2017. Available from: http://hdl.handle.net/1773/39829

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

14. Procházka, Boris. Útoky na operační systém Linux v teorii a praxi .

Degree: 2010, Brno University of Technology

 Tato diplomová práce se zaměřuje na bezpečnost linuxového jádra z pohledu útočníka. Mapuje metody a techniky skrývání výpočetních prostředků používané dnešními počítačovými piráty. Práce přináší… (more)

Subjects/Keywords: počítačová bezpečnost; operační systém; Linux; rootkit; systémové volání; virtuální souborový systém; IA-32; computer security; operating system; Linux; rootkit; system call; virtual filesystem; IA-32

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Procházka, B. (2010). Útoky na operační systém Linux v teorii a praxi . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/54282

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Procházka, Boris. “Útoky na operační systém Linux v teorii a praxi .” 2010. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/54282.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Procházka, Boris. “Útoky na operační systém Linux v teorii a praxi .” 2010. Web. 22 Oct 2019.

Vancouver:

Procházka B. Útoky na operační systém Linux v teorii a praxi . [Internet] [Thesis]. Brno University of Technology; 2010. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/54282.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Procházka B. Útoky na operační systém Linux v teorii a praxi . [Thesis]. Brno University of Technology; 2010. Available from: http://hdl.handle.net/11012/54282

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Wright State University

15. Kim, Dae Wook. Data-Driven Network-Centric Threat Assessment.

Degree: PhD, Computer Science and Engineering PhD, 2017, Wright State University

 As the Internet has grown increasingly popular as a communication and information sharing platform, it has given rise to two major types of Internet security… (more)

Subjects/Keywords: Computer Science; network security; fake anti-virus software; intrusion detection; web document analysis; statistical classification; Domain Name System; behavioral fingerprints; privacy; online social networks; virtual currency; malicious accounts

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, D. W. (2017). Data-Driven Network-Centric Threat Assessment. (Doctoral Dissertation). Wright State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814

Chicago Manual of Style (16th Edition):

Kim, Dae Wook. “Data-Driven Network-Centric Threat Assessment.” 2017. Doctoral Dissertation, Wright State University. Accessed October 22, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.

MLA Handbook (7th Edition):

Kim, Dae Wook. “Data-Driven Network-Centric Threat Assessment.” 2017. Web. 22 Oct 2019.

Vancouver:

Kim DW. Data-Driven Network-Centric Threat Assessment. [Internet] [Doctoral dissertation]. Wright State University; 2017. [cited 2019 Oct 22]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.

Council of Science Editors:

Kim DW. Data-Driven Network-Centric Threat Assessment. [Doctoral Dissertation]. Wright State University; 2017. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814


Florida International University

16. Campello, Daniel Jose. Optimizing Main Memory Usage in Modern Computing Systems to Improve Overall System Performance.

Degree: PhD, Computer Science, 2016, Florida International University

  Operating Systems use fast, CPU-addressable main memory to maintain an application’s temporary data as anonymous data and to cache copies of persistent data stored… (more)

Subjects/Keywords: operating systems; storage; persistent memory; clustering; virtual machine; caching; memory; tiering; asynchronous I/O; system performance; Computer Sciences; Data Storage Systems; OS and Networks; Systems Architecture; Theory and Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Campello, D. J. (2016). Optimizing Main Memory Usage in Modern Computing Systems to Improve Overall System Performance. (Doctoral Dissertation). Florida International University. Retrieved from http://digitalcommons.fiu.edu/etd/2568 ; 10.25148/etd.FIDC000755 ; FIDC000755

Chicago Manual of Style (16th Edition):

Campello, Daniel Jose. “Optimizing Main Memory Usage in Modern Computing Systems to Improve Overall System Performance.” 2016. Doctoral Dissertation, Florida International University. Accessed October 22, 2019. http://digitalcommons.fiu.edu/etd/2568 ; 10.25148/etd.FIDC000755 ; FIDC000755.

MLA Handbook (7th Edition):

Campello, Daniel Jose. “Optimizing Main Memory Usage in Modern Computing Systems to Improve Overall System Performance.” 2016. Web. 22 Oct 2019.

Vancouver:

Campello DJ. Optimizing Main Memory Usage in Modern Computing Systems to Improve Overall System Performance. [Internet] [Doctoral dissertation]. Florida International University; 2016. [cited 2019 Oct 22]. Available from: http://digitalcommons.fiu.edu/etd/2568 ; 10.25148/etd.FIDC000755 ; FIDC000755.

Council of Science Editors:

Campello DJ. Optimizing Main Memory Usage in Modern Computing Systems to Improve Overall System Performance. [Doctoral Dissertation]. Florida International University; 2016. Available from: http://digitalcommons.fiu.edu/etd/2568 ; 10.25148/etd.FIDC000755 ; FIDC000755


Brno University of Technology

17. Kollmann, Ladislav. Moderní trendy v technickém měření .

Degree: 2014, Brno University of Technology

 Bakalárska práca je zameraná na moderné trendy v technickom meraní. Prvá časť je venovaná postaveniu merania v technickej praxi, smerom jeho vývoja a analýze niektorých… (more)

Subjects/Keywords: Meranie; meracia technika; automatizácia; senzor; číslicové meracie systémy; virtuálne meracie systémy; meranie dĺžky.; Measurement; measuring equipment; automation; sensor; computer-based measurment system; virtual measurement systems; measurement of length.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kollmann, L. (2014). Moderní trendy v technickém měření . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/33484

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kollmann, Ladislav. “Moderní trendy v technickém měření .” 2014. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/33484.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kollmann, Ladislav. “Moderní trendy v technickém měření .” 2014. Web. 22 Oct 2019.

Vancouver:

Kollmann L. Moderní trendy v technickém měření . [Internet] [Thesis]. Brno University of Technology; 2014. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/33484.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kollmann L. Moderní trendy v technickém měření . [Thesis]. Brno University of Technology; 2014. Available from: http://hdl.handle.net/11012/33484

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Macquarie University

18. Jayarathna, Wadu M. M. Dilshan. Security techniques for virtual machine based systems.

Degree: 2017, Macquarie University

Empiriical thesis.

Bibliography:

1. Introduction  – 2. Related work  – 3. Application specific attack detection and protection  – 4. Reputation-based model for DNS  – 5.… (more)

Subjects/Keywords: Virtual computer systems  – Security measures; virtualisation; security; cloud security; trusted computing; access control; intrusion detection; integrated security; domain name system (DNS); WebServer; security attacks; hypervisor; virtual machine introspection (VMI); reputation based systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jayarathna, W. M. M. D. (2017). Security techniques for virtual machine based systems. (Doctoral Dissertation). Macquarie University. Retrieved from http://hdl.handle.net/1959.14/1260499

Chicago Manual of Style (16th Edition):

Jayarathna, Wadu M M Dilshan. “Security techniques for virtual machine based systems.” 2017. Doctoral Dissertation, Macquarie University. Accessed October 22, 2019. http://hdl.handle.net/1959.14/1260499.

MLA Handbook (7th Edition):

Jayarathna, Wadu M M Dilshan. “Security techniques for virtual machine based systems.” 2017. Web. 22 Oct 2019.

Vancouver:

Jayarathna WMMD. Security techniques for virtual machine based systems. [Internet] [Doctoral dissertation]. Macquarie University; 2017. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/1959.14/1260499.

Council of Science Editors:

Jayarathna WMMD. Security techniques for virtual machine based systems. [Doctoral Dissertation]. Macquarie University; 2017. Available from: http://hdl.handle.net/1959.14/1260499


Georgia Tech

19. Chuang, Kangtao Kendall. A virtualized quality of service packet scheduler accelerator.

Degree: MS, Electrical and Computer Engineering, 2008, Georgia Tech

 Resource virtualization is emerging as a technology to enable the management and sharing of hardware resources including multiple core processors and accelerators such as Digital… (more)

Subjects/Keywords: Virtualization; Quality of service; FPGA; Sharestreams-v; Sharestreams; Packet scheduler; Computer science; Computer network architectures; Virtual computer systems; System design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chuang, K. K. (2008). A virtualized quality of service packet scheduler accelerator. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/26646

Chicago Manual of Style (16th Edition):

Chuang, Kangtao Kendall. “A virtualized quality of service packet scheduler accelerator.” 2008. Masters Thesis, Georgia Tech. Accessed October 22, 2019. http://hdl.handle.net/1853/26646.

MLA Handbook (7th Edition):

Chuang, Kangtao Kendall. “A virtualized quality of service packet scheduler accelerator.” 2008. Web. 22 Oct 2019.

Vancouver:

Chuang KK. A virtualized quality of service packet scheduler accelerator. [Internet] [Masters thesis]. Georgia Tech; 2008. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/1853/26646.

Council of Science Editors:

Chuang KK. A virtualized quality of service packet scheduler accelerator. [Masters Thesis]. Georgia Tech; 2008. Available from: http://hdl.handle.net/1853/26646


Brno University of Technology

20. Nečas, Radek. Detektor utajovaných prostředků pro GNU/Linux .

Degree: 2013, Brno University of Technology

 Tato práce se zabývá detekováním skrytých prostředků v prostředí operačních systémů GNU/Linux. Současně analyzuje nástroje, které toto skrývání provádějí (tzv. rootkity). Práce je rozdělena na… (more)

Subjects/Keywords: počítačová bezpečnost; operační systém; Linux; systémová volání; virtuální souborový systém; proces; soubor; síťová spojení; rootkit; detektor; computer security; operating system; Linux; system call; virtual filesystem; process; file; network connection; rootkit; detector

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nečas, R. (2013). Detektor utajovaných prostředků pro GNU/Linux . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/54941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nečas, Radek. “Detektor utajovaných prostředků pro GNU/Linux .” 2013. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/54941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nečas, Radek. “Detektor utajovaných prostředků pro GNU/Linux .” 2013. Web. 22 Oct 2019.

Vancouver:

Nečas R. Detektor utajovaných prostředků pro GNU/Linux . [Internet] [Thesis]. Brno University of Technology; 2013. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/54941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nečas R. Detektor utajovaných prostředků pro GNU/Linux . [Thesis]. Brno University of Technology; 2013. Available from: http://hdl.handle.net/11012/54941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Ye, Lei. Energy Management for Virtual Machines .

Degree: 2013, University of Arizona

 Current computing infrastructures use virtualization to increase resource utilization by deploying multiple virtual machines on the same hardware. Virtualization is particularly attractive for data center,… (more)

Subjects/Keywords: Energy Management; Memory System; Storage System; Virtual Machine; Computer Science; Buffer Cache

…98 9 LIST OF FIGURES 1.1 A typical architecture of system virtual machines… …hardware from the guest operating system executing inside a virtual machine. This dissertation… …subsystem. For storage system, we study the I/O behavior of the virtual machine systems. We… …Virtualization is the abstraction of resources from computer systems. The virtual machine (VM)… …programming languages and compliers, and computer architecture. Virtual machines for supporting… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ye, L. (2013). Energy Management for Virtual Machines . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/283603

Chicago Manual of Style (16th Edition):

Ye, Lei. “Energy Management for Virtual Machines .” 2013. Doctoral Dissertation, University of Arizona. Accessed October 22, 2019. http://hdl.handle.net/10150/283603.

MLA Handbook (7th Edition):

Ye, Lei. “Energy Management for Virtual Machines .” 2013. Web. 22 Oct 2019.

Vancouver:

Ye L. Energy Management for Virtual Machines . [Internet] [Doctoral dissertation]. University of Arizona; 2013. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/10150/283603.

Council of Science Editors:

Ye L. Energy Management for Virtual Machines . [Doctoral Dissertation]. University of Arizona; 2013. Available from: http://hdl.handle.net/10150/283603


The Ohio State University

22. Hao, Shilun. Using Virtual Reality to Produce 3-D Graphical Simulation of the Construction and Use of Dougong in Chinese Architecture Emphasizing the Song and Qing Dynasties.

Degree: PhD, Civil Engineering, 2018, The Ohio State University

 Dougong, one of the unique features of ancient Chinese architecture, are located at the intersections of pillars under the roofs in the support systems of… (more)

Subjects/Keywords: Archaeology; Architecture; Civil Engineering; History; Engineering; Education; Computer Engineering; ancient construction, architecture, archaeology, cap-and-block, Chinese construction, Chinese history, Chinese temple, civil engineering, computer graphics, conservation, dougong, graphical simulation, intelligent system, renovation, virtual reality, VR

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hao, S. (2018). Using Virtual Reality to Produce 3-D Graphical Simulation of the Construction and Use of Dougong in Chinese Architecture Emphasizing the Song and Qing Dynasties. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1523616323665237

Chicago Manual of Style (16th Edition):

Hao, Shilun. “Using Virtual Reality to Produce 3-D Graphical Simulation of the Construction and Use of Dougong in Chinese Architecture Emphasizing the Song and Qing Dynasties.” 2018. Doctoral Dissertation, The Ohio State University. Accessed October 22, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1523616323665237.

MLA Handbook (7th Edition):

Hao, Shilun. “Using Virtual Reality to Produce 3-D Graphical Simulation of the Construction and Use of Dougong in Chinese Architecture Emphasizing the Song and Qing Dynasties.” 2018. Web. 22 Oct 2019.

Vancouver:

Hao S. Using Virtual Reality to Produce 3-D Graphical Simulation of the Construction and Use of Dougong in Chinese Architecture Emphasizing the Song and Qing Dynasties. [Internet] [Doctoral dissertation]. The Ohio State University; 2018. [cited 2019 Oct 22]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1523616323665237.

Council of Science Editors:

Hao S. Using Virtual Reality to Produce 3-D Graphical Simulation of the Construction and Use of Dougong in Chinese Architecture Emphasizing the Song and Qing Dynasties. [Doctoral Dissertation]. The Ohio State University; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1523616323665237


University of Central Florida

23. Sivilli, Robert. Vision-based Testbeds For Control System Applicaitons.

Degree: 2012, University of Central Florida

  In the field of control systems, testbeds are a pivotal step in the validation and improvement of new algorithms for different applications. They provide… (more)

Subjects/Keywords: Testbed; optimal trajectory planning; virtual motion camouflage; shape memory polymer; smart material; vision system; Aerospace Engineering; Engineering; Space Vehicles; <; p>; Dissertations, Academic  – Engineering and Computer Science, Engineering and Computer Science  – Dissertations, Academic<; /p>

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sivilli, R. (2012). Vision-based Testbeds For Control System Applicaitons. (Masters Thesis). University of Central Florida. Retrieved from https://stars.library.ucf.edu/etd/2382

Chicago Manual of Style (16th Edition):

Sivilli, Robert. “Vision-based Testbeds For Control System Applicaitons.” 2012. Masters Thesis, University of Central Florida. Accessed October 22, 2019. https://stars.library.ucf.edu/etd/2382.

MLA Handbook (7th Edition):

Sivilli, Robert. “Vision-based Testbeds For Control System Applicaitons.” 2012. Web. 22 Oct 2019.

Vancouver:

Sivilli R. Vision-based Testbeds For Control System Applicaitons. [Internet] [Masters thesis]. University of Central Florida; 2012. [cited 2019 Oct 22]. Available from: https://stars.library.ucf.edu/etd/2382.

Council of Science Editors:

Sivilli R. Vision-based Testbeds For Control System Applicaitons. [Masters Thesis]. University of Central Florida; 2012. Available from: https://stars.library.ucf.edu/etd/2382


Georgia State University

24. Ma, Wenjun. AMMP-EXTN: A User Privacy and Collaboration Control Framework for a Multi-User Collaboratory Virtual Reality System.

Degree: MS, Computer Science, 2007, Georgia State University

 In this thesis, we propose a new design of privacy and session control for improving a collaborative molecular modeling CVR system AMMP-VIS [1]. The design… (more)

Subjects/Keywords: Privacy protection; Access control; Collaborative Virtual Environment; CVE survey; System evaluation; GUI; Molecular modeling; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ma, W. (2007). AMMP-EXTN: A User Privacy and Collaboration Control Framework for a Multi-User Collaboratory Virtual Reality System. (Thesis). Georgia State University. Retrieved from https://scholarworks.gsu.edu/cs_theses/50

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ma, Wenjun. “AMMP-EXTN: A User Privacy and Collaboration Control Framework for a Multi-User Collaboratory Virtual Reality System.” 2007. Thesis, Georgia State University. Accessed October 22, 2019. https://scholarworks.gsu.edu/cs_theses/50.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ma, Wenjun. “AMMP-EXTN: A User Privacy and Collaboration Control Framework for a Multi-User Collaboratory Virtual Reality System.” 2007. Web. 22 Oct 2019.

Vancouver:

Ma W. AMMP-EXTN: A User Privacy and Collaboration Control Framework for a Multi-User Collaboratory Virtual Reality System. [Internet] [Thesis]. Georgia State University; 2007. [cited 2019 Oct 22]. Available from: https://scholarworks.gsu.edu/cs_theses/50.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ma W. AMMP-EXTN: A User Privacy and Collaboration Control Framework for a Multi-User Collaboratory Virtual Reality System. [Thesis]. Georgia State University; 2007. Available from: https://scholarworks.gsu.edu/cs_theses/50

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Vincent, David E. PORTABLE INDOOR MULTI-USER POSITION TRACKING SYSTEM FOR IMMERSIVE VIRTUAL ENVIRONMENTS USING SENSOR FUSION WITH MULTIDIMENSIONAL SCALING.

Degree: MS, Computer Science & Software Engineering, 2012, Miami University

 Immersive virtual systems require a tracking technology that is capable of maintaining accurate user position. Current virtual reality systems are commonly dependent on infrastructure based… (more)

Subjects/Keywords: Computer Science; virtual reality; tracking system; immersive; multidimensional scaling; sensor fusion; scipt; inertial; tdoa

…The creation of a portable virtual reality system requires a localization system that can be… …with the goal of producing a tracking system for a portable immersive virtual reality system… …usefulness in Immersive Virtual Reality in a permanently designated area, the PPT system is… …This system is currently capable of providing a low latency locomotion interface. In… …position estimates that are produced. The system has no reference to an outside source of… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vincent, D. E. (2012). PORTABLE INDOOR MULTI-USER POSITION TRACKING SYSTEM FOR IMMERSIVE VIRTUAL ENVIRONMENTS USING SENSOR FUSION WITH MULTIDIMENSIONAL SCALING. (Masters Thesis). Miami University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=miami1335634621

Chicago Manual of Style (16th Edition):

Vincent, David E. “PORTABLE INDOOR MULTI-USER POSITION TRACKING SYSTEM FOR IMMERSIVE VIRTUAL ENVIRONMENTS USING SENSOR FUSION WITH MULTIDIMENSIONAL SCALING.” 2012. Masters Thesis, Miami University. Accessed October 22, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=miami1335634621.

MLA Handbook (7th Edition):

Vincent, David E. “PORTABLE INDOOR MULTI-USER POSITION TRACKING SYSTEM FOR IMMERSIVE VIRTUAL ENVIRONMENTS USING SENSOR FUSION WITH MULTIDIMENSIONAL SCALING.” 2012. Web. 22 Oct 2019.

Vancouver:

Vincent DE. PORTABLE INDOOR MULTI-USER POSITION TRACKING SYSTEM FOR IMMERSIVE VIRTUAL ENVIRONMENTS USING SENSOR FUSION WITH MULTIDIMENSIONAL SCALING. [Internet] [Masters thesis]. Miami University; 2012. [cited 2019 Oct 22]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=miami1335634621.

Council of Science Editors:

Vincent DE. PORTABLE INDOOR MULTI-USER POSITION TRACKING SYSTEM FOR IMMERSIVE VIRTUAL ENVIRONMENTS USING SENSOR FUSION WITH MULTIDIMENSIONAL SCALING. [Masters Thesis]. Miami University; 2012. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=miami1335634621


Indian Institute of Science

26. Divakaran, Sumesh. A Refinement-Based Methodology for Verifying Abstract Data Type Implementations.

Degree: 2015, Indian Institute of Science

 This thesis is about techniques for proving the functional correctness of Abstract Data Type (ADT) implementations. We provide a framework for proving the functional correctness… (more)

Subjects/Keywords: Abstract Data Types; Data Structure; Data Abstraction; Free RTOS-open-source Real-time Operating System; Refinement (Computing); Theory of Refinement; Virtual Collective Consiousness (VCC); Modelling Languages; Programming Languages; ADT Transition Systems; FreeRTOS; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Divakaran, S. (2015). A Refinement-Based Methodology for Verifying Abstract Data Type Implementations. (Thesis). Indian Institute of Science. Retrieved from http://etd.iisc.ernet.in/2005/3744 ; http://etd.iisc.ernet.in/abstracts/4606/G26949-Abs.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Divakaran, Sumesh. “A Refinement-Based Methodology for Verifying Abstract Data Type Implementations.” 2015. Thesis, Indian Institute of Science. Accessed October 22, 2019. http://etd.iisc.ernet.in/2005/3744 ; http://etd.iisc.ernet.in/abstracts/4606/G26949-Abs.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Divakaran, Sumesh. “A Refinement-Based Methodology for Verifying Abstract Data Type Implementations.” 2015. Web. 22 Oct 2019.

Vancouver:

Divakaran S. A Refinement-Based Methodology for Verifying Abstract Data Type Implementations. [Internet] [Thesis]. Indian Institute of Science; 2015. [cited 2019 Oct 22]. Available from: http://etd.iisc.ernet.in/2005/3744 ; http://etd.iisc.ernet.in/abstracts/4606/G26949-Abs.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Divakaran S. A Refinement-Based Methodology for Verifying Abstract Data Type Implementations. [Thesis]. Indian Institute of Science; 2015. Available from: http://etd.iisc.ernet.in/2005/3744 ; http://etd.iisc.ernet.in/abstracts/4606/G26949-Abs.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

27. Gold, Brian. Balancing Performance, Area, and Power in an On-Chip Network.

Degree: MS, Electrical and Computer Engineering, 2003, Virginia Tech

 Several trends can be observed in modern microprocessor design. Architectures have become increasingly complex while design time continues to dwindle. As feature sizes shrink, wire… (more)

Subjects/Keywords: area; virtual channels; SCMP; power; network; router; crossbar switch; single chip computer; message passing; system on chip

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gold, B. (2003). Balancing Performance, Area, and Power in an On-Chip Network. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/34137

Chicago Manual of Style (16th Edition):

Gold, Brian. “Balancing Performance, Area, and Power in an On-Chip Network.” 2003. Masters Thesis, Virginia Tech. Accessed October 22, 2019. http://hdl.handle.net/10919/34137.

MLA Handbook (7th Edition):

Gold, Brian. “Balancing Performance, Area, and Power in an On-Chip Network.” 2003. Web. 22 Oct 2019.

Vancouver:

Gold B. Balancing Performance, Area, and Power in an On-Chip Network. [Internet] [Masters thesis]. Virginia Tech; 2003. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/10919/34137.

Council of Science Editors:

Gold B. Balancing Performance, Area, and Power in an On-Chip Network. [Masters Thesis]. Virginia Tech; 2003. Available from: http://hdl.handle.net/10919/34137

28. Marsh, William. Identifying and mitigating the cognitive implications of semi-natural virtual locomotion techniques.

Degree: 2012, Iowa State University

 Users of virtual reality systems often need to navigate to distant parts of the virtual environment in order to perform their desired tasks. Unfortunately, physical… (more)

Subjects/Keywords: dual-task; fuzzy system; locomotion; navigation; virtual reality; working memory; Cognitive Psychology; Computer Engineering

…navigate an infinite VE from within a finite virtual reality (VR) system using only… …locomotion is natural to the extent that a given VR system allows. In the Virtual Motion Controller… …Figure . Figure . Figure . Number of collisions as a function of virtual distance… …traveled in the adaptive system pilot study… …Number of collisions as a function of dead-zone radius in the adaptive system pilot study… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marsh, W. (2012). Identifying and mitigating the cognitive implications of semi-natural virtual locomotion techniques. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/12398

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Marsh, William. “Identifying and mitigating the cognitive implications of semi-natural virtual locomotion techniques.” 2012. Thesis, Iowa State University. Accessed October 22, 2019. https://lib.dr.iastate.edu/etd/12398.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Marsh, William. “Identifying and mitigating the cognitive implications of semi-natural virtual locomotion techniques.” 2012. Web. 22 Oct 2019.

Vancouver:

Marsh W. Identifying and mitigating the cognitive implications of semi-natural virtual locomotion techniques. [Internet] [Thesis]. Iowa State University; 2012. [cited 2019 Oct 22]. Available from: https://lib.dr.iastate.edu/etd/12398.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Marsh W. Identifying and mitigating the cognitive implications of semi-natural virtual locomotion techniques. [Thesis]. Iowa State University; 2012. Available from: https://lib.dr.iastate.edu/etd/12398

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. Vial, Stéphane. La structure de la révolution numérique : philosophie de la technologie : The Structure of the Digital Revolution.

Degree: Docteur es, Philosophie, 2012, Université Paris Descartes – Paris V

 De quoi la révolution numérique est-elle la révolution ? Le premier niveau d’analyse s’inscrit sur le plan de l’histoire. Il vise à dégager la structure… (more)

Subjects/Keywords: Technique; Système technique; Machine; Machinisme; Numérisation; Informatique; Information; Ordinateur; Réseau; Internet; Nouvelles technologies; NTIC; TIC; Etre; Perception; Constructivisme; Ontologie; Phénoménotechnique; Ontophanie; Appareil; Réel; Virtuel; Réalité virtuelle; Simulation; Interface; Interaction; Interactivité; Design; Technology; Technical System; Machine; Mechanization; Digitalization; Computer science; Information Technology; Information; Computer; Network; Internet; New Technology; IT; ICT; Being; Perception; Constructivism; Ontology; Phenomenotechnique; Ontophany; Device; Real; Virtual; Virtual Reality; Simulation; Interface; Interaction; Interactivity; Design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vial, S. (2012). La structure de la révolution numérique : philosophie de la technologie : The Structure of the Digital Revolution. (Doctoral Dissertation). Université Paris Descartes – Paris V. Retrieved from http://www.theses.fr/2012PA05H014

Chicago Manual of Style (16th Edition):

Vial, Stéphane. “La structure de la révolution numérique : philosophie de la technologie : The Structure of the Digital Revolution.” 2012. Doctoral Dissertation, Université Paris Descartes – Paris V. Accessed October 22, 2019. http://www.theses.fr/2012PA05H014.

MLA Handbook (7th Edition):

Vial, Stéphane. “La structure de la révolution numérique : philosophie de la technologie : The Structure of the Digital Revolution.” 2012. Web. 22 Oct 2019.

Vancouver:

Vial S. La structure de la révolution numérique : philosophie de la technologie : The Structure of the Digital Revolution. [Internet] [Doctoral dissertation]. Université Paris Descartes – Paris V; 2012. [cited 2019 Oct 22]. Available from: http://www.theses.fr/2012PA05H014.

Council of Science Editors:

Vial S. La structure de la révolution numérique : philosophie de la technologie : The Structure of the Digital Revolution. [Doctoral Dissertation]. Université Paris Descartes – Paris V; 2012. Available from: http://www.theses.fr/2012PA05H014

30. Yulga, Jim. Implementation of Microsoft's Virtual Pc in Networking Curriculum.

Degree: 2006, Regis University

 Using Microsoft's Virtual PC software product as a virtual technology in the implementation of Network Specialist curriculum allows increased versatility and considerable hardware cost savings.… (more)

Subjects/Keywords: Computer Sciences; Physical Sciences and Mathematics; Microsoft's Virtual PC; computer based training programs; network specialist curriculum; operating system administration; Regis University MSCIT thesis; College for Professional Studies; MS Computer and Information Technology; School of Computer & Information Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yulga, J. (2006). Implementation of Microsoft's Virtual Pc in Networking Curriculum. (Thesis). Regis University. Retrieved from http://epublications.regis.edu/theses/334

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yulga, Jim. “Implementation of Microsoft's Virtual Pc in Networking Curriculum.” 2006. Thesis, Regis University. Accessed October 22, 2019. http://epublications.regis.edu/theses/334.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yulga, Jim. “Implementation of Microsoft's Virtual Pc in Networking Curriculum.” 2006. Web. 22 Oct 2019.

Vancouver:

Yulga J. Implementation of Microsoft's Virtual Pc in Networking Curriculum. [Internet] [Thesis]. Regis University; 2006. [cited 2019 Oct 22]. Available from: http://epublications.regis.edu/theses/334.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yulga J. Implementation of Microsoft's Virtual Pc in Networking Curriculum. [Thesis]. Regis University; 2006. Available from: http://epublications.regis.edu/theses/334

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.