Follow

Theses/Dissertations from 2019

PDF

A study of the effect of memory system configuration on the power consumption of an FPGA processor, Adam Blalock

PDF

Intrusion-tolerant Order-preserving Encryption, John Huson

PDF

Using data science to detect fake news, Eliza Shoemaker

PDF

Modeling a chaotic billiard: The Bunimovich Stadium, Randal Shoemaker

PDF

The effects of finite precision on the simulation of the double pendulum, Rebecca Wild

Theses/Dissertations from 2018

PDF

Security attacks on RECKLESS-APPs: "Remote car keyless applications" for new semi autonomous vehicles, Mohamed El-Tawab

PDF

Less-java, more learning: Language design for introductory programming, Zamua Nasrawt

Theses/Dissertations from 2017

PDF

Enhancing the learning experience- Use of video game technology for teaching Japanese language, Craig A. DeCampli

PDF

An affordable VR environment, Matthew R. Petty

Theses/Dissertations from 2016

PDF

Improving the security of wireless sensor networks, Mauricio Tellez Nava

PDF

A comparison of algorithms and heuristics for solving the O 1 I n D 1 shortest route problems, Steven D. Young

Theses/Dissertations from 2015

PDF

Analysis of real-world passwords for social media sites, Mark J. Quinn

PDF

Homesafe: A mobile application utilizing encryption and access control, Kenneth Trumpoldt

Theses/Dissertations from 2014

PDF

Automated snort signature generation, Brandon Rice

PDF

Path tracing using lower level of detail for secondary rays, Ryan Irby Wolter

PDF

Approximating the wiener process, Branden James Wooten

Theses/Dissertations from 2013

PDF

Electronic voting: Methods and protocols, Christopher Andrew Collord

PDF

Class control: An adaptable and self configuring classroom control system, Thomas Grimes

PDF

Data carving parser generation, Benjamin Nathaniel Kelley

PDF

Fingerprint fuzzy vault: Security analysis and a new scheme, Patrick J.B. Perry

Theses/Dissertations from 2012

An educational game for the teaching of discrete math, Kathleen Lazo

PDF

Forensic analysis of linux physical memory: Extraction and resumption of running processes., Ernest D. Mougoue

PDF

Identity management in a public IaaS Cloud, William T. Skinner III

PDF

Methodology and automated metadata extraction from multiple volume shadow copies, Henri Michael van Goethem

Theses/Dissertations from 2011

PDF

Impediment sensitive-role based access control, Joseph Frederick Blumberg

Theses/Dissertations from 2010

PDF

Security analysis of a fingerprint-secured USB drive, Benjamin David Rodes

PDF

Improving the measurement of system time on remote hosts, Michael Christopher Smith