1.
|
Although verifying a message has long been recognized as an important concept, which has been used explicitly or implicitly in security protocol analysis, there is no con[...]
2012 | doctoral dissertations |
|
2.
|
It is crucial for embedded systems to adapt to the dynamics of openenvironments. This adaptation process becomes especially challenging in the context of multiagent syste[...]
2012 | doctoral dissertations |
|
3.
|
Very few studies to date have directly examined the impact of race or gender patient-provider concordance on the utilization of health services. This is particularly note[...]
2010 | doctoral dissertations |
|
4.
|
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have[...]
2012 | doctoral dissertations |
|
5.
|
Social norms facilitate agent coordination and conflict resolution without explicit communication. Norms generally involve restrictions on a set of actions or behaviors o[...]
2014 | doctoral dissertations |
|