1.
Although verifying a message has long been recognized as an important concept, which has been used explicitly or implicitly in security protocol analysis, there is no con[...]
2012 | doctoral dissertations |
2.
It is crucial for embedded systems to adapt to the dynamics of openenvironments. This adaptation process becomes especially challenging in the context of multiagent syste[...]
2012 | doctoral dissertations |
3.
Very few studies to date have directly examined the impact of race or gender patient-provider concordance on the utilization of health services. This is particularly note[...]
2010 | doctoral dissertations |
4.
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have[...]
2012 | doctoral dissertations |
5.
Social norms facilitate agent coordination and conflict resolution without explicit communication. Norms generally involve restrictions on a set of actions or behaviors o[...]
2014 | doctoral dissertations |