Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
The enormous growth in wireless communications and miniaturized handheld devices in the last few years, have given rise to a vast range of new services for heterogeneous user environments. The concept of a Peer-to-Peer (P2P) Grid has...
The research goal of this dissertation is to point the way towards a better understanding for the hidden complexities of knowledge communication and content markup, with a view to cleaner, more principled designs. The following four...
The dissertation research is concerned with enabling parallel, high-performance computationâ in particular development of scientific software in the network-aware programming language, Java. Traditionally, this kind of computing was...
The Cryptographic Protocol Analysis Language Evaluation System (CPAL-ES) is a tool used to analyze protocols with formal methods. In this thesis, we exercise CPAL-ES against two security protocols, the Secure Protocol of Aziz & Diffie, ...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.