Results 41 to 50 of about 3,621,508 (286)
A formal analysis method for composition protocol based on model checking
Protocol security in a composition protocol environment has always been an open problem in the field of formal analysis and verification of security protocols. As a well-known tool to analyze and verify the logical consistency of concurrent systems, SPIN
Meihua Xiao +4 more
doaj +1 more source
A posteriori metadata from automated provenance tracking: Integration of AiiDA and TCOD
In order to make results of computational scientific research findable, accessible, interoperable and re-usable, it is necessary to decorate them with standardised metadata. However, there are a number of technical and practical challenges that make this
Cepellotti, Andrea +5 more
core +1 more source
Treatment Decision‐Making Roles and Preferences Among Adolescents and Young Adults With Cancer
ABSTRACT Background Decision‐making (DM) dynamics between adolescents and young adults (AYAs) with cancer, parents, and oncologists remain underexplored in diverse populations. We examined cancer treatment DM preferences among an ethnically and socioeconomically diverse group of AYAs and their parents.
Amanda M. Gutierrez +14 more
wiley +1 more source
Use of digital data from open sources during the investigation of criminal offenses: certain aspects
he purpose of the article is to study the possibilities of using digital data from open sources during the investigation of criminal offenses. Methodology.
Basysta I. +3 more
doaj +1 more source
Exposing and harvesting metadata using the OAI metadata harvesting protocol: A tutorial [PDF]
In this article I outline the ideas behind the Open Archives Initiative metadata harvesting protocol (OAIMH), and attempt to clarify some common misconceptions. I then consider how the OAIMH protocol can be used to expose and harvest metadata.
Warner, Simeon
core +1 more source
Compiling symbolic attacks to protocol implementation tests
Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the ...
Ghabri, Hatem +2 more
core +4 more sources
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra +3 more
wiley +1 more source
Building flexible groupware through open protocols [PDF]
This paper presents a technical approach to building flexible groupware applications. Flexibility provides the promise of personalizable groupware, allowing different groups to work with the system in diverse ways which best suit the group’s own needs. An implementation technique called open protocols is described, which is a variation of client/server
Mark Roseman, Saul Greenberg
openaire +1 more source
ABSTRACT Purpose Cognitive and psychological difficulties could negatively interfere with treatment adherence and quality of life before and after hematopoietic stem cell transplant (HSCT). Methods to mitigate these changes may have positive effects on treatment success.
Kristen L. Votruba +11 more
wiley +1 more source

