Sciweavers

25 search results - page 3 / 5
» Jtlv: A Framework for Developing Verification Algorithms
Sort
View
ATAL
2010
Springer
13 years 6 months ago
Reasoning about strategies of multi-agent programs
Verification of multi-agent programs is a key problem in agent research and development. This paper focuses on multi-agent programs that consist of a finite set of BDI-based agent...
Mehdi Dastani, Wojciech Jamroga
CAV
2008
Springer
170views Hardware» more  CAV 2008»
13 years 7 months ago
Efficient Craig Interpolation for Linear Diophantine (Dis)Equations and Linear Modular Equations
Abstract. The use of Craig interpolants has enabled the development of powerful hardware and software model checking techniques. Efficient algorithms are known for computing interp...
Himanshu Jain, Edmund M. Clarke, Orna Grumberg
WWW
2003
ACM
14 years 6 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
HT
2009
ACM
13 years 3 months ago
Games with a purpose for social networking platforms
The online games market has matured in recent years. It is now a multi-billion dollar business with hundreds of millions players worldwide. At the same time, social networking pla...
Walter Rafelsberger, Arno Scharl
BIOSIG
2009
75views Biometrics» more  BIOSIG 2009»
13 years 6 months ago
Multi-Sample Fusion with Template Protection
: The widespread use of biometrics and its increased popularity introduces privacy risks. In order to mitigate these risks, solutions such as the helper-data system, fuzzy vault, f...
Emile Kelkboom, Jeroen Breebaart, Raymond N. J. Ve...