Sciweavers

37 search results - page 7 / 8
» Symbolic negotiation revisited
Sort
View
AAAI
2007
13 years 8 months ago
Impromptu Teams of Heterogeneous Mobile Robots
As robots become more involved in assisting us in large and hazardous operations, such as search and rescue, we can anticipate that diverse robots will come together with the need...
Ross Mead, Jerry B. Weinberg
ECAI
2004
Springer
13 years 11 months ago
A Syntactical Approach to Revision
The aim of this article is to revisit Dalal’s operator for belief revision. Dalal has proposed a technique for revising belief bases based on the minimization of a distance betw...
Guilherme Bittencourt, Laurent Perrussel, Jerusa M...
CADE
2011
Springer
12 years 5 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
EUROCRYPT
2009
Springer
14 years 6 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
ER
2007
Springer
146views Database» more  ER 2007»
13 years 9 months ago
Achieving, Satisficing, and Excelling
Abstract. Definitions of the concepts derived from the goal concept (including functional and nonfunctional goal, hardgoal, and softgoal) used in requirements engineering are discu...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...