Sciweavers

2351 search results - page 72 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 3 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
FMCO
2003
Springer
188views Formal Methods» more  FMCO 2003»
15 years 3 months ago
Consistency Management Within Model-Based Object-Oriented Development of Components
Abstract. The Unified Modeling Language (UML) favors the construction of models composed of several submodels, modeling the system comunder development at different levels of abs...
Jochen Malte Küster, Gregor Engels
AAAI
2008
15 years 6 days ago
H-DPOP: Using Hard Constraints for Search Space Pruning in DCOP
In distributed constraint optimization problems, dynamic programming methods have been recently proposed (e.g. DPOP). In dynamic programming many valuations are grouped together i...
Akshat Kumar, Adrian Petcu, Boi Faltings
ATAL
2010
Springer
14 years 11 months ago
Agreeing on plans through iterated disputes
Autonomous agents transcend their individual capabilities by cooperating towards achieving shared goals. The different viewpoints agents have on the environment cause disagreement...
Alexandros Belesiotis, Michael Rovatsos, Iyad Rahw...
INFFUS
2006
101views more  INFFUS 2006»
14 years 10 months ago
Fusion rules for merging uncertain information
In previous papers, we have presented a logic-based framework based on fusion rules for merging structured news reports [Hun00, Hun02b, Hun02a, HS03, HS04]. Structured news report...
Anthony Hunter, Weiru Liu