Sciweavers

1612 search results - page 272 / 323
» About models of security protocols
Sort
View
ATAL
2007
Springer
15 years 4 months ago
Exploiting Hierarchical Goals in Bilateral Automated Negotiation: Empirical Study
While argumentation-based negotiation has been accepted as a promising alternative to game-theoretic or heuristic based negotiation, no evidence has been provided to confirm this ...
Philippe Pasquier, Ramon Hollands, Frank Dignum, I...
CAV
2007
Springer
118views Hardware» more  CAV 2007»
15 years 4 months ago
Local Proofs for Global Safety Properties
This paper explores the concept of locality in proofs of global safety properties of asynchronously composed, multi-process programs. Model checking on the full state space is ofte...
Ariel Cohen 0002, Kedar S. Namjoshi
ATAL
2005
Springer
15 years 3 months ago
Layered message semantics using social commitments
Although mental states have its own place in the definition of message semantics, social commitments have emerged as a complementing element to circumvent the limitations of usin...
Roberto A. Flores, Philippe Pasquier, Brahim Chaib...
FMSP
2000
ACM
152views Formal Methods» more  FMSP 2000»
15 years 2 months ago
Fault origin adjudication
When a program P fails to satisfy a requirement R supposedly ensured by a detailed speci cation S that was used to implement P, there is a question about whether the problem arise...
Karthikeyan Bhargavan, Carl A. Gunter, Davor Obrad...
ACMICEC
2007
ACM
112views ECommerce» more  ACMICEC 2007»
15 years 1 months ago
An empirical study of interest-based negotiation
While argumentation-based negotiation has been accepted as a promising alternative to game-theoretic or heuristic based negotiation, no evidence has been provided to confirm this ...
Philippe Pasquier, Ramon Hollands, Frank Dignum, I...