Sciweavers

562 search results - page 43 / 113
» Agent communication transfer protocol
Sort
View
DKE
2007
107views more  DKE 2007»
14 years 11 months ago
Design time analysis of multiagent protocols
Interaction protocols enable agents to communicate with each other effectively. Whereas several approaches exist to specify interaction protocols, none of them has design tools t...
Pinar Yolum
CSFW
2007
IEEE
15 years 6 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
ASM
2005
ASM
15 years 5 months ago
Verifying Security Protocols: An ASM Approach
In this paper we present a modeling technique for security protocols using Abstract State Machines [BS03,Gur95] (ASMs). We describe how we model the different agents in the scenar...
Dominik Haneberg, Holger Grandy, Wolfgang Reif, Ge...
IADIS
2003
15 years 1 months ago
A Mobile Agent Based Registration System
A mobile agent is a software agent that has the ability to transfer its program code, data and execution state across a network to a remote computer for execution. In this paper, ...
K. K. Wong, C. K. Heng, P. C. Leong, Ma-Tit Yap
ISN
2000
Springer
162views Communications» more  ISN 2000»
15 years 3 months ago
An Approach to Network Control and Resource Management Based on Intelligent Agents
Network Control is currently carried out mainly by means of signalling protocols. Although these protocols are robust and facilitate standardisation, they present several drawback...
Evangelos Vayias, John Soldatos, Nikolas Mitrou