Sciweavers

3256 search results - page 54 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
ATAL
2009
Springer
15 years 1 months ago
Choice, interoperability, and conformance in interaction protocols and service choreographies
Many real-world applications of multiagent systems require independently designed (heterogeneous) and operated (autonomous) agents to interoperate. We consider agents who offer bu...
Matteo Baldoni, Cristina Baroglio, Amit K. Chopra,...
DEXA
2004
Springer
83views Database» more  DEXA 2004»
15 years 1 months ago
Efficient Rule Base Verification Using Binary Decision Diagrams
As their field of application has evolved and matured, the importance of verifying knowledge-based systems is now widely recognized. Nevertheless, some problems have remained. In t...
Christophe Mues, Jan Vanthienen
ICDAR
2005
IEEE
15 years 3 months ago
A Study on Vulnerability in On-line Writer Verification System
The analysis of vulnerabilities and threats in biometrics-based personal authentication systems is indispensable for the development and promotion of wide spread utilization of bi...
Yasushi Yamazaki, Akane Nakashima, Kazunobu Tasaka...
FORMATS
2010
Springer
14 years 7 months ago
Robust Satisfaction of Temporal Logic over Real-Valued Signals
Abstract. We consider temporal logic formulae specifying constraints in continuous time and space on the behaviors of continuous and hybrid dynamical system admitting uncertain par...
Alexandre Donzé, Oded Maler
ATAL
2004
Springer
15 years 3 months ago
Using the Experimental Method to Produce Reliable Self-Organised Systems
The ‘engineering’ and ‘adaptive’ approaches to system production are distinguished. It is argued that producing reliable self-organised software systems (SOSS) will necessa...
Bruce Edmonds