Sciweavers

1414 search results - page 209 / 283
» Combining Intruder Theories
Sort
View
TRECVID
2007
14 years 11 months ago
Eurecom at TRECVid 2007: Extraction of High-level Features
In this paper we describe our experiments for the high level features extraction task of TRECVid 2007. Our approach is different than previous submissions in that we have impleme...
Rachid Benmokhtar, Eric Galmar, Benoit Huet
ATAL
2010
Springer
14 years 11 months ago
Complexity of judgment aggregation: safety of the agenda
Aggregating the judgments of a group of agents regarding a set of interdependent propositions can lead to inconsistent outcomes. One of the parameters involved is the agenda, the ...
Ulle Endriss, Umberto Grandi, Daniele Porello
ATAL
2010
Springer
14 years 11 months ago
Strategic executions of choreographed timed normative multi-agent systems
This paper proposes a combined mechanism for coordinating agents in timed normative multi-agent systems. Timing constraints in a multi-agent system make it possible to force actio...
Lacramioara Astefanoaei, Frank S. de Boer, Mehdi D...
BIRTHDAY
2010
Springer
14 years 11 months ago
DKAL and Z3: A Logic Embedding Experiment
Yuri Gurevich and Itay Neeman proposed the Distributed Knowledge Authorization Language, DKAL, as an expressive, yet very succinctly expressible logic for distributed authorization...
Sergio Mera, Nikolaj Bjørner
CIIA
2009
14 years 11 months ago
LCF-style for Secure Verification Platform based on Multiway Decision Graphs
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
Sa'ed Abed, Otmane Aït Mohamed