Sciweavers

1581 search results - page 129 / 317
» Competitive intelligence process and tools for intelligence ...
Sort
View
APN
2008
Springer
15 years 5 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
FLAIRS
2006
15 years 5 months ago
Epistemic Categorization for Analysis of Customer Complaints
We introduce the particular functionality of the Complaint Engine suite, the integrated complaint management component for mediating consumer disputes. We formulate the problem of...
Boris Galitsky, Anca Pascu
MASA
2001
Springer
15 years 8 months ago
Motivated Agent Behaviour and Requirements Applied to Virtual Emergencies
Virtual environments provide a rich and varied domain for intelligent agents, but questions of design and development in this context are still to be answered. An agent with multip...
Sorabain Wolfheart de Lioncourt, Michael Luck
CSL
2009
Springer
15 years 10 months ago
Algorithmic Analysis of Array-Accessing Programs
For programs whose data variables range over boolean or finite domains, program verification is decidable, and this forms the basis of recent tools for software model checking. I...
Rajeev Alur, Pavol Cerný, Scott Weinstein
MICAI
2005
Springer
15 years 9 months ago
Agent-Based Simulation Replication: A Model Driven Architecture Approach
In Multi-agent based simulation (MABS) systems, computational models are built as multi-agent systems (MAS). Replication of these models can contribute to improve the reliability o...
Candelaria Sansores, Juan Pavón