Sciweavers

8651 search results - page 1682 / 1731
» Intelligent agents as innovations
Sort
View
LPAR
2007
Springer
15 years 6 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
CIMCA
2006
IEEE
15 years 6 months ago
Assessing and Assuring Trust in E-Commerce Systems
On-line trading or Internet Commerce restoring to ECommerce systems are gradually replacing the traditional commerce activities. Internet users must have reasonable faith on the u...
Zhongwei Zhang, Zhen Wang
CIMCA
2006
IEEE
15 years 6 months ago
Timed-MPSG: A Formal Model for Real-Time Shop Floor Controller
The MPSG (Message-based Part State Graph) model has been developed for the execution portion of shop-floor controllers that operate in a distributed and hierarchical control envir...
Devinder Thapa, Jaeil Park, Gi-Nam Wang, Dongmin S...
IEEESCC
2006
IEEE
15 years 5 months ago
Using Assumptions in Service Composition Context
Service composition aims to provide an efficient and accurate model of a service, based on which the global service oriented architecture (SOA) can be realized, allowing value add...
Zheng Lu, Aditya Ghose, Peter Hyland, Ying Guan
ACOM
2006
Springer
15 years 5 months ago
Experiments in Selective Overhearing of Hierarchical Organizations
Abstract. Lately, overhearing has gained interest in monitoring multi-agent settings. Previous investigations provided an extensive set of techniques using overhearing. However, mo...
Gery Gutnik, Gal A. Kaminka
« Prev « First page 1682 / 1731 Last » Next »