Sciweavers

2558 search results - page 295 / 512
» Model Composition Contracts
Sort
View
CCS
2001
ACM
15 years 9 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
CA
1997
IEEE
15 years 9 months ago
Layered Modular Action Control for Communicative Humanoids
Face-to-face interaction between people is generally effortless and effective. We exchange glances, take turns speaking and make facial and manual gestures to achieve the goals of ...
Kristinn R. Thórisson
147
Voted
ACMACE
2009
ACM
15 years 9 months ago
Music box: composing and performing visual music
Music Box is an artistic implementation of emergent behavior and its use to create music. Music Box employs Craig Reynold's flocking algorithm to display animated notes that ...
Lindsay Grace
ATAL
2008
Springer
15 years 7 months ago
Exploiting organisational information for service coordination in multiagent systems
Service-Oriented Computing and Agent Technology are nowadays two of the most active research fields in distributed and open systems. However, when trying to bridge the two worlds,...
Alberto Fernández, Sascha Ossowski
ENTCS
2008
110views more  ENTCS 2008»
15 years 5 months ago
Game-Based Probabilistic Predicate Abstraction in PRISM
ion in PRISM1 Mark Kattenbelt Marta Kwiatkowska Gethin Norman David Parker Oxford University Computing Laboratory, Oxford, UK Modelling and verification of systems such as communi...
Mark Kattenbelt, Marta Z. Kwiatkowska, Gethin Norm...