Sciweavers

1059 search results - page 88 / 212
» Modeling Security Protocols as Games
Sort
View
AI
2001
Springer
15 years 5 months ago
Knowledge and Planning in an Action-Based Multi-agent Framework: A Case Study
The situation calculus is a logical formalism that has been extensively developed for planning. We apply the formalism in a complex multi-agent domain, modelled on the game of Clue...
Bradley Bart, James P. Delgrande, Oliver Schulte
124
Voted
IANDC
2007
152views more  IANDC 2007»
15 years 12 days ago
The reactive simulatability (RSIM) framework for asynchronous systems
We define reactive simulatability for general asynchronous systems. Roughly, simulatability means that a real system implements an ideal system (specification) in a way that pre...
Michael Backes, Birgit Pfitzmann, Michael Waidner
86
Voted
EOR
2007
104views more  EOR 2007»
15 years 12 days ago
Optimal resource allocation for security in reliability systems
Recent results have used game theory to explore the nature of optimal investments in the security of simple series and parallel systems. However, it is clearly important in practi...
M. Naceur Azaiez, Vicki M. Bier
ICDE
2009
IEEE
121views Database» more  ICDE 2009»
15 years 7 months ago
Scalability for Virtual Worlds
— Networked virtual environments (net-VEs) are the next wave of digital entertainment, with Massively Multiplayer Online Games (MMOs) a very popular instance. Current MMO archite...
Nitin Gupta 0003, Alan J. Demers, Johannes Gehrke,...
137
Voted
I3E
2001
196views Business» more  I3E 2001»
15 years 1 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel