Sciweavers

2979 search results - page 342 / 596
» Modelling secure multiagent systems
Sort
View
133
Voted
KESAMSTA
2010
Springer
15 years 2 months ago
Trust Estimation Using Contextual Fitness
Trust estimation is an essential process in several multi-agent systems domains. Although it is generally accepted that trust is situational, the majority of the Computational Trus...
Joana Urbano, Ana Paula Rocha, Eugénio C. O...
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
15 years 9 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
151
Voted
MABS
2005
Springer
15 years 10 months ago
Automatic Tuning of Agent-Based Models Using Genetic Algorithms
When developping multi-agent systems (MAS) or models in the context of agent-based simulation (ABS), the tuning of the model constitutes a crucial step of the design process. Inde...
Benoît Calvez, Guillaume Hutzler
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
15 years 9 months ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...
JUCS
2008
113views more  JUCS 2008»
15 years 4 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella