This paper shows how software engineering technologies used to define and analyze complex software systems can also be effective in detecting defects in human-intensive processes ...
Bin Chen, George S. Avrunin, Elizabeth A. Henneman...
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
This paper introduces “micro-scalability” as a novel design objective for social reasoning architectures operating in open multiagent systems. Microscalability is based on the ...
We have used comparative genome analyses to produce annotated maps for large genomic loci. The first example is a locus on mouse chromosome 9 that is syntenic to human chromosome ...
We present the result of our work on use of genetic programming for evolving social behavior of agents situated in inherently cooperative environment. We use predators-prey pursuit...