An agent who bases his actions upon explicit logical formulae has at any given point in time a finite set of formulae he has computed. Closure or consistency conditions on this se...
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Biological systems have recently been shown to share many of the properties of reactive systems. This observation has led to the idea of using methods devised for the construction ...
Jasmin Fisher, David Harel, E. Jane Albert Hubbard...
Because of the ever-increasing popularity of the Internet, network monitoring becomes very mission critical to guarantee the operation of IP networks, e.g. to detect network failur...
Jan Coppens, Stijn De Smet, Steven Van den Berghe,...
The use of CAD in design makes it possible to represent complex components “as manufactured” with a great number of details. A transformation of such models into Finite Elemen...
Gilles Foucault, Philippe M. Marin, Jean-Claude L&...