Sciweavers

1777 search results - page 287 / 356
» Programming Cryptographic Protocols
Sort
View
153
Voted
CAV
2007
Springer
118views Hardware» more  CAV 2007»
15 years 10 months ago
Local Proofs for Global Safety Properties
This paper explores the concept of locality in proofs of global safety properties of asynchronously composed, multi-process programs. Model checking on the full state space is ofte...
Ariel Cohen 0002, Kedar S. Namjoshi
130
Voted
NOMS
2006
IEEE
15 years 10 months ago
System Support for Management of Networked Low-Power Sensors
— This paper addresses the problem of managing a wireless sensor network with mobile managers. The mobile managers should be able to create their connectivity to the nodes they m...
Jai-Jin Lim, Daniel L. Kiskis, Kang G. Shin
APSEC
2005
IEEE
15 years 10 months ago
Call-Ordering Constraints
Several kinds of call-ordering problems have been identified, all of which present subtle difficulties in ensuring the correctness of a sequential program. They include object pro...
Nam Tran, David Abramson, Christine Mingins
154
Voted
AIED
2005
Springer
15 years 10 months ago
Authoring plug-in tutor agents by demonstration: Rapid, rapid tutor development
We combined two existing methods for rapid tutor development: “plug-in tutor agents” [6] and an authoring tool suite (CTAT) that supports the creation of tutors “by demonstra...
Vincent Aleven, Carolyn Penstein Rosé
UM
2005
Springer
15 years 10 months ago
Modeling Agents That Exhibit Variable Performance in a Collaborative Setting
In a collaborative environment, knowledge about collaborators’ skills is an important factor when determining which team members should perform a task. However, this knowledge ma...
Ingrid Zukerman, Christian Guttmann