Sciweavers

11214 search results - page 2110 / 2243
» Programming Multi-agent Systems
Sort
View
TLDI
2005
ACM
135views Formal Methods» more  TLDI 2005»
15 years 10 months ago
Types for describing coordinated data structures
Coordinated data structures are sets of (perhaps unbounded) data structures where the nodes of each structure may share types with the corresponding nodes of the other structures....
Michael F. Ringenburg, Dan Grossman
212
Voted
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain
CAV
2005
Springer
173views Hardware» more  CAV 2005»
15 years 10 months ago
Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework
Model checking has proven to be an effective technology for verification and debugging in hardware and more recently in software domains. We believe that recent trends in both th...
Matthew B. Dwyer, John Hatcliff, Matthew Hoosier, ...
ICLP
2005
Springer
15 years 10 months ago
OWL: A Description Logic Based Ontology Language
Abstract Description Logics (DLs) are a family of class (concept) based knowledge representation formalisms. They are characterised by the use of various constructors to build comp...
Ian Horrocks
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 10 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
« Prev « First page 2110 / 2243 Last » Next »