Sciweavers

400 search results - page 60 / 80
» Reasoning About Hidden Mechanisms
Sort
View
118
Voted
KBSE
2005
IEEE
15 years 7 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
ATAL
2005
Springer
15 years 7 months ago
A computationally grounded logic of knowledge, belief and certainty
This paper presents a logic of knowledge, belief and certainty, which allows us to explicitly express the knowledge, belief and certainty of an agent. A computationally grounded m...
Kaile Su, Abdul Sattar, Guido Governatori, Qinglia...
NORMAS
2005
Springer
15 years 7 months ago
A Framework for the Design of Self-Regulation of Open Agent-based Electronic Marketplaces
In this paper, we argue that allowing self-interested agents to activate social institutions during run-time can improve the robustness (i.e., stability, cooperation or fairness) ...
Christian S. Hahn, Bettina Fley, Michael Florian
109
Voted
RWEB
2005
Springer
15 years 7 months ago
Evolution and Reactivity for the Web
Abstract. The Web and the Semantic Web, as we see it, can be understood as a “living organism” combining autonomously evolving data sources, each of them possibly reacting to e...
José Júlio Alferes, Wolfgang May
136
Voted
MM
2004
ACM
114views Multimedia» more  MM 2004»
15 years 7 months ago
ChucK: a programming language for on-the-fly, real-time audio synthesis and multimedia
In this paper, we describe ChucK – a programming language and programming model for writing precisely timed, concurrent audio synthesis and multimedia programs. Precise concurre...
Ge Wang, Perry R. Cook