Sciweavers

400 search results - page 60 / 80
» Reasoning About Hidden Mechanisms
Sort
View
KBSE
2005
IEEE
15 years 3 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
79
Voted
ATAL
2005
Springer
15 years 3 months ago
A computationally grounded logic of knowledge, belief and certainty
This paper presents a logic of knowledge, belief and certainty, which allows us to explicitly express the knowledge, belief and certainty of an agent. A computationally grounded m...
Kaile Su, Abdul Sattar, Guido Governatori, Qinglia...
NORMAS
2005
Springer
15 years 3 months ago
A Framework for the Design of Self-Regulation of Open Agent-based Electronic Marketplaces
In this paper, we argue that allowing self-interested agents to activate social institutions during run-time can improve the robustness (i.e., stability, cooperation or fairness) ...
Christian S. Hahn, Bettina Fley, Michael Florian
RWEB
2005
Springer
15 years 3 months ago
Evolution and Reactivity for the Web
Abstract. The Web and the Semantic Web, as we see it, can be understood as a “living organism” combining autonomously evolving data sources, each of them possibly reacting to e...
José Júlio Alferes, Wolfgang May
MM
2004
ACM
114views Multimedia» more  MM 2004»
15 years 3 months ago
ChucK: a programming language for on-the-fly, real-time audio synthesis and multimedia
In this paper, we describe ChucK – a programming language and programming model for writing precisely timed, concurrent audio synthesis and multimedia programs. Precise concurre...
Ge Wang, Perry R. Cook