Sciweavers

2514 search results - page 23 / 503
» The use of industrial-strength formal methods
Sort
View
122
Voted
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 8 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
AAMAS
2004
Springer
15 years 1 months ago
Temporal Development Methods for Agent-Based
In this paper we overview one specific approach to the formal development of multi-agent systems. This approach is based on the use of temporal logics to represent both the behavio...
Michael Fisher
104
Voted
ISQED
2003
IEEE
113views Hardware» more  ISQED 2003»
15 years 7 months ago
Using Integer Equations for High Level Formal Verification Property Checking
This paper describes the use of integer equations for high level modeling digital circuits for application of formal verification properties at this level. Most formal verificatio...
Bijan Alizadeh, Mohammad Reza Kakoee
CLA
2004
15 years 3 months ago
Using Concept Formal Analysis for Cooperative Information Retrieval
cessary to abstract it and eliminate the redundancy data. In this context, a method for data reduction based on the formal concept analysis is proposed in [16,17]. At the same time...
Ibtissem Nafkha, Samir Elloumi, Ali Jaoua
175
Voted
ISEMANTICS
2010
14 years 8 months ago
Towards the formalization of interaction semantics
With the advent of Web 2.0 and the emergence of improved technologies to enhance UI, the importance of user experience and intuitiveness of Web interfaces led to the growth and su...
Irene Celino, Francesco Corcoglioniti