Sciweavers

4693 search results - page 72 / 939
» Verifying Hybrid Systems
Sort
View
137
Voted
CSFW
1995
IEEE
15 years 4 months ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe
ICWS
2008
IEEE
15 years 2 months ago
A Framework for Verifying SLA Compliance in Composed Services
Service level agreements (SLAs) impose many nonfunctional requirements on services. Business analysts specify and check these requirements in business process models using tools s...
Hua Xiao, Brian Chan, Ying Zou, Jay W. Benayon, Bi...
138
Voted
AAMAS
1999
Springer
15 years 8 days ago
Verifying Compliance with Commitment Protocols
Interaction protocols are specific, often standard, constraints on the behaviors of autonomous agents in a multiagent system. Protocols are essential to the functioning of open sys...
Mahadevan Venkatraman, Munindar P. Singh
83
Voted
JCP
2008
103views more  JCP 2008»
15 years 17 days ago
Weighted Clustering and Evolutionary Analysis of Hybrid Attributes Data Streams
It presents some definitions of projected cluster and projected cluster group on hybrid attributes after having given some definitions on ordered attributes and sorted attributes t...
Xinquan Chen
WWW
2009
ACM
16 years 1 months ago
Blog credibility ranking by exploiting verified content
People use weblogs to express thoughts, present ideas and share knowledge. However, weblogs can also be misused to influence and manipulate the readers. Therefore the credibility ...
Andreas Juffinger, Michael Granitzer, Elisabeth Le...