Sciweavers

3330 search results - page 451 / 666
» software 2010
Sort
View
133
Voted
ATAL
2010
Springer
15 years 6 months ago
Model checking detectability of attacks in multiagent systems
Information security is vital to many multiagent system applications. In this paper we formalise the notion of detectability of attacks in a MAS setting and analyse its applicabil...
Ioana Boureanu, Mika Cohen, Alessio Lomuscio
ATAL
2010
Springer
15 years 6 months ago
Strategic planning for probabilistic games with incomplete information
Alternating-time Temporal Logic (ATL) [1] is used to reason about strategic abilities of agents. Aiming at strategies that can realistically be implemented in software, many varia...
Henning Schnoor
168
Voted
BIRTHDAY
2010
Springer
15 years 6 months ago
Counterexample Guided Path Reduction for Static Program Analysis
Abstract. In this work we introduce counterexample guided path reduction based on interval constraint solving for static program analysis. The aim of this technique is to reduce th...
Ansgar Fehnker, Ralf Huuck, Sean Seefried
CEC
2010
IEEE
15 years 6 months ago
The 2009 Mario AI Competition
Abstract-- This paper describes the 2009 Mario AI Competition, which was run in association with the IEEE Games Innovation Conference and the IEEE Symposium on Computational Intell...
Julian Togelius, Sergey Karakovskiy, Robin Baumgar...
126
Voted
CHES
2010
Springer
172views Cryptology» more  CHES 2010»
15 years 6 months ago
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described tha...
Jean-Sébastien Coron, Ilya Kizhvatov