Sciweavers

866 search results - page 60 / 174
» A Formal Investigation of
Sort
View
ENTCS
2006
145views more  ENTCS 2006»
13 years 10 months ago
A Calculus for Data Mapping
Technologies for overcoming heterogeneities between autonomous data sources are key in the emerging networked world. In this paper we discuss the initial results of a formal inves...
George H. L. Fletcher, Catharine M. Wyss, Edward L...
AI
2005
Springer
13 years 9 months ago
On the logic of cooperation and propositional control
Cooperation logics have recently begun to attract attention within the multi-agent systems community. Using a cooperation logic, it is possible to represent and reason about the s...
Wiebe van der Hoek, Michael Wooldridge
AAAI
2010
13 years 11 months ago
Intentions in Equilibrium
Intentions have been widely studied in AI, both in the context of decision-making within individual agents and in multiagent systems. Work on intentions in multi-agent systems has...
John Grant, Sarit Kraus, Michael Wooldridge
ICASSP
2011
IEEE
13 years 1 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 4 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...