Sciweavers

2024 search results - page 228 / 405
» A Formal Model of Multi-agent Computations
Sort
View
CONCUR
2012
Springer
13 years 6 months ago
Avoiding Shared Clocks in Networks of Timed Automata
Networks of timed automata (NTA) are widely used to model distributed real-time systems. Quite often in the literature, the automata are allowed to share clocks. This is a problem ...
Sandie Balaguer, Thomas Chatain
OTM
2007
Springer
15 years 10 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
DSOM
2005
Springer
15 years 9 months ago
Ontology-Based Integration of Management Behaviour and Information Definitions Using SWRL and OWL
Current network management architectures are using different models to define management information objects. These definitions actually also include, in a non-formal way, the defi...
Antonio Guerrero, Víctor A. Villagrá...
POLICY
2004
Springer
15 years 9 months ago
A Goal-based Approach to Policy Refinement
As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods for performing analysis and refinement of p...
Arosha K. Bandara, Emil Lupu, Jonathan D. Moffett,...
SIGSOFT
1998
ACM
15 years 8 months ago
Reasoning about Implicit Invocation
Implicit invocation SN92, GN91] has become an important architectural style for large-scale system design and evolution. This paper addresses the lack of speci cation and veri cat...
David Garlan, Somesh Jha, David Notkin