Sciweavers

1087 search results - page 133 / 218
» Achieving Distributed Control through Model Checking
Sort
View
JNW
2006
120views more  JNW 2006»
13 years 9 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
ATAL
2005
Springer
14 years 2 months ago
Using emergence in participatory simulations to design multi-agent systems
In this paper, we present, through simulations of the coffee market of the state of Veracruz, how emergence of specialized roles in participatory simulations could be used to desi...
Paul Guyot, Alexis Drogoul, Christian Lemaît...
CAV
2000
Springer
97views Hardware» more  CAV 2000»
14 years 1 months ago
Detecting Errors Before Reaching Them
Abstract. Any formalmethodor tool is almostcertainlymoreoftenapplied in situationswheretheoutcomeis failure(acounterexample)rather than success (a correctness proof). We present a ...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...
AGENTS
2001
Springer
14 years 1 months ago
A fuzzy model of reputation in multi-agent systems
Agents are intended to interact in open systems where the knowledge about others (reputation) is incomplete and uncertain. Also, this knowledge about other agents is subjective si...
Javier Carbo Rubiera, José M. Molina L&oacu...
PDCAT
2007
Springer
14 years 3 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen