Sciweavers

4305 search results - page 260 / 861
» Analysing Protocol Implementations
Sort
View
AIL
2005
90views more  AIL 2005»
13 years 9 months ago
Towards a multi-agent system for regulated information exchange in crime investigations
This paper outlines a multi-agent architecture for regulated information exchange of crime investigation data between police forces. Interactions between police officers about info...
Pieter Dijkstra, Floris Bex, Henry Prakken, Kees d...
IJNVO
2007
111views more  IJNVO 2007»
13 years 9 months ago
Virtual enterprise formation and partner selection: an analysis using case studies
: A Virtual Enterprise (VE) can be described as an organisational form that emerges when individual entities form a team of partners to achieve a specific goal. The ability to asse...
Sobah Abbas Petersen
BMCBI
2005
63views more  BMCBI 2005»
13 years 9 months ago
Communication and re-use of chemical information in bioscience
The current methods of publishing chemical information in bioscience articles are analysed. Using 3 papers as use-cases, it is shown that conventional methods using human procedur...
Peter Murray-Rust, John B. O. Mitchell, Henry S. R...
FORMATS
2010
Springer
13 years 7 months ago
A Framework for Verification of Software with Time and Probabilities
Abstract. Quantitative verification techniques are able to establish system properties such as "the probability of an airbag failing to deploy on demand" or "the exp...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
PERCOM
2005
ACM
14 years 9 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...