Sciweavers

2651 search results - page 516 / 531
» Beliefs in Agent Implementation
Sort
View
PDPTA
2010
13 years 5 months ago
Morphing Parallelization Strategy to Support On-the-Fly Video Analysis
To automate and accelerate Internet video search, we propose a parallelized on-the-fly video analysis that is distinguished from the conventional approaches in the following two f...
Munehiro Fukuda, Shuichi Kurabayashi, Jeremy K. Ha...
ICTAC
2009
Springer
13 years 5 months ago
Automatic Conflict Detection on Contracts
Abstract. Many software applications are based on collaborating, yet competing, agents or virtual organisations exchanging services. Contracts, expressing obligations, permissions ...
Stephen Fenech, Gordon J. Pace, Gerardo Schneider
CORR
2010
Springer
178views Education» more  CORR 2010»
13 years 5 months ago
Adaptive Algorithms for Coverage Control and Space Partitioning in Mobile Robotic Networks
We consider deployment problems where a mobile robotic network must optimize its configuration in a distributed way in order to minimize a steady-state cost function that depends ...
Jerome Le Ny, George J. Pappas
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 2 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
MOBILIGHT
2010
13 years 2 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...