Sciweavers

592 search results - page 69 / 119
» Can Component Service-Based Systems Be Proved Correct
Sort
View
ESORICS
2000
Springer
13 years 11 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
DAGSTUHL
2003
13 years 9 months ago
Coordinating Agents in OO
In this paper we introduce an object-oriented coordination language for multi-agents systems. The beliefs and reasoning capabilities ent are specified in terms of a corresponding ...
Frank S. de Boer, Cees Pierik, Rogier M. van Eijk,...
AIPS
2009
13 years 8 months ago
Suboptimal and Anytime Heuristic Search on Multi-Core Machines
In order to scale with modern processors, planning algorithms must become multi-threaded. In this paper, we present parallel shared-memory algorithms for two problems that underli...
Ethan Burns, Seth Lemons, Wheeler Ruml, Rong Zhou
CONCUR
2010
Springer
13 years 8 months ago
Kleene, Rabin, and Scott Are Available
We are concerned with the availability of systems, defined as the ratio between time of correct functioning and uptime. We propose to model guaranteed availability in terms of regu...
Jochen Hoenicke, Roland Meyer, Ernst-Rüdiger ...
ENTCS
2008
116views more  ENTCS 2008»
13 years 7 months ago
Computational Origami Construction as Constraint Solving and Rewriting
Computational origami is the computer assisted study of mathematical and computational aspects of origami. An origami is constructed by a finite sequence of fold steps, each consi...
Tetsuo Ida, Mircea Marin, Hidekazu Takahashi, Fado...