Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Abstract: Group-oriented web information systems (GWISs) are web-based dataintensive systems that are used by a group of people in order to fulfill common tasks. In particular, th...
Klaus-Dieter Schewe, Bernhard Thalheim, Roland Kas...
This paper presents a programmable logic-based agent control system that interleaves planning, plan execution and perception. In this system, a program is a collection of logical f...
Abstract. In this paper we present a logical model of trust in which trust is conceived as an expectation of the truster about some properties of the trustee. A general typology of...
In this paper the tool TELIOS is presented, for the automatic generation of a hardware machine, corresponding to a given logic program. The machine is implemented using an FPGA, wh...
Alexandros C. Dimopoulos, Christos Pavlatos, Georg...