Sciweavers

5792 search results - page 173 / 1159
» Communicating With Multiple Agents
Sort
View
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 10 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 10 months ago
Best Node Selection through Distributed Fast Variable Power Multiple Access
In many wireless applications, it is highly desirable to have a fast mechanism to resolve or select the packet from the user with the highest priority. Furthermore, individual pri...
Raymond Yim, Neelesh B. Mehta, Andreas F. Molisch
122
Voted
ISQED
2010
IEEE
133views Hardware» more  ISQED 2010»
15 years 2 months ago
UC-PHOTON: A novel hybrid photonic network-on-chip for multiple use-case applications
Multiple use-case chip multiprocessor (CMP) applications require adaptive on-chip communication fabrics to cope with changing use-case performance needs. Networks-on-chip (NoC) ha...
Shirish Bahirat, Sudeep Pasricha
140
Voted
DALT
2004
Springer
15 years 9 months ago
Model Checking Agent Dialogues
In this paper we address the challenges associated with the verification of correctness of communication between agents in MultiAgent Systems. Our approach applies model-checking ...
Christopher D. Walton
125
Voted
IVEVA
2004
15 years 5 months ago
Interaction Modeling with Artificial Life Agents
In this work, an interaction model between artificial life agents (creatures) is proposed, which allows studying emergent social behavior of agents. This model describes the enviro...
Ernesto Germán-Soto, Leonid Sheremetov, Chr...