Sciweavers

237 search results - page 27 / 48
» Constraint Processing with Reactive Agents
Sort
View
LPAR
2007
Springer
14 years 2 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
AAAI
2012
11 years 11 months ago
A Spin-Glass Model for Semi-Supervised Community Detection
Current modularity-based community detection methods show decreased performance as relational networks become increasingly noisy. These methods also yield a large number of divers...
Eric Eaton, Rachael Mansbach
ATAL
2009
Springer
13 years 9 months ago
Building Multi-Agent Systems for Workflow Enactment and Exception Handling
Abstract. Workflows represent the coordination requirements of various distributed operations in an organisation; workflows neatly capture business processes, and are particularly ...
Joey Sik Chun Lam, Frank Guerin, Wamberto Weber Va...
ATAL
2005
Springer
14 years 2 months ago
Formalizing and achieving multiparty agreements via commitments
Multiparty agreements often arise in a multiagent system where autonomous agents interact with each other to achieve a global goal. Multiparty agreements are traditionally represe...
Feng Wan, Munindar P. Singh
ATAL
2009
Springer
14 years 3 months ago
Maintenance-based trust for multi-agent systems
In last years, trust and reputation has been gaining increasing interest in multi-agent systems (MAS). To address this issue, we propose in this paper a maintenance-based trust me...
Babak Khosravifar, Maziar Gomrokchi, Jamal Bentaha...