Sciweavers

1540 search results - page 214 / 308
» Deceptive agents and language
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Algebraic Properties in Alice and Bob Notation
—Alice and Bob notation is a popular way to describe security protocols: it is intuitive, succinct, and yet expressive. Several formal protocol specification languages are based...
Sebastian Mödersheim
CLIMA
2007
13 years 9 months ago
Actions with Failures in Interval Temporal Logic
Abstract. Failures are unavoidable in many circumstances. For example, an agent may fail at some point to perform a task in a dynamic environment. Robust systems typically have mec...
Arjen Hommersom, Peter J. F. Lucas
GW
2009
Springer
151views Biometrics» more  GW 2009»
13 years 5 months ago
Towards Interactive Web-Based Virtual Signers: First Step, a Platform for Experimentation Design
In this paper, we present a Web-based framework for interactive Sign Language using virtual signing agents. The main feature of this framework is that it is a full DOM-Integrated a...
Jean-Paul Sansonnet, Annelies Braffort, Cyril Verr...
EJC
2008
13 years 9 months ago
Center Fragments for Upscaling and Verification in Database Semantics
The notion of a fragment was coined by Montague 1974 to illustrate the formal handling of certain puzzles, such as de dicto/de re, in a truth-conditional semantics for natural lan...
Roland Hausser
ICTAI
2009
IEEE
14 years 2 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu