Security communication systems composed of highly reliable components may have few if any failures while undergoing heavy testing or field-usage. This paper combines (i) analysis ...
Model checking by exhaustive state space enumeration is one of the most developed analysis methods for distributed event systems. Its main problem—the size of the state spaces—...
Conversations involving three or more agents often occur in multi-agent systems, for example in brokering and auction protocols typically used in e-commerce. For developing agents ...
This paper describes a simulation system that monitors operations on a production floor, periodically creating a model of those operations, and running a simulation that predicts ...
—In this paper, we discuss interaction interoperability in Collaborative Virtual Environments (CVE), intended to mean the ability of two or more users to cooperate despite the he...
Mario Ciampi, Luigi Gallo, Antonio Coronato, Giuse...