Sciweavers

5255 search results - page 956 / 1051
» Formal Methods for Privacy
Sort
View
AAAI
1994
13 years 11 months ago
Case-Based Acquisition of User Preferences for Solution Improvement in Ill-Structured Domains
1 We have developed an approach to acquire complicated user optimization criteria and use them to guide iterative solution improvement. The eectiveness of the approach was tested ...
Katia P. Sycara, Kazuo Miyashita
DIMACS
1996
13 years 11 months ago
Model Checking and the Mu-calculus
There is a growing recognition of the need to apply formal mathematical methods in the design of \high con dence" computing systems. Such systems operate in safety critical co...
E. Allen Emerson
CASCON
1992
134views Education» more  CASCON 1992»
13 years 11 months ago
Cluster busting in anchored graph drawing
Given a graph G and a drawing or layout of G, it is sometimes desirable to alter or adjust the layout. The challenging aspect of designing layout adjustment algorithms is to maint...
Kelly A. Lyons
ATAL
2008
Springer
13 years 11 months ago
Anchoring institutions in agents' attitudes: towards a logical framework for autonomous multi-agent systems
The aim of this paper is to provide a logical framework for the specification of autonomous Multi-Agent Systems (MAS). A MAS is autonomous in so far as it is capable of binding (...
Benoit Gaudou, Dominique Longin, Emiliano Lorini, ...
ATAL
2010
Springer
13 years 11 months ago
Reasoning about strategies of multi-agent programs
Verification of multi-agent programs is a key problem in agent research and development. This paper focuses on multi-agent programs that consist of a finite set of BDI-based agent...
Mehdi Dastani, Wojciech Jamroga