This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
In this paper, we consider existing approaches to ontology definition and validation. Popular techniques include the use of domain experts or reliance on formal logic. We consider...
A challenging problem for software engineering practitioners is moving from high-level system architectures produced by system engineers to deployable software produced by softwar...
David Garlan, William K. Reinholtz, Bradley R. Sch...
There is a wide agreement on the use of norms in order to specify the expected behaviour of agents in open MAS. However, in highly regulated domains, where norms dictate what can a...
Abstract. The sub-optimality approximation problem considers an optimization problem O, its optimal solution σ∗ , and a variable x with domain {d1, . . . , dm} and returns appro...