Sciweavers

220 search results - page 14 / 44
» Logic-Based Agent Verification
Sort
View
CADE
2007
Springer
14 years 10 months ago
Combining Deduction and Algebraic Constraints for Hybrid System Analysis
We show how theorem proving and methods for handling real algebraic constraints can be combined for hybrid system verification. In particular, we highlight the interaction of deduc...
André Platzer
ENTCS
2008
110views more  ENTCS 2008»
13 years 10 months ago
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has b...
Pieter Ceelen, Sjouke Mauw, Sasa Radomirovic
ER
2004
Springer
139views Database» more  ER 2004»
14 years 3 months ago
A Sociological Framework for Multi-agent Systems Validation and Verification
Social and intentional behaviours appear as two main components of the agent paradigm. Methods of conventional software engineering do not seem to be appropriate to gain a full kno...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
ICSE
2008
IEEE-ACM
14 years 10 months ago
A verification system for timed interval calculus
Timed Interval Calculus (TIC) is a highly expressive set-based notation for specifying and reasoning about embedded real-time systems. However, it lacks mechanical proving support...
Chunqing Chen, Jin Song Dong, Jun Sun 0001
JAISE
2010
88views Algorithms» more  JAISE 2010»
13 years 4 months ago
Improving user verification by implementing an agent-based security system
Abstract. This paper presents an agent-based, high-level security system for user verification. The system verifies a user's identity by processing data from several low-lever...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...