Recently, opacity has proved to be a promising technique for describing security properties. Much of the work has been couched in terms of Petri nets. Here, we extend the notion of...
Jeremy Bryans, Maciej Koutny, Laurent Mazaré...
In multi-agent systems, agents need to share information in order to make good decisions. Who does what in order to achieve this matters a lot. The assignment of responsibility in...
Tim Harbers, Rajiv T. Maheswaran, Pedro A. Szekely
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Efficient design of social networking applications must take account of two guiding principles: the adaptive processes by which humans learn and spread new information, and the co...
Ali Saidi, Mahesh V. Tripunitara, Mojdeh Mohtashem...
To date the adoption and diffusion of technology enabled solutions to deliver better healthcare has been slow. There are many reasons for this. One of the most significant is that...