Sciweavers

1833 search results - page 5 / 367
» Mechanized Verification with Sharing
Sort
View
ESA
2008
Springer
124views Algorithms» more  ESA 2008»
13 years 9 months ago
Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions
A truthful mechanism consists of an algorithm augmented with a suitable payment function which guarantees that the "players" cannot improve their utilities by "chea...
Paolo Penna, Carmine Ventre
ACMICEC
2006
ACM
111views ECommerce» more  ACMICEC 2006»
13 years 11 months ago
Passive verification of the strategyproofness of mechanisms in open environments
Consider an open infrastructure in which anyone can deploy mechanisms to support automated decision making and coordination amongst self-interested computational agents. Strategyp...
Laura Kang, David C. Parkes
ISCAPDCS
2004
13 years 8 months ago
Decentralized and Hierarchical Discovery of Software Applications in the iShare Internet Sharing System
We present the design and evaluation of a fully decentralized software application discovery scheme
Xiaojuan Ren, Zhelong Pan, Rudolf Eigenmann, Y. Ch...
CSL
2004
Springer
13 years 11 months ago
Towards Mechanized Program Verification with Separation Logic
Using separation logic, this paper presents three Hoare logics (corresponding to different notions of correctness) for the simple While language extended with commands for heap acc...
Tjark Weber
FMSD
2006
103views more  FMSD 2006»
13 years 7 months ago
Cones and foci: A mechanical framework for protocol verification
We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between ...
Wan Fokkink, Jun Pang, Jaco van de Pol