Sciweavers

372 search results - page 17 / 75
» Model Checking Commitment Protocols
Sort
View
TYPES
1993
Springer
14 years 23 days ago
Proof-Checking a Data Link Protocol
Abstract. A data link protocol developed and used by Philips Electronics is modeled and veri ed using I/O automata theory. Correctness is computer-checked with the Coq proof develo...
Leen Helmink, M. P. A. Sellink, Frits W. Vaandrage...
SAC
2003
ACM
14 years 1 months ago
A Dynamic Data/Currency Protocol for Mobile Database Design and Reconfiguration
This paper presents flexible protocols for dynamic database design and reconfiguration, enabling mobile database to be designed in such a way that data location, replication and e...
Yanli Xia, Abdelsalam Helal
EUROCRYPT
1999
Springer
14 years 1 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
CLIMA
2004
13 years 10 months ago
A Computational Model for Conversation Policies for Agent Communication
In this paper we propose a formal specification of a persuasion protocol between autonomous agents using an approach based on social commitments and arguments. In order to be flexi...
Jamal Bentahar, Bernard Moulin, John-Jules Ch. Mey...
ATAL
2006
Springer
14 years 13 days ago
Specifying and resolving preferences among agent interaction patterns
A strength of commitment protocols is that they enable agents to act flexibly, thereby enabling them to accommodate varying local policies and respond to exceptions. A consequent ...
Ashok U. Mallya, Munindar P. Singh