Sciweavers

529 search results - page 45 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
ATAL
2003
Springer
14 years 28 days ago
A protocol for multi-agent diagnosis with spatially distributed knowledge
In a large distributed system it is often infeasible or even impossible to perform diagnosis using a single model of the whole system. Instead, several spatially distributed local...
Nico Roos, Annette ten Teije, Cees Witteveen
DFG
2004
Springer
13 years 11 months ago
Modeling and Formal Verification of Production Automation Systems
This paper presents the real-time model checker RAVEN and related theoretical background. RAVEN augments the efficiency of traditional symbolic model checking with possibilities to...
Jürgen Ruf, Roland J. Weiss, Thomas Kropf, Wo...
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 9 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
ESORICS
2006
Springer
13 years 11 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
ECAI
2008
Springer
13 years 9 months ago
Coalition Structures in Weighted Voting Games
Abstract. Weighted voting games are a popular model of collaboration in multiagent systems. In such games, each agent has a weight (intuitively corresponding to resources he can co...
Edith Elkind, Georgios Chalkiadakis, Nicholas R. J...