Sciweavers

1777 search results - page 287 / 356
» Programming Cryptographic Protocols
Sort
View
CAV
2007
Springer
118views Hardware» more  CAV 2007»
14 years 2 months ago
Local Proofs for Global Safety Properties
This paper explores the concept of locality in proofs of global safety properties of asynchronously composed, multi-process programs. Model checking on the full state space is ofte...
Ariel Cohen 0002, Kedar S. Namjoshi
NOMS
2006
IEEE
14 years 2 months ago
System Support for Management of Networked Low-Power Sensors
— This paper addresses the problem of managing a wireless sensor network with mobile managers. The mobile managers should be able to create their connectivity to the nodes they m...
Jai-Jin Lim, Daniel L. Kiskis, Kang G. Shin
APSEC
2005
IEEE
14 years 2 months ago
Call-Ordering Constraints
Several kinds of call-ordering problems have been identified, all of which present subtle difficulties in ensuring the correctness of a sequential program. They include object pro...
Nam Tran, David Abramson, Christine Mingins
AIED
2005
Springer
14 years 2 months ago
Authoring plug-in tutor agents by demonstration: Rapid, rapid tutor development
We combined two existing methods for rapid tutor development: “plug-in tutor agents” [6] and an authoring tool suite (CTAT) that supports the creation of tutors “by demonstra...
Vincent Aleven, Carolyn Penstein Rosé
UM
2005
Springer
14 years 2 months ago
Modeling Agents That Exhibit Variable Performance in a Collaborative Setting
In a collaborative environment, knowledge about collaborators’ skills is an important factor when determining which team members should perform a task. However, this knowledge ma...
Ingrid Zukerman, Christian Guttmann