Sciweavers

2291 search results - page 254 / 459
» Representational Reasoning and Verification
Sort
View
COORDINATION
2009
Springer
14 years 11 months ago
Mobility Models and Behavioural Equivalence for Wireless Networks
In protocol development for wireless systems, the choice of appropriate mobility models describing the movement patterns of devices has long been recognised as a crucial factor for...
Jens Chr. Godskesen, Sebastian Nanz
POPL
2005
ACM
14 years 11 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic
POPL
2001
ACM
14 years 11 months ago
Nomadic pict: correct communication infrastructure for mobile computation
This paper addresses the design and verification of infrastructure for mobile computation. In particular, we study language primitives for communication between mobile agents. The...
Asis Unyapoth, Peter Sewell
PRIMA
2009
Springer
14 years 5 months ago
Adaptation and Validation of an Agent Model of Functional State and Performance for Individuals
Human performance can seriously degrade under demanding tasks. To improve performance, agents can reason about the current state of the human, and give the most appropriate and eff...
Fiemke Both, Mark Hoogendoorn, S. Waqar Jaffry, Ri...
RTA
2009
Springer
14 years 5 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...