Sciweavers

32032 search results - page 132 / 6407
» Verified programming in Guru
Sort
View
143
Voted
CEEMAS
2007
Springer
15 years 10 months ago
Verifying Dominant Strategy Equilibria in Auctions
Future agent mediated eCommerce will involve open systems of agents interoperating between different institutions, where different auction protocols may be in use. We argue that i...
Emmanuel M. Tadjouddine, Frank Guerin
IJNSEC
2008
107views more  IJNSEC 2008»
15 years 4 months ago
Short Designated Verifier Signature Scheme and Its Identity-based Variant
The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
80
Voted
DAC
2004
ACM
16 years 5 months ago
A general decomposition strategy for verifying register renaming
This paper describes a strategy for verifying data-hazard correctness of out-of-order processors that implement register-renaming. We define a set of predicates to characterize re...
Hazem I. Shehata, Mark Aagaard
SEFM
2009
IEEE
15 years 11 months ago
An Automated Approach to Verifying Diagnosability in Multi-agent Systems
—This paper addresses the issue of guaranteeing the correctness of fault diagnosis mechanisms in multi-agent systems. We propose an automated approach to verifying the property o...
Jonathan Ezekiel, Alessio Lomuscio
NCA
2008
IEEE
15 years 11 months ago
On the Application of Formal Methods for Specifying and Verifying Distributed Protocols
In this paper we consider the frameworks of Process Algebra and I/O Automata and we apply both towards the verification of a distributed leader-election protocol. Based on the tw...
Marina Gelastou, Chryssis Georgiou, Anna Philippou