-
1
-
-
84943174096
-
Categories of artificial societies
-
Omicini, A., Petta, P., Tolksdorf, R., eds.: Engineering Societies in the Agents World II Springer-Verlag (2001) 1-9 2nd International Workshop (ESAW'01), Prague, Czech Republic, July 7, Revised Papers
-
Davidsson, P.: Categories of artificial societies. In Omicini, A., Petta, P., Tolksdorf, R., eds.: Engineering Societies in the Agents World II. Volume 2203 of Lecture Notes in Artificial Intelligence, Springer-Verlag (2001) 1-9 2nd International Workshop (ESAW'01), Prague, Czech Republic, July 7, 2001, Revised Papers
-
(2001)
Lecture Notes in Artificial Intelligence
, vol.2203
-
-
Davidsson, P.1
-
2
-
-
0036355299
-
Proving properties of open agent systems
-
Castelfranchi, C., Lewis Johnson, W., eds.: Bologna, Italy, ACM Press
-
Guerin, F., Pitt, J.: Proving properties of open agent systems. In Castelfranchi, C., Lewis Johnson, W., eds.: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2002), Part II, Bologna, Italy, ACM Press (2002) 557-558
-
(2002)
Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2002), Part II
, pp. 557-558
-
-
Guerin, F.1
Pitt, J.2
-
3
-
-
84941160092
-
A computational logic model for the description, analysis and verification of global and open societies of heterogeneous computees
-
IST-2001-32530
-
Societies Of ComputeeS (SOCS): a computational logic model for the description, analysis and verification of global and open societies of heterogeneous computees, IST-2001-32530 (2001) Home Page: http://lia.deis.unibo.it/Research/SOCS/
-
(2001)
Home Page
-
-
-
4
-
-
8344240373
-
A social ACL semantics by deontic constraints
-
Mařík, V., Müller, J., Pěchouček, M., eds.: Multi-Agent Systems and Applications III. Proceedings of the 3rd International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2003. Prague, Czech Republic, Springer-Verlag
-
Alberti, M., Ciampolini, A., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: A social ACL semantics by deontic constraints. In Mařík, V., Müller, J., Pěchouček, M., eds.: Multi-Agent Systems and Applications III. Proceedings of the 3rd International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2003. Volume 2691 of Lecture Notes in Artificial Intelligence, Prague, Czech Republic, Springer-Verlag (2003) 204-213
-
(2003)
Lecture Notes in Artificial Intelligence
, vol.2691
, pp. 204-213
-
-
Alberti, M.1
Ciampolini, A.2
Gavanelli, M.3
Lamma, E.4
Mello, P.5
Torroni, P.6
-
5
-
-
18744390835
-
Specification and verification of agent interactions using social integrity constraints
-
Alberti, M., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Specification and verification of agent interactions using social integrity constraints. Electronic Notes in Theoretical Computer Science 85 (2003)
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.85
-
-
Alberti, M.1
Gavanelli, M.2
Lamma, E.3
Mello, P.4
Torroni, P.5
-
6
-
-
51149120869
-
-
The socs protocol repository (2005) Available at http://lia.deis.unibo.it/research/socs/partners/societies/protocols.html
-
(2005)
The Socs Protocol Repository
-
-
-
7
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM 21 (1978) 993-999
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
8
-
-
0342658605
-
Breaking and fixing the Needham-Shroeder public-key protocol using CSP and FDR
-
Margaria, T., Steffen, B., eds.: Tools and Algorithms for the Construction and Analysis of Systems: Second International Workshop, TACAS'96. Springer-Verlag
-
Lowe, G.: Breaking and fixing the Needham-Shroeder public-key protocol using CSP and FDR. In Margaria, T., Steffen, B., eds.: Tools and Algorithms for the Construction and Analysis of Systems: Second International Workshop, TACAS'96. Volume 1055 of Lecture Notes in Artificial Intelligence, Springer-Verlag (1996) 147-166
-
(1996)
Lecture Notes in Artificial Intelligence
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
10
-
-
7444226211
-
An Abductive Interpretation for Open Societies
-
Cappelli, A., Turini, F., eds.: AI*IA 2003: Advances in Artificial Intelligence, Proceedings of the 8th Congress of the Italian Association for Artificial Intelligence, Pisa. Springer-Verlag
-
Alberti, M., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: An Abductive Interpretation for Open Societies. In Cappelli, A., Turini, F., eds.: AI*IA 2003: Advances in Artificial Intelligence, Proceedings of the 8th Congress of the Italian Association for Artificial Intelligence, Pisa. Volume 2829 of Lecture Notes in Artificial Intelligence, Springer-Verlag (2003) 287-299
-
(2003)
Lecture Notes in Artificial Intelligence
, vol.2829
, pp. 287-299
-
-
Alberti, M.1
Gavanelli, M.2
Lamma, E.3
Mello, P.4
Torroni, P.5
-
11
-
-
4243532938
-
Constraint logic programming: A survey
-
Jaffar, J., Maher, M.: Constraint logic programming: a survey. Journal of Logic Programming 19-20 (1994) 503-582
-
(1994)
Journal of Logic Programming
, vol.19-20
, pp. 503-582
-
-
Jaffar, J.1
Maher, M.2
-
12
-
-
77957187070
-
Abductive logic programming
-
Kakas, A.C., Kowalski, R.A., Toni, F.: Abductive Logic Programming. Journal of Logic and Computation 2 (1993) 719-770
-
(1993)
Journal of Logic and Computation
, vol.2
, pp. 719-770
-
-
Kakas, A.C.1
Kowalski, R.A.2
Toni, F.3
-
14
-
-
33646154223
-
The sciff abductive proof-procedure
-
Proceedings of the 9th National Congress on Artificial Intelligence, AI*IA 2005. Springer-Verlag
-
Alberti, M., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: The sciff abductive proof-procedure. In: Proceedings of the 9th National Congress on Artificial Intelligence, AI*IA 2005. Volume 3673 of Lecture Notes in Artificial Intelligence, Springer-Verlag (2005) 135-147
-
(2005)
Lecture Notes in Artificial Intelligence
, vol.3673
, pp. 135-147
-
-
Alberti, M.1
Gavanelli, M.2
Lamma, E.3
Mello, P.4
Torroni, P.5
-
15
-
-
0031281313
-
The IFF proof procedure for abductive logic programming
-
Fung, T.H., Kowalski, R.A.: The IFF proof procedure for abductive logic programming. Journal of Logic Programming 33 (1997) 151-165
-
(1997)
Journal of Logic Programming
, vol.33
, pp. 151-165
-
-
Fung, T.H.1
Kowalski, R.A.2
-
16
-
-
33746649636
-
On the automatic verification of interaction protocols using g-SCIFF
-
University of Bologna (Italy) LIA Series no. 72
-
Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: On the automatic verification of interaction protocols using g-SCIFF. Technical Report DEIS-LIA-04-004, University of Bologna (Italy) (2005) LIA Series no. 72.
-
(2005)
Technical Report
, vol.DEIS-LIA-04-004
-
-
Alberti, M.1
Chesani, F.2
Gavanelli, M.3
Lamma, E.4
Mello, P.5
Torroni, P.6
-
18
-
-
84888249003
-
An abductive approach for analysing event-based requirements specifications
-
Stuckey, P., ed.: Logic Programming, 18th International Conference, ICLP 2002. Berlin Heidelberg, Springer-Verlag
-
Russo, A., Miller, R., Nuseibeh, B., Kramer, J.: An abductive approach for analysing event-based requirements specifications. In Stuckey, P., ed.: Logic Programming, 18th International Conference, ICLP 2002. Volume 2401 of Lecture Notes in Computer Science, Berlin Heidelberg, Springer-Verlag (2002) 22-37
-
(2002)
Lecture Notes in Computer Science
, vol.2401
, pp. 22-37
-
-
Russo, A.1
Miller, R.2
Nuseibeh, B.3
Kramer, J.4
-
19
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
Snekkenes, E., Gollmann, D., eds.: ESORICS. Springer
-
Basin, D.A., Mödersheim, S., Viganò, L.: An on-the-fly model-checker for security protocol analysis. In Snekkenes, E., Gollmann, D., eds.: ESORICS. Volume 2808 of Lecture Notes in Computer Science, Springer (2003) 253-270
-
(2003)
Lecture Notes in Computer Science
, vol.2808
, pp. 253-270
-
-
Basin, D.A.1
Mödersheim, S.2
Viganò, L.3
-
20
-
-
1242332714
-
Automatic verification of cryptographic protocols: A logic programming approach
-
New York, NY, USA, ACM Press
-
Blanchet, B.: Automatic verification of cryptographic protocols: a logic programming approach. In: PPDP '03: Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming, New York, NY, USA, ACM Press (2003) 1-3
-
(2003)
PPDP '03: Proceedings of the 5th ACM SIGPLAN International Conference on Principles and Practice of Declaritive Programming
, pp. 1-3
-
-
Blanchet, B.1
-
21
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. J. ACM 52 (2005) 102-146
-
(2005)
J. ACM
, vol.52
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
23
-
-
22944484456
-
Automatic compilation of protocol insecurity problems into logic programming
-
Alferes, J.J., Leite, J.A., eds.: Logics in Artificial Intelligence, 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004, Proceedings. Springer-Verlag
-
Armando, A., Compagna, L., Lierler, Y.: Automatic compilation of protocol insecurity problems into logic programming. In Alferes, J.J., Leite, J.A., eds.: Logics in Artificial Intelligence, 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004, Proceedings. Volume 3229 of Lecture Notes in Artificial Intelligence, Springer-Verlag (2004) 617-627
-
(2004)
Lecture Notes in Artificial Intelligence
, vol.3229
, pp. 617-627
-
-
Armando, A.1
Compagna, L.2
Lierler, Y.3
-
24
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6 (1998) 85-128
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
26
-
-
84958742278
-
An improved constraint-based system for the verification of security protocols
-
Hermenegildo, M.V., Puebla, G., eds.: Static Analysis, 9th International Symposium, SAS 2002, Madrid, Spain, September 17-20, 2002, Proceedings. Berlin, Germany, Springer
-
Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In Hermenegildo, M.V., Puebla, G., eds.: Static Analysis, 9th International Symposium, SAS 2002, Madrid, Spain, September 17-20, 2002, Proceedings. Volume 2477 of Lecture Notes in Computer Science, Berlin, Germany, Springer (2002) 326-341
-
(2002)
Lecture Notes in Computer Science
, vol.2477
, pp. 326-341
-
-
Corin, R.1
Etalle, S.2
-
27
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
Washington, DC, USA, IEEE Computer Society
-
Song, D.X.: Athena: a new efficient automatic checker for security protocol analysis. In: CSFW '99: Proceedings of the 1999 IEEE Computer Security Foundations Workshop, Washington, DC, USA, IEEE Computer Society (1999) 192
-
(1999)
CSFW '99: Proceedings of the 1999 IEEE Computer Security Foundations Workshop
, pp. 192
-
-
Song, D.X.1
-
29
-
-
0036361523
-
Flexible protocol specification and execution: Applying event calculus planning using commitments
-
Castelfranchi, C., Lewis Johnson, W., eds.: Bologna, Italy, ACM Press
-
Yolum, P., Singh, M.: Flexible protocol specification and execution: applying event calculus planning using commitments. In Castelfranchi, C., Lewis Johnson, W., eds.: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2002), Part II, Bologna, Italy, ACM Press (2002) 527-534
-
(2002)
Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2002), Part II
, pp. 527-534
-
-
Yolum, P.1
Singh, M.2
-
30
-
-
6744240283
-
The design and implementation of an authentication system for the wide area distributed environment
-
Yamaguchi, S., Okayama, K., Miyahara, H.: The design and implementation of an authentication system for the wide area distributed environment. IEICE Transactions on Information and Systems E74 (1991) 3902-3909
-
(1991)
IEICE Transactions on Information and Systems
, vol.E74
, pp. 3902-3909
-
-
Yamaguchi, S.1
Okayama, K.2
Miyahara, H.3
|