Filters








223,289 Hits in 5.2 sec

An AUML State Machine Based Method for Multi-agent Systems Model Checking [chapter]

Dapeng Zhang, Xiang Ji, Xinsheng Wang
2014 IFIP Advances in Information and Communication Technology  
Then a method for the conversion from AUML state machine formal description to ISPL language is proposed. Finally a simulation is accomplished with the conversion tool AUML2ISPL.  ...  This paper firstly proposes a Multi-agent System Model Checking Framework, which is based on AUML (Agent Unified Modeling Language) state machine model and temporal logics of knowledge and provides a method  ...  Finally we propose a conversion algorithm between AUML state machine and ISPL language. The description of protocol is represent by protocol functions: protdef::= Protocol : protdeflist.  ... 
doi:10.1007/978-3-662-44980-6_12 fatcat:qe6c6mnmgndujf2aqyu5gaculy

Modelling and visualizing agent conversations

Marisuz Nowostawski, Martin Purvis, Stephen Cranefield
2001 Proceedings of the fifth international conference on Autonomous agents - AGENTS '01  
With this method it is possible (a) to capture the concurrent characteristics of a conversation, (b) to capture the state of a complex conversation during runtime, and (c) to reuse a given conversation  ...  The approach described in this paper can be used both to define simple conversation protocols and to define protocols for more complex conversations composed of a number of simpler conversations.  ...  We will continue the development of software tools supporting the proposed modelling technique, and in particular the development of a graphical representation and visualizer for debugging and monitoring  ... 
doi:10.1145/375735.376297 dblp:conf/agents/NowostawskiPC01 fatcat:u2365pikvbggpbcjp4miwnqkry

Synthesis of communications protocol converters using the timed Petri net model

Mansour Jaragh, Kassem Saleh
1999 Journal of Systems and Software  
Moreover, a reliable converter must perform its conversion functions in a timely manner satisfying the timing constraints of both protocol architectures.  ...  Most existing converter design methods are based on the communicating ®nite state machine (CFSM) model as the formal description technique to describe the protocols, their services and the converter design  ...  The need for developing formal methods for protocol converter design was ®rst pointed by Green (1986) .  ... 
doi:10.1016/s0164-1212(99)00024-2 fatcat:3a4szigqtzgkljyq5ywbxt7wru

A Computational Model for Conversation Policies for Agent Communication [chapter]

Jamal Bentahar, Bernard Moulin, John-Jules Ch. Meyer, Brahim Chaib-draa
2005 Lecture Notes in Computer Science  
In order to be flexible, this protocol is defined as a combination of a set of conversation policies. These policies are formalized as a set of dialogue games.  ...  In this paper we propose a formal specification of a persuasion protocol between autonomous agents using an approach based on social commitments and arguments.  ...  We'd also like to thank Rance Cleaveland and Girish Bhat for their interesting explanations on the tableau method.  ... 
doi:10.1007/11533092_11 fatcat:pobimqo2v5f7tduyyqlzyazveu

ACS: Automatic Converter Synthesis for SoC Bus Protocols [chapter]

Karin Avnit, Arcot Sowmya, Jorgen Peddersen
2010 Lecture Notes in Computer Science  
It is based on formal foundations and guarantees correct-byconstruction deterministic solutions in VHDL, whenever it is physically possible to mediate between a given pair of protocols.  ...  In the absence of a single interface standard for such modules, "plug-n-play style" integration is not likely, as the modules are often designed to comply with different interface protocols, and a protocol  ...  The methods rely on a dedicated FSM-based formalism and formal definitions of protocol compatibility and correct protocol conversion [1, 2, 3] , and the derived algorithm for automatic converter synthesis  ... 
doi:10.1007/978-3-642-12002-2_28 fatcat:tcmieyq5dzgvtnxp7pwjk3xple

Open protocol design for complex interactions in multi-agent systems

Hamza Mazouzi, Amal El Fallah Seghrouchni, Serge Haddad
2002 Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 2 - AAMAS '02  
This paper proposes a generic approach for protocol engineering through the analysis, the specification, and the verification of such protocols when several agents are involved.  ...  This approach is three folds: 1) Starting from semi-formal specification by means of Protocol Diagrams (AUML), both formal specification of interaction protocols and their verification are allowed thanks  ...  A method requires: a label, a list of formal parameters to be linked when the method is executed, a set of Pre-conditions (i.e. necessary conditions of the method execution), and a set of Post-conditions  ... 
doi:10.1145/544865.544866 fatcat:eyrzmtjptzgmzntvjem3mmjrvy

Open protocol design for complex interactions in multi-agent systems

Hamza Mazouzi, Amal El Fallah Seghrouchni, Serge Haddad
2002 Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 2 - AAMAS '02  
This paper proposes a generic approach for protocol engineering through the analysis, the specification, and the verification of such protocols when several agents are involved.  ...  This approach is three folds: 1) Starting from semi-formal specification by means of Protocol Diagrams (AUML), both formal specification of interaction protocols and their verification are allowed thanks  ...  A method requires: a label, a list of formal parameters to be linked when the method is executed, a set of Pre-conditions (i.e. necessary conditions of the method execution), and a set of Post-conditions  ... 
doi:10.1145/544862.544866 dblp:conf/atal/MazouziFH02 fatcat:cz57ha4mkrf33eggmthk6hg36q

Formalization and Verification of a Mail Server in Coq [chapter]

Reynald Affeldt, Naoki Kobayashi
2003 Lecture Notes in Computer Science  
This paper reports on the formalization and verification of a mail server (SMTP server) in Coq.  ...  We have verified a part of a mail server written in Java, by manually translating the Java program into a Coq function as faithfully as possible, and verifying properties of the Coq function.  ...  Correctness of the security protocols are proved in a formal manner. 3.  ... 
doi:10.1007/3-540-36532-x_14 fatcat:5vrjwxsgdjbzdhysu2bcbb7nae

Editorial

Marco Carbone, Thomas Hildebrandt, Joachim Parrow, Matthias Weidlich
2016 Formal Aspects of Computing  
Large software systems become more and more communication-centered and formal methods play a key role in the design and analysis of them.  ...  the Abstract State Machines (ASM) formal method and model refinement.  ...  Dynamic Role Authorization in Multiparty Conversations by Silvia Ghilezan, Svetlana Jaksic, Jovanka Pantovic, Jorge A.  ... 
doi:10.1007/s00165-016-0386-y fatcat:3qjtv2q7wnbn5iss5uyyqfhpcy

Verifying the Conformance of Web Services to Global Interaction Protocols: A First Step [chapter]

M. Baldoni, C. Baroglio, A. Martelli, V. Patti, C. Schifanella
2005 Lecture Notes in Computer Science  
actually interoperate by producing a legal conversation.  ...  This work proposes an approach to the verification of a priori conformance of a business process to a protocol, which is based on the theory of formal languages and guarantees the interoperability of peers  ...  Concerning BPEL4WS, some proposal of a formal semantics exists and the proposed formal methods derive from formal models for concurrency and coordination of distributed systems (e.g. process algebras)  ... 
doi:10.1007/11549970_19 fatcat:euticfys2rggxgaisul7q6gjyq

INDUCTION METHODS PARADOXICALITY

E.E. VITYAEV, V.F. NOVIKOV
1989 International journal of pattern recognition and artificial intelligence  
a It is natural that the efficiency condition requires that T 0 , pr 0 should be defined effectively as well. a It is natural that the efficiency condition requires that T 0 , pr 0 should be defined effectively  ...  Let Φ be such class of homomorphisms.F-conversion of an observation protocol pr is a protocol F(pr); F-conversion of a permissible set of observation results is a permissible set F(T) (homomorphism preserves  ...  A formal induction method is the following effective mapping ind f :T 1 = ind f (T 0, pr 0 ) a , where pr 0 is a protocol,The induction method f if the following mapping f Obs , pr 0 = Obs(A), A is a set  ... 
doi:10.1142/s0218001489000139 fatcat:5y3gjzlro5chphbvenzk7zofpm

APN Model for Specification of the Communication Protocols in Multi-Agent System

Marzougui Borhen, Kamel Barkaoui, NejibBen Hadj Alouane
2013 Journal of Software Engineering and Applications  
Indeed, an agent approach requires a powerful and expressive formalism that allows him to model the behavior of a set of agents that interact.  ...  We are modeling some variants of FIPA standard protocols. Our Models are found based on communicating cognitive agents.  ...  This formal method can verify correctly the interaction between them by specifying the messages exchanged during the conversation and during interaction.  ... 
doi:10.4236/jsea.2013.69a002 fatcat:j7s2p7zjm5aerbq7xlzdrbqtxi

Monitoring large-scale multi-agent systems using overhearing

Gery Gutnik
2005 Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems - AAMAS '05  
Monitoring by overhearing [3] has been found to provide a powerful monitoring approach particularly suited for open distributed MAS settings.  ...  In my research, I attempt to provide a comprehensive theoretical model for overhearing and then, based on this model, to systematically cover various aspects related to overhearing.  ...  Thus, modelling multi-agent interaction protocols is an important aspect of MAS applications. Various formalisms have been proposed to model multi-agent interaction protocols.  ... 
doi:10.1145/1082473.1082785 dblp:conf/atal/Gutnik05 fatcat:oizkjokmafgwpokjooxw4ocecy

Model Oriented Approach for Industrial Software Development

P. D. Drobintsev, V. P. Kotlyarov, N. V. Voinov, I. V. Nikiforov
2016 Modelirovanie i Analiz Informacionnyh Sistem  
The results of applying the proposed method in the industrial technology are shown. The article is published in the authors' wording.  ...  Also the grammar of a language for specifying rules of abstract model data structures transformation into real system detailed data structures is described.  ...  This means that a communication protocol can be represented by only one signal on the abstract level while in the real code this protocol can be specified by a set of incoming and outgoing signals.  ... 
doi:10.18255/1818-1015-2015-6-750-762 fatcat:c7gvgqade5ca5oqmv4jpdjt3lq

The Java SPI Framework for Security Protocol Implementation

Matteo Avalle, Alfredo Pironti, Riccardo Sisto, Davide Pozza
2011 2011 Sixth International Conference on Availability, Reliability and Security  
formally.  ...  By using the SSL handshake protocol as a reference example, this paper illustrates the JavaSPI framework.  ...  CONCLUSION The JavaSPI framework enables model-driven development of security protocols based on formal methods without the need to know specialized formal languages.  ... 
doi:10.1109/ares.2011.117 dblp:conf/IEEEares/AvallePSP11 fatcat:gowacthovvcrfokqvhnj4wy4na
« Previous Showing results 1 — 15 out of 223,289 results