A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
An AUML State Machine Based Method for Multi-agent Systems Model Checking
[chapter]
2014
IFIP Advances in Information and Communication Technology
Then a method for the conversion from AUML state machine formal description to ISPL language is proposed. Finally a simulation is accomplished with the conversion tool AUML2ISPL. ...
This paper firstly proposes a Multi-agent System Model Checking Framework, which is based on AUML (Agent Unified Modeling Language) state machine model and temporal logics of knowledge and provides a method ...
Finally we propose a conversion algorithm between AUML state machine and ISPL language. The description of protocol is represent by protocol functions: protdef::= Protocol : protdeflist. ...
doi:10.1007/978-3-662-44980-6_12
fatcat:qe6c6mnmgndujf2aqyu5gaculy
Modelling and visualizing agent conversations
2001
Proceedings of the fifth international conference on Autonomous agents - AGENTS '01
With this method it is possible (a) to capture the concurrent characteristics of a conversation, (b) to capture the state of a complex conversation during runtime, and (c) to reuse a given conversation ...
The approach described in this paper can be used both to define simple conversation protocols and to define protocols for more complex conversations composed of a number of simpler conversations. ...
We will continue the development of software tools supporting the proposed modelling technique, and in particular the development of a graphical representation and visualizer for debugging and monitoring ...
doi:10.1145/375735.376297
dblp:conf/agents/NowostawskiPC01
fatcat:u2365pikvbggpbcjp4miwnqkry
Synthesis of communications protocol converters using the timed Petri net model
1999
Journal of Systems and Software
Moreover, a reliable converter must perform its conversion functions in a timely manner satisfying the timing constraints of both protocol architectures. ...
Most existing converter design methods are based on the communicating ®nite state machine (CFSM) model as the formal description technique to describe the protocols, their services and the converter design ...
The need for developing formal methods for protocol converter design was ®rst pointed by Green (1986) . ...
doi:10.1016/s0164-1212(99)00024-2
fatcat:3a4szigqtzgkljyq5ywbxt7wru
A Computational Model for Conversation Policies for Agent Communication
[chapter]
2005
Lecture Notes in Computer Science
In order to be flexible, this protocol is defined as a combination of a set of conversation policies. These policies are formalized as a set of dialogue games. ...
In this paper we propose a formal specification of a persuasion protocol between autonomous agents using an approach based on social commitments and arguments. ...
We'd also like to thank Rance Cleaveland and Girish Bhat for their interesting explanations on the tableau method. ...
doi:10.1007/11533092_11
fatcat:pobimqo2v5f7tduyyqlzyazveu
ACS: Automatic Converter Synthesis for SoC Bus Protocols
[chapter]
2010
Lecture Notes in Computer Science
It is based on formal foundations and guarantees correct-byconstruction deterministic solutions in VHDL, whenever it is physically possible to mediate between a given pair of protocols. ...
In the absence of a single interface standard for such modules, "plug-n-play style" integration is not likely, as the modules are often designed to comply with different interface protocols, and a protocol ...
The methods rely on a dedicated FSM-based formalism and formal definitions of protocol compatibility and correct protocol conversion [1, 2, 3] , and the derived algorithm for automatic converter synthesis ...
doi:10.1007/978-3-642-12002-2_28
fatcat:tcmieyq5dzgvtnxp7pwjk3xple
Open protocol design for complex interactions in multi-agent systems
2002
Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 2 - AAMAS '02
This paper proposes a generic approach for protocol engineering through the analysis, the specification, and the verification of such protocols when several agents are involved. ...
This approach is three folds: 1) Starting from semi-formal specification by means of Protocol Diagrams (AUML), both formal specification of interaction protocols and their verification are allowed thanks ...
A method requires: a label, a list of formal parameters to be linked when the method is executed, a set of Pre-conditions (i.e. necessary conditions of the method execution), and a set of Post-conditions ...
doi:10.1145/544865.544866
fatcat:eyrzmtjptzgmzntvjem3mmjrvy
Open protocol design for complex interactions in multi-agent systems
2002
Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 2 - AAMAS '02
This paper proposes a generic approach for protocol engineering through the analysis, the specification, and the verification of such protocols when several agents are involved. ...
This approach is three folds: 1) Starting from semi-formal specification by means of Protocol Diagrams (AUML), both formal specification of interaction protocols and their verification are allowed thanks ...
A method requires: a label, a list of formal parameters to be linked when the method is executed, a set of Pre-conditions (i.e. necessary conditions of the method execution), and a set of Post-conditions ...
doi:10.1145/544862.544866
dblp:conf/atal/MazouziFH02
fatcat:cz57ha4mkrf33eggmthk6hg36q
Formalization and Verification of a Mail Server in Coq
[chapter]
2003
Lecture Notes in Computer Science
This paper reports on the formalization and verification of a mail server (SMTP server) in Coq. ...
We have verified a part of a mail server written in Java, by manually translating the Java program into a Coq function as faithfully as possible, and verifying properties of the Coq function. ...
Correctness of the security protocols are proved in a formal manner. 3. ...
doi:10.1007/3-540-36532-x_14
fatcat:5vrjwxsgdjbzdhysu2bcbb7nae
Editorial
2016
Formal Aspects of Computing
Large software systems become more and more communication-centered and formal methods play a key role in the design and analysis of them. ...
the Abstract State Machines (ASM) formal method and model refinement. ...
Dynamic Role Authorization in Multiparty Conversations by Silvia Ghilezan, Svetlana Jaksic, Jovanka Pantovic, Jorge A. ...
doi:10.1007/s00165-016-0386-y
fatcat:3qjtv2q7wnbn5iss5uyyqfhpcy
Verifying the Conformance of Web Services to Global Interaction Protocols: A First Step
[chapter]
2005
Lecture Notes in Computer Science
actually interoperate by producing a legal conversation. ...
This work proposes an approach to the verification of a priori conformance of a business process to a protocol, which is based on the theory of formal languages and guarantees the interoperability of peers ...
Concerning BPEL4WS, some proposal of a formal semantics exists and the proposed formal methods derive from formal models for concurrency and coordination of distributed systems (e.g. process algebras) ...
doi:10.1007/11549970_19
fatcat:euticfys2rggxgaisul7q6gjyq
INDUCTION METHODS PARADOXICALITY
1989
International journal of pattern recognition and artificial intelligence
a It is natural that the efficiency condition requires that T 0 , pr 0 should be defined effectively as well. a It is natural that the efficiency condition requires that T 0 , pr 0 should be defined effectively ...
Let Φ be such class of homomorphisms.F-conversion of an observation protocol pr is a protocol F(pr); F-conversion of a permissible set of observation results is a permissible set F(T) (homomorphism preserves ...
A formal induction method is the following effective mapping ind f :T 1 = ind f (T 0, pr 0 ) a , where pr 0 is a protocol,The induction method f if the following mapping f Obs , pr 0 = Obs(A), A is a set ...
doi:10.1142/s0218001489000139
fatcat:5y3gjzlro5chphbvenzk7zofpm
APN Model for Specification of the Communication Protocols in Multi-Agent System
2013
Journal of Software Engineering and Applications
Indeed, an agent approach requires a powerful and expressive formalism that allows him to model the behavior of a set of agents that interact. ...
We are modeling some variants of FIPA standard protocols. Our Models are found based on communicating cognitive agents. ...
This formal method can verify correctly the interaction between them by specifying the messages exchanged during the conversation and during interaction. ...
doi:10.4236/jsea.2013.69a002
fatcat:j7s2p7zjm5aerbq7xlzdrbqtxi
Monitoring large-scale multi-agent systems using overhearing
2005
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems - AAMAS '05
Monitoring by overhearing [3] has been found to provide a powerful monitoring approach particularly suited for open distributed MAS settings. ...
In my research, I attempt to provide a comprehensive theoretical model for overhearing and then, based on this model, to systematically cover various aspects related to overhearing. ...
Thus, modelling multi-agent interaction protocols is an important aspect of MAS applications. Various formalisms have been proposed to model multi-agent interaction protocols. ...
doi:10.1145/1082473.1082785
dblp:conf/atal/Gutnik05
fatcat:oizkjokmafgwpokjooxw4ocecy
Model Oriented Approach for Industrial Software Development
2016
Modelirovanie i Analiz Informacionnyh Sistem
The results of applying the proposed method in the industrial technology are shown. The article is published in the authors' wording. ...
Also the grammar of a language for specifying rules of abstract model data structures transformation into real system detailed data structures is described. ...
This means that a communication protocol can be represented by only one signal on the abstract level while in the real code this protocol can be specified by a set of incoming and outgoing signals. ...
doi:10.18255/1818-1015-2015-6-750-762
fatcat:c7gvgqade5ca5oqmv4jpdjt3lq
The Java SPI Framework for Security Protocol Implementation
2011
2011 Sixth International Conference on Availability, Reliability and Security
formally. ...
By using the SSL handshake protocol as a reference example, this paper illustrates the JavaSPI framework. ...
CONCLUSION The JavaSPI framework enables model-driven development of security protocols based on formal methods without the need to know specialized formal languages. ...
doi:10.1109/ares.2011.117
dblp:conf/IEEEares/AvallePSP11
fatcat:gowacthovvcrfokqvhnj4wy4na
« Previous
Showing results 1 — 15 out of 223,289 results