Filters








23 Hits in 2.2 sec

Metareasoning about Security Protocols using Distributed Temporal Logic

Carlos Caleiro, Luca Viganò, David Basin
2005 Electronical Notes in Theoretical Computer Science  
We introduce a version of distributed temporal logic for rigorously formalizing and proving metalevel properties of different protocol models, and establishing relationships between models.  ...  protocol tools.  ...  In §2 we introduce our distributed temporal logic.  ... 
doi:10.1016/j.entcs.2004.05.020 fatcat:g7k4ypqstfduhmovh45g6klfju

Reports of the AAAI 2010 Conference Workshops

David W. Aha, Mark Boddy, Vadim Bulitko, Artur S. D'Avila Garcez, Prashant Doshi, Stefan Edelkamp, Christopher Geib, Piotr Gmytrasiewicz, Robert P. Goldman, Pascal Hitzler, Charles Isbell, Darsana Josyula (+20 others)
2010 The AI Magazine  
The titles of the workshops were AI and Fun, Bridging the Gap between Task and Motion Planning, Collaboratively-Built Knowledge Sources and Artificial Intelligence, Goal-Directed Autonomy, Intelligent Security  ...  Abdur Rakib (University of Nottingham) spoke on bounded model checking for temporal epistemic logic.  ...  The proposed architecture combines temporal logic reasoning and learning in recurrent restricted Boltzmann machines.  ... 
doi:10.1609/aimag.v31i4.2318 fatcat:niss5pwei5hytcof433r45okja

AAAI 2008 Workshop Reports

Sarabjot Singh Anand, Razvan C. Bunescu, Vitor R. Carvalho, Jan Chomicki, Vincent Conitzer, Michael T. Cox, Virginia Dignum, Zachary Dodds, Mark Dredze, David Furcy, Evgeniy Gabrilovich, Mehmet H. Göker (+25 others)
2009 The AI Magazine  
: Thinking about Thinking; Multidisciplinary Workshop on Advances in Preference Handling; Search in Artificial Intelligence and Robotics; Spatial and Temporal Reasoning; Trading Agent Design and Analysis  ...  Coordination, Organizations, Institutions, and Norms in Agent Systems, Enhanced Messaging; Human Implications of Human-Robot Interaction; Intelligent Techniques for Web Personalization and Recommender Systems; Metareasoning  ...  Metareasoning: Thinking about Thinking The two-day Workshop on Metareasoning: Thinking about Thinking was such as web-based recommender systems, in automated problem solvers such as configurators, and  ... 
doi:10.1609/aimag.v30i1.2196 fatcat:xsrhlc3tgzhzphg3wt57klqvqu

Dynamic security reconfiguration for the semantic web

J TAN, S POSLAD
2004 Engineering applications of artificial intelligence  
Open systems often require a more sophisticated security analysis and configuration to safeguard distributed services.  ...  A security framework constituting both semantic and meta-reasoning models is investigated in order to reason about the security requirements and security operation of interacting entities within open service  ...  The classification sub-system is triggered when it receives an invocation for logical reasoning about security profiles.  ... 
doi:10.1016/s0952-1976(04)00118-6 fatcat:fnd2pzwctncxrb5zhug5yf4jri

Dynamic security reconfiguration for the semantic web

Juan Jim Tan, Stefan Poslad
2004 Engineering applications of artificial intelligence  
Open systems often require a more sophisticated security analysis and configuration to safeguard distributed services.  ...  A security framework constituting both semantic and meta-reasoning models is investigated in order to reason about the security requirements and security operation of interacting entities within open service  ...  The classification sub-system is triggered when it receives an invocation for logical reasoning about security profiles.  ... 
doi:10.1016/j.engappai.2004.08.036 fatcat:l57i4legf5adtoh2njm6jtoqvu

Metareasoning for Multi-agent Epistemic Logics [chapter]

Konstantine Arkoudas, Selmer Bringsjord
2005 Lecture Notes in Computer Science  
We then use Athena as a metalanguage in order to reason about the multi-agent logic an as object language. This facilitates theorem proving in the multi-agent logic in several ways.  ...  First, it lets us marshal the highly efficient theorem provers for classical first-order logic that are integrated with Athena for the purpose of doing proofs in the multi-agent logic.  ...  game theory in economics; to distributed systems analysis and protocol authentication in computer security [17, 32] .  ... 
doi:10.1007/11533092_7 fatcat:eegohnqdojc7feu4gx4jnj4xay

Distributed temporal logic for the analysis of security protocol models

David Basin, Carlos Caleiro, Jaime Ramos, Luca Viganò
2011 Theoretical Computer Science  
We show how DTL can be used as a metalogic to reason about and relate different security-protocol models.  ...  We illustrate how DTL can be used to formalize security models, protocols, and properties, and then present three concrete examples of metareasoning.  ...  Distributed temporal logic The distributed temporal logic DTL is a logic for reasoning about temporal properties of distributed systems from the local point of view of the system's agents, which are assumed  ... 
doi:10.1016/j.tcs.2011.04.006 fatcat:4lhptb7zjjh3deen4eqoj5dwcu

ExPlanTech: Multi-agent Framework for Production Planning, Simulation and Supply Chain Management [chapter]

Michal Pechoucek, Jirí Vokrínek, Jirí Hodík, Petr Becvár, Jirí Pospíšil
2004 Lecture Notes in Computer Science  
The technology has been tested on several industrial cases and is used in a daily production planning processes of one important automobile industry supplier in the Czech Republic.  ...  In addition ExPlanTech handles secure and authenticated communication by the X-Security component, and it uses the concept of acquaintance models in order to handle temporal suppliers inaccessibility.  ...  Extra-enterprise communication uses inter-platform addressing and HTTP protocol.  ... 
doi:10.1007/978-3-540-30082-3_21 fatcat:xtkmv4qwb5g5ja6ctbwd27sea4

An Overview of AI Research in Italy [chapter]

Andrea Roli, Michela Milano
2009 Lecture Notes in Computer Science  
[52] , many-valued logic [7], temporal action logic [115] and model checking [29, 97] .  ...  Since the 1980s, there is a strong interest in logics for AI, especially on logic formalisms [141] , modal logics [117] , metareasoning [81, 57] , and spatial logic [3] .  ... 
doi:10.1007/978-3-642-03226-4_10 fatcat:wsimnbii4fdptcyls2bqkt2wqu

Autonomy and Intelligence in the Computing Continuum: Challenges, Enablers, and Future Directions for Orchestration [article]

Henna Kokkonen, Lauri Lovén, Naser Hossein Motlagh, Juha Partala, Alfonso González-Gil, Ester Sola, Iñigo Angulo, Madhusanka Liyanage, Teemu Leppänen, Tri Nguyen, Panos Kostakos, Mehdi Bennis (+4 others)
2022 arXiv   pre-print
In this article, we study orchestration in the device-edge-cloud continuum, and focus on AI for edge, that is, the AI methods used in resource orchestration.  ...  ACKNOWLEDGMENT The authors would like to thank the researchers and alumni at the Center for Ubiquitous Computing (UBICOMP) at the University of Oulu, and Distributed Systems Group (DSG) at TU Wien, for  ...  Distributed application logic is implemented with agents that have distinct roles and behavior.  ... 
arXiv:2205.01423v1 fatcat:ul24ibzts5eutoozdh4y3n5kgq

Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis [Extended Version] [article]

M. Camilla Fiazza, Michele Peroli, Luca Viganò
2011 arXiv   pre-print
We then present a new strategy to defend security protocols, based on active exploitation of attack interference.  ...  In security protocol analysis, the traditional choice to consider a single Dolev-Yao attacker is supported by the fact that models with multiple collaborating Dolev-Yao attackers have been shown to be  ...  (www.avantssar.eu) and by the FP7-ICT-2009-5 Project no. 257876, "SPaCIoS: Secure Provision and Consumption in the Internet of Services" (www.spacios.eu).  ... 
arXiv:1106.3746v1 fatcat:mvafqt5ie5h4lj5aa6sbrtpp5i

A Framework for Web Science

Tim Berners-Lee, Daniel J. Weitzner, Wendy Hall, Kieron O'Hara, Nigel Shadbolt, James A. Hendler
2006 Foundations and Trends® in Web Science  
Finally, the Web as a technology is essentially socially embedded; therefore various issues and requirements for Web use and governance are also reviewed.  ...  We also thank the US National Science Foundation for their support of work in the Policy Aware Web and Transparent Accountable Datamining Initiative.  ...  Technologies interdisciplinary research collaboration (grant number GR/N15764/01), and some of the work reported was conducted under the UK Economic and Social Research Council project 'Justice On-Line: Distributing  ... 
doi:10.1561/1800000001 fatcat:ref26ejozzhsxbaw32xckem2ca

Computational trust and reputation models for open multi-agent systems: a review

Isaac Pinyol, Jordi Sabater-Mir
2011 Artificial Intelligence Review  
For the latter, agents use an exploratory protocol to ask other agents about how to evaluate the degree of trust, and a query protocol to ask for recommendations from trusted agents.  ...  To do so, these models use Dirichlet probability distribution, a multinomial Bayesian distribution.  ... 
doi:10.1007/s10462-011-9277-z fatcat:5c5eksiginh7dpdpwtpwbrtpzu

Meta-agent programs

Jürgen Dix, V.S. Subrahmanian, George Pick
2000 The Journal of Logic Programming  
beliefs about b 's beliefs about agent c 's state, and so on.  ...  Subrahmanian, Heterogeneous Active Agents, II: Algorithms and Complexity, Arti®cial Intelligence 108 (1±2) (1999) 257±307; loc. cit.] so as to allow agents to perform metareasoning.  ...  They provided us with lots of helpful remarks and pointed out numerous inconsistencies of the ®rst and second draft of this paper.  ... 
doi:10.1016/s0743-1066(99)00062-x fatcat:h5sc4gy2wff4jamhx3vl4m3p6q

A 20-Year Community Roadmap for Artificial Intelligence Research in the US [article]

Yolanda Gil, Bart Selman
2019 arXiv   pre-print
Future AI systems will rightfully be expected to reason effectively about the world in which they (and people) operate, handling complex tasks and responsibilities effectively and ethically, engaging in  ...  deployment of AI systems has not only created a trillion-dollar industry that is projected to quadruple in three years, but has also exposed the need to make AI systems fair, explainable, trustworthy, and secure  ...  Building Aishwarya's model requires combining sparse data measured at different locations around the planet, measured at different spatial and temporal scales using different instruments and protocols,  ... 
arXiv:1908.02624v1 fatcat:jza6i2tzufgeracsou77qukbu4
« Previous Showing results 1 — 15 out of 23 results