A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Metareasoning about Security Protocols using Distributed Temporal Logic
2005
Electronical Notes in Theoretical Computer Science
We introduce a version of distributed temporal logic for rigorously formalizing and proving metalevel properties of different protocol models, and establishing relationships between models. ...
protocol tools. ...
In §2 we introduce our distributed temporal logic. ...
doi:10.1016/j.entcs.2004.05.020
fatcat:g7k4ypqstfduhmovh45g6klfju
Reports of the AAAI 2010 Conference Workshops
2010
The AI Magazine
The titles of the workshops were AI and Fun, Bridging the Gap between Task and Motion Planning, Collaboratively-Built Knowledge Sources and Artificial Intelligence, Goal-Directed Autonomy, Intelligent Security ...
Abdur Rakib (University of Nottingham) spoke on bounded model checking for temporal epistemic logic. ...
The proposed architecture combines temporal logic reasoning and learning in recurrent restricted Boltzmann machines. ...
doi:10.1609/aimag.v31i4.2318
fatcat:niss5pwei5hytcof433r45okja
AAAI 2008 Workshop Reports
2009
The AI Magazine
: Thinking about Thinking; Multidisciplinary Workshop on Advances in Preference Handling; Search in Artificial Intelligence and Robotics; Spatial and Temporal Reasoning; Trading Agent Design and Analysis ...
Coordination, Organizations, Institutions, and Norms in Agent Systems, Enhanced Messaging; Human Implications of Human-Robot Interaction; Intelligent Techniques for Web Personalization and Recommender Systems; Metareasoning ...
Metareasoning: Thinking about Thinking The two-day Workshop on Metareasoning: Thinking about Thinking was such as web-based recommender systems, in automated problem solvers such as configurators, and ...
doi:10.1609/aimag.v30i1.2196
fatcat:xsrhlc3tgzhzphg3wt57klqvqu
Dynamic security reconfiguration for the semantic web
2004
Engineering applications of artificial intelligence
Open systems often require a more sophisticated security analysis and configuration to safeguard distributed services. ...
A security framework constituting both semantic and meta-reasoning models is investigated in order to reason about the security requirements and security operation of interacting entities within open service ...
The classification sub-system is triggered when it receives an invocation for logical reasoning about security profiles. ...
doi:10.1016/s0952-1976(04)00118-6
fatcat:fnd2pzwctncxrb5zhug5yf4jri
Dynamic security reconfiguration for the semantic web
2004
Engineering applications of artificial intelligence
Open systems often require a more sophisticated security analysis and configuration to safeguard distributed services. ...
A security framework constituting both semantic and meta-reasoning models is investigated in order to reason about the security requirements and security operation of interacting entities within open service ...
The classification sub-system is triggered when it receives an invocation for logical reasoning about security profiles. ...
doi:10.1016/j.engappai.2004.08.036
fatcat:l57i4legf5adtoh2njm6jtoqvu
Metareasoning for Multi-agent Epistemic Logics
[chapter]
2005
Lecture Notes in Computer Science
We then use Athena as a metalanguage in order to reason about the multi-agent logic an as object language. This facilitates theorem proving in the multi-agent logic in several ways. ...
First, it lets us marshal the highly efficient theorem provers for classical first-order logic that are integrated with Athena for the purpose of doing proofs in the multi-agent logic. ...
game theory in economics; to distributed systems analysis and protocol authentication in computer security [17, 32] . ...
doi:10.1007/11533092_7
fatcat:eegohnqdojc7feu4gx4jnj4xay
Distributed temporal logic for the analysis of security protocol models
2011
Theoretical Computer Science
We show how DTL can be used as a metalogic to reason about and relate different security-protocol models. ...
We illustrate how DTL can be used to formalize security models, protocols, and properties, and then present three concrete examples of metareasoning. ...
Distributed temporal logic The distributed temporal logic DTL is a logic for reasoning about temporal properties of distributed systems from the local point of view of the system's agents, which are assumed ...
doi:10.1016/j.tcs.2011.04.006
fatcat:4lhptb7zjjh3deen4eqoj5dwcu
ExPlanTech: Multi-agent Framework for Production Planning, Simulation and Supply Chain Management
[chapter]
2004
Lecture Notes in Computer Science
The technology has been tested on several industrial cases and is used in a daily production planning processes of one important automobile industry supplier in the Czech Republic. ...
In addition ExPlanTech handles secure and authenticated communication by the X-Security component, and it uses the concept of acquaintance models in order to handle temporal suppliers inaccessibility. ...
Extra-enterprise communication uses inter-platform addressing and HTTP protocol. ...
doi:10.1007/978-3-540-30082-3_21
fatcat:xtkmv4qwb5g5ja6ctbwd27sea4
An Overview of AI Research in Italy
[chapter]
2009
Lecture Notes in Computer Science
[52] , many-valued logic [7], temporal action logic [115] and model checking [29, 97] . ...
Since the 1980s, there is a strong interest in logics for AI, especially on logic formalisms [141] , modal logics [117] , metareasoning [81, 57] , and spatial logic [3] . ...
doi:10.1007/978-3-642-03226-4_10
fatcat:wsimnbii4fdptcyls2bqkt2wqu
Autonomy and Intelligence in the Computing Continuum: Challenges, Enablers, and Future Directions for Orchestration
[article]
2022
arXiv
pre-print
In this article, we study orchestration in the device-edge-cloud continuum, and focus on AI for edge, that is, the AI methods used in resource orchestration. ...
ACKNOWLEDGMENT The authors would like to thank the researchers and alumni at the Center for Ubiquitous Computing (UBICOMP) at the University of Oulu, and Distributed Systems Group (DSG) at TU Wien, for ...
Distributed application logic is implemented with agents that have distinct roles and behavior. ...
arXiv:2205.01423v1
fatcat:ul24ibzts5eutoozdh4y3n5kgq
Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis [Extended Version]
[article]
2011
arXiv
pre-print
We then present a new strategy to defend security protocols, based on active exploitation of attack interference. ...
In security protocol analysis, the traditional choice to consider a single Dolev-Yao attacker is supported by the fact that models with multiple collaborating Dolev-Yao attackers have been shown to be ...
(www.avantssar.eu) and by the FP7-ICT-2009-5 Project no. 257876, "SPaCIoS: Secure Provision and Consumption in the Internet of Services" (www.spacios.eu). ...
arXiv:1106.3746v1
fatcat:mvafqt5ie5h4lj5aa6sbrtpp5i
A Framework for Web Science
2006
Foundations and Trends® in Web Science
Finally, the Web as a technology is essentially socially embedded; therefore various issues and requirements for Web use and governance are also reviewed. ...
We also thank the US National Science Foundation for their support of work in the Policy Aware Web and Transparent Accountable Datamining Initiative. ...
Technologies interdisciplinary research collaboration (grant number GR/N15764/01), and some of the work reported was conducted under the UK Economic and Social Research Council project 'Justice On-Line: Distributing ...
doi:10.1561/1800000001
fatcat:ref26ejozzhsxbaw32xckem2ca
Computational trust and reputation models for open multi-agent systems: a review
2011
Artificial Intelligence Review
For the latter, agents use an exploratory protocol to ask other agents about how to evaluate the degree of trust, and a query protocol to ask for recommendations from trusted agents. ...
To do so, these models use Dirichlet probability distribution, a multinomial Bayesian distribution. ...
doi:10.1007/s10462-011-9277-z
fatcat:5c5eksiginh7dpdpwtpwbrtpzu
Meta-agent programs
2000
The Journal of Logic Programming
beliefs about b 's beliefs about agent c 's state, and so on. ...
Subrahmanian, Heterogeneous Active Agents, II: Algorithms and Complexity, Arti®cial Intelligence 108 (1±2) (1999) 257±307; loc. cit.] so as to allow agents to perform metareasoning. ...
They provided us with lots of helpful remarks and pointed out numerous inconsistencies of the ®rst and second draft of this paper. ...
doi:10.1016/s0743-1066(99)00062-x
fatcat:h5sc4gy2wff4jamhx3vl4m3p6q
A 20-Year Community Roadmap for Artificial Intelligence Research in the US
[article]
2019
arXiv
pre-print
Future AI systems will rightfully be expected to reason effectively about the world in which they (and people) operate, handling complex tasks and responsibilities effectively and ethically, engaging in ...
deployment of AI systems has not only created a trillion-dollar industry that is projected to quadruple in three years, but has also exposed the need to make AI systems fair, explainable, trustworthy, and secure ...
Building Aishwarya's model requires combining sparse data measured at different locations around the planet, measured at different spatial and temporal scales using different instruments and protocols, ...
arXiv:1908.02624v1
fatcat:jza6i2tzufgeracsou77qukbu4
« Previous
Showing results 1 — 15 out of 23 results