Verifying requirements for resource-bounded agents
This thesis presents frameworks for the modelling and verification of resource-bounded reasoning agents. The resources considered include the time, memory, and communication bandwidth required by agents to achieve a goal. The scalability and expressiveness of standard model checking techniques is in...
| Main Author: | Abdur, Rakib |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2011
|
| Online Access: | https://eprints.nottingham.ac.uk/12057/ |
Similar Items
Verifying systems of resource-bounded agents
by: Alechina, Natasha, et al.
Published: (2016)
by: Alechina, Natasha, et al.
Published: (2016)
Verifying existence of resource-bounded coalition uniform strategies
by: Alechina, Natasha, et al.
Published: (2016)
by: Alechina, Natasha, et al.
Published: (2016)
Alternating-time temporal logic with resource bounds
by: Nguyen, Hoang Nga, et al.
Published: (2015)
by: Nguyen, Hoang Nga, et al.
Published: (2015)
Verifying heterogeneous multi-agent programs
by: Doan, Thu Trang, et al.
Published: (2014)
by: Doan, Thu Trang, et al.
Published: (2014)
Reasoning about resource-bounded multi-agent systems
by: Nguyen, Nguyen
Published: (2011)
by: Nguyen, Nguyen
Published: (2011)
Verifying the authenticity of digital certificates
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
UPM perkenal aplikasi certificate verifier
by: Utusan Malaysia
Published: (2017)
by: Utusan Malaysia
Published: (2017)
To verify or not to verify: using partial least squares to predict effect of online news on panic buying during pandemic
by: Tan, Kim Lim, et al.
Published: (2022)
by: Tan, Kim Lim, et al.
Published: (2022)
On the complexity of resource-bounded logics
by: Alechina, Natasha, et al.
Published: (2016)
by: Alechina, Natasha, et al.
Published: (2016)
On the complexity of resource-bounded logics
by: Alechina, N., et al.
Published: (2018)
by: Alechina, N., et al.
Published: (2018)
Efficiency three ways: tested, verified, and formalised
by: Handley, Martin AT
Published: (2020)
by: Handley, Martin AT
Published: (2020)
Essays on strategic naivety and disclosure of verifiable information
by: Sheth, Jesal Dilip
Published: (2019)
by: Sheth, Jesal Dilip
Published: (2019)
Accessible bounds for general quantum resources
by: Bromley, Thomas R., et al.
Published: (2018)
by: Bromley, Thomas R., et al.
Published: (2018)
Compiling concurrency correctly: verifying software transactional memory
by: Hu, Liyang
Published: (2013)
by: Hu, Liyang
Published: (2013)
The necessity of laboratory analyses to verify the authenticity of halal products
by: Mustafa, Shuhaimi
Published: (2014)
by: Mustafa, Shuhaimi
Published: (2014)
A secure, anonymous and verifiable E-Voting system
by: Ooi, Elynn
Published: (2020)
by: Ooi, Elynn
Published: (2020)
Model-checking for resource-bounded ATL with production and
consumption of resources
by: Alechina, Natasha, et al.
Published: (2017)
by: Alechina, Natasha, et al.
Published: (2017)
Bounded Coordination Control of Second-order Dynamic Agents
by: Do, Khac Duc
Published: (2013)
by: Do, Khac Duc
Published: (2013)
Towards a formally verified functional quantum programming language
by: Green, Alexander S.
Published: (2010)
by: Green, Alexander S.
Published: (2010)
A framework for relating, implementing and verifying argumentation models and their translations
by: van Gijzel, Bas
Published: (2016)
by: van Gijzel, Bas
Published: (2016)
In situ target strength estimates of visually verified orange roughy
by: Macaulay, G., et al.
Published: (2013)
by: Macaulay, G., et al.
Published: (2013)
Bounded Assignment Formation Control of Second-Order Dynamic Agents
by: Do, Khac Duc
Published: (2013)
by: Do, Khac Duc
Published: (2013)
A model for characterizing knowledge utilization in verifying successful knowledge transfer
by: Abdullah, Salfarina, et al.
Published: (2018)
by: Abdullah, Salfarina, et al.
Published: (2018)
Rapid DNA-based analytical techniques to verify the authenticity of Halal food
by: Mustafa, Shuhaimi, et al.
Published: (2022)
by: Mustafa, Shuhaimi, et al.
Published: (2022)
The virtual source method - verifying the concept using numerical and physical modelling
by: Saul, Matthew, et al.
Published: (2007)
by: Saul, Matthew, et al.
Published: (2007)
Modelling and verifying dynamic access control policies in workflow-based healthcare systems
by: Faruqui, Rokan Uddin
Published: (2020)
by: Faruqui, Rokan Uddin
Published: (2020)
Rule-based and Resource-bounded: A New Look at Epistemic Logic
by: Jago, Mark
Published: (2006)
by: Jago, Mark
Published: (2006)
Inhibitors of leishmania mexicana phosphoglycerate mutase identified by virtual screening and verified by inhibition studies
by: Ahmad Fuad, Fazia Adyani, et al.
Published: (2016)
by: Ahmad Fuad, Fazia Adyani, et al.
Published: (2016)
Inhibitors of Leishmania mexicana phosphoglycerate mutase identified by virtual screening and verified by inhibition studies
by: Fazia Adyani Ahmad Fuad,, et al.
Published: (2016)
by: Fazia Adyani Ahmad Fuad,, et al.
Published: (2016)
Religion and legal spaces: in Gods we Trust; in the Church we Trust, but need to verify
by: McGoldrick, Dominic
Published: (2012)
by: McGoldrick, Dominic
Published: (2012)
Verifying the correctness of UML statechart outpatient clinic based on common modeling language and SMV
by: Abdul Samat, Pathiah, et al.
Published: (2021)
by: Abdul Samat, Pathiah, et al.
Published: (2021)
Understanding behaviour through the lens of bounded rationality: experiments with human and artificial agents
by: Lee Penagos, Luis Alejandro
Published: (2017)
by: Lee Penagos, Luis Alejandro
Published: (2017)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Agent-oriented requirement engineering for mobile application development
by: Cheah, Wai Shiang, et al.
Published: (2017)
by: Cheah, Wai Shiang, et al.
Published: (2017)
Adapting agent technology in managing requirements reuse process
by: Wan Jusoh, Wan Nursyamsiah
Published: (2017)
by: Wan Jusoh, Wan Nursyamsiah
Published: (2017)
Optimal requirements-dependent model-driven agent development
by: Goncalves, J., et al.
Published: (2015)
by: Goncalves, J., et al.
Published: (2015)
Immunity protein release from a cell-bound nuclease colicin complex requires global conformational rearrangement
by: Vankemmelbeke, Mireille, et al.
Published: (2013)
by: Vankemmelbeke, Mireille, et al.
Published: (2013)
Verifying and assessing the reliability of the learning module of positive design and innovative technology in the integration approach of spiritual knowledge
by: Zaipah, Ismail, et al.
Published: (2024)
by: Zaipah, Ismail, et al.
Published: (2024)
Using SMS technology to verify the safety of seasonal trivalent influenza vaccine for pregnant women in real time
by: Regan, Annette, et al.
Published: (2013)
by: Regan, Annette, et al.
Published: (2013)
Convocation bound
by: Siti Sarah, Mohamad Rajimi
Published: (2017)
by: Siti Sarah, Mohamad Rajimi
Published: (2017)
Similar Items
-
Verifying systems of resource-bounded agents
by: Alechina, Natasha, et al.
Published: (2016) -
Verifying existence of resource-bounded coalition uniform strategies
by: Alechina, Natasha, et al.
Published: (2016) -
Alternating-time temporal logic with resource bounds
by: Nguyen, Hoang Nga, et al.
Published: (2015) -
Verifying heterogeneous multi-agent programs
by: Doan, Thu Trang, et al.
Published: (2014) -
Reasoning about resource-bounded multi-agent systems
by: Nguyen, Nguyen
Published: (2011)