Synthesis of Minimum-Cost Shields for Multi-agent Systems
暂无分享,去创建一个
[1] Lujo Bauer,et al. Run-Time Enforcement of Nonsafety Policies , 2009, TSEC.
[2] Thomas Wilke,et al. Automata logics, and infinite games: a guide to current research , 2002 .
[3] Martin Leucker,et al. Runtime Verification for LTL and TLTL , 2011, TSEM.
[4] Jin Hock Ong,et al. Multi-UAV System for Inventory Automation , 2007, 2007 1st Annual RFID Eurasia.
[5] Grigore Rosu,et al. EnforceMOP: a runtime property enforcement system for multithreaded programs , 2013, ISSTA.
[6] Adrian Francalanza,et al. Synthesising correct concurrent runtime monitors , 2015, Formal Methods Syst. Des..
[7] Derek Kingston,et al. A Brief Introduction to Unmanned Systems Autonomy Services (UxAS) , 2018, 2018 International Conference on Unmanned Aircraft Systems (ICUAS).
[8] Tariq Samad,et al. Network-Centric Systems for Military Operations in Urban Terrain: The Role of UAVs , 2007, Proceedings of the IEEE.
[9] César Sánchez,et al. Runtime Verification for Decentralised and Distributed Systems , 2018, Lectures on Runtime Verification.
[10] Hadas Kress-Gazit,et al. Shortcut through an evil door: Optimality of correct-by-construction controllers in adversarial environments , 2013, 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[11] Yliès Falcone,et al. You Should Better Enforce Than Verify , 2010, RV.
[12] Thanh-Hung Nguyen,et al. Runtime Verification of Component-Based Systems , 2011, SEFM.
[13] Yliès Falcone,et al. What can you verify and enforce at runtime? , 2012, International Journal on Software Tools for Technology Transfer.
[14] D. Ghose,et al. Multi-UAV Task Allocation using Team Theory , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[15] Amir Pnueli,et al. The temporal logic of programs , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).
[16] Sven Schewe,et al. Synthesis of Distributed Systems , 2018 .
[17] Ufuk Topcu,et al. Shield synthesis , 2017, Formal Methods Syst. Des..
[18] Michal Pechoucek,et al. Autonomous UAV Surveillance in Complex Urban Environments , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[19] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[20] Han-Lim Choi,et al. Real-Time Multi-UAV Task Assignment in Dynamic and Uncertain Environments , 2009 .
[21] Yliès Falcone,et al. Decentralised LTL monitoring , 2016, Formal Methods Syst. Des..