2013
DOI: 10.1007/978-3-642-36546-1_45
|View full text |Cite
|
Sign up to set email alerts
|

Runtime Verification of Multi-agent Systems Interaction Quality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Specifically, the global specification, which is used to represent the global protocol, is translated into partial decentralised specifications-one for each agent of the MAS. In [36,37], other works on runtime verification of agent interactions are proposed for the JADE platform. Specifically, in [36], the authors propose a framework called Multi-agent Runtime Verification (MARV).…”
Section: Runtime Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Specifically, the global specification, which is used to represent the global protocol, is translated into partial decentralised specifications-one for each agent of the MAS. In [36,37], other works on runtime verification of agent interactions are proposed for the JADE platform. Specifically, in [36], the authors propose a framework called Multi-agent Runtime Verification (MARV).…”
Section: Runtime Verificationmentioning
confidence: 99%
“…In [36,37], other works on runtime verification of agent interactions are proposed for the JADE platform. Specifically, in [36], the authors propose a framework called Multi-agent Runtime Verification (MARV). In this framework, requirements of MAS interaction during runtime are defined, such as availability and trustability.…”
Section: Runtime Verificationmentioning
confidence: 99%
“…The verification mechanisms of trust in MASs fall into two categories depending on when the verification activities are performed: runtime and design-time. For the first approaches, monitoring is the most common used technique where the verification is performed by monitoring the evolving executions of the target system during the operation phase, and then checking whether the desired properties of the system hold or not (Alotaibi & Zedan, 2010;Bakar & Selamat, 2013;Bauer et al, 2011). Runtime verification can also extract relevant information from a running system and use it to detect undesired behaviors with regard to particular properties.…”
Section: Verification Techniquesmentioning
confidence: 99%