共 50 条
- [31] Applying the MVC design pattern to multi-agent systems [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 1450 - +
- [32] Experience using formal methods for specifying a multi-agent system [J]. SIXTH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2000, : 72 - 80
- [33] The Role of Requirements Engineering in the Development of Multi-Agent Systems [J]. JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2005, 5 (02): : 111 - 111
- [34] Recommended Practices for the Specification of Multi-Agent Systems Requirements [J]. 2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 179 - 185
- [35] Configuring requirements-compliant multi-agent systems [J]. 2005 IEEE 2nd Symposium on Multi-Agent Security and Survivability, Proceedings, 2005, : 58 - 65
- [36] Using Bounded Fairness to Specify and Verify Ordered Asynchronous Multi-agent Systems [J]. 2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 111 - 120
- [37] FORMAL MODEL TO INTEGRATE MULTI-AGENT SYSTEMS AND INTERACTIVE GRAPHIC SYSTEMS [J]. ICAART 2010: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 2: AGENTS, 2010, : 264 - 267
- [38] Multi-Agent Systems for Scalable Internet of Things Security [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
- [39] Specifying standard security mechanisms in multi-agent systems [J]. TRUST, REPUTATION, AND SECURITY: THEORIES AND PRACTICE, 2003, 2631 : 163 - 176
- [40] A security infrastructure for trust management in multi-agent systems [J]. TRUSTING AGENTS FOR TRUSTING ELECTRONIC SOCIETIES: THEORY AND APPLICATIONS IN HCI AND E-COMMERCE, 2005, 3577 : 162 - 179