COMP 3152/9152 -- Lectures and recommended reading
- Introduction, Semantic models for Knowledge
- Logics of Knowledge - Axioms and Model Checking
- Semantic Models for Knowledge and Time
- Properties of Knowledge and Time
-
FHMV Ch 8
- Lecture Notes
- Complete Axiomatizations for Reasoning
about Knowledge and Time , J. Y. Halpern, R. van der Meyden and
M. Y. Vardi, SIAM Journal on Computing, Vol 33, No. 3, 2004,
pp. 674-703.
- Complete Axiomatizations for Reasoning about
Knowledge and Branching Time , R. van der Meyden and
K. Wong, Studia Logica Vol 75, Oct 2003, pp. 93-123.
- Dynamics of Common Knowledge
- Lecture Notes
-
Common Knowledge and Update in Finite Environments, R. van der Meyden,
Information and Computation Vol 140, No. 2, Feb 1998, pp. 115-157.
-
Dynamic Epistemic Logic, Hans van Ditmarsch, Wiebe van der Hoek, Barteld Kooi
- Model Checking Knowledge and Time
- Knowledge-based programs
- Lecture Notes
-
FHMV Ch5 and Ch 7
-
Constructing Finite State Implementations of Knowledge Based Programs
with Perfect Recall, R. van der Meyden, in Intelligent Agent Systems:
Theoretical and Practical Issues, Springer LNAI No. 1209,
1997, pp. 135-152.
-
Finite State Implementations of Knowledge-Based Programs, R. van der
Meyden, in Proc. Conf. on Foundations of Software Technology and
Theoretical Computer Science, Hyderabad India, Dec 1996, Springer LNCS
No. 1180, pp. 262-273.
-
Knowledge-Based Programs: on the Complexity of Perfect Recall in
Finite Environments (Extended Abstract), R. van der Meyden,
Proceedings of the Conference on Theoretical Aspects of Reasoning
about Knowledge, Renesse, Netherlands, March 1996, pp. 31-50.
-
Ronen I. Brafman, Jean-Claude Latombe, Yoram Moses, Yoav Shoham:
Applications of a logic of knowledge to motion planning under
uncertainty. J. ACM 44(5): 633-668 (1997)
- Common Knowledge and Agreement
-
FHMV Ch 6
- Lecture Notes
-
Agreeing to Disagree, Robert J. Aumann,
The Annals of Statistics, Vol. 4, No. 6 (Nov., 1976), pp. 1236-1239
- Byzantine Agreement
- Applications to computer security. Security protocols and noninterference.
- Lecture Notes
-
Symbolic Model Checking the Knowledge of the Dining Cryptographers,
R. van der Meyden and K. Su, 17th IEEE Computer Security Foundations
Workshop, Asilomar, June 2004, pp. 280-291
-
What, indeed, is intransitive noninterference? R. van der Meyden,
Proc. European Symposium on Research in Computer Security, Dresden,
Sept 2007, LNCS Vol. 4734, pp. 235-250.
-
A Logic of Authentication, Michael Burrows, Martin Abadi and Roger Needham,
Proceedings of the Royal Society, Series A, 426, 1871 (December 1989), 233-271.
-
Anonymity and Information Hiding in Multiagent Systems, Joseph
Halpern and Kevin O'Neill, Journal of Computer Security 13:3, 2005,
pp. 483-514
-
Secrecy in Multiagent Systems, Joseph Halpern and Kevin O'Neill,
in Proceedings of the 15th IEEE Computer Security Foundations Workshop, 2002, pp. 32-46
- Variants of Common Knowledge
- The logic of knowledge and probability
- Lecture Notes
-
J. Y. Halpern, Reasoning about Uncertainty, Ch 6 & 7
-
Joseph Y. Halpern, Mark R. Tuttle: Knowledge, Probability, and Adversaries. J. ACM 40(4): 917-962 (1993)
-
Joseph Y. Halpern, Yoram Moses: Characterizing Solution Concepts in Games Using Knowledge-Based Programs. IJCAI 2007: 1300-1307