Academic literature on the topic 'Mobile agents'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile agents.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mobile agents"
Elijah and Muhammad Naveed Dilber. "Complete Analysis of Fault Tolerance Schemes in Mobile Agents for a Reliable Mobile Agent Computation." Bonfring International Journal of Industrial Engineering and Management Science 7, no. 1 (March 31, 2017): 20–24. http://dx.doi.org/10.9756/bijiems.8322.
Full textDiepolder, S., and K. H. Krempels. "Mobile Agenten. Mobile Agents." PIK - Praxis der Informationsverarbeitung und Kommunikation 29, no. 4 (December 2006): 203–7. http://dx.doi.org/10.1515/piko.2006.203.
Full textHuhns, M. N., and M. P. Singh. "Mobile agents." IEEE Internet Computing 1, no. 3 (1997): 80–82. http://dx.doi.org/10.1109/4236.589200.
Full textReddy, Parineeth M. "Mobile agents." Resonance 7, no. 7 (July 2002): 35–43. http://dx.doi.org/10.1007/bf02836751.
Full textBorawake-Satao, Rachana, and Rajesh Shardanand Prasad. "Mobile Sink with Mobile Agents." International Journal of Rough Sets and Data Analysis 4, no. 2 (April 2017): 24–35. http://dx.doi.org/10.4018/ijrsda.2017040102.
Full textLeppänen, Teemu, José Álvarez Lacasia, Yoshito Tobe, Kaoru Sezaki, and Jukka Riekki. "Mobile crowdsensing with mobile agents." Autonomous Agents and Multi-Agent Systems 31, no. 1 (October 24, 2015): 1–35. http://dx.doi.org/10.1007/s10458-015-9311-7.
Full textDalmeijer, M., D. K. Hammer, and A. T. M. Aerts. "Mobile software agents." Computers in Industry 41, no. 3 (May 2000): 251–60. http://dx.doi.org/10.1016/s0166-3615(99)00047-0.
Full textMartins, Rosane Maria, Magali Ribeiro Chaves, Luci Pirmez, and Luiz Fernando Rust da Costa Carmo. "Mobile agents applications." Internet Research 11, no. 1 (March 2001): 49–54. http://dx.doi.org/10.1108/10662240110365715.
Full textZrari, Chadha, Hela Hachicha, and Khaled Ghedira. "Agent's Security During Communication in Mobile Agents System." Procedia Computer Science 60 (2015): 17–26. http://dx.doi.org/10.1016/j.procs.2015.08.100.
Full textKovacs, Ern�, Klaus R�hrle, and Matthias Reich. "Integrating mobile agents into the mobile middleware." Personal Technologies 2, no. 2 (June 1998): 68–74. http://dx.doi.org/10.1007/bf01324936.
Full textDissertations / Theses on the topic "Mobile agents"
Vanzan, Alessio <1993>. "Mobile Agents Rendezvous in Networks Despite a Malicious Agent." Master's Degree Thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/10604.
Full textTajer, Jean. "Detection of malicious hosts against agents in Mobile Agent networks." Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/detection-of-malicious-hosts-against-agents-in-mobile-agent-networks(beca3871-a989-4137-9a4d-13c88d8893d9).html.
Full textBraun, Oliver. "Constructing mobile agents using transformations." [S.l.] : [s.n.], 2004. http://137.193.200.177/ediss/braun-oliver/meta.html.
Full textBurvall, Niklas. "Contact Center with Mobile Agents." Thesis, Uppsala University, Department of Information Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-98322.
Full textA Contact Center assists a company with customer relations such as support and telemarketing using telephones but also with email, SMS and chat. Incoming calls are routed by the contact center to the best match according to the polices set up and the queue status. In a contact center context the person handling the calls is called an agent. It would be beneficial to be able to reach agents which are not at the contact center but at home or in the field.
This master thesis investigates how such a mobile agent can be connected to acontact center with respect to security, handling more than just voice interactions (i.e. chat and email) and requirements on network infrastructure from a mobile perspective. A prototype client is developed using Java ME connecting to a Genesys contact center, describing the requirements a client has on network, mobile device and security. The results show that eventhough a mobile agent is possible using todays technologies, some features still need to be added to the mobile phones API, such as better call control and keeping focus during incoming calls.
Ma, Haiqing. "Network management by mobile agents." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ35073.pdf.
Full textAbbas, Shehla. "Distributed calculations using mobile agents." Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13716/document.
Full textThis thesis deals with the use of mobile agents in distributed algorithms by performing random walks in the network. k mobile agents having unique identities are placed initially in a network. We describe a distributed algorithm for computing spanning trees in dynamic networks by using mobile agents. The agents mark the nodes on which they arrive. They use two di?erent techniques. In one problem they use the cloning in which an agent creates its own clone to do some task assigned. In the second, the mobile agents mark on the whiteboard (a memory location on the nodes). These techniques are used in applications such as spanning tree, gathering and collecting information. The mobile agents have limited knowledge and hence, they are not intelligent and do not have computational capabilities. When two or more agents meet at a node of the underlying graph, they merge into a single agent. The parameter of interest is the expected time for all the agents to merge into a single agent. We present a Markov chain, modelling the agents behavior, and show how this can be used to upper bound the expected time for all the k agents to merge into a single agent. We study the same problem when the mobile agents start their walk directly under stationary regime. Handshake problem is also studied and analyzed using mobile agents
Baumann, Joachim. "Control algorithms for mobile agents." [S.l.] : Universität Stuttgart , Fakultät Informatik, 1999. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB8536753.
Full textTufekcioglu, Refik. "Communication models in mobile computing systems and mobile agents." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378775.
Full textThesis advisor(s): Michael, James B. "March 2000." Includes bibliographical references (p. 131-137). Also available in print.
Bouchard, Sébastien. "On the Deterministic Gathering of Mobile Agents." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS175.
Full textDistributed systems are a theoretical model with a huge application field. It can represent a multitude of systems in which several autonomous entities cooperate to achieve a common task. The applications range from computer science related ones like processes sharing memory inside a computer, computers exchanging messages, and cohorts of robots to understanding social animals behavior. When the entities involved are able to move spontaneously, they are called mobile agents, and one of the most studied problems regarding mobile agents is gathering. The mobile agents are spread in an unknown environment, with no a priori information about the others and without the ability to communicate with other agents, unless colocated. Each of them gradually discovers its surroundings, meets some other agents, coordinates with them, until all agents are gathered and detect it. Once all agents gathered, they can communicate and coordinate for some future task. This thesis addresses the feasibility and complexity of gathering, in particular when facing two major difficulties: asynchrony and occurrence of Byzantine faults. When tackling the former, the agents have no control over their speed, which can vary arbitrarily and independently from each other. This makes coordination more challenging. When facing the latter, some of the agents are Byzantine, they can be viewed as malicious and using the difficulty to distinguish them from other (good) agents to try to prevent the gathering
Shibli, Muhammad Awais. "Building Secure Systems using Mobile Agents." Thesis, KTH, Computer and Systems Sciences, DSV, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4622.
Full textThe progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some interesting solution emerged like Intrusion Detection and Prevention systems, but these too have some problems, like detecting and responding in real time, because they mostly require inputs from system administrator. Optimistically, we have succeeded in protecting the hosts to some extent by applying the reactive approach, such as antivirus, firewall and intrusion detection and response systems, But, if we critically analyze this approach, we will reach the conclusion that it has inherent flaws, since the number of penetrations, Internet crime cases, identity and financial data thefts, etc. are rising exponentially in recent years. The main reason is that we are using only reactive approach, i.e. protection system is activated only when some security breach occurs. Secondly, current techniques try to fix the overall huge problem of security using only small remedies (firewall, antivirus and intrusion detection and preventions system) – “point solutions”. Therefore, there is a need to develop a strategy using Mobile Agents in order to operate in reactive and proactive manners, what requires providing security on the principle of defense in depth. So, that ultimate goal of securing a system as a whole can be achieved. System is assumed to be secure if unauthorized access (penetrations) is not possible and system is safe against damages. This strategy will include three aspects: (a) autonomously detect vulnerabilities on different hosts (in a distributed network) before an attacker can exploit (b) protect hosts by detecting attempts of intrusions and responding to them in real time; and finally (c) perform tasks related to security management.
Books on the topic "Mobile agents"
Cockayne, William R. Mobile agents. Greenwich, CT: Manning, 1998.
Find full textRothermel, Kurt, and Radu Popescu-Zeletin, eds. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7.
Full textRothermel, Kurt, and Fritz Hohl, eds. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0057642.
Full textSuri, Niranjan, ed. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36112-x.
Full textPicco, Gian Pietro, ed. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45647-3.
Full textNyein, Pyah. Mobile agents. Oxford: Oxford Brookes University, 2001.
Find full textGiovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.
Find full textKotz, David, and Friedemann Mattern, eds. Agent Systems, Mobile Agents, and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/b75241.
Full textBaumann, Joachim. Mobile Agents: Control Algorithms. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10704127.
Full textVigna, Giovanni, ed. Mobile Agents and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-68671-1.
Full textBook chapters on the topic "Mobile agents"
Satoh, Ichiro. "Mobile Agents." In Handbook of Ambient Intelligence and Smart Environments, 771–91. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-93808-0_29.
Full textOliveira, Luiz A. G., Paulo C. Oliveira, and Eleri Cardozo. "An agent-based approach for quality of service negotiation and management in distributed multimedia systems." In Mobile Agents, 1–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_19.
Full textBaldi, Mario, Silvano Gai, and Gian Pietro Picco. "Exploiting code mobility in decentralized and flexible network management." In Mobile Agents, 13–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_20.
Full textLiberman, B., F. Griffel, M. Merz, and W. Lamersdorf. "Java-based mobile agents — How to migrate, persist, and interact on electronic service markets." In Mobile Agents, 27–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_21.
Full textGhezzi, Carlo, and Giovanni Vigna. "Mobile code paradigms and technologies: A case study." In Mobile Agents, 39–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_22.
Full textPeine, Holger, and Torsten Stolpmann. "The architecture of the ara platform for mobile agents." In Mobile Agents, 50–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_23.
Full textPark, Anthony Sang-Bum, and Stefan Leuker. "A multi-agent architecture supporting services access." In Mobile Agents, 62–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_24.
Full textSchulze, B., and E. R. M. Madeira. "Contracting and moving agents in distributed applications based on a service-oriented architecture." In Mobile Agents, 74–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_25.
Full textWong, David, Noemi Paciorek, Tom Walsh, Joe DiCelie, Mike Young, and Bill Peet. "Concordia: An infrastructure for collaborating mobile agents." In Mobile Agents, 86–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_26.
Full textChang, Daniel T., and Stefan Covaci. "The OMG mobile agent facility: A submission." In Mobile Agents, 98–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_27.
Full textConference papers on the topic "Mobile agents"
Honda, Jason, Harry H. Cheng, and Donna D. Djordjevich. "Mobile Agents and Related Features for Real Time First Responder Training Systems." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87450.
Full textMalik, Najmus Saqib, David Ko, and Harry H. Cheng. "A Secure Migration Protocol for Mobile Agent Systems." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87613.
Full textChou, Yu-Cheng, David Ko, and Harry H. Cheng. "Embeddable Mobile-C for Runtime Support of Code Mobility in Multi-Agent Systems." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35747.
Full textLal, Mayank, Swaminathan Sethuraman, Suhada Jayasuriya, and J. Maurice Rojas. "A New Method of Motion Coordination of a Group of Mobile Agents." In ASME 2006 International Mechanical Engineering Congress and Exposition. ASMEDC, 2006. http://dx.doi.org/10.1115/imece2006-14043.
Full textMena, Eduardo, and Carlos Bobed. "Mobile Agents for Mobile Games." In MobiSys'15: The 13th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751496.2751500.
Full textKalakota, R., J. Stallaert, and A. B. Whinston. "Mobile agents and mobile workers." In Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences. IEEE, 1996. http://dx.doi.org/10.1109/hicss.1996.493231.
Full textLi, Tie-Yan, and Kwok-Yan Lam. "Detecting anomalous agents in mobile agent system." In the first international joint conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/544862.544894.
Full textTomlinson, Bill, Man Lok Yau, and Eric Baumer. "Embodied mobile agents." In the fifth international joint conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1160633.1160807.
Full textAouadi, H., and M. B. Ahmed. "Mobile agents security." In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.207201.
Full textUeda, Leo Kazuhiro, and Fabio Kon. "Mobile musical agents." In Companion to the 19th annual ACM SIGPLAN conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1028664.1028752.
Full textReports on the topic "Mobile agents"
Rus, Daniela. Mobile Information Agents. Fort Belvoir, VA: Defense Technical Information Center, April 2001. http://dx.doi.org/10.21236/ada387701.
Full textBurmester, Mike, and Alex Yasinsac. Secure Tactical Mobile Intelligent Agents. Fort Belvoir, VA: Defense Technical Information Center, September 2004. http://dx.doi.org/10.21236/ada427578.
Full textKassab, Lora L., and Jeffrey Voas. Towards Fault-Tolerant Mobile Agents. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada465330.
Full textSchneider, Fred B., and Gregory Morrisett. Mobile Agents and Systems Principles. Fort Belvoir, VA: Defense Technical Information Center, December 1999. http://dx.doi.org/10.21236/ada381524.
Full textQi, Hairong, S. S. Iyengar, and Krishnendu Chakrabarty. Distributed Multi-Resolution Data Integration Using Mobile Agents. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada440144.
Full textJansen, Wayne, Peter Mell, Tom Karygiannis, and Don Marks. Applying mobile agents to intrusion detection and response. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6416.
Full textArkko, J., V. Devarapalli, and F. Dupont. Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents. RFC Editor, June 2004. http://dx.doi.org/10.17487/rfc3776.
Full textYokota, H., D. Kim, B. Sarikaya, and F. Xia. Flow Bindings Initiated by Home Agents for Mobile IPv6. RFC Editor, February 2014. http://dx.doi.org/10.17487/rfc7109.
Full textValetto, Giuseppe, and Gail Kaiser. Combining Mobile Agents and Process-Based Coordination to Achieve Software Adaptation. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada451580.
Full textDiouf, Awa, Marco Carreras, and Fabrizio Santoro. Taxing Mobile Money in Kenya: Impact on Financial Inclusion. Institute of Development Studies, June 2023. http://dx.doi.org/10.19088/ictd.2023.030.
Full text