Academic literature on the topic 'Mobile agents'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile agents.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mobile agents"

1

Elijah and Muhammad Naveed Dilber. "Complete Analysis of Fault Tolerance Schemes in Mobile Agents for a Reliable Mobile Agent Computation." Bonfring International Journal of Industrial Engineering and Management Science 7, no. 1 (March 31, 2017): 20–24. http://dx.doi.org/10.9756/bijiems.8322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Diepolder, S., and K. H. Krempels. "Mobile Agenten. Mobile Agents." PIK - Praxis der Informationsverarbeitung und Kommunikation 29, no. 4 (December 2006): 203–7. http://dx.doi.org/10.1515/piko.2006.203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huhns, M. N., and M. P. Singh. "Mobile agents." IEEE Internet Computing 1, no. 3 (1997): 80–82. http://dx.doi.org/10.1109/4236.589200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reddy, Parineeth M. "Mobile agents." Resonance 7, no. 7 (July 2002): 35–43. http://dx.doi.org/10.1007/bf02836751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Borawake-Satao, Rachana, and Rajesh Shardanand Prasad. "Mobile Sink with Mobile Agents." International Journal of Rough Sets and Data Analysis 4, no. 2 (April 2017): 24–35. http://dx.doi.org/10.4018/ijrsda.2017040102.

Full text
Abstract:
Wireless Sensor Networks (WSN) has been drawing considerable attention and discussion in recent years due to its potential applications in various fields. In modern applications for future internet the MSN (Mobile Sensor Network) is a key factor. Mobility allows the applications of Wireless Sensor Network to be compatible with IoT (Internet of Things) applications. As mobility enhances capability of the network it also affects the performance of the network at each layer. In recent years the various methodologies are proposed to handle mobility. Most of them use mobility for efficient data collection in WSNs. The purpose of this paper is to study effects of mobility on various performance parameters of the network and to explore the effective techniques to handle mobility in network. This paper proposes Mobile Sink with Mobile Agent mobility model for WSN which will increase the lifetime of the network using sink and agent node mobility.
APA, Harvard, Vancouver, ISO, and other styles
6

Leppänen, Teemu, José Álvarez Lacasia, Yoshito Tobe, Kaoru Sezaki, and Jukka Riekki. "Mobile crowdsensing with mobile agents." Autonomous Agents and Multi-Agent Systems 31, no. 1 (October 24, 2015): 1–35. http://dx.doi.org/10.1007/s10458-015-9311-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dalmeijer, M., D. K. Hammer, and A. T. M. Aerts. "Mobile software agents." Computers in Industry 41, no. 3 (May 2000): 251–60. http://dx.doi.org/10.1016/s0166-3615(99)00047-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Martins, Rosane Maria, Magali Ribeiro Chaves, Luci Pirmez, and Luiz Fernando Rust da Costa Carmo. "Mobile agents applications." Internet Research 11, no. 1 (March 2001): 49–54. http://dx.doi.org/10.1108/10662240110365715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zrari, Chadha, Hela Hachicha, and Khaled Ghedira. "Agent's Security During Communication in Mobile Agents System." Procedia Computer Science 60 (2015): 17–26. http://dx.doi.org/10.1016/j.procs.2015.08.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kovacs, Ern�, Klaus R�hrle, and Matthias Reich. "Integrating mobile agents into the mobile middleware." Personal Technologies 2, no. 2 (June 1998): 68–74. http://dx.doi.org/10.1007/bf01324936.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Mobile agents"

1

Vanzan, Alessio <1993&gt. "Mobile Agents Rendezvous in Networks Despite a Malicious Agent." Master's Degree Thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/10604.

Full text
Abstract:
The use of mobile agents, i.e., autonomous software entities , finds its application in many settings such as Network Maintenance, Electronic commerce and Intelligent search. Given a network, we have a set of mobile agents that moves from node to node in order to achieve a common task. Security is an important issue that can arise in such environment and that has been widely studied in literature. In particular, it is important to study the problem of having a host or an agent that hinders or harms the honest agents in their tasks. In this thesis we consider a scenario in which one of the mobile agents may behave maliciously and thus act in order to prevent the other agents to complete their goal. We study the Rendezvous problem,i.e., the problem of gathering a set of mobile agents at a single node of a network, starting from a initial scattered configuration and despite the presence of a Malicious agent, and in particular, we propose a novel solution in the bidirectional hypercube network.
APA, Harvard, Vancouver, ISO, and other styles
2

Tajer, Jean. "Detection of malicious hosts against agents in Mobile Agent networks." Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/detection-of-malicious-hosts-against-agents-in-mobile-agent-networks(beca3871-a989-4137-9a4d-13c88d8893d9).html.

Full text
Abstract:
Over the last decade, networks have become increasingly advanced in terms of size, complexity and the level of heterogeneity, due to increase of number of users, devices and implementation of cloud among big enterprises and developing smart cities. As networks become more complicated, the existing client-server paradigm suffers from problems such as delay, jitter, bad quality of service, insufficient scalability, availability and flexibility. The appearance of mobile agents' technology is getting popular as means for an efficient way to access remote resources on computer networks. Mobile Agent- systems usually benefit from the following: asynchronous execution, dynamic adaptation, fault-tolerance improvement in network latency, protocol encapsulation, reduction in network load and robustness. However, one of the major technical obstacles to a wider acceptance of the mobile agent is security which is the modus operandi to protect the mobile agents against malicious hosts. This work proposes how the Mobile Agents (MA), supported by a new solid models (detection and protection), can present a new way of securing mobile agents against malicious hosts. The work contributes in proposing a new computing model for protection against malicious hosts. This model is based on trust, which is a combination of two kinds of trust: policy enforcement and control and punishment. The originality of this model is the introduction of the concept of setting up an active storage element in the agent space, called as "home away from home", for partial result storage and separation as well as digital signing of the destination of the mobile agent. An efficient flooding detection scheme is developed by integrating the sketch technique with the Divergence Measures (Hellinger Distance, Chi-Square and Power Divergences). This type of integration can be considered unique in comparison with existing solutions over a Mobile Agent network. The sketch data- structure summarizes the mobile agent's process of calls generating into a fixed set of data for developing a probability model. The Divergence Measures techniques, combined with a Mobile Agent traffic, efficiently identifies attacks, by monitoring the distance between current traffic distribution and the estimated distribution, based on history information. Compared to the previous detection system and existing works, the proposed techniques achieve the advantages of higher accuracy and flexibility, to deal with low intensity attacks and the ability to track the period of attack. Simulation results are presented to demonstrate the performance of the proposed detection model. This work achieves in outperforming the existing detection solutions by tuning the Divergence Measures. An evaluation of the scheme is done via the receiver-operating characteristic (ROC). The work achieves in outperforming the existing detection solutions by tuning the Power Divergence with a value of β=2.2. With this value of β, the detection scheme leads to a very attractive performance in terms of True Positive Rate (100%), False Positive Rate (3.8%) and is capable of detecting low intensity attacks. Moreover, the Power Divergence with β=2.2 presents a better detection accuracy of 98.1% in comparison with Hellinger Distance (60%) and Chi-square (80%). Since the scenarios in consideration in this work can be reasonably related to any type of network, the strength of the proposed model can alternatively be applied to any enterprise network.
APA, Harvard, Vancouver, ISO, and other styles
3

Braun, Oliver. "Constructing mobile agents using transformations." [S.l.] : [s.n.], 2004. http://137.193.200.177/ediss/braun-oliver/meta.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Burvall, Niklas. "Contact Center with Mobile Agents." Thesis, Uppsala University, Department of Information Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-98322.

Full text
Abstract:

A Contact Center assists a company with customer relations such as support and telemarketing using telephones but also with email, SMS and chat. Incoming calls are routed by the contact center to the best match according to the polices set up and the queue status. In a contact center context the person handling the calls is called an agent. It would be beneficial to be able to reach agents which are not at the contact center but at home or in the field.

This master thesis investigates how such a mobile agent can be connected to acontact center with respect to security, handling more than just voice interactions (i.e. chat and email) and requirements on network infrastructure from a mobile perspective. A prototype client is developed using Java ME connecting to a Genesys contact center, describing the requirements a client has on network, mobile device and security. The results show that eventhough a mobile agent is possible using todays technologies, some features still need to be added to the mobile phones API, such as better call control and keeping focus during incoming calls.

APA, Harvard, Vancouver, ISO, and other styles
5

Ma, Haiqing. "Network management by mobile agents." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ35073.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abbas, Shehla. "Distributed calculations using mobile agents." Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13716/document.

Full text
Abstract:
Cette thèse traite l’utilisation des agents mobiles dans le domaine des algo- rithmes distribués en les déplaçant de manière aléatoire dans le réseau. Initialement k agents mobiles ayant les identités uniques sont placés dans le réseau. On décrit un algorithme distribué pour calculer un arbre couvrant dans les réseaux dynamiques en utilisant les agents mobiles. Les agents marquent les noeuds sur les quelles ils arrivent. Ils utilisent deux techniques di?érentes : le clonage dans lequel un agent crée son propre clone pour faire quelques tâches et le marquage sur la tableau de bord (un espace mémoire sur les noeuds). Ces techniques sont utilisés dans les applications comme l’arbre couvrant, le rassemblement et la collecte d’information. Chacun des agents détient une information partielle. Quand deux ou plusieurs agents se rencontrent sur un noeud, ils fusionnent en un seul agent. On s’intéresse alors au temps nécessaire ou tous les k agents fusionnent en un seul et unique agent. On présent une chaîne de Markov pour le comportement des agents, et on montre comment on peut utiliser cette technique pour calculer la bourne supérieur. On étudie le même problème quand les agents mobile commencent la marche aléatoire sous un régime stationnaire. On a aussi étudié le problème de Handshake et on l’a analysé en utilisant les agents mobiles
This thesis deals with the use of mobile agents in distributed algorithms by performing random walks in the network. k mobile agents having unique identities are placed initially in a network. We describe a distributed algorithm for computing spanning trees in dynamic networks by using mobile agents. The agents mark the nodes on which they arrive. They use two di?erent techniques. In one problem they use the cloning in which an agent creates its own clone to do some task assigned. In the second, the mobile agents mark on the whiteboard (a memory location on the nodes). These techniques are used in applications such as spanning tree, gathering and collecting information. The mobile agents have limited knowledge and hence, they are not intelligent and do not have computational capabilities. When two or more agents meet at a node of the underlying graph, they merge into a single agent. The parameter of interest is the expected time for all the agents to merge into a single agent. We present a Markov chain, modelling the agents behavior, and show how this can be used to upper bound the expected time for all the k agents to merge into a single agent. We study the same problem when the mobile agents start their walk directly under stationary regime. Handshake problem is also studied and analyzed using mobile agents
APA, Harvard, Vancouver, ISO, and other styles
7

Baumann, Joachim. "Control algorithms for mobile agents." [S.l.] : Universität Stuttgart , Fakultät Informatik, 1999. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB8536753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tufekcioglu, Refik. "Communication models in mobile computing systems and mobile agents." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378775.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, March 2000.
Thesis advisor(s): Michael, James B. "March 2000." Includes bibliographical references (p. 131-137). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
9

Bouchard, Sébastien. "On the Deterministic Gathering of Mobile Agents." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS175.

Full text
Abstract:
Les systèmes distribués sont un modèle théorique capable de représenter une multitude de systèmes bâtis autour de la coopération d'entités autonomes dans le but d'accomplir une tâche commune. Leur champ applicatif est immense, et s'étend de l'informatique ou de la robotique, en modélisant des processus partageant la mémoire d'un ordinateur, des ordinateurs communiquant par envois de messages, ou encore des cohortes de robots, à la compréhension du comportement des animaux sociaux. Les agents mobiles font partie des entités étudiées dans ce domaine. Ils se distinguent des autres notamment par leur capacité à se déplacer spontanément. L'une des tâches les plus étudiées les mettant en scène est celle du rassemblement. Les agents mobiles sont dispersés dans un environnement inconnu. Aucun d'eux n'a d'informations à propos des autres, ou la capacité de communiquer avec eux, à moins de se trouver au même endroit. Chacun d'eux découvre peu à peu les environs, rencontre d'autres agents et se coordonne avec eux jusqu'à ce que tous soient rassemblés et le détectent. Une fois tous les agents rassemblés, ils peuvent communiquer et se coordonner pour une autre tâche. Cette thèse s'intéresse à la faisabilité et à l'efficience du rassemblement, en particulier face à deux difficultés majeures: l'asynchronie et l'occurrence de fautes Byzantines. Dans un contexte asynchrone, les agents n'ont aucun contrôle sur leur vitesse, qui peut varier arbitrairement et indépendamment des autres. Se coordonner est alors un défi. Quand une partie des agents subit des fautes Byzantines, on peut considérer ces agents comme malicieux, se fondant parmi les autres (bons) agents pour les induire en erreur et empêcher que le rassemblement ait lieu
Distributed systems are a theoretical model with a huge application field. It can represent a multitude of systems in which several autonomous entities cooperate to achieve a common task. The applications range from computer science related ones like processes sharing memory inside a computer, computers exchanging messages, and cohorts of robots to understanding social animals behavior. When the entities involved are able to move spontaneously, they are called mobile agents, and one of the most studied problems regarding mobile agents is gathering. The mobile agents are spread in an unknown environment, with no a priori information about the others and without the ability to communicate with other agents, unless colocated. Each of them gradually discovers its surroundings, meets some other agents, coordinates with them, until all agents are gathered and detect it. Once all agents gathered, they can communicate and coordinate for some future task. This thesis addresses the feasibility and complexity of gathering, in particular when facing two major difficulties: asynchrony and occurrence of Byzantine faults. When tackling the former, the agents have no control over their speed, which can vary arbitrarily and independently from each other. This makes coordination more challenging. When facing the latter, some of the agents are Byzantine, they can be viewed as malicious and using the difficulty to distinguish them from other (good) agents to try to prevent the gathering
APA, Harvard, Vancouver, ISO, and other styles
10

Shibli, Muhammad Awais. "Building Secure Systems using Mobile Agents." Thesis, KTH, Computer and Systems Sciences, DSV, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4622.

Full text
Abstract:

The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some interesting solution emerged like Intrusion Detection and Prevention systems, but these too have some problems, like detecting and responding in real time, because they mostly require inputs from system administrator. Optimistically, we have succeeded in protecting the hosts to some extent by applying the reactive approach, such as antivirus, firewall and intrusion detection and response systems, But, if we critically analyze this approach, we will reach the conclusion that it has inherent flaws, since the number of penetrations, Internet crime cases, identity and financial data thefts, etc. are rising exponentially in recent years. The main reason is that we are using only reactive approach, i.e. protection system is activated only when some security breach occurs. Secondly, current techniques try to fix the overall huge problem of security using only small remedies (firewall, antivirus and intrusion detection and preventions system) – “point solutions”. Therefore, there is a need to develop a strategy using Mobile Agents in order to operate in reactive and proactive manners, what requires providing security on the principle of defense in depth. So, that ultimate goal of securing a system as a whole can be achieved. System is assumed to be secure if unauthorized access (penetrations) is not possible and system is safe against damages. This strategy will include three aspects: (a) autonomously detect vulnerabilities on different hosts (in a distributed network) before an attacker can exploit (b) protect hosts by detecting attempts of intrusions and responding to them in real time; and finally (c) perform tasks related to security management.

APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Mobile agents"

1

Cockayne, William R. Mobile agents. Greenwich, CT: Manning, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rothermel, Kurt, and Radu Popescu-Zeletin, eds. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rothermel, Kurt, and Fritz Hohl, eds. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0057642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Suri, Niranjan, ed. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36112-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Picco, Gian Pietro, ed. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45647-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nyein, Pyah. Mobile agents. Oxford: Oxford Brookes University, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Giovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kotz, David, and Friedemann Mattern, eds. Agent Systems, Mobile Agents, and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/b75241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baumann, Joachim. Mobile Agents: Control Algorithms. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10704127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vigna, Giovanni, ed. Mobile Agents and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-68671-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Mobile agents"

1

Satoh, Ichiro. "Mobile Agents." In Handbook of Ambient Intelligence and Smart Environments, 771–91. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-93808-0_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oliveira, Luiz A. G., Paulo C. Oliveira, and Eleri Cardozo. "An agent-based approach for quality of service negotiation and management in distributed multimedia systems." In Mobile Agents, 1–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Baldi, Mario, Silvano Gai, and Gian Pietro Picco. "Exploiting code mobility in decentralized and flexible network management." In Mobile Agents, 13–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liberman, B., F. Griffel, M. Merz, and W. Lamersdorf. "Java-based mobile agents — How to migrate, persist, and interact on electronic service markets." In Mobile Agents, 27–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ghezzi, Carlo, and Giovanni Vigna. "Mobile code paradigms and technologies: A case study." In Mobile Agents, 39–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Peine, Holger, and Torsten Stolpmann. "The architecture of the ara platform for mobile agents." In Mobile Agents, 50–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Park, Anthony Sang-Bum, and Stefan Leuker. "A multi-agent architecture supporting services access." In Mobile Agents, 62–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schulze, B., and E. R. M. Madeira. "Contracting and moving agents in distributed applications based on a service-oriented architecture." In Mobile Agents, 74–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wong, David, Noemi Paciorek, Tom Walsh, Joe DiCelie, Mike Young, and Bill Peet. "Concordia: An infrastructure for collaborating mobile agents." In Mobile Agents, 86–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chang, Daniel T., and Stefan Covaci. "The OMG mobile agent facility: A submission." In Mobile Agents, 98–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mobile agents"

1

Honda, Jason, Harry H. Cheng, and Donna D. Djordjevich. "Mobile Agents and Related Features for Real Time First Responder Training Systems." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87450.

Full text
Abstract:
This article discusses how mobile agents and scripting technology can play an important role in first-responder training simulations. From a training perspective, the power of mobile agents can greatly improve the training experience if they are easy to use and integrate and have the necessary power. Certain features should be available to mobile agents in applications such as this. As opposed to traditional mobile agent applications, supplementing a real-time training system with a mobile agent system requires many features so that agents integrate appropriately with the running application. Mobile agents with the ability to interface with the running binary application and with the features discussed in this paper can be very effective and valuable. This paper looks at the features that are necessary. We implement these features into a mobile agent system, Mobile-FIRST, and then examine its use in a first responder training video game currently in production. Using a system with these principles, integration of mobile agents becomes simple and intuitive, and can greatly improve the application in many different ways.
APA, Harvard, Vancouver, ISO, and other styles
2

Malik, Najmus Saqib, David Ko, and Harry H. Cheng. "A Secure Migration Protocol for Mobile Agent Systems." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87613.

Full text
Abstract:
This paper describes a secure migration process of mobile agents between agencies. Mobile-C is an IEEE Foundation for Intelligent Physical Agents (FIPA) standard compliant multi-agent platform for supporting C/C++ mobile and stationary agents. This secure migration process is inspired from Secure Shell (SSH). Before migration, both agencies authenticate each other using public key authentication. After successful authentication, an encrypted mobile agent is transferred and its integrity is verified. Mobile-C is specially designed for mechatronic and factory automation systems where, for correct system operations, agencies must accept mobile agents from trusted agencies. For this reason, the emphasis is on strong authentication of both agencies involved in migration process. Security aspects of other popular mobile agent systems are described briefly. A comparison study with SSH protocol is performed and future work is elaborated.
APA, Harvard, Vancouver, ISO, and other styles
3

Chou, Yu-Cheng, David Ko, and Harry H. Cheng. "Embeddable Mobile-C for Runtime Support of Code Mobility in Multi-Agent Systems." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35747.

Full text
Abstract:
Agent technology is emerging as an important concept for the development of distributed complex systems. A number of mobile agent systems have been developed in the last decade. However, most of them were developed to support only Java mobile agents. Furthermore, many of them are standalone platforms. In other words, they were not designed to be embedded in a user application to support the code mobility. In order to provide distributed applications with the code mobility, this article presents a mobile agent library, the Mobile-C library. The Mobile-C library is supported by various operating systems including Windows, Unix, and real-time operating systems. It has a small footprint to meet the stringent memory capacity for a variety of mechatronic and embedded systems. This library allows a Mobile-C agency, a mobile agent platform, to be embedded in a program to support C/C++ mobile agents. Functions in this library facilitate the development of a multi-agent system that can easily interface with a variety of hardware devices.
APA, Harvard, Vancouver, ISO, and other styles
4

Lal, Mayank, Swaminathan Sethuraman, Suhada Jayasuriya, and J. Maurice Rojas. "A New Method of Motion Coordination of a Group of Mobile Agents." In ASME 2006 International Mechanical Engineering Congress and Exposition. ASMEDC, 2006. http://dx.doi.org/10.1115/imece2006-14043.

Full text
Abstract:
This paper presents a new method for coordinated motion planning of multiple mobile agents. The position in 2-D of each mobile agent is mapped to a complex number and a time varying polynomial contains information regarding the current positions of all mobile agents, the degree of the polynomial being the number of mobile agents and the roots of the polynomial representing the position in 2-D of the mobile agents at a given time. This polynomial is constructed by finding a path parameterized in time from the initial to the goal polynomial which represent the initial and goal positions of the mobile agents so that the discriminant variety or the set of polynomials with multiple roots is avoided in polynomial space. This is equivalent to saying that there is no collision between any two agents in going from initial position to goal position.
APA, Harvard, Vancouver, ISO, and other styles
5

Mena, Eduardo, and Carlos Bobed. "Mobile Agents for Mobile Games." In MobiSys'15: The 13th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751496.2751500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kalakota, R., J. Stallaert, and A. B. Whinston. "Mobile agents and mobile workers." In Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences. IEEE, 1996. http://dx.doi.org/10.1109/hicss.1996.493231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Tie-Yan, and Kwok-Yan Lam. "Detecting anomalous agents in mobile agent system." In the first international joint conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/544862.544894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tomlinson, Bill, Man Lok Yau, and Eric Baumer. "Embodied mobile agents." In the fifth international joint conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1160633.1160807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aouadi, H., and M. B. Ahmed. "Mobile agents security." In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.207201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ueda, Leo Kazuhiro, and Fabio Kon. "Mobile musical agents." In Companion to the 19th annual ACM SIGPLAN conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1028664.1028752.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Mobile agents"

1

Rus, Daniela. Mobile Information Agents. Fort Belvoir, VA: Defense Technical Information Center, April 2001. http://dx.doi.org/10.21236/ada387701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Burmester, Mike, and Alex Yasinsac. Secure Tactical Mobile Intelligent Agents. Fort Belvoir, VA: Defense Technical Information Center, September 2004. http://dx.doi.org/10.21236/ada427578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kassab, Lora L., and Jeffrey Voas. Towards Fault-Tolerant Mobile Agents. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada465330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schneider, Fred B., and Gregory Morrisett. Mobile Agents and Systems Principles. Fort Belvoir, VA: Defense Technical Information Center, December 1999. http://dx.doi.org/10.21236/ada381524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Qi, Hairong, S. S. Iyengar, and Krishnendu Chakrabarty. Distributed Multi-Resolution Data Integration Using Mobile Agents. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada440144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jansen, Wayne, Peter Mell, Tom Karygiannis, and Don Marks. Applying mobile agents to intrusion detection and response. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Arkko, J., V. Devarapalli, and F. Dupont. Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents. RFC Editor, June 2004. http://dx.doi.org/10.17487/rfc3776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yokota, H., D. Kim, B. Sarikaya, and F. Xia. Flow Bindings Initiated by Home Agents for Mobile IPv6. RFC Editor, February 2014. http://dx.doi.org/10.17487/rfc7109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Valetto, Giuseppe, and Gail Kaiser. Combining Mobile Agents and Process-Based Coordination to Achieve Software Adaptation. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada451580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Diouf, Awa, Marco Carreras, and Fabrizio Santoro. Taxing Mobile Money in Kenya: Impact on Financial Inclusion. Institute of Development Studies, June 2023. http://dx.doi.org/10.19088/ictd.2023.030.

Full text
Abstract:
Many people argue that mobile money has the potential to increase financial inclusion and improve the livelihoods of poor people in Africa. However, while many African governments impose specific taxes on mobile money transactions, very little is known about their effect on the use of mobile money services. This study assesses the short- and long-term impact of the tax on money transfer fees that the Kenyan government introduced in 2013. The tax, more specifically an excise duty, was imposed on fees incurred in all money transactions, including mobile money. It was introduced at 10 per cent and increased to 12 per cent in 2018. Our analysis has two parts. We use country-level data to see if the tax affected the use of mobile money – transaction values and volume – and the number of active mobile money agents. In addition, we use four rounds of nationally representative survey data to estimate changes in the use of mobile money after introduction of the tax. We find that the excise duty did not have a significant impact on different aggregated indicators relating to the use of mobile money. However, survey data shows that the tax may have reduced the rate of increase in use of mobile money services affected by the changes in tax, such as sending and receiving money, compared to services that were not, like savings and paying bills. Importantly, while the amounts transacted may not change, users send and receive money within households less regularly. In addition, the tax seems to have a more detrimental impact on poorer households, which were less likely to be financially included before the tax was introduced. Larger households also show more negative effects after the tax. URI
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography