Dissertations / Theses on the topic 'Mobile agents'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Mobile agents.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Vanzan, Alessio <1993>. "Mobile Agents Rendezvous in Networks Despite a Malicious Agent." Master's Degree Thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/10604.
Full textTajer, Jean. "Detection of malicious hosts against agents in Mobile Agent networks." Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/detection-of-malicious-hosts-against-agents-in-mobile-agent-networks(beca3871-a989-4137-9a4d-13c88d8893d9).html.
Full textBraun, Oliver. "Constructing mobile agents using transformations." [S.l.] : [s.n.], 2004. http://137.193.200.177/ediss/braun-oliver/meta.html.
Full textBurvall, Niklas. "Contact Center with Mobile Agents." Thesis, Uppsala University, Department of Information Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-98322.
Full textA Contact Center assists a company with customer relations such as support and telemarketing using telephones but also with email, SMS and chat. Incoming calls are routed by the contact center to the best match according to the polices set up and the queue status. In a contact center context the person handling the calls is called an agent. It would be beneficial to be able to reach agents which are not at the contact center but at home or in the field.
This master thesis investigates how such a mobile agent can be connected to acontact center with respect to security, handling more than just voice interactions (i.e. chat and email) and requirements on network infrastructure from a mobile perspective. A prototype client is developed using Java ME connecting to a Genesys contact center, describing the requirements a client has on network, mobile device and security. The results show that eventhough a mobile agent is possible using todays technologies, some features still need to be added to the mobile phones API, such as better call control and keeping focus during incoming calls.
Ma, Haiqing. "Network management by mobile agents." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ35073.pdf.
Full textAbbas, Shehla. "Distributed calculations using mobile agents." Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13716/document.
Full textThis thesis deals with the use of mobile agents in distributed algorithms by performing random walks in the network. k mobile agents having unique identities are placed initially in a network. We describe a distributed algorithm for computing spanning trees in dynamic networks by using mobile agents. The agents mark the nodes on which they arrive. They use two di?erent techniques. In one problem they use the cloning in which an agent creates its own clone to do some task assigned. In the second, the mobile agents mark on the whiteboard (a memory location on the nodes). These techniques are used in applications such as spanning tree, gathering and collecting information. The mobile agents have limited knowledge and hence, they are not intelligent and do not have computational capabilities. When two or more agents meet at a node of the underlying graph, they merge into a single agent. The parameter of interest is the expected time for all the agents to merge into a single agent. We present a Markov chain, modelling the agents behavior, and show how this can be used to upper bound the expected time for all the k agents to merge into a single agent. We study the same problem when the mobile agents start their walk directly under stationary regime. Handshake problem is also studied and analyzed using mobile agents
Baumann, Joachim. "Control algorithms for mobile agents." [S.l.] : Universität Stuttgart , Fakultät Informatik, 1999. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB8536753.
Full textTufekcioglu, Refik. "Communication models in mobile computing systems and mobile agents." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378775.
Full textThesis advisor(s): Michael, James B. "March 2000." Includes bibliographical references (p. 131-137). Also available in print.
Bouchard, Sébastien. "On the Deterministic Gathering of Mobile Agents." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS175.
Full textDistributed systems are a theoretical model with a huge application field. It can represent a multitude of systems in which several autonomous entities cooperate to achieve a common task. The applications range from computer science related ones like processes sharing memory inside a computer, computers exchanging messages, and cohorts of robots to understanding social animals behavior. When the entities involved are able to move spontaneously, they are called mobile agents, and one of the most studied problems regarding mobile agents is gathering. The mobile agents are spread in an unknown environment, with no a priori information about the others and without the ability to communicate with other agents, unless colocated. Each of them gradually discovers its surroundings, meets some other agents, coordinates with them, until all agents are gathered and detect it. Once all agents gathered, they can communicate and coordinate for some future task. This thesis addresses the feasibility and complexity of gathering, in particular when facing two major difficulties: asynchrony and occurrence of Byzantine faults. When tackling the former, the agents have no control over their speed, which can vary arbitrarily and independently from each other. This makes coordination more challenging. When facing the latter, some of the agents are Byzantine, they can be viewed as malicious and using the difficulty to distinguish them from other (good) agents to try to prevent the gathering
Shibli, Muhammad Awais. "Building Secure Systems using Mobile Agents." Thesis, KTH, Computer and Systems Sciences, DSV, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4622.
Full textThe progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some interesting solution emerged like Intrusion Detection and Prevention systems, but these too have some problems, like detecting and responding in real time, because they mostly require inputs from system administrator. Optimistically, we have succeeded in protecting the hosts to some extent by applying the reactive approach, such as antivirus, firewall and intrusion detection and response systems, But, if we critically analyze this approach, we will reach the conclusion that it has inherent flaws, since the number of penetrations, Internet crime cases, identity and financial data thefts, etc. are rising exponentially in recent years. The main reason is that we are using only reactive approach, i.e. protection system is activated only when some security breach occurs. Secondly, current techniques try to fix the overall huge problem of security using only small remedies (firewall, antivirus and intrusion detection and preventions system) – “point solutions”. Therefore, there is a need to develop a strategy using Mobile Agents in order to operate in reactive and proactive manners, what requires providing security on the principle of defense in depth. So, that ultimate goal of securing a system as a whole can be achieved. System is assumed to be secure if unauthorized access (penetrations) is not possible and system is safe against damages. This strategy will include three aspects: (a) autonomously detect vulnerabilities on different hosts (in a distributed network) before an attacker can exploit (b) protect hosts by detecting attempts of intrusions and responding to them in real time; and finally (c) perform tasks related to security management.
Sun, Kuan Ieong. "The secure wireless mobile agents system." Thesis, University of Macau, 2003. http://umaclib3.umac.mo/record=b1447897.
Full textShibli, Awais. "Security Infrastructure and Applicationsfor Mobile Agents." Doctoral thesis, KTH, Data- och systemvetenskap, DSV, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-12764.
Full textQC20100525
Wagealla, Waleed. "Reliable mobile agents for distributed computing." Thesis, Nottingham Trent University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.272441.
Full textMcInerney, James. "Intelligent agents for mobile location services." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/365495/.
Full textGiansiracusa, Michelangelo Antonio. "A secure infrastructural strategy for safe autonomous mobile agents." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16052/1/Michaelangelo_Giansiracusa_Thesis.pdf.
Full textGiansiracusa, Michelangelo Antonio. "A Secure Infrastructural Strategy for Safe Autonomous Mobile Agents." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16052/.
Full textTang, Zhijun. "Information-theoretic management of mobile sensor agents." Connect to resource, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1126882086.
Full textTitle from first page of PDF file. Document formatted into pages; contains xiii, 170 p.; also includes graphics (some col.). Includes bibliographical references (p. 162-170). Available online via OhioLINK's ETD Center
Miller, Paul Sheridan Mikler Armin. "Automated syndromic surveillance using intelligent mobile agents." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5141.
Full textHanumantha, Rao Karthik. "Dynamic configuration management using mobile intelligent agents." Thesis, Wichita State University, 2009. http://hdl.handle.net/10057/2430.
Full textThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering
Basha, Nagi Nabil. "Survey and analysis of intelligent mobile agents." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32754.
Full textThis survey reviews the field of mobile agents by summarizing the key concepts and giving an overview of the most important implementations. Design and implementation issues of mobile agents are analyzed in general. Some of the most important mobile agent systems are presented and discussed. Java's support for mobile agent development is thoroughly examined. In addition, the role of the Common Object Request Broker Architecture (CORBA) as a broker between mobile agents and their environment is also analyzed. Most importantly, a survey of the major security concerns is provided followed by an analysis of the currently available techniques to address these concerns. Last but not least, a detailed analysis of the Foundation for Intelligent Physical Agents (FIPA) standards for interoperability between heterogeneous agents and their hosts is included. This survey will help in understanding the potentials of mobile agents and why they have not caught on. Once progress is made in the areas of security, programming language support for specific mobile agent requirements, and standards for coordination between heterogeneous agents, it is expected that the mobile agent paradigm will dramatically revolutionize the way the Internet is being used now.
Seymour, Mark. "Automating Internet auctions with adaptable mobile agents." Thesis, University College London (University of London), 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313025.
Full textKalogridis, Georgios. "Preemptive mobile code protection using spy agents." Thesis, Royal Holloway, University of London, 2011. http://repository.royalholloway.ac.uk/items/1863e436-1c99-0cae-8a59-c6bee0c9553e/9/.
Full textKarousatou, Christina. "Distributed algorithms for energy constrained mobile agents." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0373/document.
Full textIn this thesis we study and design algorithms for solving various well-known problems for mobile agents moving on a graph, with the additional constraint of limited energy which restricts the movement of the agents. Each mobile agent is an entity, equipped with a battery, that can traverse the edges of the graph and visit the nodes of the graph, consuming a part of its energy for movement. In contrast to various well-studied models for mobile agents, very little research has been conducted for the model considering the energy limitations. We study the fundamental problems of graph exploration, gathering and collaborative delivery in this model
Bohoris, Christos. "Network performance management using mobile software agents." Thesis, University of Surrey, 2003. http://epubs.surrey.ac.uk/844000/.
Full textBarbu, Andreea. "Developing mobile agents through a formal approach." Paris 12, 2005. https://athena.u-pec.fr/primo-explore/search?query=any,exact,990002282380204611&vid=upec.
Full textThis thesis deals with the modelling and validation of mobile agent systems. The development of a support structure for mobile agents demans the development of solutions for set of specific problems that appear due to mobility. A basic question in software development is if the proposed program is really a solution for the considered problem. One way to answer this question is through the use of formal methods. In our approach, the first step is to build a model of the solution (specification) using the higher-order Pi-calculus. Having this formal model as a base, we can : validate the model through simulations ; carry out mathematical tests to guarantee that this model possesses the required properties (verification) ; being able to prove that the implementation is correct with respect to the specification. Making use of our results, we have implemented a prototype called HOPiTool which allows the possibility of validation of mobile agent systems conceived with higher-order Pi-calc
Miller, Paul. "Automated Syndromic Surveillance using Intelligent Mobile Agents." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc5141/.
Full textBarbu, Andreea Best Eike Pelz Elisabeth. "Developing mobile agents through a formal approach." Créteil : Oldenburg : Université de Paris-Val-de-Marne ; Carl von Ossietzky-Forschungsstelle, 2005. http://doxa.scd.univ-paris12.fr:80/theses/th0228238.pdf.
Full textThèse soutenue en co-tutelle. Titre provenant de l'écran-titre. Bibliogr. p. 166173. Index.
Sriraman, Sandhya. "An Annotated Bibliography of Mobile Agents in Networks." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3310/.
Full textDengiz, Orhan Smith Alice E. "Maximizing connectivity and performance in mobile ad hoc networks using mobile agents." Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Fall%20Dissertations/Dengiz_Orhan_22.pdf.
Full textTyagi, Satyam. "Extensions to Jinni Mobile Agent Architecture." Thesis, University of North Texas, 2001. https://digital.library.unt.edu/ark:/67531/metadc2773/.
Full textChen, Yao. "YAVO, on-line trading system using mobile agents." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0023/MQ51991.pdf.
Full textPourafzal, Ashkan. "MEROMA, Managing the Environmental Resources of Mobile Agents." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0023/MQ50859.pdf.
Full textWang, YunBo. "The applicability of mobile agents, a comparative study." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0017/MQ55253.pdf.
Full textVelazquez, Elio. "Mobile agents in distributed search, a comparative study." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ57761.pdf.
Full textPourafzal, Ashkan. "Meroma : managing the environmental resources of mobile agents." Thesis, McGill University, 1998. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=21626.
Full textIt is apparent from the previous analogy with the nomads, that environmental resources play a crucial role in the agent's lifecycle. Even though most agent systems provide environmental resource management of agents to some degree, not all aspects of resource management are in place yet. If the industry continues to embrace mobile agentry, there will be a gargantous amount of heterogeneous agent systems and agents in the near future. Bearing in mind this fact, as well as the dynamic nature of mobile agents and environmental resources, environmental resource management is strongly recommended.
In this thesis, we present the criteria to be considered as environmental resources of the agents. We analyze in detail the agent paradigm to find where environmental resource management should be applied, and, based on our analysis, present two solutions to enhance the applicability of the agent paradigm. For completeness, we present similar work in other agent groups.
Perez, Diaz Fernando. "Firey-inspired synchronization in swarms of mobile agents." Thesis, University of Sheffield, 2016. http://etheses.whiterose.ac.uk/16552/.
Full textVelazquez, Elio Carleton University Dissertation Computer Science. "Mobile agents in distributed search: a comparative study." Ottawa, 2001.
Find full textGonzález, Marta C. "Contact networks of mobile agents and spreading dynamics." [S.l. : s.n.], 2006. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-29332.
Full textArumugam, Subramanian. "aZIMAS Web mobile agent system /." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000632.
Full textXu, Ke. "Mobile agent security through multi-agent cryptographic protocols." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4473/.
Full textGünter, Manuel. "Customer-based IP service monitoring with mobile software agents /." Basel [u.a.] : Birkhäuser, 2002. http://www.loc.gov/catdir/enhancements/fy0812/2002074391-d.html.
Full textGunupudi, Vandana. "Performance Evaluation of Data Integrity Mechanisms for Mobile Agents." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4366/.
Full textCarlier, David. "Représentation permanente, coordonnée par une carte à microprocesseur, d'un utilisateur mobile." Lille 1, 1998. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/1998/50376-1998-27.pdf.
Full textLal, Mayank. "Motion planning algorithms for a group of mobile agents." Texas A&M University, 2008. http://hdl.handle.net/1969.1/86038.
Full textCozzolino, Clifford Joseph. "DADS - A Distributed Agent Delivery System." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3352/.
Full textAmin, Kaizar Abdul Husain. "Resource Efficient and Scalable Routing using Intelligent Mobile Agents." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4240/.
Full textINAGAKI, Yasuyoshi, Katsuhiko TOYAMA, and Nobuo KAWAGUCHI. "MAGNET: ad hoc network system based on mobile agents." Elsevier, 2000. http://hdl.handle.net/2237/15448.
Full textKalyani, Yogesh. "Towards the use of mobile agents for privacy negotiation." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27379.
Full textAl-Jaljouli, Raja Computer Science & Engineering Faculty of Engineering UNSW. "A proposed security protocol for data gathering mobile agents." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/23999.
Full textFan, Xiaobo. "Applying mobile agents to implement resilient authentication in networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0021/MQ55053.pdf.
Full text