Literatura académica sobre el tema "Mobile agents"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Mobile agents".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Mobile agents"
Elijah y Muhammad Naveed Dilber. "Complete Analysis of Fault Tolerance Schemes in Mobile Agents for a Reliable Mobile Agent Computation". Bonfring International Journal of Industrial Engineering and Management Science 7, n.º 1 (31 de marzo de 2017): 20–24. http://dx.doi.org/10.9756/bijiems.8322.
Texto completoDiepolder, S. y K. H. Krempels. "Mobile Agenten. Mobile Agents". PIK - Praxis der Informationsverarbeitung und Kommunikation 29, n.º 4 (diciembre de 2006): 203–7. http://dx.doi.org/10.1515/piko.2006.203.
Texto completoHuhns, M. N. y M. P. Singh. "Mobile agents". IEEE Internet Computing 1, n.º 3 (1997): 80–82. http://dx.doi.org/10.1109/4236.589200.
Texto completoReddy, Parineeth M. "Mobile agents". Resonance 7, n.º 7 (julio de 2002): 35–43. http://dx.doi.org/10.1007/bf02836751.
Texto completoBorawake-Satao, Rachana y Rajesh Shardanand Prasad. "Mobile Sink with Mobile Agents". International Journal of Rough Sets and Data Analysis 4, n.º 2 (abril de 2017): 24–35. http://dx.doi.org/10.4018/ijrsda.2017040102.
Texto completoLeppänen, Teemu, José Álvarez Lacasia, Yoshito Tobe, Kaoru Sezaki y Jukka Riekki. "Mobile crowdsensing with mobile agents". Autonomous Agents and Multi-Agent Systems 31, n.º 1 (24 de octubre de 2015): 1–35. http://dx.doi.org/10.1007/s10458-015-9311-7.
Texto completoDalmeijer, M., D. K. Hammer y A. T. M. Aerts. "Mobile software agents". Computers in Industry 41, n.º 3 (mayo de 2000): 251–60. http://dx.doi.org/10.1016/s0166-3615(99)00047-0.
Texto completoMartins, Rosane Maria, Magali Ribeiro Chaves, Luci Pirmez y Luiz Fernando Rust da Costa Carmo. "Mobile agents applications". Internet Research 11, n.º 1 (marzo de 2001): 49–54. http://dx.doi.org/10.1108/10662240110365715.
Texto completoZrari, Chadha, Hela Hachicha y Khaled Ghedira. "Agent's Security During Communication in Mobile Agents System". Procedia Computer Science 60 (2015): 17–26. http://dx.doi.org/10.1016/j.procs.2015.08.100.
Texto completoKovacs, Ern�, Klaus R�hrle y Matthias Reich. "Integrating mobile agents into the mobile middleware". Personal Technologies 2, n.º 2 (junio de 1998): 68–74. http://dx.doi.org/10.1007/bf01324936.
Texto completoTesis sobre el tema "Mobile agents"
Vanzan, Alessio <1993>. "Mobile Agents Rendezvous in Networks Despite a Malicious Agent". Master's Degree Thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/10604.
Texto completoTajer, Jean. "Detection of malicious hosts against agents in Mobile Agent networks". Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/detection-of-malicious-hosts-against-agents-in-mobile-agent-networks(beca3871-a989-4137-9a4d-13c88d8893d9).html.
Texto completoBraun, Oliver. "Constructing mobile agents using transformations". [S.l.] : [s.n.], 2004. http://137.193.200.177/ediss/braun-oliver/meta.html.
Texto completoBurvall, Niklas. "Contact Center with Mobile Agents". Thesis, Uppsala University, Department of Information Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-98322.
Texto completoA Contact Center assists a company with customer relations such as support and telemarketing using telephones but also with email, SMS and chat. Incoming calls are routed by the contact center to the best match according to the polices set up and the queue status. In a contact center context the person handling the calls is called an agent. It would be beneficial to be able to reach agents which are not at the contact center but at home or in the field.
This master thesis investigates how such a mobile agent can be connected to acontact center with respect to security, handling more than just voice interactions (i.e. chat and email) and requirements on network infrastructure from a mobile perspective. A prototype client is developed using Java ME connecting to a Genesys contact center, describing the requirements a client has on network, mobile device and security. The results show that eventhough a mobile agent is possible using todays technologies, some features still need to be added to the mobile phones API, such as better call control and keeping focus during incoming calls.
Ma, Haiqing. "Network management by mobile agents". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ35073.pdf.
Texto completoAbbas, Shehla. "Distributed calculations using mobile agents". Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13716/document.
Texto completoThis thesis deals with the use of mobile agents in distributed algorithms by performing random walks in the network. k mobile agents having unique identities are placed initially in a network. We describe a distributed algorithm for computing spanning trees in dynamic networks by using mobile agents. The agents mark the nodes on which they arrive. They use two di?erent techniques. In one problem they use the cloning in which an agent creates its own clone to do some task assigned. In the second, the mobile agents mark on the whiteboard (a memory location on the nodes). These techniques are used in applications such as spanning tree, gathering and collecting information. The mobile agents have limited knowledge and hence, they are not intelligent and do not have computational capabilities. When two or more agents meet at a node of the underlying graph, they merge into a single agent. The parameter of interest is the expected time for all the agents to merge into a single agent. We present a Markov chain, modelling the agents behavior, and show how this can be used to upper bound the expected time for all the k agents to merge into a single agent. We study the same problem when the mobile agents start their walk directly under stationary regime. Handshake problem is also studied and analyzed using mobile agents
Baumann, Joachim. "Control algorithms for mobile agents". [S.l.] : Universität Stuttgart , Fakultät Informatik, 1999. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB8536753.
Texto completoTufekcioglu, Refik. "Communication models in mobile computing systems and mobile agents". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378775.
Texto completoThesis advisor(s): Michael, James B. "March 2000." Includes bibliographical references (p. 131-137). Also available in print.
Bouchard, Sébastien. "On the Deterministic Gathering of Mobile Agents". Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS175.
Texto completoDistributed systems are a theoretical model with a huge application field. It can represent a multitude of systems in which several autonomous entities cooperate to achieve a common task. The applications range from computer science related ones like processes sharing memory inside a computer, computers exchanging messages, and cohorts of robots to understanding social animals behavior. When the entities involved are able to move spontaneously, they are called mobile agents, and one of the most studied problems regarding mobile agents is gathering. The mobile agents are spread in an unknown environment, with no a priori information about the others and without the ability to communicate with other agents, unless colocated. Each of them gradually discovers its surroundings, meets some other agents, coordinates with them, until all agents are gathered and detect it. Once all agents gathered, they can communicate and coordinate for some future task. This thesis addresses the feasibility and complexity of gathering, in particular when facing two major difficulties: asynchrony and occurrence of Byzantine faults. When tackling the former, the agents have no control over their speed, which can vary arbitrarily and independently from each other. This makes coordination more challenging. When facing the latter, some of the agents are Byzantine, they can be viewed as malicious and using the difficulty to distinguish them from other (good) agents to try to prevent the gathering
Shibli, Muhammad Awais. "Building Secure Systems using Mobile Agents". Thesis, KTH, Computer and Systems Sciences, DSV, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4622.
Texto completoThe progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some interesting solution emerged like Intrusion Detection and Prevention systems, but these too have some problems, like detecting and responding in real time, because they mostly require inputs from system administrator. Optimistically, we have succeeded in protecting the hosts to some extent by applying the reactive approach, such as antivirus, firewall and intrusion detection and response systems, But, if we critically analyze this approach, we will reach the conclusion that it has inherent flaws, since the number of penetrations, Internet crime cases, identity and financial data thefts, etc. are rising exponentially in recent years. The main reason is that we are using only reactive approach, i.e. protection system is activated only when some security breach occurs. Secondly, current techniques try to fix the overall huge problem of security using only small remedies (firewall, antivirus and intrusion detection and preventions system) – “point solutions”. Therefore, there is a need to develop a strategy using Mobile Agents in order to operate in reactive and proactive manners, what requires providing security on the principle of defense in depth. So, that ultimate goal of securing a system as a whole can be achieved. System is assumed to be secure if unauthorized access (penetrations) is not possible and system is safe against damages. This strategy will include three aspects: (a) autonomously detect vulnerabilities on different hosts (in a distributed network) before an attacker can exploit (b) protect hosts by detecting attempts of intrusions and responding to them in real time; and finally (c) perform tasks related to security management.
Libros sobre el tema "Mobile agents"
Cockayne, William R. Mobile agents. Greenwich, CT: Manning, 1998.
Buscar texto completoRothermel, Kurt y Radu Popescu-Zeletin, eds. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7.
Texto completoRothermel, Kurt y Fritz Hohl, eds. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0057642.
Texto completoSuri, Niranjan, ed. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36112-x.
Texto completoPicco, Gian Pietro, ed. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45647-3.
Texto completoNyein, Pyah. Mobile agents. Oxford: Oxford Brookes University, 2001.
Buscar texto completoGiovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.
Buscar texto completoKotz, David y Friedemann Mattern, eds. Agent Systems, Mobile Agents, and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/b75241.
Texto completoBaumann, Joachim. Mobile Agents: Control Algorithms. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10704127.
Texto completoVigna, Giovanni, ed. Mobile Agents and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-68671-1.
Texto completoCapítulos de libros sobre el tema "Mobile agents"
Satoh, Ichiro. "Mobile Agents". En Handbook of Ambient Intelligence and Smart Environments, 771–91. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-93808-0_29.
Texto completoOliveira, Luiz A. G., Paulo C. Oliveira y Eleri Cardozo. "An agent-based approach for quality of service negotiation and management in distributed multimedia systems". En Mobile Agents, 1–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_19.
Texto completoBaldi, Mario, Silvano Gai y Gian Pietro Picco. "Exploiting code mobility in decentralized and flexible network management". En Mobile Agents, 13–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_20.
Texto completoLiberman, B., F. Griffel, M. Merz y W. Lamersdorf. "Java-based mobile agents — How to migrate, persist, and interact on electronic service markets". En Mobile Agents, 27–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_21.
Texto completoGhezzi, Carlo y Giovanni Vigna. "Mobile code paradigms and technologies: A case study". En Mobile Agents, 39–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_22.
Texto completoPeine, Holger y Torsten Stolpmann. "The architecture of the ara platform for mobile agents". En Mobile Agents, 50–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_23.
Texto completoPark, Anthony Sang-Bum y Stefan Leuker. "A multi-agent architecture supporting services access". En Mobile Agents, 62–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_24.
Texto completoSchulze, B. y E. R. M. Madeira. "Contracting and moving agents in distributed applications based on a service-oriented architecture". En Mobile Agents, 74–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_25.
Texto completoWong, David, Noemi Paciorek, Tom Walsh, Joe DiCelie, Mike Young y Bill Peet. "Concordia: An infrastructure for collaborating mobile agents". En Mobile Agents, 86–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_26.
Texto completoChang, Daniel T. y Stefan Covaci. "The OMG mobile agent facility: A submission". En Mobile Agents, 98–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_27.
Texto completoActas de conferencias sobre el tema "Mobile agents"
Honda, Jason, Harry H. Cheng y Donna D. Djordjevich. "Mobile Agents and Related Features for Real Time First Responder Training Systems". En ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87450.
Texto completoMalik, Najmus Saqib, David Ko y Harry H. Cheng. "A Secure Migration Protocol for Mobile Agent Systems". En ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87613.
Texto completoChou, Yu-Cheng, David Ko y Harry H. Cheng. "Embeddable Mobile-C for Runtime Support of Code Mobility in Multi-Agent Systems". En ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35747.
Texto completoLal, Mayank, Swaminathan Sethuraman, Suhada Jayasuriya y J. Maurice Rojas. "A New Method of Motion Coordination of a Group of Mobile Agents". En ASME 2006 International Mechanical Engineering Congress and Exposition. ASMEDC, 2006. http://dx.doi.org/10.1115/imece2006-14043.
Texto completoMena, Eduardo y Carlos Bobed. "Mobile Agents for Mobile Games". En MobiSys'15: The 13th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751496.2751500.
Texto completoKalakota, R., J. Stallaert y A. B. Whinston. "Mobile agents and mobile workers". En Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences. IEEE, 1996. http://dx.doi.org/10.1109/hicss.1996.493231.
Texto completoLi, Tie-Yan y Kwok-Yan Lam. "Detecting anomalous agents in mobile agent system". En the first international joint conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/544862.544894.
Texto completoTomlinson, Bill, Man Lok Yau y Eric Baumer. "Embodied mobile agents". En the fifth international joint conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1160633.1160807.
Texto completoAouadi, H. y M. B. Ahmed. "Mobile agents security". En IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.207201.
Texto completoUeda, Leo Kazuhiro y Fabio Kon. "Mobile musical agents". En Companion to the 19th annual ACM SIGPLAN conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1028664.1028752.
Texto completoInformes sobre el tema "Mobile agents"
Rus, Daniela. Mobile Information Agents. Fort Belvoir, VA: Defense Technical Information Center, abril de 2001. http://dx.doi.org/10.21236/ada387701.
Texto completoBurmester, Mike y Alex Yasinsac. Secure Tactical Mobile Intelligent Agents. Fort Belvoir, VA: Defense Technical Information Center, septiembre de 2004. http://dx.doi.org/10.21236/ada427578.
Texto completoKassab, Lora L. y Jeffrey Voas. Towards Fault-Tolerant Mobile Agents. Fort Belvoir, VA: Defense Technical Information Center, enero de 1998. http://dx.doi.org/10.21236/ada465330.
Texto completoSchneider, Fred B. y Gregory Morrisett. Mobile Agents and Systems Principles. Fort Belvoir, VA: Defense Technical Information Center, diciembre de 1999. http://dx.doi.org/10.21236/ada381524.
Texto completoQi, Hairong, S. S. Iyengar y Krishnendu Chakrabarty. Distributed Multi-Resolution Data Integration Using Mobile Agents. Fort Belvoir, VA: Defense Technical Information Center, enero de 2001. http://dx.doi.org/10.21236/ada440144.
Texto completoJansen, Wayne, Peter Mell, Tom Karygiannis y Don Marks. Applying mobile agents to intrusion detection and response. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6416.
Texto completoArkko, J., V. Devarapalli y F. Dupont. Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents. RFC Editor, junio de 2004. http://dx.doi.org/10.17487/rfc3776.
Texto completoYokota, H., D. Kim, B. Sarikaya y F. Xia. Flow Bindings Initiated by Home Agents for Mobile IPv6. RFC Editor, febrero de 2014. http://dx.doi.org/10.17487/rfc7109.
Texto completoValetto, Giuseppe y Gail Kaiser. Combining Mobile Agents and Process-Based Coordination to Achieve Software Adaptation. Fort Belvoir, VA: Defense Technical Information Center, enero de 2002. http://dx.doi.org/10.21236/ada451580.
Texto completoDiouf, Awa, Marco Carreras y Fabrizio Santoro. Taxing Mobile Money in Kenya: Impact on Financial Inclusion. Institute of Development Studies, junio de 2023. http://dx.doi.org/10.19088/ictd.2023.030.
Texto completo