Letteratura scientifica selezionata sul tema "Mobile agents"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Mobile agents".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Mobile agents"
Elijah e Muhammad Naveed Dilber. "Complete Analysis of Fault Tolerance Schemes in Mobile Agents for a Reliable Mobile Agent Computation". Bonfring International Journal of Industrial Engineering and Management Science 7, n. 1 (31 marzo 2017): 20–24. http://dx.doi.org/10.9756/bijiems.8322.
Testo completoDiepolder, S., e K. H. Krempels. "Mobile Agenten. Mobile Agents". PIK - Praxis der Informationsverarbeitung und Kommunikation 29, n. 4 (dicembre 2006): 203–7. http://dx.doi.org/10.1515/piko.2006.203.
Testo completoHuhns, M. N., e M. P. Singh. "Mobile agents". IEEE Internet Computing 1, n. 3 (1997): 80–82. http://dx.doi.org/10.1109/4236.589200.
Testo completoReddy, Parineeth M. "Mobile agents". Resonance 7, n. 7 (luglio 2002): 35–43. http://dx.doi.org/10.1007/bf02836751.
Testo completoBorawake-Satao, Rachana, e Rajesh Shardanand Prasad. "Mobile Sink with Mobile Agents". International Journal of Rough Sets and Data Analysis 4, n. 2 (aprile 2017): 24–35. http://dx.doi.org/10.4018/ijrsda.2017040102.
Testo completoLeppänen, Teemu, José Álvarez Lacasia, Yoshito Tobe, Kaoru Sezaki e Jukka Riekki. "Mobile crowdsensing with mobile agents". Autonomous Agents and Multi-Agent Systems 31, n. 1 (24 ottobre 2015): 1–35. http://dx.doi.org/10.1007/s10458-015-9311-7.
Testo completoDalmeijer, M., D. K. Hammer e A. T. M. Aerts. "Mobile software agents". Computers in Industry 41, n. 3 (maggio 2000): 251–60. http://dx.doi.org/10.1016/s0166-3615(99)00047-0.
Testo completoMartins, Rosane Maria, Magali Ribeiro Chaves, Luci Pirmez e Luiz Fernando Rust da Costa Carmo. "Mobile agents applications". Internet Research 11, n. 1 (marzo 2001): 49–54. http://dx.doi.org/10.1108/10662240110365715.
Testo completoZrari, Chadha, Hela Hachicha e Khaled Ghedira. "Agent's Security During Communication in Mobile Agents System". Procedia Computer Science 60 (2015): 17–26. http://dx.doi.org/10.1016/j.procs.2015.08.100.
Testo completoKovacs, Ern�, Klaus R�hrle e Matthias Reich. "Integrating mobile agents into the mobile middleware". Personal Technologies 2, n. 2 (giugno 1998): 68–74. http://dx.doi.org/10.1007/bf01324936.
Testo completoTesi sul tema "Mobile agents"
Vanzan, Alessio <1993>. "Mobile Agents Rendezvous in Networks Despite a Malicious Agent". Master's Degree Thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/10604.
Testo completoTajer, Jean. "Detection of malicious hosts against agents in Mobile Agent networks". Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/detection-of-malicious-hosts-against-agents-in-mobile-agent-networks(beca3871-a989-4137-9a4d-13c88d8893d9).html.
Testo completoBraun, Oliver. "Constructing mobile agents using transformations". [S.l.] : [s.n.], 2004. http://137.193.200.177/ediss/braun-oliver/meta.html.
Testo completoBurvall, Niklas. "Contact Center with Mobile Agents". Thesis, Uppsala University, Department of Information Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-98322.
Testo completoA Contact Center assists a company with customer relations such as support and telemarketing using telephones but also with email, SMS and chat. Incoming calls are routed by the contact center to the best match according to the polices set up and the queue status. In a contact center context the person handling the calls is called an agent. It would be beneficial to be able to reach agents which are not at the contact center but at home or in the field.
This master thesis investigates how such a mobile agent can be connected to acontact center with respect to security, handling more than just voice interactions (i.e. chat and email) and requirements on network infrastructure from a mobile perspective. A prototype client is developed using Java ME connecting to a Genesys contact center, describing the requirements a client has on network, mobile device and security. The results show that eventhough a mobile agent is possible using todays technologies, some features still need to be added to the mobile phones API, such as better call control and keeping focus during incoming calls.
Ma, Haiqing. "Network management by mobile agents". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ35073.pdf.
Testo completoAbbas, Shehla. "Distributed calculations using mobile agents". Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13716/document.
Testo completoThis thesis deals with the use of mobile agents in distributed algorithms by performing random walks in the network. k mobile agents having unique identities are placed initially in a network. We describe a distributed algorithm for computing spanning trees in dynamic networks by using mobile agents. The agents mark the nodes on which they arrive. They use two di?erent techniques. In one problem they use the cloning in which an agent creates its own clone to do some task assigned. In the second, the mobile agents mark on the whiteboard (a memory location on the nodes). These techniques are used in applications such as spanning tree, gathering and collecting information. The mobile agents have limited knowledge and hence, they are not intelligent and do not have computational capabilities. When two or more agents meet at a node of the underlying graph, they merge into a single agent. The parameter of interest is the expected time for all the agents to merge into a single agent. We present a Markov chain, modelling the agents behavior, and show how this can be used to upper bound the expected time for all the k agents to merge into a single agent. We study the same problem when the mobile agents start their walk directly under stationary regime. Handshake problem is also studied and analyzed using mobile agents
Baumann, Joachim. "Control algorithms for mobile agents". [S.l.] : Universität Stuttgart , Fakultät Informatik, 1999. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB8536753.
Testo completoTufekcioglu, Refik. "Communication models in mobile computing systems and mobile agents". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378775.
Testo completoThesis advisor(s): Michael, James B. "March 2000." Includes bibliographical references (p. 131-137). Also available in print.
Bouchard, Sébastien. "On the Deterministic Gathering of Mobile Agents". Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS175.
Testo completoDistributed systems are a theoretical model with a huge application field. It can represent a multitude of systems in which several autonomous entities cooperate to achieve a common task. The applications range from computer science related ones like processes sharing memory inside a computer, computers exchanging messages, and cohorts of robots to understanding social animals behavior. When the entities involved are able to move spontaneously, they are called mobile agents, and one of the most studied problems regarding mobile agents is gathering. The mobile agents are spread in an unknown environment, with no a priori information about the others and without the ability to communicate with other agents, unless colocated. Each of them gradually discovers its surroundings, meets some other agents, coordinates with them, until all agents are gathered and detect it. Once all agents gathered, they can communicate and coordinate for some future task. This thesis addresses the feasibility and complexity of gathering, in particular when facing two major difficulties: asynchrony and occurrence of Byzantine faults. When tackling the former, the agents have no control over their speed, which can vary arbitrarily and independently from each other. This makes coordination more challenging. When facing the latter, some of the agents are Byzantine, they can be viewed as malicious and using the difficulty to distinguish them from other (good) agents to try to prevent the gathering
Shibli, Muhammad Awais. "Building Secure Systems using Mobile Agents". Thesis, KTH, Computer and Systems Sciences, DSV, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4622.
Testo completoThe progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some interesting solution emerged like Intrusion Detection and Prevention systems, but these too have some problems, like detecting and responding in real time, because they mostly require inputs from system administrator. Optimistically, we have succeeded in protecting the hosts to some extent by applying the reactive approach, such as antivirus, firewall and intrusion detection and response systems, But, if we critically analyze this approach, we will reach the conclusion that it has inherent flaws, since the number of penetrations, Internet crime cases, identity and financial data thefts, etc. are rising exponentially in recent years. The main reason is that we are using only reactive approach, i.e. protection system is activated only when some security breach occurs. Secondly, current techniques try to fix the overall huge problem of security using only small remedies (firewall, antivirus and intrusion detection and preventions system) – “point solutions”. Therefore, there is a need to develop a strategy using Mobile Agents in order to operate in reactive and proactive manners, what requires providing security on the principle of defense in depth. So, that ultimate goal of securing a system as a whole can be achieved. System is assumed to be secure if unauthorized access (penetrations) is not possible and system is safe against damages. This strategy will include three aspects: (a) autonomously detect vulnerabilities on different hosts (in a distributed network) before an attacker can exploit (b) protect hosts by detecting attempts of intrusions and responding to them in real time; and finally (c) perform tasks related to security management.
Libri sul tema "Mobile agents"
Cockayne, William R. Mobile agents. Greenwich, CT: Manning, 1998.
Cerca il testo completoRothermel, Kurt, e Radu Popescu-Zeletin, a cura di. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7.
Testo completoRothermel, Kurt, e Fritz Hohl, a cura di. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0057642.
Testo completoSuri, Niranjan, a cura di. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36112-x.
Testo completoPicco, Gian Pietro, a cura di. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45647-3.
Testo completoNyein, Pyah. Mobile agents. Oxford: Oxford Brookes University, 2001.
Cerca il testo completoGiovanni, Vigna, a cura di. Mobile agents and security. Berlin: Springer, 1998.
Cerca il testo completoKotz, David, e Friedemann Mattern, a cura di. Agent Systems, Mobile Agents, and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/b75241.
Testo completoBaumann, Joachim. Mobile Agents: Control Algorithms. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10704127.
Testo completoVigna, Giovanni, a cura di. Mobile Agents and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-68671-1.
Testo completoCapitoli di libri sul tema "Mobile agents"
Satoh, Ichiro. "Mobile Agents". In Handbook of Ambient Intelligence and Smart Environments, 771–91. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-93808-0_29.
Testo completoOliveira, Luiz A. G., Paulo C. Oliveira e Eleri Cardozo. "An agent-based approach for quality of service negotiation and management in distributed multimedia systems". In Mobile Agents, 1–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_19.
Testo completoBaldi, Mario, Silvano Gai e Gian Pietro Picco. "Exploiting code mobility in decentralized and flexible network management". In Mobile Agents, 13–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_20.
Testo completoLiberman, B., F. Griffel, M. Merz e W. Lamersdorf. "Java-based mobile agents — How to migrate, persist, and interact on electronic service markets". In Mobile Agents, 27–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_21.
Testo completoGhezzi, Carlo, e Giovanni Vigna. "Mobile code paradigms and technologies: A case study". In Mobile Agents, 39–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_22.
Testo completoPeine, Holger, e Torsten Stolpmann. "The architecture of the ara platform for mobile agents". In Mobile Agents, 50–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_23.
Testo completoPark, Anthony Sang-Bum, e Stefan Leuker. "A multi-agent architecture supporting services access". In Mobile Agents, 62–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_24.
Testo completoSchulze, B., e E. R. M. Madeira. "Contracting and moving agents in distributed applications based on a service-oriented architecture". In Mobile Agents, 74–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_25.
Testo completoWong, David, Noemi Paciorek, Tom Walsh, Joe DiCelie, Mike Young e Bill Peet. "Concordia: An infrastructure for collaborating mobile agents". In Mobile Agents, 86–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_26.
Testo completoChang, Daniel T., e Stefan Covaci. "The OMG mobile agent facility: A submission". In Mobile Agents, 98–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_27.
Testo completoAtti di convegni sul tema "Mobile agents"
Honda, Jason, Harry H. Cheng e Donna D. Djordjevich. "Mobile Agents and Related Features for Real Time First Responder Training Systems". In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87450.
Testo completoMalik, Najmus Saqib, David Ko e Harry H. Cheng. "A Secure Migration Protocol for Mobile Agent Systems". In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87613.
Testo completoChou, Yu-Cheng, David Ko e Harry H. Cheng. "Embeddable Mobile-C for Runtime Support of Code Mobility in Multi-Agent Systems". In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35747.
Testo completoLal, Mayank, Swaminathan Sethuraman, Suhada Jayasuriya e J. Maurice Rojas. "A New Method of Motion Coordination of a Group of Mobile Agents". In ASME 2006 International Mechanical Engineering Congress and Exposition. ASMEDC, 2006. http://dx.doi.org/10.1115/imece2006-14043.
Testo completoMena, Eduardo, e Carlos Bobed. "Mobile Agents for Mobile Games". In MobiSys'15: The 13th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751496.2751500.
Testo completoKalakota, R., J. Stallaert e A. B. Whinston. "Mobile agents and mobile workers". In Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences. IEEE, 1996. http://dx.doi.org/10.1109/hicss.1996.493231.
Testo completoLi, Tie-Yan, e Kwok-Yan Lam. "Detecting anomalous agents in mobile agent system". In the first international joint conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/544862.544894.
Testo completoTomlinson, Bill, Man Lok Yau e Eric Baumer. "Embodied mobile agents". In the fifth international joint conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1160633.1160807.
Testo completoAouadi, H., e M. B. Ahmed. "Mobile agents security". In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.207201.
Testo completoUeda, Leo Kazuhiro, e Fabio Kon. "Mobile musical agents". In Companion to the 19th annual ACM SIGPLAN conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1028664.1028752.
Testo completoRapporti di organizzazioni sul tema "Mobile agents"
Rus, Daniela. Mobile Information Agents. Fort Belvoir, VA: Defense Technical Information Center, aprile 2001. http://dx.doi.org/10.21236/ada387701.
Testo completoBurmester, Mike, e Alex Yasinsac. Secure Tactical Mobile Intelligent Agents. Fort Belvoir, VA: Defense Technical Information Center, settembre 2004. http://dx.doi.org/10.21236/ada427578.
Testo completoKassab, Lora L., e Jeffrey Voas. Towards Fault-Tolerant Mobile Agents. Fort Belvoir, VA: Defense Technical Information Center, gennaio 1998. http://dx.doi.org/10.21236/ada465330.
Testo completoSchneider, Fred B., e Gregory Morrisett. Mobile Agents and Systems Principles. Fort Belvoir, VA: Defense Technical Information Center, dicembre 1999. http://dx.doi.org/10.21236/ada381524.
Testo completoQi, Hairong, S. S. Iyengar e Krishnendu Chakrabarty. Distributed Multi-Resolution Data Integration Using Mobile Agents. Fort Belvoir, VA: Defense Technical Information Center, gennaio 2001. http://dx.doi.org/10.21236/ada440144.
Testo completoJansen, Wayne, Peter Mell, Tom Karygiannis e Don Marks. Applying mobile agents to intrusion detection and response. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6416.
Testo completoArkko, J., V. Devarapalli e F. Dupont. Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents. RFC Editor, giugno 2004. http://dx.doi.org/10.17487/rfc3776.
Testo completoYokota, H., D. Kim, B. Sarikaya e F. Xia. Flow Bindings Initiated by Home Agents for Mobile IPv6. RFC Editor, febbraio 2014. http://dx.doi.org/10.17487/rfc7109.
Testo completoValetto, Giuseppe, e Gail Kaiser. Combining Mobile Agents and Process-Based Coordination to Achieve Software Adaptation. Fort Belvoir, VA: Defense Technical Information Center, gennaio 2002. http://dx.doi.org/10.21236/ada451580.
Testo completoDiouf, Awa, Marco Carreras e Fabrizio Santoro. Taxing Mobile Money in Kenya: Impact on Financial Inclusion. Institute of Development Studies, giugno 2023. http://dx.doi.org/10.19088/ictd.2023.030.
Testo completo