Tesi sul tema "Mobile agents"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Mobile agents".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Vanzan, Alessio <1993>. "Mobile Agents Rendezvous in Networks Despite a Malicious Agent". Master's Degree Thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/10604.
Testo completoTajer, Jean. "Detection of malicious hosts against agents in Mobile Agent networks". Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/detection-of-malicious-hosts-against-agents-in-mobile-agent-networks(beca3871-a989-4137-9a4d-13c88d8893d9).html.
Testo completoBraun, Oliver. "Constructing mobile agents using transformations". [S.l.] : [s.n.], 2004. http://137.193.200.177/ediss/braun-oliver/meta.html.
Testo completoBurvall, Niklas. "Contact Center with Mobile Agents". Thesis, Uppsala University, Department of Information Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-98322.
Testo completoA Contact Center assists a company with customer relations such as support and telemarketing using telephones but also with email, SMS and chat. Incoming calls are routed by the contact center to the best match according to the polices set up and the queue status. In a contact center context the person handling the calls is called an agent. It would be beneficial to be able to reach agents which are not at the contact center but at home or in the field.
This master thesis investigates how such a mobile agent can be connected to acontact center with respect to security, handling more than just voice interactions (i.e. chat and email) and requirements on network infrastructure from a mobile perspective. A prototype client is developed using Java ME connecting to a Genesys contact center, describing the requirements a client has on network, mobile device and security. The results show that eventhough a mobile agent is possible using todays technologies, some features still need to be added to the mobile phones API, such as better call control and keeping focus during incoming calls.
Ma, Haiqing. "Network management by mobile agents". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ35073.pdf.
Testo completoAbbas, Shehla. "Distributed calculations using mobile agents". Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13716/document.
Testo completoThis thesis deals with the use of mobile agents in distributed algorithms by performing random walks in the network. k mobile agents having unique identities are placed initially in a network. We describe a distributed algorithm for computing spanning trees in dynamic networks by using mobile agents. The agents mark the nodes on which they arrive. They use two di?erent techniques. In one problem they use the cloning in which an agent creates its own clone to do some task assigned. In the second, the mobile agents mark on the whiteboard (a memory location on the nodes). These techniques are used in applications such as spanning tree, gathering and collecting information. The mobile agents have limited knowledge and hence, they are not intelligent and do not have computational capabilities. When two or more agents meet at a node of the underlying graph, they merge into a single agent. The parameter of interest is the expected time for all the agents to merge into a single agent. We present a Markov chain, modelling the agents behavior, and show how this can be used to upper bound the expected time for all the k agents to merge into a single agent. We study the same problem when the mobile agents start their walk directly under stationary regime. Handshake problem is also studied and analyzed using mobile agents
Baumann, Joachim. "Control algorithms for mobile agents". [S.l.] : Universität Stuttgart , Fakultät Informatik, 1999. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB8536753.
Testo completoTufekcioglu, Refik. "Communication models in mobile computing systems and mobile agents". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378775.
Testo completoThesis advisor(s): Michael, James B. "March 2000." Includes bibliographical references (p. 131-137). Also available in print.
Bouchard, Sébastien. "On the Deterministic Gathering of Mobile Agents". Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS175.
Testo completoDistributed systems are a theoretical model with a huge application field. It can represent a multitude of systems in which several autonomous entities cooperate to achieve a common task. The applications range from computer science related ones like processes sharing memory inside a computer, computers exchanging messages, and cohorts of robots to understanding social animals behavior. When the entities involved are able to move spontaneously, they are called mobile agents, and one of the most studied problems regarding mobile agents is gathering. The mobile agents are spread in an unknown environment, with no a priori information about the others and without the ability to communicate with other agents, unless colocated. Each of them gradually discovers its surroundings, meets some other agents, coordinates with them, until all agents are gathered and detect it. Once all agents gathered, they can communicate and coordinate for some future task. This thesis addresses the feasibility and complexity of gathering, in particular when facing two major difficulties: asynchrony and occurrence of Byzantine faults. When tackling the former, the agents have no control over their speed, which can vary arbitrarily and independently from each other. This makes coordination more challenging. When facing the latter, some of the agents are Byzantine, they can be viewed as malicious and using the difficulty to distinguish them from other (good) agents to try to prevent the gathering
Shibli, Muhammad Awais. "Building Secure Systems using Mobile Agents". Thesis, KTH, Computer and Systems Sciences, DSV, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4622.
Testo completoThe progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some interesting solution emerged like Intrusion Detection and Prevention systems, but these too have some problems, like detecting and responding in real time, because they mostly require inputs from system administrator. Optimistically, we have succeeded in protecting the hosts to some extent by applying the reactive approach, such as antivirus, firewall and intrusion detection and response systems, But, if we critically analyze this approach, we will reach the conclusion that it has inherent flaws, since the number of penetrations, Internet crime cases, identity and financial data thefts, etc. are rising exponentially in recent years. The main reason is that we are using only reactive approach, i.e. protection system is activated only when some security breach occurs. Secondly, current techniques try to fix the overall huge problem of security using only small remedies (firewall, antivirus and intrusion detection and preventions system) – “point solutions”. Therefore, there is a need to develop a strategy using Mobile Agents in order to operate in reactive and proactive manners, what requires providing security on the principle of defense in depth. So, that ultimate goal of securing a system as a whole can be achieved. System is assumed to be secure if unauthorized access (penetrations) is not possible and system is safe against damages. This strategy will include three aspects: (a) autonomously detect vulnerabilities on different hosts (in a distributed network) before an attacker can exploit (b) protect hosts by detecting attempts of intrusions and responding to them in real time; and finally (c) perform tasks related to security management.
Sun, Kuan Ieong. "The secure wireless mobile agents system". Thesis, University of Macau, 2003. http://umaclib3.umac.mo/record=b1447897.
Testo completoShibli, Awais. "Security Infrastructure and Applicationsfor Mobile Agents". Doctoral thesis, KTH, Data- och systemvetenskap, DSV, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-12764.
Testo completoQC20100525
Wagealla, Waleed. "Reliable mobile agents for distributed computing". Thesis, Nottingham Trent University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.272441.
Testo completoMcInerney, James. "Intelligent agents for mobile location services". Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/365495/.
Testo completoGiansiracusa, Michelangelo Antonio. "A secure infrastructural strategy for safe autonomous mobile agents". Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16052/1/Michaelangelo_Giansiracusa_Thesis.pdf.
Testo completoGiansiracusa, Michelangelo Antonio. "A Secure Infrastructural Strategy for Safe Autonomous Mobile Agents". Queensland University of Technology, 2005. http://eprints.qut.edu.au/16052/.
Testo completoTang, Zhijun. "Information-theoretic management of mobile sensor agents". Connect to resource, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1126882086.
Testo completoTitle from first page of PDF file. Document formatted into pages; contains xiii, 170 p.; also includes graphics (some col.). Includes bibliographical references (p. 162-170). Available online via OhioLINK's ETD Center
Miller, Paul Sheridan Mikler Armin. "Automated syndromic surveillance using intelligent mobile agents". [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5141.
Testo completoHanumantha, Rao Karthik. "Dynamic configuration management using mobile intelligent agents". Thesis, Wichita State University, 2009. http://hdl.handle.net/10057/2430.
Testo completoThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering
Basha, Nagi Nabil. "Survey and analysis of intelligent mobile agents". Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32754.
Testo completoThis survey reviews the field of mobile agents by summarizing the key concepts and giving an overview of the most important implementations. Design and implementation issues of mobile agents are analyzed in general. Some of the most important mobile agent systems are presented and discussed. Java's support for mobile agent development is thoroughly examined. In addition, the role of the Common Object Request Broker Architecture (CORBA) as a broker between mobile agents and their environment is also analyzed. Most importantly, a survey of the major security concerns is provided followed by an analysis of the currently available techniques to address these concerns. Last but not least, a detailed analysis of the Foundation for Intelligent Physical Agents (FIPA) standards for interoperability between heterogeneous agents and their hosts is included. This survey will help in understanding the potentials of mobile agents and why they have not caught on. Once progress is made in the areas of security, programming language support for specific mobile agent requirements, and standards for coordination between heterogeneous agents, it is expected that the mobile agent paradigm will dramatically revolutionize the way the Internet is being used now.
Seymour, Mark. "Automating Internet auctions with adaptable mobile agents". Thesis, University College London (University of London), 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313025.
Testo completoKalogridis, Georgios. "Preemptive mobile code protection using spy agents". Thesis, Royal Holloway, University of London, 2011. http://repository.royalholloway.ac.uk/items/1863e436-1c99-0cae-8a59-c6bee0c9553e/9/.
Testo completoKarousatou, Christina. "Distributed algorithms for energy constrained mobile agents". Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0373/document.
Testo completoIn this thesis we study and design algorithms for solving various well-known problems for mobile agents moving on a graph, with the additional constraint of limited energy which restricts the movement of the agents. Each mobile agent is an entity, equipped with a battery, that can traverse the edges of the graph and visit the nodes of the graph, consuming a part of its energy for movement. In contrast to various well-studied models for mobile agents, very little research has been conducted for the model considering the energy limitations. We study the fundamental problems of graph exploration, gathering and collaborative delivery in this model
Bohoris, Christos. "Network performance management using mobile software agents". Thesis, University of Surrey, 2003. http://epubs.surrey.ac.uk/844000/.
Testo completoBarbu, Andreea. "Developing mobile agents through a formal approach". Paris 12, 2005. https://athena.u-pec.fr/primo-explore/search?query=any,exact,990002282380204611&vid=upec.
Testo completoThis thesis deals with the modelling and validation of mobile agent systems. The development of a support structure for mobile agents demans the development of solutions for set of specific problems that appear due to mobility. A basic question in software development is if the proposed program is really a solution for the considered problem. One way to answer this question is through the use of formal methods. In our approach, the first step is to build a model of the solution (specification) using the higher-order Pi-calculus. Having this formal model as a base, we can : validate the model through simulations ; carry out mathematical tests to guarantee that this model possesses the required properties (verification) ; being able to prove that the implementation is correct with respect to the specification. Making use of our results, we have implemented a prototype called HOPiTool which allows the possibility of validation of mobile agent systems conceived with higher-order Pi-calc
Miller, Paul. "Automated Syndromic Surveillance using Intelligent Mobile Agents". Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc5141/.
Testo completoBarbu, Andreea Best Eike Pelz Elisabeth. "Developing mobile agents through a formal approach". Créteil : Oldenburg : Université de Paris-Val-de-Marne ; Carl von Ossietzky-Forschungsstelle, 2005. http://doxa.scd.univ-paris12.fr:80/theses/th0228238.pdf.
Testo completoThèse soutenue en co-tutelle. Titre provenant de l'écran-titre. Bibliogr. p. 166173. Index.
Sriraman, Sandhya. "An Annotated Bibliography of Mobile Agents in Networks". Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3310/.
Testo completoDengiz, Orhan Smith Alice E. "Maximizing connectivity and performance in mobile ad hoc networks using mobile agents". Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Fall%20Dissertations/Dengiz_Orhan_22.pdf.
Testo completoTyagi, Satyam. "Extensions to Jinni Mobile Agent Architecture". Thesis, University of North Texas, 2001. https://digital.library.unt.edu/ark:/67531/metadc2773/.
Testo completoChen, Yao. "YAVO, on-line trading system using mobile agents". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0023/MQ51991.pdf.
Testo completoPourafzal, Ashkan. "MEROMA, Managing the Environmental Resources of Mobile Agents". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0023/MQ50859.pdf.
Testo completoWang, YunBo. "The applicability of mobile agents, a comparative study". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0017/MQ55253.pdf.
Testo completoVelazquez, Elio. "Mobile agents in distributed search, a comparative study". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ57761.pdf.
Testo completoPourafzal, Ashkan. "Meroma : managing the environmental resources of mobile agents". Thesis, McGill University, 1998. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=21626.
Testo completoIt is apparent from the previous analogy with the nomads, that environmental resources play a crucial role in the agent's lifecycle. Even though most agent systems provide environmental resource management of agents to some degree, not all aspects of resource management are in place yet. If the industry continues to embrace mobile agentry, there will be a gargantous amount of heterogeneous agent systems and agents in the near future. Bearing in mind this fact, as well as the dynamic nature of mobile agents and environmental resources, environmental resource management is strongly recommended.
In this thesis, we present the criteria to be considered as environmental resources of the agents. We analyze in detail the agent paradigm to find where environmental resource management should be applied, and, based on our analysis, present two solutions to enhance the applicability of the agent paradigm. For completeness, we present similar work in other agent groups.
Perez, Diaz Fernando. "Firey-inspired synchronization in swarms of mobile agents". Thesis, University of Sheffield, 2016. http://etheses.whiterose.ac.uk/16552/.
Testo completoVelazquez, Elio Carleton University Dissertation Computer Science. "Mobile agents in distributed search: a comparative study". Ottawa, 2001.
Cerca il testo completoGonzález, Marta C. "Contact networks of mobile agents and spreading dynamics". [S.l. : s.n.], 2006. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-29332.
Testo completoArumugam, Subramanian. "aZIMAS Web mobile agent system /". [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000632.
Testo completoXu, Ke. "Mobile agent security through multi-agent cryptographic protocols". Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4473/.
Testo completoGünter, Manuel. "Customer-based IP service monitoring with mobile software agents /". Basel [u.a.] : Birkhäuser, 2002. http://www.loc.gov/catdir/enhancements/fy0812/2002074391-d.html.
Testo completoGunupudi, Vandana. "Performance Evaluation of Data Integrity Mechanisms for Mobile Agents". Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4366/.
Testo completoCarlier, David. "Représentation permanente, coordonnée par une carte à microprocesseur, d'un utilisateur mobile". Lille 1, 1998. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/1998/50376-1998-27.pdf.
Testo completoLal, Mayank. "Motion planning algorithms for a group of mobile agents". Texas A&M University, 2008. http://hdl.handle.net/1969.1/86038.
Testo completoCozzolino, Clifford Joseph. "DADS - A Distributed Agent Delivery System". Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3352/.
Testo completoAmin, Kaizar Abdul Husain. "Resource Efficient and Scalable Routing using Intelligent Mobile Agents". Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4240/.
Testo completoINAGAKI, Yasuyoshi, Katsuhiko TOYAMA e Nobuo KAWAGUCHI. "MAGNET: ad hoc network system based on mobile agents". Elsevier, 2000. http://hdl.handle.net/2237/15448.
Testo completoKalyani, Yogesh. "Towards the use of mobile agents for privacy negotiation". Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27379.
Testo completoAl-Jaljouli, Raja Computer Science & Engineering Faculty of Engineering UNSW. "A proposed security protocol for data gathering mobile agents". Awarded by:University of New South Wales. School of Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/23999.
Testo completoFan, Xiaobo. "Applying mobile agents to implement resilient authentication in networks". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0021/MQ55053.pdf.
Testo completo