Добірка наукової літератури з теми "Mobile agents"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Mobile agents".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Mobile agents"
Elijah and Muhammad Naveed Dilber. "Complete Analysis of Fault Tolerance Schemes in Mobile Agents for a Reliable Mobile Agent Computation." Bonfring International Journal of Industrial Engineering and Management Science 7, no. 1 (March 31, 2017): 20–24. http://dx.doi.org/10.9756/bijiems.8322.
Повний текст джерелаDiepolder, S., and K. H. Krempels. "Mobile Agenten. Mobile Agents." PIK - Praxis der Informationsverarbeitung und Kommunikation 29, no. 4 (December 2006): 203–7. http://dx.doi.org/10.1515/piko.2006.203.
Повний текст джерелаHuhns, M. N., and M. P. Singh. "Mobile agents." IEEE Internet Computing 1, no. 3 (1997): 80–82. http://dx.doi.org/10.1109/4236.589200.
Повний текст джерелаReddy, Parineeth M. "Mobile agents." Resonance 7, no. 7 (July 2002): 35–43. http://dx.doi.org/10.1007/bf02836751.
Повний текст джерелаBorawake-Satao, Rachana, and Rajesh Shardanand Prasad. "Mobile Sink with Mobile Agents." International Journal of Rough Sets and Data Analysis 4, no. 2 (April 2017): 24–35. http://dx.doi.org/10.4018/ijrsda.2017040102.
Повний текст джерелаLeppänen, Teemu, José Álvarez Lacasia, Yoshito Tobe, Kaoru Sezaki, and Jukka Riekki. "Mobile crowdsensing with mobile agents." Autonomous Agents and Multi-Agent Systems 31, no. 1 (October 24, 2015): 1–35. http://dx.doi.org/10.1007/s10458-015-9311-7.
Повний текст джерелаDalmeijer, M., D. K. Hammer, and A. T. M. Aerts. "Mobile software agents." Computers in Industry 41, no. 3 (May 2000): 251–60. http://dx.doi.org/10.1016/s0166-3615(99)00047-0.
Повний текст джерелаMartins, Rosane Maria, Magali Ribeiro Chaves, Luci Pirmez, and Luiz Fernando Rust da Costa Carmo. "Mobile agents applications." Internet Research 11, no. 1 (March 2001): 49–54. http://dx.doi.org/10.1108/10662240110365715.
Повний текст джерелаZrari, Chadha, Hela Hachicha, and Khaled Ghedira. "Agent's Security During Communication in Mobile Agents System." Procedia Computer Science 60 (2015): 17–26. http://dx.doi.org/10.1016/j.procs.2015.08.100.
Повний текст джерелаKovacs, Ern�, Klaus R�hrle, and Matthias Reich. "Integrating mobile agents into the mobile middleware." Personal Technologies 2, no. 2 (June 1998): 68–74. http://dx.doi.org/10.1007/bf01324936.
Повний текст джерелаДисертації з теми "Mobile agents"
Vanzan, Alessio <1993>. "Mobile Agents Rendezvous in Networks Despite a Malicious Agent." Master's Degree Thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/10604.
Повний текст джерелаTajer, Jean. "Detection of malicious hosts against agents in Mobile Agent networks." Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/detection-of-malicious-hosts-against-agents-in-mobile-agent-networks(beca3871-a989-4137-9a4d-13c88d8893d9).html.
Повний текст джерелаBraun, Oliver. "Constructing mobile agents using transformations." [S.l.] : [s.n.], 2004. http://137.193.200.177/ediss/braun-oliver/meta.html.
Повний текст джерелаBurvall, Niklas. "Contact Center with Mobile Agents." Thesis, Uppsala University, Department of Information Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-98322.
Повний текст джерелаA Contact Center assists a company with customer relations such as support and telemarketing using telephones but also with email, SMS and chat. Incoming calls are routed by the contact center to the best match according to the polices set up and the queue status. In a contact center context the person handling the calls is called an agent. It would be beneficial to be able to reach agents which are not at the contact center but at home or in the field.
This master thesis investigates how such a mobile agent can be connected to acontact center with respect to security, handling more than just voice interactions (i.e. chat and email) and requirements on network infrastructure from a mobile perspective. A prototype client is developed using Java ME connecting to a Genesys contact center, describing the requirements a client has on network, mobile device and security. The results show that eventhough a mobile agent is possible using todays technologies, some features still need to be added to the mobile phones API, such as better call control and keeping focus during incoming calls.
Ma, Haiqing. "Network management by mobile agents." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ35073.pdf.
Повний текст джерелаAbbas, Shehla. "Distributed calculations using mobile agents." Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13716/document.
Повний текст джерелаThis thesis deals with the use of mobile agents in distributed algorithms by performing random walks in the network. k mobile agents having unique identities are placed initially in a network. We describe a distributed algorithm for computing spanning trees in dynamic networks by using mobile agents. The agents mark the nodes on which they arrive. They use two di?erent techniques. In one problem they use the cloning in which an agent creates its own clone to do some task assigned. In the second, the mobile agents mark on the whiteboard (a memory location on the nodes). These techniques are used in applications such as spanning tree, gathering and collecting information. The mobile agents have limited knowledge and hence, they are not intelligent and do not have computational capabilities. When two or more agents meet at a node of the underlying graph, they merge into a single agent. The parameter of interest is the expected time for all the agents to merge into a single agent. We present a Markov chain, modelling the agents behavior, and show how this can be used to upper bound the expected time for all the k agents to merge into a single agent. We study the same problem when the mobile agents start their walk directly under stationary regime. Handshake problem is also studied and analyzed using mobile agents
Baumann, Joachim. "Control algorithms for mobile agents." [S.l.] : Universität Stuttgart , Fakultät Informatik, 1999. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB8536753.
Повний текст джерелаTufekcioglu, Refik. "Communication models in mobile computing systems and mobile agents." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378775.
Повний текст джерелаThesis advisor(s): Michael, James B. "March 2000." Includes bibliographical references (p. 131-137). Also available in print.
Bouchard, Sébastien. "On the Deterministic Gathering of Mobile Agents." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS175.
Повний текст джерелаDistributed systems are a theoretical model with a huge application field. It can represent a multitude of systems in which several autonomous entities cooperate to achieve a common task. The applications range from computer science related ones like processes sharing memory inside a computer, computers exchanging messages, and cohorts of robots to understanding social animals behavior. When the entities involved are able to move spontaneously, they are called mobile agents, and one of the most studied problems regarding mobile agents is gathering. The mobile agents are spread in an unknown environment, with no a priori information about the others and without the ability to communicate with other agents, unless colocated. Each of them gradually discovers its surroundings, meets some other agents, coordinates with them, until all agents are gathered and detect it. Once all agents gathered, they can communicate and coordinate for some future task. This thesis addresses the feasibility and complexity of gathering, in particular when facing two major difficulties: asynchrony and occurrence of Byzantine faults. When tackling the former, the agents have no control over their speed, which can vary arbitrarily and independently from each other. This makes coordination more challenging. When facing the latter, some of the agents are Byzantine, they can be viewed as malicious and using the difficulty to distinguish them from other (good) agents to try to prevent the gathering
Shibli, Muhammad Awais. "Building Secure Systems using Mobile Agents." Thesis, KTH, Computer and Systems Sciences, DSV, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4622.
Повний текст джерелаThe progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some interesting solution emerged like Intrusion Detection and Prevention systems, but these too have some problems, like detecting and responding in real time, because they mostly require inputs from system administrator. Optimistically, we have succeeded in protecting the hosts to some extent by applying the reactive approach, such as antivirus, firewall and intrusion detection and response systems, But, if we critically analyze this approach, we will reach the conclusion that it has inherent flaws, since the number of penetrations, Internet crime cases, identity and financial data thefts, etc. are rising exponentially in recent years. The main reason is that we are using only reactive approach, i.e. protection system is activated only when some security breach occurs. Secondly, current techniques try to fix the overall huge problem of security using only small remedies (firewall, antivirus and intrusion detection and preventions system) – “point solutions”. Therefore, there is a need to develop a strategy using Mobile Agents in order to operate in reactive and proactive manners, what requires providing security on the principle of defense in depth. So, that ultimate goal of securing a system as a whole can be achieved. System is assumed to be secure if unauthorized access (penetrations) is not possible and system is safe against damages. This strategy will include three aspects: (a) autonomously detect vulnerabilities on different hosts (in a distributed network) before an attacker can exploit (b) protect hosts by detecting attempts of intrusions and responding to them in real time; and finally (c) perform tasks related to security management.
Книги з теми "Mobile agents"
Cockayne, William R. Mobile agents. Greenwich, CT: Manning, 1998.
Знайти повний текст джерелаRothermel, Kurt, and Radu Popescu-Zeletin, eds. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7.
Повний текст джерелаRothermel, Kurt, and Fritz Hohl, eds. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0057642.
Повний текст джерелаSuri, Niranjan, ed. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36112-x.
Повний текст джерелаPicco, Gian Pietro, ed. Mobile Agents. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45647-3.
Повний текст джерелаNyein, Pyah. Mobile agents. Oxford: Oxford Brookes University, 2001.
Знайти повний текст джерелаGiovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.
Знайти повний текст джерелаKotz, David, and Friedemann Mattern, eds. Agent Systems, Mobile Agents, and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/b75241.
Повний текст джерелаBaumann, Joachim. Mobile Agents: Control Algorithms. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10704127.
Повний текст джерелаVigna, Giovanni, ed. Mobile Agents and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-68671-1.
Повний текст джерелаЧастини книг з теми "Mobile agents"
Satoh, Ichiro. "Mobile Agents." In Handbook of Ambient Intelligence and Smart Environments, 771–91. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-93808-0_29.
Повний текст джерелаOliveira, Luiz A. G., Paulo C. Oliveira, and Eleri Cardozo. "An agent-based approach for quality of service negotiation and management in distributed multimedia systems." In Mobile Agents, 1–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_19.
Повний текст джерелаBaldi, Mario, Silvano Gai, and Gian Pietro Picco. "Exploiting code mobility in decentralized and flexible network management." In Mobile Agents, 13–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_20.
Повний текст джерелаLiberman, B., F. Griffel, M. Merz, and W. Lamersdorf. "Java-based mobile agents — How to migrate, persist, and interact on electronic service markets." In Mobile Agents, 27–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_21.
Повний текст джерелаGhezzi, Carlo, and Giovanni Vigna. "Mobile code paradigms and technologies: A case study." In Mobile Agents, 39–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_22.
Повний текст джерелаPeine, Holger, and Torsten Stolpmann. "The architecture of the ara platform for mobile agents." In Mobile Agents, 50–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_23.
Повний текст джерелаPark, Anthony Sang-Bum, and Stefan Leuker. "A multi-agent architecture supporting services access." In Mobile Agents, 62–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_24.
Повний текст джерелаSchulze, B., and E. R. M. Madeira. "Contracting and moving agents in distributed applications based on a service-oriented architecture." In Mobile Agents, 74–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_25.
Повний текст джерелаWong, David, Noemi Paciorek, Tom Walsh, Joe DiCelie, Mike Young, and Bill Peet. "Concordia: An infrastructure for collaborating mobile agents." In Mobile Agents, 86–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_26.
Повний текст джерелаChang, Daniel T., and Stefan Covaci. "The OMG mobile agent facility: A submission." In Mobile Agents, 98–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62803-7_27.
Повний текст джерелаТези доповідей конференцій з теми "Mobile agents"
Honda, Jason, Harry H. Cheng, and Donna D. Djordjevich. "Mobile Agents and Related Features for Real Time First Responder Training Systems." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87450.
Повний текст джерелаMalik, Najmus Saqib, David Ko, and Harry H. Cheng. "A Secure Migration Protocol for Mobile Agent Systems." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87613.
Повний текст джерелаChou, Yu-Cheng, David Ko, and Harry H. Cheng. "Embeddable Mobile-C for Runtime Support of Code Mobility in Multi-Agent Systems." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35747.
Повний текст джерелаLal, Mayank, Swaminathan Sethuraman, Suhada Jayasuriya, and J. Maurice Rojas. "A New Method of Motion Coordination of a Group of Mobile Agents." In ASME 2006 International Mechanical Engineering Congress and Exposition. ASMEDC, 2006. http://dx.doi.org/10.1115/imece2006-14043.
Повний текст джерелаMena, Eduardo, and Carlos Bobed. "Mobile Agents for Mobile Games." In MobiSys'15: The 13th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751496.2751500.
Повний текст джерелаKalakota, R., J. Stallaert, and A. B. Whinston. "Mobile agents and mobile workers." In Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences. IEEE, 1996. http://dx.doi.org/10.1109/hicss.1996.493231.
Повний текст джерелаLi, Tie-Yan, and Kwok-Yan Lam. "Detecting anomalous agents in mobile agent system." In the first international joint conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/544862.544894.
Повний текст джерелаTomlinson, Bill, Man Lok Yau, and Eric Baumer. "Embodied mobile agents." In the fifth international joint conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1160633.1160807.
Повний текст джерелаAouadi, H., and M. B. Ahmed. "Mobile agents security." In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.207201.
Повний текст джерелаUeda, Leo Kazuhiro, and Fabio Kon. "Mobile musical agents." In Companion to the 19th annual ACM SIGPLAN conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1028664.1028752.
Повний текст джерелаЗвіти організацій з теми "Mobile agents"
Rus, Daniela. Mobile Information Agents. Fort Belvoir, VA: Defense Technical Information Center, April 2001. http://dx.doi.org/10.21236/ada387701.
Повний текст джерелаBurmester, Mike, and Alex Yasinsac. Secure Tactical Mobile Intelligent Agents. Fort Belvoir, VA: Defense Technical Information Center, September 2004. http://dx.doi.org/10.21236/ada427578.
Повний текст джерелаKassab, Lora L., and Jeffrey Voas. Towards Fault-Tolerant Mobile Agents. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada465330.
Повний текст джерелаSchneider, Fred B., and Gregory Morrisett. Mobile Agents and Systems Principles. Fort Belvoir, VA: Defense Technical Information Center, December 1999. http://dx.doi.org/10.21236/ada381524.
Повний текст джерелаQi, Hairong, S. S. Iyengar, and Krishnendu Chakrabarty. Distributed Multi-Resolution Data Integration Using Mobile Agents. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada440144.
Повний текст джерелаJansen, Wayne, Peter Mell, Tom Karygiannis, and Don Marks. Applying mobile agents to intrusion detection and response. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6416.
Повний текст джерелаArkko, J., V. Devarapalli, and F. Dupont. Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents. RFC Editor, June 2004. http://dx.doi.org/10.17487/rfc3776.
Повний текст джерелаYokota, H., D. Kim, B. Sarikaya, and F. Xia. Flow Bindings Initiated by Home Agents for Mobile IPv6. RFC Editor, February 2014. http://dx.doi.org/10.17487/rfc7109.
Повний текст джерелаValetto, Giuseppe, and Gail Kaiser. Combining Mobile Agents and Process-Based Coordination to Achieve Software Adaptation. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada451580.
Повний текст джерелаDiouf, Awa, Marco Carreras, and Fabrizio Santoro. Taxing Mobile Money in Kenya: Impact on Financial Inclusion. Institute of Development Studies, June 2023. http://dx.doi.org/10.19088/ictd.2023.030.
Повний текст джерела