As of today no solely software-based solution that a priori protects the computation of any mobile code and/or mobile agent was presented. Furthermore, Algesheimer et al. [1], arg...
With the advent of mobile computing and mobile services becoming more widespread and more complex, the development process of those services requires an ever more important focus o...
Mobile technologies are argued to offer unprecedented opportunities for organizations and individuals. In order for organizations to be persuaded that investment in mobile technol...
While there are different research groups in the mobile computing community, most research requires mobile action data in terms of user calling and mobility patterns. Since collec...
Over the past years, mobile agent technology has attracted considerable attention, and a significant body of literature has been published. To further develop mobile agent technol...