Sciweavers

506 search results - page 55 / 102
» Mobile agents for monitoring distributed systems
Sort
View
85
Voted
SAC
2004
ACM
15 years 4 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman
92
Voted
ICDCSW
2003
IEEE
15 years 4 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
WOA
2003
15 years 15 days ago
A Case Study in Role-based Agent Interactions to Perform Administrative Tasks
- Mobile agents are an emerging approach to develop distributed and parallel applications. They also can be used to develop enterprise applications, since they can act as active ne...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
114
Voted
KESAMSTA
2009
Springer
15 years 3 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
POLICY
2004
Springer
15 years 4 months ago
Policy-Based Mobile Ad Hoc Network Management
Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over w...
Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Cho-Yu Ja...