Sciweavers

1216 search results - page 57 / 244
» Self-Protected Mobile Agents
Sort
View
111
Voted
JUCS
2010
142views more  JUCS 2010»
14 years 11 months ago
Mobile Agent Routing with Time Constraints: A Resource Constrained Longest-Path Approach
: Mobile agent technology advocates the mobility of code rather than the transfer of data. As data is found in several sites, a mobile agent has to plan an itinerary to visit sever...
Eduardo Camponogara, Ricardo Boveto Shima
92
Voted
ECOOPW
1999
Springer
15 years 4 months ago
Mutual Protection of Co-operating Agents
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and op...
Volker Roth
96
Voted
FTDCS
1999
IEEE
15 years 4 months ago
Protecting Competitive Negotiation of Mobile Agents
The paradigm of mobile agents reached its popularity and attraction from typical application scenarios, which are located in the area of electronic commerce. In these common appli...
Hartmut Vogler, Axel Spriestersbach, Marie-Luise M...
102
Voted
IAAI
2003
15 years 1 months ago
Secure Mobile Agents on Ad Hoc Wireless Networks
This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated environment to study information assurance for mobile agent systems on ad hoc wirel...
Evan Sultanik, Donovan Artz, Gustave Anderson, Mos...
98
Voted
IAT
2006
IEEE
15 years 6 months ago
Mobile Agent Architecture Integration for a Wireless Sensor Medical Application
Wireless sensor nodes are used to monitor patient vital signs in a medical application. To ensure proper patient care is provided, real-time patient data must be managed correctly...
John Herbert, John O'Donoghue, Gao Ling, Kai Fei, ...