Sciweavers

1216 search results - page 63 / 244
» Self-Protected Mobile Agents
Sort
View
IDEAL
2004
Springer
15 years 6 months ago
Mobile Data Mining by Location Dependencies
Mobile mining is about finding useful knowledge from the raw data produced by mobile users. The mobile environment consists of a set of static device and mobile device. Previous wo...
Jen Ye Goh, David Taniar
107
Voted
LCN
2002
IEEE
15 years 5 months ago
Simulation of Route Optimization in Mobile IP
Mobile Internet Protocol has been proposed by IETF to support portable IP addresses for mobile devices that often change their network access points to the Internet. In the basic ...
Hao Chen, Ljiljana Trajkovic
84
Voted
IJNSEC
2007
108views more  IJNSEC 2007»
15 years 14 days ago
Mobility Management with Distributed AAA Architecture
Mobile IP has been defined by Third Generation Partnership Project 2(3GPP2) to be the mobility solution for the next generation cellular networks. The Mobile IP related issues th...
Lin-Huang Chang, Che Lin Lo, Jui Jen Lo, Wei-Ting ...
99
Voted
SRDS
2000
IEEE
15 years 5 months ago
Modeling Fault-Tolerant Mobile Agent Execution as a Sequence of Agreement Problems
Fault-tolerance is fundamental to the further development of mobile agent applications. In the context of mobile agents, fault-tolerance prevents a partial or complete loss of the...
Stefan Pleisch, André Schiper
118
Voted
IFIP
1998
Springer
15 years 4 months ago
Mobile agent technology in support of sales order processing in the virtual enterprise
The flexible integration of a range of disparate IT applications is a key requirement for today's global enterprises. The virtual enterprise, formed by a collection of collab...
Todd Papaioannou, John Edwards