Sciweavers

1216 search results - page 85 / 244
» Self-Protected Mobile Agents
Sort
View
88
Voted
SIROCCO
2008
15 years 2 months ago
Locating and Repairing Faults in a Network with Mobile Agents
Abstract. We consider a fixed, undirected, known network and a number of "mobile agents" which can traverse the network in synchronized steps. Some nodes in the network m...
Colin Cooper, Ralf Klasing, Tomasz Radzik
DAIS
2003
15 years 2 months ago
Rational Server Selection for Mobile Agents
- Mobile agents have the ability to migrate through heterogeneous networks and execute at remote hosts. This ability can be exploited to improve the performance of agent based appl...
Carsten Pils, Stefan Diepolder
ATAL
2005
Springer
15 years 6 months ago
AmbieAgents: a scalable infrastructure for mobile and context-aware information services
Context-aware information systems for mobile users have to cope with a variety of requirements in order to be able to provide an added value that goes beyond simply location-based...
Till Christopher Lech, Leendert W. M. Wienhofen
CHI
2010
ACM
14 years 10 months ago
Trying too hard: effects of mobile agents' (Inappropriate) social expressiveness on trust, affect and compliance
Mobile services can provide users with information relevant to their current circumstances. Distant services in turn can acquire local information from people in an area of intere...
Henriette S. M. Cramer, Vanessa Evers, Tim van Slo...
86
Voted
SAC
2004
ACM
15 years 6 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...