Itinerant Agents for Mobile Computing Secure, remote applications for large public networks
暂无分享,去创建一个
Benjamin N. Grosof | Gene Tsudik | Colin George Harrison | Colin Parris | David M. Chess | Benjamin N. Grosof | David Levine | D. Chess | C. Parris | G. Tsudik | David W. Levine | C. Harrison
[1] S. Chokhani. Toward a national public key infrastructure , 1994, IEEE Communications Magazine.
[2] Peter F. Patel-Schneider,et al. The DARPA Knowledge Sharing Effort: A Progress Report , 1997, KR.
[3] M. R. Genesereth,et al. Knowledge Interchange Format Version 3.0 Reference Manual , 1992, LICS 1992.
[4] Timothy W. Finin,et al. An Overview of KQML: A Knowledge Query and Manipulation Language , 1991 .
[5] Aaron Kershenbaum,et al. Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Jeffrey S. Rosenschein and Gilad Zlotkin. Rules of Encounter , 1994 .
[8] Timothy W. Finin,et al. Enabling Technology for Knowledge Sharing , 1991, AI Mag..
[9] L. J. Hoffman. Rogue programs: viruses, worms and Trojan horses , 1990 .
[10] G. Shering,et al. The NODAL system for the SPS 1974 , 1974 .
[11] John K. Ousterhout,et al. Tcl and the Tk Toolkit , 1994 .
[12] Tad Hogg,et al. Collective behavior of predictive agents , 1990 .
[13] Tad Hogg,et al. CAN PREDICTIVE AGENTS PREVENT CHAOS , 1992 .
[14] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[15] Timothy W. Finin,et al. KQML as an agent communication language , 1994, CIKM '94.
[16] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .