An Operational and Secure Mobile-Agent Based System for Business Process Reconstruction
暂无分享,去创建一个
[1] Tilak Agerwala,et al. Data Flow Systems: Guest Editors' Introduction , 1982, Computer.
[2] Habin Lee,et al. A Component Based Multi-agent Architecture to Support Mobile Business Processes , 2003, CEEMAS.
[3] Jeffrey Posluns,et al. Snort 2.0 Intrusion Detection , 2003 .
[4] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[5] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[6] San-Yih Hwang,et al. On the discovery of process models from their instances , 2002, Decis. Support Syst..
[7] Li-Der Chou,et al. Implementation of Mobile-Agent-Based Network Management Systems for National Broadband Experimental Networks in Taiwan , 2003, HoloMAS.
[8] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[9] Simson L. Garfinkel,et al. Practical UNIX and Internet Security , 1996 .
[10] Wil M. P. van der Aalst,et al. Discovering Distributed Processes in Supply Chains , 2002, APMS.
[11] Jeong-Joon Yoo,et al. Design of a Mobile Agent-Based Workflow Management System , 2001, MATA.
[12] Françoise Baude,et al. System and Network Management Itineraries for Mobile Agents , 2002, MATA.
[13] Aaron Kershenbaum,et al. Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.
[14] Stephen H. Kaisler,et al. Data Flow Systems , 2005 .
[15] Ricardo J. Rabelo. Trust Building In The Creation Of Virtual Enterprises In Mobile Agent-Based Architectures , 2003, PRO-VE.
[16] Marco Dorigo,et al. AntNet: Distributed Stigmergetic Control for Communications Networks , 1998, J. Artif. Intell. Res..
[17] M. Hammer,et al. REENGINEERING THE CORPORATION: A MANIFESTO FOR BUSINESS REVOLUTION , 1995 .
[18] Joachim Posegga,et al. Mobile agents and telcos’ nightmares , 2000, Ann. des Télécommunications.