An Overview of Mobile Software Systems
暂无分享,去创建一个
[1] Syed Adnan,et al. A Survey of Mobile Agent Systems , 2000 .
[2] Patricia Morreale. Agents on the move [mobile software agents] , 1998 .
[3] H. Van Dyke Parunak,et al. "Go to the ant": Engineering principles from natural multi-agent systems , 1997, Ann. Oper. Res..
[4] Gian Pietro Picco,et al. Understanding code mobility , 1998, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[5] Fabio Vitali,et al. PageSpace: An Architecture to Coordinate Distributed Applications on the Web , 1996, Comput. Networks.
[6] Franco Zambonelli,et al. Reactive Tuple Spaces for Mobile Agent Coordination , 1998, Mobile Agents.
[7] Deepinder P. Sidhu,et al. A scalable location tracking and message delivery scheme for mobile agents , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).
[8] Nicholas R. Jennings,et al. Co-ordination in Multi-Agent Systems , 1997, Software Agents and Soft Computing.
[9] Pattie Maes,et al. Challenger: a multi-agent system for distributed resource allocation , 1997, AGENTS '97.
[10] J. Price. GO TO THE ANT...... , 1969, British Journal of Psychiatry.
[11] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[12] Gruia-Catalin Roman,et al. Expressing code mobility in mobile UNITY , 1997, ESEC '97/FSE-5.
[13] Aaron Kershenbaum,et al. Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.
[14] Jan Vitek,et al. Secure composition of insecure components , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[15] Nicholas Carriero,et al. Linda in context , 1989, CACM.
[16] Robbert van Renesse,et al. An introduction to the TACOMA distributed system. Version 1.0 , 1995 .
[17] Carlo Ghezzi,et al. Mobile Code Paradigms and Technologies: A Case Study , 1997, Mobile Agents.
[18] Franco Zambonelli,et al. Coordination Models for Multi-Agent Systems , 1999 .
[19] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[20] Oswald Drobnik,et al. Mobile Agent Interaction in Heterogeneous Environments , 1997, Mobile Agents.
[21] Fritz Hohl,et al. A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.
[22] Carlo Ghezzi,et al. Analyzing Mobile Code Languages , 1996, Mobile Object Systems.
[23] M. Calisti,et al. FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2000 .
[24] Robert S. Gray,et al. Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .
[25] Christian F. Tschudin,et al. On Software Protection via Function Hiding , 1998, Information Hiding.
[26] Giovanni Vigna,et al. Designing Distributed Applications with Mobile Code Paradigms , 1997, Proceedings of the (19th) International Conference on Software Engineering.
[27] Dejan S. Milojicic,et al. Trend Wars - Mobile agent applications , 1999, IEEE Concurrency.
[28] Pattie Maes,et al. Cooperating Mobile Agents for Mapping Networks , 1998 .
[29] George Cybenko,et al. D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.
[30] Holger Peine,et al. An Introduction to Mobile Agent Programming and the Ara System , 1999 .
[31] Christine Morin,et al. Enabling a Mobile Network Manager (MNM) Through Mobile Agents , 1998, Mobile Agents.
[32] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[33] Joachim Baumann,et al. Agent Groups in Mobile Agent Systems , 1997, DAIS.
[34] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[35] Franco Zambonelli,et al. How to coordinate Internet applications based on mobile agents , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).
[36] Franco Zambonelli,et al. TuCSoN: a Coordination Model for Mobile Agents , 1998 .
[37] Antonio Puliafito,et al. Advanced Network Management Functionalities through the Use of Mobile Software Agents , 1999, IATA.
[38] David Wong,et al. Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.
[39] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.