An Overview of Mobile Software Systems

After a short overview of recent trends in software engineering, we summarize the foundations of mobile software technology and examine the standardizatoin efforts in the field, and finally present our evaluation of mobile agent systems.

[1]  Syed Adnan,et al.  A Survey of Mobile Agent Systems , 2000 .

[2]  Patricia Morreale Agents on the move [mobile software agents] , 1998 .

[3]  H. Van Dyke Parunak,et al.  "Go to the ant": Engineering principles from natural multi-agent systems , 1997, Ann. Oper. Res..

[4]  Gian Pietro Picco,et al.  Understanding code mobility , 1998, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.

[5]  Fabio Vitali,et al.  PageSpace: An Architecture to Coordinate Distributed Applications on the Web , 1996, Comput. Networks.

[6]  Franco Zambonelli,et al.  Reactive Tuple Spaces for Mobile Agent Coordination , 1998, Mobile Agents.

[7]  Deepinder P. Sidhu,et al.  A scalable location tracking and message delivery scheme for mobile agents , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).

[8]  Nicholas R. Jennings,et al.  Co-ordination in Multi-Agent Systems , 1997, Software Agents and Soft Computing.

[9]  Pattie Maes,et al.  Challenger: a multi-agent system for distributed resource allocation , 1997, AGENTS '97.

[10]  J. Price GO TO THE ANT...... , 1969, British Journal of Psychiatry.

[11]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[12]  Gruia-Catalin Roman,et al.  Expressing code mobility in mobile UNITY , 1997, ESEC '97/FSE-5.

[13]  Aaron Kershenbaum,et al.  Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.

[14]  Jan Vitek,et al.  Secure composition of insecure components , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[15]  Nicholas Carriero,et al.  Linda in context , 1989, CACM.

[16]  Robbert van Renesse,et al.  An introduction to the TACOMA distributed system. Version 1.0 , 1995 .

[17]  Carlo Ghezzi,et al.  Mobile Code Paradigms and Technologies: A Case Study , 1997, Mobile Agents.

[18]  Franco Zambonelli,et al.  Coordination Models for Multi-Agent Systems , 1999 .

[19]  J. C. Byington,et al.  Mobile agents and security , 1998, IEEE Commun. Mag..

[20]  Oswald Drobnik,et al.  Mobile Agent Interaction in Heterogeneous Environments , 1997, Mobile Agents.

[21]  Fritz Hohl,et al.  A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[22]  Carlo Ghezzi,et al.  Analyzing Mobile Code Languages , 1996, Mobile Object Systems.

[23]  M. Calisti,et al.  FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2000 .

[24]  Robert S. Gray,et al.  Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .

[25]  Christian F. Tschudin,et al.  On Software Protection via Function Hiding , 1998, Information Hiding.

[26]  Giovanni Vigna,et al.  Designing Distributed Applications with Mobile Code Paradigms , 1997, Proceedings of the (19th) International Conference on Software Engineering.

[27]  Dejan S. Milojicic,et al.  Trend Wars - Mobile agent applications , 1999, IEEE Concurrency.

[28]  Pattie Maes,et al.  Cooperating Mobile Agents for Mapping Networks , 1998 .

[29]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[30]  Holger Peine,et al.  An Introduction to Mobile Agent Programming and the Ara System , 1999 .

[31]  Christine Morin,et al.  Enabling a Mobile Network Manager (MNM) Through Mobile Agents , 1998, Mobile Agents.

[32]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[33]  Joachim Baumann,et al.  Agent Groups in Mobile Agent Systems , 1997, DAIS.

[34]  Gerhard Goos,et al.  Fast Software Encryption , 2001, Lecture Notes in Computer Science.

[35]  Franco Zambonelli,et al.  How to coordinate Internet applications based on mobile agents , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).

[36]  Franco Zambonelli,et al.  TuCSoN: a Coordination Model for Mobile Agents , 1998 .

[37]  Antonio Puliafito,et al.  Advanced Network Management Functionalities through the Use of Mobile Software Agents , 1999, IATA.

[38]  David Wong,et al.  Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.

[39]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.