To see the other types of publications on this topic, follow the link: Mobile agents.

Dissertations / Theses on the topic 'Mobile agents'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Mobile agents.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Vanzan, Alessio <1993&gt. "Mobile Agents Rendezvous in Networks Despite a Malicious Agent." Master's Degree Thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/10604.

Full text
Abstract:
The use of mobile agents, i.e., autonomous software entities , finds its application in many settings such as Network Maintenance, Electronic commerce and Intelligent search. Given a network, we have a set of mobile agents that moves from node to node in order to achieve a common task. Security is an important issue that can arise in such environment and that has been widely studied in literature. In particular, it is important to study the problem of having a host or an agent that hinders or harms the honest agents in their tasks. In this thesis we consider a scenario in which one of t
APA, Harvard, Vancouver, ISO, and other styles
2

Tajer, Jean. "Detection of malicious hosts against agents in Mobile Agent networks." Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/detection-of-malicious-hosts-against-agents-in-mobile-agent-networks(beca3871-a989-4137-9a4d-13c88d8893d9).html.

Full text
Abstract:
Over the last decade, networks have become increasingly advanced in terms of size, complexity and the level of heterogeneity, due to increase of number of users, devices and implementation of cloud among big enterprises and developing smart cities. As networks become more complicated, the existing client-server paradigm suffers from problems such as delay, jitter, bad quality of service, insufficient scalability, availability and flexibility. The appearance of mobile agents' technology is getting popular as means for an efficient way to access remote resources on computer networks. Mobile Agen
APA, Harvard, Vancouver, ISO, and other styles
3

Braun, Oliver. "Constructing mobile agents using transformations." [S.l.] : [s.n.], 2004. http://137.193.200.177/ediss/braun-oliver/meta.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Burvall, Niklas. "Contact Center with Mobile Agents." Thesis, Uppsala University, Department of Information Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-98322.

Full text
Abstract:
<p>A Contact Center assists a company with customer relations such as support and telemarketing using telephones but also with email, SMS and chat. Incoming calls are routed by the contact center to the best match according to the polices set up and the queue status. In a contact center context the person handling the calls is called an agent. It would be beneficial to be able to reach agents which are not at the contact center but at home or in the field.</p><p>This master thesis investigates how such a mobile agent can be connected to acontact center with respect to security, handling more t
APA, Harvard, Vancouver, ISO, and other styles
5

Ma, Haiqing. "Network management by mobile agents." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ35073.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abbas, Shehla. "Distributed calculations using mobile agents." Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13716/document.

Full text
Abstract:
Cette thèse traite l’utilisation des agents mobiles dans le domaine des algo- rithmes distribués en les déplaçant de manière aléatoire dans le réseau. Initialement k agents mobiles ayant les identités uniques sont placés dans le réseau. On décrit un algorithme distribué pour calculer un arbre couvrant dans les réseaux dynamiques en utilisant les agents mobiles. Les agents marquent les noeuds sur les quelles ils arrivent. Ils utilisent deux techniques di?érentes : le clonage dans lequel un agent crée son propre clone pour faire quelques tâches et le marquage sur la tableau de bord (un espace mé
APA, Harvard, Vancouver, ISO, and other styles
7

Baumann, Joachim. "Control algorithms for mobile agents." [S.l.] : Universität Stuttgart , Fakultät Informatik, 1999. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB8536753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tufekcioglu, Refik. "Communication models in mobile computing systems and mobile agents." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378775.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, March 2000.<br>Thesis advisor(s): Michael, James B. "March 2000." Includes bibliographical references (p. 131-137). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
9

Bouchard, Sébastien. "On the Deterministic Gathering of Mobile Agents." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS175.

Full text
Abstract:
Les systèmes distribués sont un modèle théorique capable de représenter une multitude de systèmes bâtis autour de la coopération d'entités autonomes dans le but d'accomplir une tâche commune. Leur champ applicatif est immense, et s'étend de l'informatique ou de la robotique, en modélisant des processus partageant la mémoire d'un ordinateur, des ordinateurs communiquant par envois de messages, ou encore des cohortes de robots, à la compréhension du comportement des animaux sociaux. Les agents mobiles font partie des entités étudiées dans ce domaine. Ils se distinguent des autres notamment par l
APA, Harvard, Vancouver, ISO, and other styles
10

Shibli, Muhammad Awais. "Building Secure Systems using Mobile Agents." Thesis, KTH, Computer and Systems Sciences, DSV, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4622.

Full text
Abstract:
<p>The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some interesting solution emerged like Intrusion Detection and Prevention systems, but these too have so
APA, Harvard, Vancouver, ISO, and other styles
11

Sun, Kuan Ieong. "The secure wireless mobile agents system." Thesis, University of Macau, 2003. http://umaclib3.umac.mo/record=b1447897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Shibli, Awais. "Security Infrastructure and Applicationsfor Mobile Agents." Doctoral thesis, KTH, Data- och systemvetenskap, DSV, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-12764.

Full text
Abstract:
Research areas of this dissertation are security for mobile agents, for applications based on mobile agents, and for distributed network environments in which mobile agents execute. Mobile agents paradigm has captured researchers’ and industry’s interests long time ago because of its innovative capabilities and attractive applications. The ability of mobile agents to autonomously migrate from host to host, transferring their code and internal state, enables them to accomplish tasks in network and distributed environments more conveniently, robustly, and efficiently than traditional client-serv
APA, Harvard, Vancouver, ISO, and other styles
13

Wagealla, Waleed. "Reliable mobile agents for distributed computing." Thesis, Nottingham Trent University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.272441.

Full text
Abstract:
The emergence of platform-independent, mobile code technologies has created big opportunities for Internet-based applications. Mobile agents are being utilized to perform a variety of tasks from personalized computing to business-critical transactions. Unfortunately, these advances were not matched by correspondent research into the reliability of these new technologies. This work has been undertaken to investigate the faulttolerance of this new paradigm. Agent programs' mobility and autonomy of execution has introduced a new class of failures different to that of traditional distributed syste
APA, Harvard, Vancouver, ISO, and other styles
14

McInerney, James. "Intelligent agents for mobile location services." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/365495/.

Full text
Abstract:
Understanding human mobility patterns is a significant research endeavour that has recently received considerable attention. Developing the science to describe and predict how people move from one place to another during their daily lives promises to address a wide range of societal challenges: from predicting the spread of infectious diseases, improving urban planning, to devising effective emergency response strategies. Individuals are also set to benefit from this area of research, as mobile devices will be able to analyse their mobility pattern and offer context-aware assistance and inform
APA, Harvard, Vancouver, ISO, and other styles
15

Giansiracusa, Michelangelo Antonio. "A secure infrastructural strategy for safe autonomous mobile agents." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16052/1/Michaelangelo_Giansiracusa_Thesis.pdf.

Full text
Abstract:
Portable languages and distributed paradigms have driven a wave of new applications and processing models. One of the most promising, certainly from its early marketing, but disappointing (from its limited uptake)is the mobile agent execution and data processing model. Mobile agents are autonomous programs which can move around a heterogeneous network such as the Internet, crossing through a number of different security domains, and perform some work at each visited destination as partial completion of a mission for their agent user. Despite their promise as a technology and paradigm to
APA, Harvard, Vancouver, ISO, and other styles
16

Giansiracusa, Michelangelo Antonio. "A Secure Infrastructural Strategy for Safe Autonomous Mobile Agents." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16052/.

Full text
Abstract:
Portable languages and distributed paradigms have driven a wave of new applications and processing models. One of the most promising, certainly from its early marketing, but disappointing (from its limited uptake)is the mobile agent execution and data processing model. Mobile agents are autonomous programs which can move around a heterogeneous network such as the Internet, crossing through a number of different security domains, and perform some work at each visited destination as partial completion of a mission for their agent user. Despite their promise as a technology and paradigm to dri
APA, Harvard, Vancouver, ISO, and other styles
17

Tang, Zhijun. "Information-theoretic management of mobile sensor agents." Connect to resource, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1126882086.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2005.<br>Title from first page of PDF file. Document formatted into pages; contains xiii, 170 p.; also includes graphics (some col.). Includes bibliographical references (p. 162-170). Available online via OhioLINK's ETD Center
APA, Harvard, Vancouver, ISO, and other styles
18

Miller, Paul Sheridan Mikler Armin. "Automated syndromic surveillance using intelligent mobile agents." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hanumantha, Rao Karthik. "Dynamic configuration management using mobile intelligent agents." Thesis, Wichita State University, 2009. http://hdl.handle.net/10057/2430.

Full text
Abstract:
With the increasing complexity of Aircraft Data Network the need for configuration management has become a necessity as the tolerance level is absolutely minimal. It is also known that most of the network faults are due to invalid configurations on the network devices. As fault detection plays a vital role in detecting invalid configurations, configuration management forms its basis. The aim of network configuration management is to supervise the network information so that the changes on networks can be tracked and managed. Also the topology of network can be better understood with each devic
APA, Harvard, Vancouver, ISO, and other styles
20

Basha, Nagi Nabil. "Survey and analysis of intelligent mobile agents." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32754.

Full text
Abstract:
The notion of mobile agent, a software component that can move autonomously between the different nodes of a network is gaining wide popularity in business and in academia. The term mobile agent was first introduced in 1994. Since then, lots of research has been carried out in various aspects of the newly introduced paradigm. It might even be surprising to know that a recent census reports the existence of more than 70 mobile agent systems. Therefore, there is a need to gather and analyze what has been done so far in this new area.<br>This survey reviews the field of mobile agents by summarizi
APA, Harvard, Vancouver, ISO, and other styles
21

Seymour, Mark. "Automating Internet auctions with adaptable mobile agents." Thesis, University College London (University of London), 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Kalogridis, Georgios. "Preemptive mobile code protection using spy agents." Thesis, Royal Holloway, University of London, 2011. http://repository.royalholloway.ac.uk/items/1863e436-1c99-0cae-8a59-c6bee0c9553e/9/.

Full text
Abstract:
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts in mobile code scenarios. In this security paradigm, a spy agent, i.e. a mobile agent which circulates amongst a number of remote hosts, can employ a variety of techniques in order to both appear 'normal' and suggest to a malicious host that it can 'misuse' the agent's data or code without being held accountable. A framework for the operation and deployment of such spy agents is described. Subsequently, a number of aspects of the operation of such agents within this framework are analysed in gre
APA, Harvard, Vancouver, ISO, and other styles
23

Karousatou, Christina. "Distributed algorithms for energy constrained mobile agents." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0373/document.

Full text
Abstract:
Dans cette thèse, nous étudions et concevons des algorithmes pour des agents mobiles se déplaçant dans un graphe avec une énergie limité, restreignant leurs mouvements. Chaque agent mobile est une entité, équipée d’une batterie, qui peut parcourir les arêtes du graphe et visiter les noeuds du graphe. A chaque mouvement, l’agent consomme une partie de son énergie. Contrairement à divers modèles bien étudiés pour les agents mobiles, très peu de recherches ont été menées pour le modèle compte tenu des limites d’énergie. Nous étudions les problèmes fondamentaux de l’exploration d’un graphe, du gat
APA, Harvard, Vancouver, ISO, and other styles
24

Bohoris, Christos. "Network performance management using mobile software agents." Thesis, University of Surrey, 2003. http://epubs.surrey.ac.uk/844000/.

Full text
Abstract:
In recent years a lot of promise has surrounded the potential impact of mobile software agents in the area of network management. The work aims to present a clear- direction of practical exploitation of mobile agents for network management tasks. Three different case studies of network performance management were examined in order to evaluate the effectiveness of the agent mobility strategy and autonomous behaviour applied within the specific context. This work importantly allowed the identification of 'Constrained' mobility, an agent migration strategy especially suited for network management
APA, Harvard, Vancouver, ISO, and other styles
25

Barbu, Andreea. "Developing mobile agents through a formal approach." Paris 12, 2005. https://athena.u-pec.fr/primo-explore/search?query=any,exact,990002282380204611&vid=upec.

Full text
Abstract:
Nous nous intéressons dans cette thèse à la modélisation et à la vérification de systèmes d'agents mobiles. Le développement d'une structure pour les agents mobiles demande le développement de solutions pour un ensemble de problèmes spécifiques dû à la mobilité. Une question dans le développement de logiciel est : le programme proposé est-il vraiment une solution pour le problème considéré. Une façon de répondre à cette question consiste à utiliser les méthodes formelles. Dans notre approche, nous construisons un modèle du problème (la spécification) en uitilisant le Pi calcul d'ordre supérieu
APA, Harvard, Vancouver, ISO, and other styles
26

Miller, Paul. "Automated Syndromic Surveillance using Intelligent Mobile Agents." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc5141/.

Full text
Abstract:
Current syndromic surveillance systems utilize centralized databases that are neither scalable in storage space nor in computing power. Such systems are limited in the amount of syndromic data that may be collected and analyzed for the early detection of infectious disease outbreaks. However, with the increased prevalence of international travel, public health monitoring must extend beyond the borders of municipalities or states which will require the ability to store vasts amount of data and significant computing power for analyzing the data. Intelligent mobile agents may be used to create a
APA, Harvard, Vancouver, ISO, and other styles
27

Barbu, Andreea Best Eike Pelz Elisabeth. "Developing mobile agents through a formal approach." Créteil : Oldenburg : Université de Paris-Val-de-Marne ; Carl von Ossietzky-Forschungsstelle, 2005. http://doxa.scd.univ-paris12.fr:80/theses/th0228238.pdf.

Full text
Abstract:
Thèse de doctorat : Informatique : Paris 12 : 2005. Thèse de doctorat : Informatique : Oldenburg, Carl v. Ossietzky Universität : 2005.<br>Thèse soutenue en co-tutelle. Titre provenant de l'écran-titre. Bibliogr. p. 166173. Index.
APA, Harvard, Vancouver, ISO, and other styles
28

Sriraman, Sandhya. "An Annotated Bibliography of Mobile Agents in Networks." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3310/.

Full text
Abstract:
The purpose of this thesis is to present a comprehensive colligation of applications of mobile agents in networks, and provide a baseline association of these systems. This work has been motivated by the fact that mobile agent systems have been deemed proficuous alternatives in system applications. Several mobile agent systems have been developed to provide scalable and cogent solutions in network-centric applications. This thesis examines some existing mobile agent systems in core networking areas, in particular, those of network and resource management, routing, and the provision of fault to
APA, Harvard, Vancouver, ISO, and other styles
29

Dengiz, Orhan Smith Alice E. "Maximizing connectivity and performance in mobile ad hoc networks using mobile agents." Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Fall%20Dissertations/Dengiz_Orhan_22.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Tyagi, Satyam. "Extensions to Jinni Mobile Agent Architecture." Thesis, University of North Texas, 2001. https://digital.library.unt.edu/ark:/67531/metadc2773/.

Full text
Abstract:
We extend the Jinni mobile agent architecture with a multicast network transport layer, an agent-to-agent delegation mechanism and a reflection based Prolog-to-Java interface. To ensure that our agent infrastructure runs efficiently, independently of router-level multicast support, we describe a blackboard based algorithm for locating a randomly roaming agent. As part of the agent-to-agent delegation mechanism, we describe an alternative to code-fetching mechanism for stronger mobility of mobile agents with less network overhead. In the context of direct and reflection based extension mechanis
APA, Harvard, Vancouver, ISO, and other styles
31

Chen, Yao. "YAVO, on-line trading system using mobile agents." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0023/MQ51991.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Pourafzal, Ashkan. "MEROMA, Managing the Environmental Resources of Mobile Agents." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0023/MQ50859.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, YunBo. "The applicability of mobile agents, a comparative study." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0017/MQ55253.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Velazquez, Elio. "Mobile agents in distributed search, a comparative study." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ57761.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Pourafzal, Ashkan. "Meroma : managing the environmental resources of mobile agents." Thesis, McGill University, 1998. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=21626.

Full text
Abstract:
Mobile Agentry is a promising new technology towards the vision of a widely scaleable electronic market. Mobile agents are computational entities which can autonomously migrate from host to host. They migrate like nomadic tribes due to the lack of environmental resources. Whereas the nomads would migrate if the weather was too cold or the food was running out, the agents migrate when the computing power is too low or the memory allowance is running out.<br>It is apparent from the previous analogy with the nomads, that environmental resources play a crucial role in the agent's lifecycle. Even t
APA, Harvard, Vancouver, ISO, and other styles
36

Perez, Diaz Fernando. "Firey-inspired synchronization in swarms of mobile agents." Thesis, University of Sheffield, 2016. http://etheses.whiterose.ac.uk/16552/.

Full text
Abstract:
Synchronization can be a necessary prerequisite to perform coordinated actions or reach consensus in decentralized multi-agent systems, such as robotic swarms and sensor networks. One of the simplest distributed synchronization algorithms is firefly synchronization, also known as pulse-coupled oscillator synchronization. In this framework, each agent possesses an internal oscillator and the completion of oscillation cycles is signaled by means of short pulses, which can be detected by other neighboring agents. This thesis focuses on a realistic mode of interaction for practical implementations
APA, Harvard, Vancouver, ISO, and other styles
37

Velazquez, Elio Carleton University Dissertation Computer Science. "Mobile agents in distributed search: a comparative study." Ottawa, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

González, Marta C. "Contact networks of mobile agents and spreading dynamics." [S.l. : s.n.], 2006. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-29332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Arumugam, Subramanian. "aZIMAS Web mobile agent system /." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Xu, Ke. "Mobile agent security through multi-agent cryptographic protocols." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4473/.

Full text
Abstract:
An increasingly promising and widespread topic of research in distributed computing is the mobile agent paradigm: code travelling and performing computations on remote hosts in an autonomous manner. One of the biggest challenges faced by this new paradigm is security. The issue of protecting sensitive code and data carried by a mobile agent against tampering from a malicious host is particularly hard but important. Based on secure multi-party computation, a recent research direction shows the feasibility of a software-only solution to this problem, which had been deemed impossible by some rese
APA, Harvard, Vancouver, ISO, and other styles
41

Günter, Manuel. "Customer-based IP service monitoring with mobile software agents /." Basel [u.a.] : Birkhäuser, 2002. http://www.loc.gov/catdir/enhancements/fy0812/2002074391-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Gunupudi, Vandana. "Performance Evaluation of Data Integrity Mechanisms for Mobile Agents." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4366/.

Full text
Abstract:
With the growing popularity of e-commerce applications that use software agents, the protection of mobile agent data has become imperative. To that end, the performance of four methods that protect the data integrity of mobile agents is evaluated. The methods investigated include existing approaches known as the Partial Result Authentication Codes, Hash Chaining, and Set Authentication Code methods, and a technique of our own design, called the Modified Set Authentication Code method, which addresses the limitations of the Set Authentication Code method. The experiments were run using the DADS
APA, Harvard, Vancouver, ISO, and other styles
43

Carlier, David. "Représentation permanente, coordonnée par une carte à microprocesseur, d'un utilisateur mobile." Lille 1, 1998. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/1998/50376-1998-27.pdf.

Full text
Abstract:
L'informatique mobile est un domaine en pleine expansion notamment grace a la vulgarisation des reseaux de telephonie mobile tels que le gsm. Ces reseaux utilisent principalement une liaison radio et permettent de tout endroit de transmettre non seulement de la parole mais aussi des donnees informatiques. La mobilite des terminaux impose des contraintes de poids et d'encombrement drastiques et, par consequent, une quantite et une qualite des ressources limitees : puissance de calcul, taille memoire, interface homme-machine et autonomie d'energie imposant des connexions intermittentes. Le but d
APA, Harvard, Vancouver, ISO, and other styles
44

Lal, Mayank. "Motion planning algorithms for a group of mobile agents." Texas A&M University, 2008. http://hdl.handle.net/1969.1/86038.

Full text
Abstract:
Building autonomous mobile agents has been a major research effort for a while with cooperative mobile robotics receiving a lot of attention in recent times. Motion planning is a critical problem in deploying autonomous agents. In this research we have developed two novel global motion planning schemes for a group of mobile agents which eliminate some of the disadvantages of the current methods available. The first is the homotopy method in which the planning is done in polynomial space. In this method the position in local frame of each mobile agent is mapped to a complex number and a time va
APA, Harvard, Vancouver, ISO, and other styles
45

Cozzolino, Clifford Joseph. "DADS - A Distributed Agent Delivery System." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3352/.

Full text
Abstract:
Mobile agents require an appropriate platform that can facilitate their migration and execution. In particular, the design and implementation of such a system must balance several factors that will ensure that its constituent agents are executed without problems. Besides the basic requirements of migration and execution, an agent system must also provide mechanisms to ensure the security and survivability of an agent when it migrates between hosts. In addition, the system should be simple enough to facilitate its widespread use across large scale networks (i.e Internet). To address these iss
APA, Harvard, Vancouver, ISO, and other styles
46

Amin, Kaizar Abdul Husain. "Resource Efficient and Scalable Routing using Intelligent Mobile Agents." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4240/.

Full text
Abstract:
Many of the contemporary routing algorithms use simple mechanisms such as flooding or broadcasting to disseminate the routing information available to them. Such routing algorithms cause significant network resource overhead due to the large number of messages generated at each host/router throughout the route update process. Many of these messages are wasteful since they do not contribute to the route discovery process. Reducing the resource overhead may allow for several algorithms to be deployed in a wide range of networks (wireless and ad-hoc) which require a simple routing protocol due to
APA, Harvard, Vancouver, ISO, and other styles
47

INAGAKI, Yasuyoshi, Katsuhiko TOYAMA, and Nobuo KAWAGUCHI. "MAGNET: ad hoc network system based on mobile agents." Elsevier, 2000. http://hdl.handle.net/2237/15448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Kalyani, Yogesh. "Towards the use of mobile agents for privacy negotiation." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27379.

Full text
Abstract:
With the increase in popularity of e-Commerce, concern for privacy has also increased. Users are becoming increasingly concerned about what personal information they could reveal when they go online. Currently, an e-Commerce Website does not provide full support to conduct negotiations concerning personal information between a user and a Web site. A user has to comply with the privacy policy specified on the Web site and has two choices: either they abandon the transaction or accept the privacy practices of the host. The Platform for Privacy Preferences (P3P) [16] specification, a W3C standard
APA, Harvard, Vancouver, ISO, and other styles
49

Al-Jaljouli, Raja Computer Science &amp Engineering Faculty of Engineering UNSW. "A proposed security protocol for data gathering mobile agents." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/23999.

Full text
Abstract:
We address the security issue of the data which mobile agents gather as they are traversing the Internet. Our goal is to devise a security protocol that truly secures the data which mobile agents gather. Several cryptographic protocols were presented in the literature asserting the security of gathered data. Formal verification of the protocols reveals unforeseen security flaws, such as truncation or alteration of the collected data, breaching the privacy of the gathered data, sending others data under the private key of a malicious host, and replacing the collected data with data of similar a
APA, Harvard, Vancouver, ISO, and other styles
50

Fan, Xiaobo. "Applying mobile agents to implement resilient authentication in networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0021/MQ55053.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!