To see the other types of publications on this topic, follow the link: Mobile agents.

Journal articles on the topic 'Mobile agents'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile agents.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Elijah and Muhammad Naveed Dilber. "Complete Analysis of Fault Tolerance Schemes in Mobile Agents for a Reliable Mobile Agent Computation." Bonfring International Journal of Industrial Engineering and Management Science 7, no. 1 (2017): 20–24. http://dx.doi.org/10.9756/bijiems.8322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Diepolder, S., and K. H. Krempels. "Mobile Agenten. Mobile Agents." PIK - Praxis der Informationsverarbeitung und Kommunikation 29, no. 4 (2006): 203–7. http://dx.doi.org/10.1515/piko.2006.203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huhns, M. N., and M. P. Singh. "Mobile agents." IEEE Internet Computing 1, no. 3 (1997): 80–82. http://dx.doi.org/10.1109/4236.589200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reddy, Parineeth M. "Mobile agents." Resonance 7, no. 7 (2002): 35–43. http://dx.doi.org/10.1007/bf02836751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Borawake-Satao, Rachana, and Rajesh Shardanand Prasad. "Mobile Sink with Mobile Agents." International Journal of Rough Sets and Data Analysis 4, no. 2 (2017): 24–35. http://dx.doi.org/10.4018/ijrsda.2017040102.

Full text
Abstract:
Wireless Sensor Networks (WSN) has been drawing considerable attention and discussion in recent years due to its potential applications in various fields. In modern applications for future internet the MSN (Mobile Sensor Network) is a key factor. Mobility allows the applications of Wireless Sensor Network to be compatible with IoT (Internet of Things) applications. As mobility enhances capability of the network it also affects the performance of the network at each layer. In recent years the various methodologies are proposed to handle mobility. Most of them use mobility for efficient data col
APA, Harvard, Vancouver, ISO, and other styles
6

Leppänen, Teemu, José Álvarez Lacasia, Yoshito Tobe, Kaoru Sezaki, and Jukka Riekki. "Mobile crowdsensing with mobile agents." Autonomous Agents and Multi-Agent Systems 31, no. 1 (2015): 1–35. http://dx.doi.org/10.1007/s10458-015-9311-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dalmeijer, M., D. K. Hammer, and A. T. M. Aerts. "Mobile software agents." Computers in Industry 41, no. 3 (2000): 251–60. http://dx.doi.org/10.1016/s0166-3615(99)00047-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Martins, Rosane Maria, Magali Ribeiro Chaves, Luci Pirmez, and Luiz Fernando Rust da Costa Carmo. "Mobile agents applications." Internet Research 11, no. 1 (2001): 49–54. http://dx.doi.org/10.1108/10662240110365715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zrari, Chadha, Hela Hachicha, and Khaled Ghedira. "Agent's Security During Communication in Mobile Agents System." Procedia Computer Science 60 (2015): 17–26. http://dx.doi.org/10.1016/j.procs.2015.08.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kovacs, Ern�, Klaus R�hrle, and Matthias Reich. "Integrating mobile agents into the mobile middleware." Personal Technologies 2, no. 2 (1998): 68–74. http://dx.doi.org/10.1007/bf01324936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Morreale, P. "Agents on the move [mobile software agents]." IEEE Spectrum 35, no. 4 (1998): 34–41. http://dx.doi.org/10.1109/6.666958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Bagga, Pallavi, and Rahul Hans. "Mobile Agents System Security." ACM Computing Surveys 50, no. 5 (2017): 1–45. http://dx.doi.org/10.1145/3095797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Pietro Picco, Gian. "Mobile agents: an introduction." Microprocessors and Microsystems 25, no. 2 (2001): 65–74. http://dx.doi.org/10.1016/s0141-9331(01)00099-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Shun, Zhou, Zhu Chunyan, and Ying Shi. "Mobile agents on internet." Wuhan University Journal of Natural Sciences 3, no. 1 (1998): 21–26. http://dx.doi.org/10.1007/bf02827506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Evripidou, Paraskevas, and George Samaras. "Metacomputing with Mobile Agents." International Journal of Parallel Programming 34, no. 5 (2006): 429–58. http://dx.doi.org/10.1007/s10766-006-0021-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Lange, Danny B., and Mitsuru Oshima. "Introduction to mobile agents." Personal Technologies 2, no. 2 (1998): 49–56. http://dx.doi.org/10.1007/bf01324934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Wong, David, Noemi Paciorek, and Dana Moore. "Java-based mobile agents." Communications of the ACM 42, no. 3 (1999): 92. http://dx.doi.org/10.1145/295685.295717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Greenberg, M. S., L. C. Byington, and D. G. Harper. "Mobile agents and security." IEEE Communications Magazine 36, no. 7 (1998): 76–85. http://dx.doi.org/10.1109/35.689634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

STRASSER, MARKUS, and KURT ROTHERMEL. "RELIABILITY CONCEPTS FOR MOBILE AGENTS." International Journal of Cooperative Information Systems 07, no. 04 (1998): 355–82. http://dx.doi.org/10.1142/s0218843098000179.

Full text
Abstract:
The use of mobile agent technology has been proposed for various fault-sensitive application areas, including electronic commerce and system management. A prerequisite for the use of mobile agents in these environments is that agents have to be executed reliably, independent of communication and node failures. In this article, we present two approaches improving the level of fault-tolerance in agent execution. The introduction of an itinerary concept allows to specify an agent's travel plan flexibly and provides the agent system with the possibility to postpone the visit of currently unavailab
APA, Harvard, Vancouver, ISO, and other styles
20

Atawneh, Samer, Mousa Al-Akhras, Iman AlMomani, Anas Liswi, and Mohammed Alawairdhi. "Collaborative Mobile-Learning Architecture Based on Mobile Agents." Electronics 9, no. 1 (2020): 162. http://dx.doi.org/10.3390/electronics9010162.

Full text
Abstract:
The connection between collaborative learning and the new mobile technology has become tighter. Mobile learning enhances collaborative learning as learners can access information and learning materials from anywhere and at any time. However, supporting efficient mobile learning in education is a critical challenge. In addition, incorporating technological and educational components becomes a new, complex dimension. In this paper, an efficient collaborative mobile-learning architecture based on mobile agents is proposed to enhance learning activity and to allow teachers and students to collabor
APA, Harvard, Vancouver, ISO, and other styles
21

Chen, Bo, Harry H. Cheng, and Joe Palen. "Mobile-C: a mobile agent platform for mobile C/C++ agents." Software: Practice and Experience 36, no. 15 (2006): 1711–33. http://dx.doi.org/10.1002/spe.742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Desai, Prashant R. "A Survey on Mobile Agents." International Journal for Research in Applied Science and Engineering Technology V, no. XI (2017): 2915–19. http://dx.doi.org/10.22214/ijraset.2017.11401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Karjoth, Günter, and Joachim Posegga. "Mobile agents and telcos’ nightmares." Annales Des Télécommunications 55, no. 7-8 (2000): 388–400. http://dx.doi.org/10.1007/bf02994846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Dadhich, Priyanka, Dr Kamlesh Dutta, and Dr M. C. Govil. "Security Issues in Mobile Agents." International Journal of Computer Applications 11, no. 4 (2010): 1–7. http://dx.doi.org/10.5120/1574-2104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Milojicic, Dejan S., William LaForge, and Deepika Chauhan. "Mobile Objects and Agents (MOA)." Distributed Systems Engineering 5, no. 4 (1998): 214–27. http://dx.doi.org/10.1088/0967-1846/5/4/007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Prasad, Sanjiva. "Models for mobile computing agents." ACM Computing Surveys 28, no. 4es (1996): 53. http://dx.doi.org/10.1145/242224.242292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Chess, D., B. Grosof, C. Harrison, D. Levine, C. Parris, and G. Tsudik. "Itinerant agents for mobile computing." IEEE Personal Communications 2, no. 5 (1995): 34–49. http://dx.doi.org/10.1109/98.468361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Holt, A., C. Y. Huang, and J. Monk. "Performance analysis of mobile agents." IET Communications 1, no. 3 (2007): 532. http://dx.doi.org/10.1049/iet-com:20050490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jansen, Wayne A. "Intrusion detection with mobile agents." Computer Communications 25, no. 15 (2002): 1392–401. http://dx.doi.org/10.1016/s0140-3664(02)00040-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Cabri, Giacomo, Letizia Leonardi, and Franco Zambonelli. "Coordination infrastructures for mobile agents." Microprocessors and Microsystems 25, no. 2 (2001): 85–92. http://dx.doi.org/10.1016/s0141-9331(01)00101-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Degano, Pierpaolo, Corrado Priami, Lone Leth, and Bent Thomsen. "Causality for debugging mobile agents." Acta Informatica 36, no. 5 (1999): 335–74. http://dx.doi.org/10.1007/s002360050164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Rothermel, Kurt. "Guest editorial: Mobile software agents." Personal Technologies 2, no. 2 (1998): 47–48. http://dx.doi.org/10.1007/bf01324933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Vu Anh Pham and A. Karmouch. "Mobile software agents: an overview." IEEE Communications Magazine 36, no. 7 (1998): 26–37. http://dx.doi.org/10.1109/35.689628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hanandeh, Feras Ahmad, Izzat Alsmadi, Majdi Yousef Al Shannag, and Essam Al Daoud. "Mobile agents modelling using UML." International Journal of Business Information Systems 19, no. 4 (2015): 419. http://dx.doi.org/10.1504/ijbis.2015.070202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Bugliesi, Michele, Giuseppe Castagna, and Silvia Crafa. "Access control for mobile agents." ACM Transactions on Programming Languages and Systems 26, no. 1 (2004): 57–124. http://dx.doi.org/10.1145/963778.963781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Vasiu, L., and Q. H. Mahmoud. "Mobile agents in wireless devices." Computer 37, no. 2 (2004): 104–5. http://dx.doi.org/10.1109/mc.2004.1266304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Bieszczad, Andrzej, Bernard Pagurek, and Tony White. "Mobile agents for network management." IEEE Communications Surveys & Tutorials 1, no. 1 (1998): 2–9. http://dx.doi.org/10.1109/comst.1998.5340400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Chess, David, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, and Gene Tsudik. "Itinerant Agents for Mobile Computing." IEEE Communications Surveys & Tutorials 3, no. 3 (2000): 34–49. http://dx.doi.org/10.1109/comst.2000.5340729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Peschanski, Frédéric. "Mobile Agents in Interaction Spaces." Electronic Notes in Theoretical Computer Science 154, no. 1 (2006): 63–82. http://dx.doi.org/10.1016/j.entcs.2005.12.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Jiao, Yu, and Ali R. Hurson. "Application of Mobile Agents in Mobile Data Access Systems." Journal of Database Management 15, no. 4 (2004): 1–24. http://dx.doi.org/10.4018/jdm.2004100101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Gadiraju, S., and V. Kumar. "Recovery in the mobile wireless environment using mobile agents." IEEE Transactions on Mobile Computing 3, no. 2 (2004): 180–91. http://dx.doi.org/10.1109/tmc.2004.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Urra, Óscar, Sergio Ilarri Artigas, Raquel Trillo Lado, and Eduardo Mena Nieto. "Mobile agents and mobile devices: friendship or difficult relationship?" Journal of Physical Agents (JoPha) 3, no. 2 (2009): 27–37. http://dx.doi.org/10.14198/jopha.2009.3.2.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Kumar, Pradeep, Niraj Singhal, Dhiraj Pandey, and Avimanyou Vatsa. "Secure Mobile Agent Migration Using Lagrange Interpolation and Fast Fourier Transformation." International Journal of Computer Network and Information Security 15, no. 4 (2023): 72–83. http://dx.doi.org/10.5815/ijcnis.2023.04.07.

Full text
Abstract:
Mobile agent is a processing unit works on the behalf of host computer. Mobile agent with intelligence provides a new computing prototype that is totally different from conventional prototype. Mobile agents are automatically itinerating from one host Computer to another host computer and execute assigned task on the behalf of user in heterogeneous environment under own control. Because mobile agents roam around distributed networks automatically, the security of the agents and platforms is a major concern. The number of mobile agents-based software applications has increased dramatically over
APA, Harvard, Vancouver, ISO, and other styles
44

., Asha Anil. "AN ENHANCED APPROACH FOR SECURING MOBILE AGENTS FROM THE ATTACK OF OTHER MALICIOUS MOBILE AGENTS." International Journal of Research in Engineering and Technology 03, no. 13 (2014): 16–20. http://dx.doi.org/10.15623/ijret.2014.0313004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Liu, Na, and Kun Liu. "Mobile Agents Build Web Information Retrieval System." Applied Mechanics and Materials 543-547 (March 2014): 3373–76. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3373.

Full text
Abstract:
In recent years, mobile agent has always been the hot spot of the academic research, this paper introduces the concept of mobile agent, mobile agent system architecture and key technologies, combined with the mobile technology and web information retrieval technology, design a model of information retrieval system based on mobile agent, and expounds the key technology to realize the model needs to solve.
APA, Harvard, Vancouver, ISO, and other styles
46

Hassan, Razouki, and Hair Abdellatif. "Security for Mobile Agents: Trust Estimate for Platforms." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 2 (2015): 381. http://dx.doi.org/10.11591/tijee.v15i2.1553.

Full text
Abstract:
The mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent makes it to travel often in open network. In this scenario, it is obvious that the mobile agents are vulnerable to various security threats. Protecting free-roaming mobile agents from malicious host and from other mobile agents has drawn much attention in recent years. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present
APA, Harvard, Vancouver, ISO, and other styles
47

Sabir, B. E., M. Youssi, O. Bouattane, and H. Allali. "Towards a New Model to Secure IoT-based Smart Home Mobile Agents using Blockchain Technology." Engineering, Technology & Applied Science Research 10, no. 2 (2020): 5441–47. https://doi.org/10.5281/zenodo.3748336.

Full text
Abstract:
The Internet of Things (IoT) is becoming an indispensable part of the actual Internet and continues to extend deeper into the daily lives of people, offering distributed and critical services. Mobile agents are widely used in the context of IoT and due to the possibility of transmitting their execution status from one device to another in an IoT network, they offer many advantages such as reducing network load, encapsulating protocols, exceeding network latency, etc. Also, Blockchain Technology is growing rapidly allowing for the addition of an approved security layer in many areas. Security i
APA, Harvard, Vancouver, ISO, and other styles
48

Macêdo, Raimundo J. Araújo, and Flávio M. Assis Silva. "The mobile groups approach for the coordination of mobile agents." Journal of Parallel and Distributed Computing 65, no. 3 (2005): 275–88. http://dx.doi.org/10.1016/j.jpdc.2004.10.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Saleem, Hussain. "Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones." IOSR Journal of Computer Engineering 6, no. 2 (2012): 26–34. http://dx.doi.org/10.9790/0661-0622634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Chung, Sheng-Hung, and Ean-Teng Khor. "Mobile Agents Approach for Transaction Processing in Mobile Database Systems – Mobile Learning Environment." Asian Association of Open Universities Journal 6, no. 1 (2011): 74–83. http://dx.doi.org/10.1108/aaouj-06-01-2011-b008.

Full text
Abstract:
This paper describes the architecture of using the Mobile Agent and ACID (Atomicity, Consistency, Isolation and Durability) in Mobile e-Learning (mLearning). In the coming years, there will be an incremental amount of mobile learning experiments for the purpose of implementing mobile ICTs into mainstream education. In this article, the Replication Agent and Snapshot Agent architecture is proposed as an effective way to overcome the problem of heavy loading on the limited bandwidth used in wireless transmission for mobile learning environment merge replication process. The implementation of mob
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!