-
1
-
-
0003906677
-
-
Waston Research Center, Yorktown Heights, New York, March 1995, URL
-
D. Chess, C. Harrison, and A. Kershenbaum. "Mobile Agents: Are They a Good Idea?: IBM Research Division, T. J. Waston Research Center, Yorktown Heights, New York, March 1995, URL: http://www.cs.dartmouth.edu/ ?agent/papers/chapter.ps.
-
Mobile Agents: Are They a Good Idea?: IBM Research Division, T. J
-
-
Chess, D.1
Harrison, C.2
Kershenbaum, A.3
-
2
-
-
34548161907
-
Mobile Agent Facility Specification
-
August, URL
-
International Business Machines Corporation: "Mobile Agent Facility Specification". OMG TC Document cf/96-08-01, August 1996. URL: http://www.trl.ibm.co.jp/aglets/maf.ps
-
(1996)
OMG TC Document cf/96-08-01
-
-
-
4
-
-
0033203783
-
A Performance Evaluation of the Mobile Agents Paradigm
-
pp
-
Leila Ismail and Daniel Hagimont. "A Performance Evaluation of the Mobile Agents Paradigm". In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications OOPSLA'99. ISBN = "1-58113-238-7, 0-201-48561-3 (Addison Wesley Longman)", pp. 306-313
-
In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications OOPSLA'99. ISBN = 1-58113-238-7, 0-201-48561-3 (Addison Wesley Longman)
, pp. 306-313
-
-
Ismail, L.1
Hagimont, D.2
-
7
-
-
78651532362
-
Capability Based Protection for Hosting Mobile Code
-
March 17-21
-
Christian Jensen and Leila Ismail. "Capability Based Protection for Hosting Mobile Code". In ERSADS'97, March 17-21, 1997.
-
(1997)
ERSADS'97
-
-
Jensen, C.1
Ismail, L.2
-
8
-
-
0030721196
-
A Protection Scheme for Mobile Agents on Java
-
In the, Budapest, Hungary, September
-
Daniel Hagimont and Leila Ismail. "A Protection Scheme for Mobile Agents on Java. In the 3rd ACM/IEEE International Conference on Mobile Computing and Networking, pp: 215-222, Budapest, Hungary, September 1997
-
(1997)
3rd ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 215-222
-
-
Hagimont, D.1
Ismail, L.2
-
10
-
-
46749100550
-
-
Leila Ismail. 'Evaluation of Authentication Mechanisms for Mobile Agents on top of Java. icis, pp. 663-668, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
-
Leila Ismail. 'Evaluation of Authentication Mechanisms for Mobile Agents on top of Java". icis, pp. 663-668, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
-
-
-
-
11
-
-
35048865790
-
A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering
-
Springer Berlin/Heidelberg. ISBN: 978-3-540-22114-2
-
Ozgur Koray Sahingoz and Nadia Erdogan. "A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering". Lecture Notes in Computer Science. Springer Berlin/Heidelberg. Vol.3036/2004, ISBN: 978-3-540-22114-2, 2004
-
(2004)
Lecture Notes in Computer Science
, vol.3036
-
-
Koray Sahingoz, O.1
Erdogan, N.2
-
12
-
-
33847178726
-
Mobile agents in a multi-agent e-commerce system
-
ISBN: 0-7695-2453-2, pp
-
C. Badica, M. Ganzha, and M. Paprzycki. Mobile agents in a multi-agent e-commerce system. Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2005. SYNASC, ISBN: 0-7695-2453-2, pp: 8, 2005
-
(2005)
Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2005. SYNASC
, pp. 8
-
-
Badica, C.1
Ganzha, M.2
Paprzycki, M.3
-
14
-
-
70350782978
-
-
William Cockayne and Michael Zypa editors, Manning Publishing and Prentice Hall
-
Robert S. Gray, George Cybenko, David Kotz, and Daniela Rus. "Agent Tcl. Itinerant Agents: Explanations and Examples with CDROM". William Cockayne and Michael Zypa (editors), Manning Publishing and Prentice Hall, 1997
-
(1997)
Agent Tcl. Itinerant Agents: Explanations and Examples with CDROM
-
-
Gray, R.S.1
Cybenko, G.2
Kotz, D.3
Rus, D.4
-
15
-
-
46149151346
-
Programming and Deployimg Java Mobile Agents with Aglets
-
August
-
D. Lange and O. Mitasuru. "Programming and Deployimg Java Mobile Agents with Aglets. Addison-Wesley Pub Co, ISBM: 0-201-32582-9, August 1998
-
(1998)
Addison-Wesley Pub Co, ISBM
-
-
Lange, D.1
Mitasuru, O.2
-
17
-
-
0000368626
-
Mole, Concepts of a MobileAgents System
-
J. Baiumann, F. Hohl, K. Rothermel, and M. Straer. "Mole, Concepts of a MobileAgents System". World Wide Web, vol. 1, No. 3, pp. 123-137, 1998.
-
(1998)
World Wide Web
, vol.1
, Issue.3
, pp. 123-137
-
-
Baiumann, J.1
Hohl, F.2
Rothermel, K.3
Straer, M.4
-
18
-
-
70350775617
-
Mobile Objects and Agents, Design, Implementation and Lessons Learned
-
D. S. Milojici, W. LaForge, and D. Chauhan. "Mobile Objects and Agents, Design, Implementation and Lessons Learned". Distributed systems Engineering IEEE, pp. 1-14, 1998.
-
(1998)
Distributed systems Engineering IEEE
, pp. 1-14
-
-
Milojici, D.S.1
LaForge, W.2
Chauhan, D.3
-
19
-
-
84947944550
-
Object Space Voyager - The Agent ORB for Java
-
G. Glass. "Object Space Voyager - The Agent ORB for Java". Lecture Notes in Computer Science, n. 1368, pp. 38-55, 1998.
-
(1998)
Lecture Notes in Computer Science
, Issue.1368
, pp. 38-55
-
-
Glass, G.1
-
20
-
-
33646594936
-
-
JADE Board, February, 2004
-
JADE Board. "JADE Security Guide". February, 2004. http:// jade.tilab.com/
-
JADE Security Guide
-
-
-
24
-
-
84867313902
-
Protecting the computation results of free-roaming agents
-
Second International Workshop on Mobile Agents MN98, Springer-Verlag
-
G. Karjoth, N. Asokan, and C. Glc. "Protecting the computation results of free-roaming agents", Second International Workshop on Mobile Agents (MN98), Lecture Notes in Computer Science 1477, pages 195-207. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1477
, pp. 195-207
-
-
Karjoth, G.1
Asokan, N.2
Glc, C.3
-
25
-
-
84974577749
-
One-Round Secure Computation and Secure Autonomous Mobile Agents
-
Proc. 27th Colloquium on Automata, Languages and Programming ICALP, Geneva, Springer-Verlag
-
C. Cachin, J. Camenisch, J. Kilian, and J. Mller. One-Round Secure Computation and Secure Autonomous Mobile Agents. In Proc. 27th Colloquium on Automata, Languages and Programming (ICALP), Geneva, Lecture Notes in Computer Science, Springer-Verlag, 2000
-
(2000)
Lecture Notes in Computer Science
-
-
Cachin, C.1
Camenisch, J.2
Kilian, J.3
Mller, J.4
-
26
-
-
0037362952
-
Protecting Mobile Code in Wild
-
March/April
-
John Zachary. "Protecting Mobile Code in Wild". IEEE Computer Society. March/April 2003 (Vol. 7, No. 2) pp 78-82
-
(2003)
IEEE Computer Society
, vol.7
, Issue.2
, pp. 78-82
-
-
Zachary, J.1
-
27
-
-
78651535766
-
-
A. Puliafito and O. Tomarchio. Design and development of a practical security model for a mobile agent system. Proceedings of the Seventh International Symposium on Computers and Communications (ISCC02), 02, pp. 1530-1346.
-
A. Puliafito and O. Tomarchio. "Design and development of a practical security model for a mobile agent system". Proceedings of the Seventh International Symposium on Computers and Communications (ISCC02), vol. 02, pp. 1530-1346.
-
-
-
-
28
-
-
0002992633
-
D'Agents: Security in a multiple-language, mobile-agent syste
-
Mobile Agents and Security, Giovanni Vigna Editor, Springer Verlag, pp
-
Robert S. Gray, David Kotz, George Cybenko, and Daniela Rus. "D'Agents: Security in a multiple-language, mobile-agent syste". In Mobile Agents and Security, Giovanni Vigna (Editor), Lecture Notes in Computer Science, Springer Verlag, pp. 154-197, 1998
-
(1998)
Lecture Notes in Computer Science
, pp. 154-197
-
-
Gray, R.S.1
Kotz, D.2
Cybenko, G.3
Rus, D.4
-
31
-
-
0004198635
-
-
ISBN-10:, ISBN-13: 978-0-13-035548-5. Prentice Hall. Published. 02 December, Upper Saddle River, NJ: Prentice Hall
-
Charles P. Pfleeger and Shari Lawrence Pfleeger. "Security in Computing". ISBN-10: 0-13-035548-8; ISBN-13: 978-0-13-035548-5. Prentice Hall. Published. 02 December 2002. Upper Saddle River, NJ: Prentice Hall
-
(2002)
Security in Computing
-
-
Pfleeger, C.P.1
Lawrence Pfleeger, S.2
-
32
-
-
0001259536
-
A Distributed Object Model for the Java System
-
A. Wollrath, R. Riggs, and J. Waldo. "A Distributed Object Model for the Java System". Computing Systems, vol. 9, no. 4, pp. 291-312, 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.4
, pp. 291-312
-
-
Wollrath, A.1
Riggs, R.2
Waldo, J.3
-
33
-
-
0038335724
-
Pickling State in the Java System
-
Fall
-
R. Riggs, J. Waldo, A. Wolrath, and K. Bharat. "Pickling State in the Java System". Computing Systems, 9(4), pp. 313-329, Fall 1996
-
(1996)
Computing Systems
, vol.9
, Issue.4
, pp. 313-329
-
-
Riggs, R.1
Waldo, J.2
Wolrath, A.3
Bharat, K.4
-
34
-
-
78651536138
-
-
Pankaj Kumar. J2EE Security for Servlets, EJBs, and Web Services. ISBN-10: 0-13-140264-1; ISBN-13: 978-0-13-140264-5; Prentice Hall. Published: 04 September, 2003
-
Pankaj Kumar. "J2EE Security for Servlets, EJBs, and Web Services. ISBN-10: 0-13-140264-1; ISBN-13: 978-0-13-140264-5; Prentice Hall. Published: 04 September, 2003
-
-
-
-
36
-
-
78651591305
-
-
Sun Microsystems. JDK 5.0 Documentation. Sun Microsystems, 2004. URL: http://java.sun.com/j2se/1.5.0/docs
-
Sun Microsystems. "JDK 5.0 Documentation". Sun Microsystems, 2004. URL: http://java.sun.com/j2se/1.5.0/docs
-
-
-
|