期刊文献+

一种基于JXTA的Mobile Agent平台系统 被引量:1

A mobile agent system based on JXTA
下载PDF
导出
摘要 对比分析了JXTA技术和Mobile Agent的技术特点,提出了一种基于JXTA技术的Mobile Agent平台系统.该系统提供了一种基于JXTA的查找、通信、安全解决方案,以提高移动代理的健壮性、安全性和代理间的交互性;对该系统中关键技术的实现机制进行了分析说明.最后在实验原型系统的基础上对系统的性能进行了分析. Paper analyzes the technologies′ characteristic between JXTA and mobile agent.Aimed at those characteristics,a mobile agent module based on JXTA has been put forward.This module has provide a solution of searching,communication and security based on JXTA.It can improve the robustness,security of mobile agent and interactivity of different agents.At the mean time,realizing mechanism of key technologies of the module has also been analyzed.At last,system′s capability has been analyzed on experiment.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第S1期241-245,共5页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
关键词 点对点 代理 移动代理 peer to peer agent mobile agent
  • 相关文献

参考文献1

二级参考文献15

  • 1[1]FURL. http://www.jps.net/williamw/furi.
  • 2[2]Bressan S, Goh CL, Ooi BC, Tan KL. Supporting extensible buffer replacement strategies in database system. In: Delis A, et al., eds. Proceedings of the ACM SIGMOD International Conference on Management of Data. Philadelphia: ACM Press, 1999. 52~64.
  • 3[3]Wong D, Paciorek N, Walsh T, DiCelie J, Young M, Peet B. Concordia: an infrastructure for collaborating mobile agents. In: Rothermel K, et al., eds. Mobile Agents, First International Workshop. Berlin: Springer-Verlag, 1998. 86~97.
  • 4[4]Freenet Home Page. http://freenet.sourceforge.com.
  • 5[5]Gnutella Development Home Page. http://gnutella.wego.com.
  • 6[6]Goh CL, Bressan S, Ooi BC, Anirban M. Storm: a 100% java peersistent storage manager. In: Chaudhri AB, ed. Proceedings of the OOPSLA Worshop on Java and Object. Denver: Hermes Penton Science, 1999. 12~13.
  • 7[7]Gribble S, Halevy A, Ives Z, Rodrig M, Suciu D. What can database do for peer-to-peer. In: Mecca G, et al., eds. Proceedings of the 4th International Workshop on the Web and Databases. Santa Barbara, 2001. 31~36.
  • 8[8]ICQ Home Page. http://www.icq.com.
  • 9[9]Karjoth G, Lange DB, Oshima M. A security model for aglets. Lecture Notes in Computer Science, 1997,1419:188~205.
  • 10[10]Karnik NM, Tripathi AR. Security in the Ajanta mobile agent system. Software-Practice and Experience, 2001,31(4):301~329.

共引文献19

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部