期刊文献+

基于移动agent的异构网络PBD任务库搜索技术研究

Research of Mobile Agent-based PBD Task Library Searching Technology in Heterogeneous Network
下载PDF
导出
摘要 从PBD可以扩展为基于异构网络的DPBD模型,使得网络中的机器可以共享任务库因而达到无需网络中的每台机器都安装完整的PBD系统的目的,而共享的任务库必然会导致搜索问题,普通的搜索技术很难达到DPBD任务库的搜索,而使用移动agent则可以提高DPBD包装器的搜索效率,同时可以大大减少网络负担。而且在移动agent内部增加安全机制,可以独立于开发平台增加搜索的可靠性。 PBD system can be expanded to DPBD model in order to enhance the reusability of the PBD system.We introduce mobile agent-based searching technology into DPBD model to help achieving this goal.Mobile agent-based searching technology not only can enhance the wrapper searching effect,but also can reduce the communication burden of the network.We invite the effective security mechanism into the mobile agent to improve the searching reliability which can be independent of the agent platform.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第34期154-157,共4页 Computer Engineering and Applications
关键词 PBD 移动AGENT 系统agent 包装器 PBD,mobile agent,system agent,wrapper
  • 相关文献

参考文献8

  • 1A Cypher. EAGER:Programming repetitive tasks by example[C].In:Proceedings of CHI ,ACM :New Orleans, 1991:33~39
  • 2A Cypher ed.Watch what I Do:Programming by Demonstration[M].MIT Press, 1993
  • 3G W Paynter. FAMILIAR : automating repetition in common application[C].In:Proceedings of the Third New Zealand Computer Science Research Conference, 1999
  • 4G W Paynter,H Witten. Developing a Pratical Programming by Demonstration Tool[C].In: OZCHI 2000: Interfacing Reality in the New Millennium, Sydney, Australia, 2000
  • 5Lieberman H.Integrating User Interface Agents with Conventional Applications[C].In :Proc of Intelligent User Interface,ACM Press, 1998
  • 6Mathias Bauer,Dietmar Dentgler,Gabiele Paul et al. Programming by Demonstration for Information Agents[J].Communication of the ACM,2000
  • 7J Baumann,F Hohl,K Rothermel et al. Mole-Concepts of a Mobile Agent System[J].WWW Journal,Special issue on Applications and Techniques of Web Agents, 1997
  • 8Niklas Borselius,Chris J Mitchell,Aaron Wilson. On Mobile AgentBased Transactions in Moderately Hostile Environments[J].Network Security, 2001:173~186

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部