期刊文献+

Tahiti的研究与改进

Research and Improvement of Tahiti
下载PDF
导出
摘要 介绍了IBM公司的移动Agent开发平台Aglets,阐述了它的图形化用户界面Tahiti的功能和实现技术。提出了对Tahiti改进的方法,使其能对多个Agent的生命周期同时进行控制,目的是为了解决Tahiti一次只能处理一个Agent的不足,从而扩展Tahiti的应用范围,使其更有利于开发大型的多Agent系统。 Aglets is one of the most popular mobile agent development platforms.The paper introduces the function and implementation technology of Tahiti,the graphic user interface of Aglets.Aiming to solve the defect of Tahiti on operating only one agent once,the paper puts forwards an improvement method,by which multi-agents can be opertated once.So it can extend the application scope of Tahiti,and it is beneficial to develop the large-scale multi-agents system.
出处 《微机发展》 2005年第5期100-102,共3页 Microcomputer Development
基金 浙江省自然科学基金重大项目(ZD0108) 浙江省教育科研项目(20030717)
关键词 JAVA语言 智能代理 AGLETS TAHITI Jave intelligent agent Aglets Tahiti
  • 相关文献

参考文献4

二级参考文献35

  • 1SchneiderB.应用密码学[M].北京:机械工业出版社,2001..
  • 2W Lugmayr. Mobile code, agents, and Java. 2000. http://www. infosys, tuwien, ac. at/Research/Agents/homepage. html.
  • 3W Jansen, T Karygiannis. NIST special piblications 800-19:Mobile agent security. National Institute of Standards and Technology, Tech Rep: MD208999, 1999.
  • 4W Jansen. Countermeasures for mobile agent security. Computer Communications, 2000, 23(10): 1667--1677.
  • 5R Wahbe, S Lucco, T E Anderson et al. Efficient software-based fault isolation. In: Proc of the 14th ACM Symposium on Operating Systems Principles. New York: ACM Press, 1993.203--216.
  • 6J K Ousterhout. Scripting: Higher-level programming for the 21st century. IEEE Computer, 1998, 31(3) : 23--30.
  • 7G C Necula, P Lee. Safe kernel extensions without run-time checking. In: Proc of the 2nd Symposium on Operating System Design and Implementation. Berkeley: USENIX Association,1996. 229--243.
  • 8N Islam, R Anand, T Jaeger et al. A flexible security system for using intemet content. IEEE Software, 1997, 14(5): 52--59.
  • 9D Chess, B Grosof, C Harrison et al. Itinerant agents for mobile computing. IEEE Personal Communications, 1995, 2(5): 34--49.
  • 10W Farmer, J Guttman, V Swamp. Security for mobile agents:Authentication and state appraisal. In: Proc of the 4th European Symposiumon Research in Computer Sectudty. Rome: Springer-Verlag, 1996. 118--130.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部