期刊文献+

利用MOM实现移动代理基础通信机制的研究 被引量:2

Research of Mobile Agent Basic Communication Mechanism Based on MOM
下载PDF
导出
摘要 移动代理之间的基础通信机制是该领域中的一个关键问题,但在当前的各种移动代理产品中,代理之间的基础通信机制存在两个问题:一是代理本身承担了通信过程中的所有任务,使得代理的开发和维护变得复杂;二是对异步通信的支持不够灵活.本文采用了中间件的思想,将通信的发起和处理进行了分离,开发了一个面向消息的中间件,解决了上述问题,具有很高的应用价值和一定的理论价值. The basic communication mechanism among mobile agents is a key problem in this field. In current all kinds of implementations of mobile agents, there exits two problems about agent basic communication mechanism: one is a-gent itself must process all tasks in the process of communication, which must add complexity to development and maintenance, the other is lacking of flexibility in asynchronous communication. The paper takes the thinking of middleware, separates the initialization of communication from processing of communication, develop a message-oriented middleware, which solves these questions very well, so have fine appliance values.
出处 《小型微型计算机系统》 CSCD 北大核心 2003年第5期811-814,共4页 Journal of Chinese Computer Systems
基金 国家863重点项目(863-511-946-008)资助
关键词 移动代理 基础通信机制 MOM 中间件 网络管理 计算机网络 mobile agent message-oriented middleware agent communication
  • 相关文献

参考文献6

  • 1Vu Anh Pham and Ahmed Karmouch.Mobile software agents:an overview[J].IEEE Comm,July 1998,26-37.
  • 2Mayfield J,Labrou Y,and Finin T.Evaluation of KQML as an agent communication language[A].Intelligent Agents II:Agent Theories,Architectures and Langauages[M].vo1.1037,Lecture Notes in AJ,Wooldridge M,Mueller J P and Tambe M,Eds.,Springer Verlag,1995,347-360.
  • 3Finin T,Labrou Y,and Mayfield J.KQML as an agent communieation language [A].Software agents [M].J.M.Bradshaw,Ed.,:AAAJ Press/The MIT Press,1997,291-316.
  • 4Gray R S.Agent Tcl:a transportable agent system [C].Proe.CIKM Wksp.Intelligent Info.Agents,J.Mayfield and T.Finnin,Eds.,1995,http://www.es.dartmouth.edu/agent/papers/cikm95.ps.Z.
  • 5Wong D et a1.Concordia:an infrastructure for collaborating mobile agents[A].K.Rothermel and R.Popescu-Zeletin[M].Eds.,Mobile Agents,Lecture Notes in Comp.Sci.Series,1219,Springer,1997.86-97.
  • 6Philip A.Bernstein.Middleware:a model for distributed system services[J].Communications of The ACM.February,1996,39(2):86-98.

同被引文献22

  • 1LiXiaoyong,LiuDongxi.An automatic scheme to construct Snort rules from honeypots data[J].Journal of Systems Engineering and Electronics,2005,16(2):466-470. 被引量:1
  • 2FULLFORD D. Distributed interactive simulation: Its past,present,and future[A]. Proceedings of 1996 Winter Simulation Conference[C]. San Diego,CA, USA:IEEE WSC, 1996.179-185.
  • 3REYES A A,NARAYANASAMY A P,DOGAN A. Simulation- based development of real-time, embedded software for cooperative,autonomous aerial vehicles[A]. Digital Avionics Systems Conference[C]. Orlando, FL, USA:IEEE Computer Society, 2003. 551-558.
  • 4MEY L T,TURNER S J. Ownership management in distributed collaborative applications using HLA[A]. Proceedings of 2002 IEEE Region 10 Conference on Computers,Communications,Control and Power Engineering[C]. Beijing: People' s Posts Telecommunications Publishing House, 2002. 367-370.
  • 5BROHEDE M,ANDLER S F. Distributed simulation communication through an active real-time database[A]. Proceedings of 27th Annual NASA Goddard/IEEE[C]. MD, USA:IEEE Computer Society,2002. 147-155.
  • 6GUPTA P,LIN Zhong,JHA N K. A high-level interconnect power model for design space exploration[A]. International Conference on Computer-Aided Design[C]. New York,NY,USA:The Association for Computing Machinery, 2003. 551-558.
  • 7MURPHY A L,ROMAN G C,VARGHESE G. An exercise in formal reasoning about mobile communications[A]. Proceedings of the 9th International Workshop on Software Specification and Design[C]. New York, NY, USA: IEEE Computer Society,1998. 25-33.
  • 8N.Weiler.Honeypots for distributed denial-of-service attacks[].Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collabora- tive EnterprisesWET ICE’.2002
  • 9I.Kuwatly,M.Sraj,Z.Al Masri,H.Artail.A dynamic honeypot design for intrusion detection[].The IEEE/ACS International Conference on Pervasive Services.2004
  • 10B.Scottberg,W.Yurcik,D.Doss.Internet honeypots: protection or entrapment[].IEEE International Symposium on Technology and Society (ISTAS’).2002

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部