期刊文献+

基于移动代理的P2P网络资源发现方法研究 被引量:3

A Solution to Peer-to-Peer Network Resource Discovery Based on Mobile Agents
下载PDF
导出
摘要 在本文中 ,我们概述了 P2 P(Peer- to- Peer)网络及移动代理 (Mobile Agents)技术 ,讨论了当前的 P2 P网络资源发现方法的问题 ,并提出了一种基于移动代理的相对先进的新的解决方法。同时 ,分析了该方法的优点 ,给出了算法步骤和具体运用 Aglets实现该方法的初步思路。
作者 金响红 项明
出处 《微型电脑应用》 2004年第3期37-39,共3页 Microcomputer Applications
  • 相关文献

参考文献10

  • 1IBM Japan Aglets Home Page, http://www. trl. ibm.com/aglets/index. html
  • 2Aglets Community, http ..//aglets. sourceforge. net/
  • 3Napster Home Page, Inc. , http://www. napster. com/
  • 4Gnutella Home Page, http://www. gnutella. co. uk/
  • 5Aglets Software Development Kit, http://prdownloads.sourceforge. net/aglets/aglets-2. 0. 2. jar
  • 6Benno J. Overeinder, Etienne Posthumus, and Frances M.T. Brazier Integrating Peer - to- Peer Networking and Computing in the AgentScape Framework
  • 7Lange DB, Oshima M. Programming and Deploying Java Mobile Agents with Aglets. MA: Addison- Wesley,1998.
  • 8Feng XY, Cao JN, Lu J, Chan H. An efficient mailbox -based algorithm for message delivery in mobile Agent systems. In: Picco JP,ed. Proceedings of the MA 2001.LNCS2240, Berlin :Spring Verlag, 2001. 135 - 151.
  • 9刘平山,许倩霞.aglet编程机制研究[J].桂林电子工业学院学报,2002,22(3):23-27. 被引量:10
  • 10黄维雄,黄铭钧,陈建利,王晓宇,凌波,周傲英.一种基于自配置策略的新型Peer to Peer平台系统[J].软件学报,2003,14(2):237-246. 被引量:20

二级参考文献21

  • 1[1]FURL. http://www.jps.net/williamw/furi.
  • 2[2]Bressan S, Goh CL, Ooi BC, Tan KL. Supporting extensible buffer replacement strategies in database system. In: Delis A, et al., eds. Proceedings of the ACM SIGMOD International Conference on Management of Data. Philadelphia: ACM Press, 1999. 52~64.
  • 3[3]Wong D, Paciorek N, Walsh T, DiCelie J, Young M, Peet B. Concordia: an infrastructure for collaborating mobile agents. In: Rothermel K, et al., eds. Mobile Agents, First International Workshop. Berlin: Springer-Verlag, 1998. 86~97.
  • 4[4]Freenet Home Page. http://freenet.sourceforge.com.
  • 5[5]Gnutella Development Home Page. http://gnutella.wego.com.
  • 6[6]Goh CL, Bressan S, Ooi BC, Anirban M. Storm: a 100% java peersistent storage manager. In: Chaudhri AB, ed. Proceedings of the OOPSLA Worshop on Java and Object. Denver: Hermes Penton Science, 1999. 12~13.
  • 7[7]Gribble S, Halevy A, Ives Z, Rodrig M, Suciu D. What can database do for peer-to-peer. In: Mecca G, et al., eds. Proceedings of the 4th International Workshop on the Web and Databases. Santa Barbara, 2001. 31~36.
  • 8[8]ICQ Home Page. http://www.icq.com.
  • 9[9]Karjoth G, Lange DB, Oshima M. A security model for aglets. Lecture Notes in Computer Science, 1997,1419:188~205.
  • 10[10]Karnik NM, Tripathi AR. Security in the Ajanta mobile agent system. Software-Practice and Experience, 2001,31(4):301~329.

共引文献28

同被引文献11

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部