期刊文献+
共找到55篇文章
< 1 2 3 >
每页显示 20 50 100
Node Coverage Algorithms in Wireless Sensor Networks Using Mobile Agents 被引量:9
1
作者 RAINA Manik KUMAR Subhas PATRO Ranjeet 《自动化学报》 EI CSCD 北大核心 2006年第6期915-921,共7页
This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of g... This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of global deployment or topology, etc). We propose the algorithms and show mathematical analysis to support our claims. The paper ends with simulation studies and discussion of results. 展开更多
关键词 Wireless sensor networks mobile agents
下载PDF
Optimization in the Migration Problem of Mobile Agents in Distributed Information Retrieval Systems 被引量:1
2
作者 HeYan-xiang ChenYi-feng +1 位作者 HeJing CaoJian-nong 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第2期153-160,共8页
In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices... In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices. The proposed encoding scheme has the advantages of simplicity for encoding and decoding, ease for GA operations, and better equilibrium between exploration and exploitation. It is also adaptive in that, with few restrictions on the length of code, it can be freely lengthened or shortened according to the characteristics of the problem space. Furthermore, the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node. The simulation results demonstrate the higher performance of our algorithm, with fast convergence to the optima or sub-optima on various problem sizes. Comparing with the binary string encoding of vertices, when the problem size is large, our algorithm runs remarkably faster with comparable search capability. Key words distributed information retrieval - mobile agents - migration problem - genetic algorithms CLC number TP 301. 6 Foundation item: Supported by the National Natural Science Foundation of China (90104005), the Natural Science Foundation of Hubei Province and the Hong Kong Polytechnic University under the grant G-YD63Biography: He Yan-xiang (1952-), male, Professor, research direction: distributed and parallel processing, multi-agent systems, data mining and e-business. 展开更多
关键词 distributed information retrieval mobile agents migration problem genetic algorithms
下载PDF
QoS Negotiation and Renegotiation Based on Mobile Agents
3
作者 张士兵 张登银 《Journal of Electronic Science and Technology of China》 2006年第2期97-100,共4页
The Quality of Service (QoS) has received more and more attention since QoS becomes increasingly important in the Internet development. Mobile software agents represent a valid alternative to the implementation of s... The Quality of Service (QoS) has received more and more attention since QoS becomes increasingly important in the Internet development. Mobile software agents represent a valid alternative to the implementation of strategies for the negotiation. In this paper, a QoS negotiation and renegotiation system architecture based on mobile agents is proposed. The agents perform the task in the whole process. Therefore, such a system can reduce the network load, overcome latency, and avoid frequent exchange information between clients and server. The simulation results show that the proposed system could improve the network resource utility about 10%. 展开更多
关键词 Quality of Service (QoS) NEGOTIATION RENEGOTIATION mobile agents
下载PDF
A Forward Integrity and Itinerary Secrecy Protocol for Mobile Agents 被引量:1
4
作者 GUAN Huanmei MENG Xuejun ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1727-1730,共4页
The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agen... The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agent. Forward integrity in mobile agents guarantees that offers contained in a mobile agent from previously visited host can not be modified by a malicious host. Itinerary secrecy can prevent mobile agent from being passively attack. This paper proposes a new forward integrity and itinerary secrecy protocol for mobile agent. The protocol can also resist collusion truncation attack. 展开更多
关键词 mobile agent security forward integrity itinerary secrecy truncation attack
下载PDF
Using Mobile Agents to Implement Workflow System
5
作者 LIJie LIUXian-xing GUOZheng-wei 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期775-780,共6页
Current workflow management systems usually adopt the existing technologies such as TCP/IP-based Web technologies and CORBA as well to fulfill the bottom communications. Very often it has been considered only from a t... Current workflow management systems usually adopt the existing technologies such as TCP/IP-based Web technologies and CORBA as well to fulfill the bottom communications. Very often it has been considered only from a theoretical point of view, mainly for the lack of concrete possibilities to execute with elasticity. MAT (Mobile Agent Technology) represents a very attractive approach to the distributed control of computer networks and a valid alternative to the implementation of strategies for workflow system. This paper mainly focuses on improving the performance of workflow system by using MAT. Firstly, the performances of workflow systems based on both CORBA and mobile agent are summarized and analyzed; Secondly, the performance contrast is presented by introducing the mathematic model of each kind of data interaction process respectively. Last, a mobile agentbased workflow system named MAWMS is presented and described in detail. Key words workflow - Mobile Agent - Contract Net Protocol - CORBA - Web CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60272024) and National Natural Science Foundation of Henan Province (0411014100)Biography: LI Jie, (1975-), male, lector, Ph. D., research direction: workflow, mobile agent, network management. 展开更多
关键词 WORKFLOW mobile Agent Contract Net Protocol CORBA WEB
下载PDF
An Anonymous Payment Protocol withMobile Agents in Hostile Environments
6
作者 LIUYi XIANGMing-sen WANGYu-min 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期271-274,共4页
By using Pedersen's verifiable secret sharing scheme and the theory of crossvalidation, we propose an a-nonymous payment protocol which have following features: protecting theconfidentiality of sensitive payment i... By using Pedersen's verifiable secret sharing scheme and the theory of crossvalidation, we propose an a-nonymous payment protocol which have following features: protecting theconfidentiality of sensitive payment information from spying by malicioushosts; using a trustedthird party in a minimal way; verifying the validity of the share by the merchant; allowing agent toverify that the product which it is a-bout to receive is the one it is paying for; keeping thecustomer anonymous. 展开更多
关键词 mobile agent anonymous payment protocol verifiable secret sharing thetheory of cross validation
下载PDF
Study of the Security in Network Management Based on Mobile Agents 被引量:2
7
作者 CHEN Zhi~1 WANG Ru-chuan~(1,2)1.Department of Computer Science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,P.R.China 2.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,P.R.China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期37-42,共6页
Security of mobile-agent based network management must be considered due to the widespread adoption of mo-bile agents in network management,which involves the protections of mobile agents,management station and manage... Security of mobile-agent based network management must be considered due to the widespread adoption of mo-bile agents in network management,which involves the protections of mobile agents,management station and managed de-vices.The integrated security model proposed in our paper incorporates the effective security countermeasures of these entitiesinto a trusted execution environment and two security protection layers.Sandbox based on Java virtual machine and Javacard independent on the network devices also with the cryptography technology in this model together protect the networkmanagement process. 展开更多
关键词 network management mobile agent SECURITY Java card CRYPTOGRAPHY
原文传递
Control of group of mobile autonomous agents via local strategies
8
作者 Lixin GAO Daizhan CHENG Yiguang HONG 《控制理论与应用(英文版)》 EI 2008年第4期357-364,共8页
This paper considers the formation control problem of multi-agent systems in a distributed fashion. Two cases of the information propagating topologies among multiple agents, characterized by graphics model, are consi... This paper considers the formation control problem of multi-agent systems in a distributed fashion. Two cases of the information propagating topologies among multiple agents, characterized by graphics model, are considered. One is fixed topology. The other is switching topology which represents the limited and less reliable information exchange. The local formation control strategies established in this paper are based on a simple modification of the existing consensus control strategies. Moreover, some existing convergence conditions are shown to be a special case of our model even in the continuous-time consensus case. Therefore, the results of this paper extend the existing results about the consensus problem. 展开更多
关键词 Formation control Distributed control Multi-agent coordination mobile autonomous agent
下载PDF
Mobile Agent Platform and Naming Scheme of Agents
9
作者 Sudin SHRESTHA 徐拾义 Jagath RATNAYEKE 《Journal of Shanghai University(English Edition)》 CAS 2004年第2期177-179,共3页
Mobile agent technology has drawn a tremendous amount of attention from researchers in distributed computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as ... Mobile agent technology has drawn a tremendous amount of attention from researchers in distributed computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as well as offering a new approach to human-computer-interaction. In mobile agent systems, the mobile agent travels autonomously from one computer to another within the agent enabled networks, executes itself in the agent execution environment, collects useful information and makes its own decision or behalf of its owner. This mobility nature of mobile agent demands its unique name in the whole network otherwise it gets lost or conflicts with other mobile agent having same name. This paper proposes a naming scheme which promises a unique name for a mobile agent within that network. Key words mobile agent - mobile agent platform - naming scheme 展开更多
关键词 mobile agent mobile agent platform naming scheme
下载PDF
Energy-efficient routing for mobile agents in wireless sensor networks
10
作者 CAO Yongtao HE Chen JIANG Lingge 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2007年第2期161-166,共6页
In wireless sensor networks,data fusion(in-network processing)is a critical issue because sensor networks are energy-constrained and bandwidth-constrained.Recently,a new scheme based on mobile agent has been proposed ... In wireless sensor networks,data fusion(in-network processing)is a critical issue because sensor networks are energy-constrained and bandwidth-constrained.Recently,a new scheme based on mobile agent has been proposed to solve the problem.The order and number of nodes on the route traversed by a mobile agent determine the energy consumption,and hence,they have a significant impact on the overall performance of the whole system.Considering the limited transmission range of sensor nodes,we showed that this routing problem in a multi-hop cluster could be modeled as a node-weighted traveling tourist problem(TTP).We proved that the problem was nondeterministic polynomial time(NP)-complete.Then we presented a new approximation algorithm to solve the problem.Simulation experiments demonstrate that the proposed heuristic is more energy-efficient than the two earlier ones. 展开更多
关键词 wireless sensor networks mobile agent rout-ing NP-complete problem
原文传递
基于Multi-Mobile Agent的决策模型在电子政务中的应用 被引量:1
11
作者 郭荷清 吴涛 《计算机应用与软件》 CSCD 北大核心 2007年第11期109-110,146,共3页
电子政务是"信息高速公路"的首要应用领域,各国政府信息化的首要目标就是建立电子政府,推行电子政务。基于Multi-Agent和Mobile-Agent的电子政务协同决策方法,是利用Agent内部的知识库和推理规则进行智能决策,通过资源测评体... 电子政务是"信息高速公路"的首要应用领域,各国政府信息化的首要目标就是建立电子政府,推行电子政务。基于Multi-Agent和Mobile-Agent的电子政务协同决策方法,是利用Agent内部的知识库和推理规则进行智能决策,通过资源测评体系进行硬性挑选,从一定程度上减少了弄虚作假的可能,保证了政府部门以开放的机制进行人事决策,更有利于用客观和科学的准则来保证决策的公平公正性。 展开更多
关键词 MULTI—AGENT mobile—Agent 电子政务 协同决策
下载PDF
Anonymous Authentication for Secure Mobile Agent Based Internet Business
12
作者 Sivaraman Audithan Thanjavur Swaminathan Murunya Pandi Vijayakumar 《Circuits and Systems》 2016年第8期1421-1429,共9页
Nowadays, mobile agents are an effective paradigm for accessing the information in distributed applications, especially in a dynamic network environment such as Internet businesses. In such kind of Internet based appl... Nowadays, mobile agents are an effective paradigm for accessing the information in distributed applications, especially in a dynamic network environment such as Internet businesses. In such kind of Internet based applications, access must be secure and authentication takes a vital role to avoid malicious use of the system. This kind of security has been provided by several previously proposed algorithms based on RSA digital signature cryptography. However, the computational time for performing encryption and decryption operations in the past literatures is very high. In this paper, we propose an anonymous authentication scheme which potentially reduces the overall computation time needed for verifying the legitimacy of the users. Comparing with previous anonymous authentication schemes, our proposed scheme provides more security and it is effective in terms of computation cost. The experimental results show that the proposed method authenticates the users with low computational time significantly. 展开更多
关键词 mobile agents AUTHENTICATION Elliptic Curve Digital Signature Computational Time Servers
下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
13
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response
下载PDF
Building Distributed Web GIS: A Mobile Agent Based Approach 被引量:2
14
作者 jhguan@wtusm.edu.cn Guan Ji hong 1 , Zhou Shui geng 2 , Bian Fu ling 3, Meng Ling kui 3 1. School of Computer, Wuhan University, Wuhan 430072, China 2. State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, Chin 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期474-481,共8页
The diversity of GISs and the wide spread availability of WWW have led to an increasing amount of research on integrating a variety of heterogeneous and autonomous GISs in a cooperative environment to construct a new... The diversity of GISs and the wide spread availability of WWW have led to an increasing amount of research on integrating a variety of heterogeneous and autonomous GISs in a cooperative environment to construct a new generation of GIS characterizing in open architecture, distributed computation, interoperability, and extensibility. Our on going research project MADGIS (Mobile Agent based Distributed Geographic Information System) is reported, in which we propose the architecture of MADGIS to meet the requirements of integrating distributed GIS applications under Internet environment. We first describe the architecture of MADGIS, and detailed discussions focusing on the structure of client site, server site and mobile agent in MADGIS. Then we explore key techniques for MADGIS implementation. 展开更多
关键词 distributed GIS mobile agent architecture MOBILITY INTEROPERABILITY
下载PDF
Study of Interoperability in Mobile Agent Environment 被引量:1
15
作者 PENGDe-wei HEYan-xiang 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期623-628,共6页
The paper mainly represents how to solve the problem. OMG CORBA, MASIF and FIPA standards are closely analysed here, then are combined to guarantee the interoperability of Mobile Agent System. We present four layer of... The paper mainly represents how to solve the problem. OMG CORBA, MASIF and FIPA standards are closely analysed here, then are combined to guarantee the interoperability of Mobile Agent System. We present four layer of interoperability in our system and the method to implement it and compare our system to the existing system. Key words mobile agent - interoperability - CORBA - MASIF - FIPA CLC number TP 391 Foundation item: Supported by the Key Science and Techndology project of Wuhan City(20011007087)Biography: PENG De-wei (1976-), male, Ph. D. candidate, research direction: mobile agent, distributed computing and web systems 展开更多
关键词 mobile agent INTEROPERABILITY CORBA MASIF FIPA
下载PDF
Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:1
16
作者 Weijin Jiang Yang Wang +4 位作者 Yirong Jiang Yuhui Xu Jiahui Chen Lina Tan Guo Liang 《Computers, Materials & Continua》 SCIE EI 2020年第1期123-136,共14页
In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management... In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness. 展开更多
关键词 Cloud computing mobile agent system subjective trust objective trust dynamic trust management mobile Internet
下载PDF
A Mobile Agent-Based Prototype of HeterogeneousDistributed Virtual Environment Systems 被引量:1
17
作者 Ji Qingge(Dept. of Computer Science & Engineering, Harbin Institute of Technology, 150001, P. R. China)Wang Dongmu(Beijing Simulation Center, 100854, P. R. China)Hong Bingrong(Dept. of Computer Science & Engineering, Harbin Institute of Technology, 150001 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第2期61-65,共5页
Mobile agents provide a new method for the distributed computation. This paper presents the advantages of using mobile agents in a distributed virtual environment (DVE) system, and describes the architecture of hetero... Mobile agents provide a new method for the distributed computation. This paper presents the advantages of using mobile agents in a distributed virtual environment (DVE) system, and describes the architecture of heterogeneous computer's distributed virtual environment system (HCWES) designed to populate some mobile agents as well as stationary agents. Finally, the paper introduces how heterogeneous computer network communication is to be realized. 展开更多
关键词 Distributed virtual environment mobile agent Distributed computing
下载PDF
High Efficiency and Light Mobile Electronic Business System Based on Mobile Agent Middleware 被引量:1
18
作者 张云勇 刘锦德 《Journal of Electronic Science and Technology of China》 2004年第1期43-46,共4页
Mobile Network technology has been being the research focus during the 1990’s. The middleware technology is imported for the sake of running distributed transaction smoothly. In this paper, a mobile agent based middl... Mobile Network technology has been being the research focus during the 1990’s. The middleware technology is imported for the sake of running distributed transaction smoothly. In this paper, a mobile agent based middleware high efficiency mobile electronic business oriented middleware (HEMEBOM) is designed and implemented based on the requirement and background of collaborative electronic business. Its architecture, elements and excellent properties are mainly focused. Then high efficiency mobile electronic business system μMcommerce is built using HEMEBOM. 展开更多
关键词 B2B electronic business MIDDLEWARE mobile agent real-time information push lightweight mobile commerce
下载PDF
Explosive synchronization in a mobile network in the presence of a positive feedback mechanism
19
作者 钱冬杰 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第1期187-191,共5页
Synchronization is a process that describes the coherent dynamics of a large ensemble of interacting units.The study of explosive synchronization transition attracts considerable attention.Here,I report the explosive ... Synchronization is a process that describes the coherent dynamics of a large ensemble of interacting units.The study of explosive synchronization transition attracts considerable attention.Here,I report the explosive transition within the framework of a mobile network,while each oscillator is controlled by global-order parameters of the system.Using numerical simulation,I find that the explosive synchronization(ES)transition behavior can be controlled by simply adjusting the fraction of controlled oscillators.The influences of some parameters on explosive synchronization are studied.Moreover,due to the presence of the positive feedback mechanism,I prevent the occurrence of the synchronization of continuous-phase transition and make phase transition of the system a first-order phase transition accompanied by a hysteresis loop. 展开更多
关键词 complex network explosive synchronization positive feedback mobile agent
下载PDF
A DRM System Based on Mobile Agent for Digital Rights Redistribution
20
作者 LI Ping LU Zhengding ZOU Fuhao LING Hefei 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期475-480,共6页
We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent ... We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent and dispatches it to the user end to enforce DRM functions. The blackbox is an agent that can resist the attacks from the malicious user in a certain time interval. Owing to digital rights redistribution support, the user whose rights belong to redistribution category can transfer his rights to other users. Moreover, by introducing public key infrastructure (PKI) and certificate authority (CA) role, the security of the session can be ensured. An analysis of system security and performance and a comparison with traditional DRM system is given. 展开更多
关键词 digital rights management public key infrastructure certificate authority mobile agent rights redistribution
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部