|
|
|
|
LEADER |
05278nam a2200601 4500 |
001 |
978-3-540-45647-6 |
003 |
DE-He213 |
005 |
20191220130926.0 |
007 |
cr nn 008mamaa |
008 |
121227s2001 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540456476
|9 978-3-540-45647-6
|
024 |
7 |
|
|a 10.1007/3-540-45647-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA75.5-76.95
|
050 |
|
4 |
|a TK7885-7895
|
072 |
|
7 |
|a UK
|2 bicssc
|
072 |
|
7 |
|a COM067000
|2 bisacsh
|
072 |
|
7 |
|a UK
|2 thema
|
082 |
0 |
4 |
|a 004
|2 23
|
245 |
1 |
0 |
|a Mobile Agents
|h [electronic resource] :
|b 5th International Conference, MA 2001 Atlanta, GA, USA, December 2-4, 2001 Proceedings /
|c edited by Gian P. Picco.
|
250 |
|
|
|a 1st ed. 2001.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2001.
|
300 |
|
|
|a XII, 284 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 2240
|
505 |
0 |
|
|a Security -- On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection -- Trust Relationships in a Mobile Agent System -- Evaluating the Security of Three Java-Based Mobile Agent Systems -- Models and Architectures -- Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study -- Lime Revisited -- Dynamic Adaptation of Mobile Agents in Heterogenous Environments -- Applications -- Fast File Access for Fast Agents -- Flying Emulator: Rapid Building and Testing of Networked Applications for Mobile Computers -- Crawlets: Agents for High Performance Web Search Engines -- Communication -- An Efficient Mailbox-Based Algorithm for Message Delivery in Mobile Agent Systems -- Using Predicates for Specifying Targets of Migration and Messages in a Peer-to-Peer Mobile Agent Environment -- A Scalable and Secure Global Tracking Service for Mobile Agents -- Run-Time Support -- Translating Strong Mobility into Weak Mobility -- Transparent Migration of Mobile Agents Using the Java Platform Debugger Architecture -- Portable Resource Reification in Java-Based Mobile Agent Systems -- Quantitative Evaluation and Benchmarking -- Mobile-Agent versus Client/Server Performance: Scalability in an Information-Retrieval Task -- Performance Evaluation of Mobile-Agent Middleware: A Hierarchical Approach -- Scheduling Multi-task Agents.
|
520 |
|
|
|a Recent years have witnessed the appearance of new paradigms for designing distributed applications where the application components can be relocated - namically across the hosts of the network. This form of code mobility lays the foundation for a new generation of technologies, architectures, models, and - plications in which the location at which the code is executed comes under the control of the designer, rather than simply being a con?guration accident. Among the various ?avors of mobile code, the mobile agent paradigm has become particularly popular. Mobile agents are programs able to determine - tonomously their own migration to a di?erent host, and still retain their code and state (or at least a portion thereof). Thus, distributed computations do not necessarily unfold as a sequence of requests and replies between clients and - mote servers, rather they encompass one or more visits of one or more mobile agents to the nodes involved. Mobile code and mobile agents hold the potential to shape the next gene- tion of technologies and models for distributed computation. The ?rst steps of this process are already evident today: Web applets provide a case for the least sophisticated form of mobile code, Java-based distributed middleware makes - creasing use of mobile code, and the ?rst commercial applications using mobile agents are starting to appear.
|
650 |
|
0 |
|a Computer hardware.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
1 |
4 |
|a Computer Hardware.
|0 http://scigraph.springernature.com/things/product-market-codes/I1200X
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Programming Techniques.
|0 http://scigraph.springernature.com/things/product-market-codes/I14010
|
650 |
2 |
4 |
|a Software Engineering.
|0 http://scigraph.springernature.com/things/product-market-codes/I14029
|
650 |
2 |
4 |
|a Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14045
|
700 |
1 |
|
|a Picco, Gian P.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662188682
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540429524
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 2240
|
856 |
4 |
0 |
|u https://doi.org/10.1007/3-540-45647-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|