期刊文献+
共找到73篇文章
< 1 2 4 >
每页显示 20 50 100
Node Coverage Algorithms in Wireless Sensor Networks Using Mobile Agents 被引量:9
1
作者 RAINA Manik KUMAR Subhas PATRO Ranjeet 《自动化学报》 EI CSCD 北大核心 2006年第6期915-921,共7页
This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of g... This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of global deployment or topology, etc). We propose the algorithms and show mathematical analysis to support our claims. The paper ends with simulation studies and discussion of results. 展开更多
关键词 Wireless sensor networks mobile agents
在线阅读 下载PDF
Optimization in the Migration Problem of Mobile Agents in Distributed Information Retrieval Systems 被引量:1
2
作者 He Yan-xiang Chen Yi-feng +1 位作者 He Jing Cao Jian-nong 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第2期153-160,共8页
In this paper,we employ genetic algorithms to solve the migration problem(MP).We propose a new encoding scheme to represent trees,which is composed of two parts:the pre-ordered traversal sequence of tree vertices and ... In this paper,we employ genetic algorithms to solve the migration problem(MP).We propose a new encoding scheme to represent trees,which is composed of two parts:the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices.The proposed encoding scheme has the advantages of simplicity for encoding and decoding,ease for GA operations,and better equilibrium between exploration and exploitation.It is also adaptive in that,with few restrictions on the length of code,it can be freely lengthened or shortened according to the characteristics of the problem space.Furthermore,the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node.The simulation results demonstrate the higher performance of our algorithm,with fast convergence to the optima or sub-optima on various problem sizes.Comparing with the binary string encoding of vertices,when the problem size is large,our algorithm runs remarkably faster with comparable search capability. 展开更多
关键词 distributed information retrieval mobile agents migration problem genetic algorithms
在线阅读 下载PDF
A Forward Integrity and Itinerary Secrecy Protocol for Mobile Agents 被引量:1
3
作者 GUAN Huanmei MENG Xuejun ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1727-1730,共4页
The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agen... The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agent. Forward integrity in mobile agents guarantees that offers contained in a mobile agent from previously visited host can not be modified by a malicious host. Itinerary secrecy can prevent mobile agent from being passively attack. This paper proposes a new forward integrity and itinerary secrecy protocol for mobile agent. The protocol can also resist collusion truncation attack. 展开更多
关键词 mobile agent security forward integrity itinerary secrecy truncation attack
在线阅读 下载PDF
Protecting mobile agents' data using trusted computing technology 被引量:1
4
作者 XIAN He-qun FENG Deng-guo 《通讯和计算机(中英文版)》 2007年第3期44-51,共8页
Even with attractive computational advantages,mobile agent technology has not developed its full potential due to various security issues.This paper proposes a method called Private Key Consignment to solve the proble... Even with attractive computational advantages,mobile agent technology has not developed its full potential due to various security issues.This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents.It exploits new functionalities and mechanism provided by the trusted computing technology,and adopts both public key and symmetric key cryptographic means for data and key protection.The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware,thus,enabling convenient and secure use of the private key.It provides a new scheme of mobile agents'data protection. 展开更多
关键词 private key consignment mobile agent trusted computing TPM
在线阅读 下载PDF
Using Mobile Agents to Implement Workflow System
5
作者 LIJie LIUXian-xing GUOZheng-wei 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期775-780,共6页
Current workflow management systems usually adopt the existing technologies such as TCP/IP-based Web technologies and CORBA as well to fulfill the bottom communications. Very often it has been considered only from a t... Current workflow management systems usually adopt the existing technologies such as TCP/IP-based Web technologies and CORBA as well to fulfill the bottom communications. Very often it has been considered only from a theoretical point of view, mainly for the lack of concrete possibilities to execute with elasticity. MAT (Mobile Agent Technology) represents a very attractive approach to the distributed control of computer networks and a valid alternative to the implementation of strategies for workflow system. This paper mainly focuses on improving the performance of workflow system by using MAT. Firstly, the performances of workflow systems based on both CORBA and mobile agent are summarized and analyzed; Secondly, the performance contrast is presented by introducing the mathematic model of each kind of data interaction process respectively. Last, a mobile agentbased workflow system named MAWMS is presented and described in detail. Key words workflow - Mobile Agent - Contract Net Protocol - CORBA - Web CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60272024) and National Natural Science Foundation of Henan Province (0411014100)Biography: LI Jie, (1975-), male, lector, Ph. D., research direction: workflow, mobile agent, network management. 展开更多
关键词 WORKFLOW Mobile Agent Contract Net Protocol CORBA WEB
在线阅读 下载PDF
Control of group of mobile autonomous agents via local strategies
6
作者 Lixin GAO Daizhan CHENG Yiguang HONG 《控制理论与应用(英文版)》 EI 2008年第4期357-364,共8页
This paper considers the formation control problem of multi-agent systems in a distributed fashion. Two cases of the information propagating topologies among multiple agents, characterized by graphics model, are consi... This paper considers the formation control problem of multi-agent systems in a distributed fashion. Two cases of the information propagating topologies among multiple agents, characterized by graphics model, are considered. One is fixed topology. The other is switching topology which represents the limited and less reliable information exchange. The local formation control strategies established in this paper are based on a simple modification of the existing consensus control strategies. Moreover, some existing convergence conditions are shown to be a special case of our model even in the continuous-time consensus case. Therefore, the results of this paper extend the existing results about the consensus problem. 展开更多
关键词 Formation control Distributed control Multi-agent coordination Mobile autonomous agent
在线阅读 下载PDF
An Anonymous Payment Protocol withMobile Agents in Hostile Environments
7
作者 LIUYi XIANGMing-sen WANGYu-min 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期271-274,共4页
By using Pedersen's verifiable secret sharing scheme and the theory of crossvalidation, we propose an a-nonymous payment protocol which have following features: protecting theconfidentiality of sensitive payment i... By using Pedersen's verifiable secret sharing scheme and the theory of crossvalidation, we propose an a-nonymous payment protocol which have following features: protecting theconfidentiality of sensitive payment information from spying by malicioushosts; using a trustedthird party in a minimal way; verifying the validity of the share by the merchant; allowing agent toverify that the product which it is a-bout to receive is the one it is paying for; keeping thecustomer anonymous. 展开更多
关键词 mobile agent anonymous payment protocol verifiable secret sharing thetheory of cross validation
在线阅读 下载PDF
A Solution Model to Protect Mobile Agents Against Malicious Host Attack
8
作者 迈克尔 徐良贤 《Journal of Shanghai Jiaotong university(Science)》 EI 2003年第1期1-5,共5页
Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, ... Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, by providing mechanisms that ensure attack detection and provide integrity to mobile agents. This noble technique involves encapsulating partial results obtained on each intermediate host and binding these results together using a hash function, thus forming a strong bonded chain that cannot be compromised. An analytical model to explore the system performance was also developed. 展开更多
关键词 mobile agent(MA) secure service station(SSS) agent host execution environment(EE)
在线阅读 下载PDF
Mobile Agent Platform and Naming Scheme of Agents
9
作者 Sudin SHRESTHA 徐拾义 Jagath RATNAYEKE 《Journal of Shanghai University(English Edition)》 CAS 2004年第2期177-179,共3页
Mobile agent technology has drawn a tremendous amount of attention from researchers in distributed computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as ... Mobile agent technology has drawn a tremendous amount of attention from researchers in distributed computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as well as offering a new approach to human-computer-interaction. In mobile agent systems, the mobile agent travels autonomously from one computer to another within the agent enabled networks, executes itself in the agent execution environment, collects useful information and makes its own decision or behalf of its owner. This mobility nature of mobile agent demands its unique name in the whole network otherwise it gets lost or conflicts with other mobile agent having same name. This paper proposes a naming scheme which promises a unique name for a mobile agent within that network. Key words mobile agent - mobile agent platform - naming scheme 展开更多
关键词 mobile agent mobile agent platform naming scheme
在线阅读 下载PDF
QoS Negotiation and Renegotiation Based on Mobile Agents
10
作者 张士兵 张登银 《Journal of Electronic Science and Technology of China》 2006年第2期97-100,共4页
The Quality of Service (QoS) has received more and more attention since QoS becomes increasingly important in the Internet development. Mobile software agents represent a valid alternative to the implementation of s... The Quality of Service (QoS) has received more and more attention since QoS becomes increasingly important in the Internet development. Mobile software agents represent a valid alternative to the implementation of strategies for the negotiation. In this paper, a QoS negotiation and renegotiation system architecture based on mobile agents is proposed. The agents perform the task in the whole process. Therefore, such a system can reduce the network load, overcome latency, and avoid frequent exchange information between clients and server. The simulation results show that the proposed system could improve the network resource utility about 10%. 展开更多
关键词 Quality of Service (QoS) NEGOTIATION RENEGOTIATION mobile agents
在线阅读 下载PDF
Spatial Grasp Model for Distributed Management and Its Comparison With Traditional Algorithms 被引量:1
11
作者 Peter Simon Sapaty 《International Relations and Diplomacy》 2025年第3期164-179,共16页
The word“spatial”fundamentally relates to human existence,evolution,and activity in terrestrial and even celestial spaces.After reviewing the spatial features of many areas,the paper describes basics of high level m... The word“spatial”fundamentally relates to human existence,evolution,and activity in terrestrial and even celestial spaces.After reviewing the spatial features of many areas,the paper describes basics of high level model and technology called Spatial Grasp for dealing with large distributed systems,which can provide spatial vision,awareness,management,control,and even consciousness.The technology description includes its key Spatial Grasp Language(SGL),self-evolution of recursive SGL scenarios,and implementation of SGL interpreter converting distributed networked systems into powerful spatial engines.Examples of typical spatial scenarios in SGL include finding shortest path tree and shortest path between network nodes,collecting proper information throughout the whole world,elimination of multiple targets by intelligent teams of chasers,and withstanding cyber attacks in distributed networked systems.Also this paper compares Spatial Grasp model with traditional algorithms,confirming universality of the former for any spatial systems,while the latter just tools for concrete applications. 展开更多
关键词 spatial awareness spatial control spatial consciousness Spatial Grasp Technology Spatial Grasp Language spatial scenarios cyber attacks distributed algorithms mobile agents
在线阅读 下载PDF
基于Multi-Mobile Agent的决策模型在电子政务中的应用 被引量:1
12
作者 郭荷清 吴涛 《计算机应用与软件》 CSCD 北大核心 2007年第11期109-110,146,共3页
电子政务是"信息高速公路"的首要应用领域,各国政府信息化的首要目标就是建立电子政府,推行电子政务。基于Multi-Agent和Mobile-Agent的电子政务协同决策方法,是利用Agent内部的知识库和推理规则进行智能决策,通过资源测评体... 电子政务是"信息高速公路"的首要应用领域,各国政府信息化的首要目标就是建立电子政府,推行电子政务。基于Multi-Agent和Mobile-Agent的电子政务协同决策方法,是利用Agent内部的知识库和推理规则进行智能决策,通过资源测评体系进行硬性挑选,从一定程度上减少了弄虚作假的可能,保证了政府部门以开放的机制进行人事决策,更有利于用客观和科学的准则来保证决策的公平公正性。 展开更多
关键词 MULTI—AGENT Mobile—Agent 电子政务 协同决策
在线阅读 下载PDF
基于P2P的移动Agent入侵检测系统
13
作者 孙名松 李卿 刘鑫 《计算机技术与发展》 2009年第4期166-169,共4页
传统入侵检测系统的能力在迅猛发展的互联网面前日显薄弱。探讨了将P2P技术、Mobile-agent技术引入到传统入侵检测系统中,构建一个基于P2P的Mobile-agent入侵检测系统。组成该系统的Agent在网络的各个节点间流动,实时监测网络状况,同时A... 传统入侵检测系统的能力在迅猛发展的互联网面前日显薄弱。探讨了将P2P技术、Mobile-agent技术引入到传统入侵检测系统中,构建一个基于P2P的Mobile-agent入侵检测系统。组成该系统的Agent在网络的各个节点间流动,实时监测网络状况,同时Agent能够互相识别各自的行为并能根据潜在的策略采取适当的反应。该系统与传统系统相比具有灵活性、分布式、智能化等特点,能全面、深入地实现入侵的检测和防御。 展开更多
关键词 P2P Mobile—agent 入侵检测
在线阅读 下载PDF
基于Agent的信息技术外包方案评价体系结构 被引量:3
14
作者 席代昭 范体军 《情报杂志》 CSSCI 北大核心 2007年第9期92-93,97,共3页
企业信息技术外包方案评价涉及的因素非常复杂,特别是具有分散、开放性特点,这样造成外包方案评价因素的信息搜集具有相当大的难度。为此,基于Agent技术提出了信息技术外包方案评价体系结构,应用Mobil-Agent和Multi-Agent来实现各个模... 企业信息技术外包方案评价涉及的因素非常复杂,特别是具有分散、开放性特点,这样造成外包方案评价因素的信息搜集具有相当大的难度。为此,基于Agent技术提出了信息技术外包方案评价体系结构,应用Mobil-Agent和Multi-Agent来实现各个模块的功能,在实现决策评价体系智能化的同时,解决评价结果在速度、效率方面的难题和以前系统中存在的被动式搜索问题。 展开更多
关键词 信息技术外包 Mobil—Agent MULTI—AGENT 信息源 搜索模块 分析模块
在线阅读 下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
15
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response
在线阅读 下载PDF
CROSS LAYER COORDINATED ENERGY SAVING STRATEGY IN MANET 被引量:7
16
作者 Xu Li Zheng Baoyu(Dept. of Info. Eng., Nanjing University of Post and Telecommunication, Nanjing 210003) (Dept. of Computer Science, Fujian Normal University, Fuzhou 350007) 《Journal of Electronics(China)》 2003年第6期451-455,共5页
Mobile Ad hoc NETwork (MANET) consists of a set of mobile hosts which can operate independently without infrastructure base stations. Energy saving is a critical issue for MANET since most mobile hosts will operate on... Mobile Ad hoc NETwork (MANET) consists of a set of mobile hosts which can operate independently without infrastructure base stations. Energy saving is a critical issue for MANET since most mobile hosts will operate on battery powers. A cross layer coordinated framework for energy saving is proposed in this letter. On-demand power management, physical layer and medium access control layer dialogue based multi-packet reception, mobile agent based topology discovery and topology control based transmit power-aware and battery power-aware dynamic source routing are some of new ideas in this framework. 展开更多
关键词 Mobile Ad hoc NETwork (MANET) Energy saving Power Management Multi-packet reception Mobile agent Topology control
在线阅读 下载PDF
Remediation of a Mercury-Contaminated Industrial Soil Using Bioavailable Contaminant Stripping 被引量:3
17
作者 F.PEDRON G.PETRUZZELLI +1 位作者 M.BARBAFIERI E.TASSI 《Pedosphere》 SCIE CAS CSCD 2013年第1期104-110,共7页
The method to remove bioavailable amounts of heavy metals from a contaminated soil by using plants is defined as bioavailable contaminant stripping (BCS) and could safely be applied if the soil's long-term ability ... The method to remove bioavailable amounts of heavy metals from a contaminated soil by using plants is defined as bioavailable contaminant stripping (BCS) and could safely be applied if the soil's long-term ability to replenish the bioavuilable pool is known. The aim of this study was to evaluate the ability of three common plant species selected, Brassica juncea, Poa annua, and Helianthus annus, to remove bioavailable amounts of mercury (Hg) from a contaminated industrial soil containing 15.1 mg kg-1 Hg. Trials were carried out under greenhouse conditions using pots (mesocosms). According to the precautionary principle, we modified the BCS remediation approach by adding a new step, in which mercury bioavailability was increased by the addition of a strong mobilizing agent, ammonium thiosulphate, (NH4)28203, to obtain an estimate of the likely long-term bioavailable Hg pool. The modified BCS remediation approach was called enhanced bioavailable contaminant stripping (EBCS). After one growth cycle, nearly all the bioavailable mercury (95.7%) was removed and the metal remaining in the soil was considered inert since it was neither extractable by (NH4)2S2O3 nor taken up by plants during a second growth cycle. The results demonstrated that EBCS appeared promising since it removed the most dangerous metal forms while substantially shortening the cleanup time. 展开更多
关键词 heavy metal mercury bioavailability mobilizing agent plant species remediation approach
原文传递
Towards an Artificial Immune System for Detecting Anomalies in Wireless Mesh Networks 被引量:3
18
作者 易平 吴越 陈佳霖 《China Communications》 SCIE CSCD 2011年第3期107-117,共11页
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents m... This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents monitor the situation in the network.These agents can take appropriate actions according to the underlying security policies.Specifically,their activities are coordinated in a hierarchical fashion while sensing,communicating,determining and generating responses.Such an agent can learn about and adapt to its environment dynamically and can detect both known and unknown intrusions.The proposed intrusion detection architecture is designed to be flexible,extendible,and adaptable so that it can perform real-time monitoring.This paper provides the conceptual view and a general framework of the proposed system.In the end,the architecture is illustrated by an example and by simulation to show it can prevent attacks efficiently. 展开更多
关键词 immune system intrusion detection mobile agent wireless mesh network network security
在线阅读 下载PDF
Building Distributed Web GIS: A Mobile Agent Based Approach 被引量:2
19
作者 jhguan@wtusm.edu.cn Guan Ji hong 1 , Zhou Shui geng 2 , Bian Fu ling 3, Meng Ling kui 3 1. School of Computer, Wuhan University, Wuhan 430072, China 2. State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, Chin 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期474-481,共8页
The diversity of GISs and the wide spread availability of WWW have led to an increasing amount of research on integrating a variety of heterogeneous and autonomous GISs in a cooperative environment to construct a new... The diversity of GISs and the wide spread availability of WWW have led to an increasing amount of research on integrating a variety of heterogeneous and autonomous GISs in a cooperative environment to construct a new generation of GIS characterizing in open architecture, distributed computation, interoperability, and extensibility. Our on going research project MADGIS (Mobile Agent based Distributed Geographic Information System) is reported, in which we propose the architecture of MADGIS to meet the requirements of integrating distributed GIS applications under Internet environment. We first describe the architecture of MADGIS, and detailed discussions focusing on the structure of client site, server site and mobile agent in MADGIS. Then we explore key techniques for MADGIS implementation. 展开更多
关键词 distributed GIS mobile agent architecture MOBILITY INTEROPERABILITY
在线阅读 下载PDF
AN IMMUNITY-BASED SECURITY ARCHITECTURE FOR MOBILE AD HOC NETWORKS 被引量:2
20
作者 Yi Ping Zhong Yiping Zhang Shiyong 《Journal of Electronics(China)》 2006年第3期417-422,共6页
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents... This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing, communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently. 展开更多
关键词 Immune system Intrusion detection Mobile agent Mobile ad hoc network Network security
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部