Mobile Agent 1 Mobile Agent 1.1 Mobile Agent 1.2 Mobile Agent
|
|
- Felicia Garrett
- 5 years ago
- Views:
Transcription
1 /2002/13(07) Journal of Software Vol13, No7 Mobile Agent,,, (, ) http//wwwsjtueducn Mobile Agent, Mobile Agent Mobile Agent, Mobile Agent Mobile Agent Lucent Inferno Mobile Agent Mobile Agent; TP393 A Mobile Agent( MA) Agent, Mobile Agent, Mobile Agent, Mobile Agent 1 Mobile Agent 11 Mobile Agent MA Agent, Agent, Agent,,, MA,Agent,, Agent 12 Mobile Agent MA Client/Server,MA (1) MA Client/Server, Agent, Agent MA, Agent,, (2) MA, Agent, (3) MA,,, [1] ; (1970 ),,,, ; (1931 ),,,,,, ; (1977 ),,,, ; (1976 ),,,,
2 1332 Journal of Software 2002,13(7) (4) MA, MA, (5), Agent, MA, (6) Agent,,, WAN [2] 13 Mobile Agent MA, MA, (principal), ;, API,,,MA MA MA 4 [4] ; (CE), Agent (AEE); CE ; CE ( 1 ) [3] Host Host Computation environment Mobile object system Network Computation environment Mobile object system Fig1 MA (1) AEE Agent ; (2) Agent AEE ; The component of the MA system 1 MA (3) Agent Agent ; (4) AEE AEE ; (5) AEE ; (6) AEE MA [5],, 2 MA, 21,, a 1,a 2,a 3, gcd(a i,a j )=1
3 Mobile Agent 1333 MAXNUM A K N 1,N 2,,N K N i, a i a i 1( ), gcd(a i,a j )=1, i,j,1 i<j K; MAXNUM=min(a 1,a 2,,a K ) 1, A Base MAXNUM Base,A N i m (1 m MAXNUM) stamp(i,m)=base+a i m a 1,a 2,,a K, a K 1,a K a K 1<a K, 22 BaseIncr=a K 1 a K (FROM ) (TO ) FROM, (1) N i ;(2) Basei;(3) a i ;(4) ;(5) TO (1) ;(2) j (Base i +j a i ), j 0, 1; 0,,,,,,,,, 23 (1) (replay attack) Mobile Agent N i ( Mobile Agent stamp(i,m)), m N i FROM, 1,, 0, 1 3 (2) Mobile Agent Mobile Agent,,, Mobile Agent A, X,, X, Mobile Agent Y,,, Mobile Agent A X Y A N 1,N 2,,N K, X {N 1,N 2,,N K },Y {N 1,N 2,,N K }, A TO Agent 1 m MAXNUM, Local stamp base Host name Stamp increase N 1 a 1 X a X A Y a Y N K stamp(x,m)=base A +a X m, (1) a K
4 1334 Journal of Software 2002,13(7) MAXNUM=min(a 1,a 2,,a K ) 1 (2) Agent A X Y, 1 n MAXNUM, (1) (3),a X m=a Y n a X m=0 mod a Y gcd(a X,a Y )=1, X,Y,1 X<Y K; stamp(x,m)=base A +a Y n, (3) MAXNUM=min(a 1,a 2,,a K ) 1 m=0 mod a Y (4) (2), m MAXNUM a Y m 0 mod a Y, (5) (4) (5), (3) Mobile Agent Mobile Agent,,,,, Mobile Agent A B Mobile Agent Mobile Agent A B Mobile Agent, B N 1,N 2,,N K, A {N 1,N 2,,N K }, Agent B stamp=stamp(b,m)=base T1 +a A m Agent 1 B, B FROM a NK a NK 1 a N1 Host name Remote stamp base Stamp increase Used stamp bitmap N 1 Base N1 a N1 A Base T1 a A N K Base NK a NK Agent 2 B, B FROM Host name Remote stamp base Stamp increase Used stamp bitmap N 1 Base N1 a N1 A Base T2 a A N K Base NK a NK 22, Agent 1 B, Agent 2 B, (1) Base T1 =Base T2, (replay attack), B Agent (2) Base T1 Base T2, Base T2 =Base T1 +BaseIncr n,(n Z +,n 1), BaseIncr=a NK a NK 1 ; B stamp, stamp=base T1 +a A m Base T1 +a A MAXNUM Base T1 +a NK MAXNUM Base T1 +a NK a NK 1 =Base T1 +BaseIncr Base T1 +BaseIncr n=base T2 B Mobile Agent, MA, A B ( )( 3 ), ( 4 ), MA, MA
5 Mobile Agent , 3 PC, Lucent Inferno V20, Inferno Limbo 2,A,B,C 3, FROM TO, SERVER A FROM TABLE A SERVER B TO TABLE A SERVER C FROM TABLE C TO TABLE C FROM TABLE B TO TABLE B Fig2 A structure sketch map of the incremental timestamp s example 2 3, FROM TO FROM TABLE A REMOTE USED BITMAP LOCAL TO TABLE A B B C C 10 REMOTE FROM TABLE B USED BITMAP LOCAL TO TABLE B A A C C 12 REMOTE FROM TABLE C USED BITMAP LOCAL TO TABLE C A A C B 5 Fig3 Sometime the contents of table FROM and table TO at servers A, B, C 3 A,B,C FROM TO A, A FROM 1 B,B (remote stamp base) 1000, B (stamp increase) 7, (used stamp bitmap) B, A 6 (6 6 ) 6 1,2,4 ( ) A B i (1000 i 7)( 1 i 6), i 0, 1 0, ( ) 2 C, A TO, 500, B C
6 1336 Journal of Software 2002,13(7) 11 10, 9( 2 MAXNUM=min(11,10) 1) A 9, MA A, 110( 2 BaseIncr=10 11), TO (local stamp base) 610, B,C A, A FROM 610, B,C A, 4, MA Java, Java,Aglets [6],Mole [7],MOA [8] Concordia [2] MOA Mole Java IBM Aglets MA Aglet,,Aglet (owner) Aglet, Aglet (capability), CPU Concordia, Agent Agent, (passport),agent passport,passport Agent, Agent ( ) MA, Telescript TACOMA Telescript 1 MA,Agent (permit) Agent Telescript Troms Cornell TACOMA, Agent (principal)( Agent ) Agent MA MA MA, MA 5 Mobile Agent, Mobile Agent Mobile Agent, Mobile Agent References [1] Ma, Jun-tao, Liu, Ji-ren Architecture and technology of mobile agent system Mini-Micro Systems, 1998,19(2)7 14 (in Chinese) [2] Walsh, T, Paciorek, N, Wong, D Security and reliability in Concordia In ElRewini, H, ed Proceedings of the 31st Annual Hawaii International Conference on System Science (HICSS 31) Los Alamitos, CA IEEE Computer Society Press, [3] Peine, H Security concepts and implementation in the ara mobile agent system In ElRewini, H, ed Proceedings of the 31st Annual Hawaii International Conference on System Science (HICSS 31), Los Alamitos, CA IEEE Computer Society Press, [4] Pham, Vu A Karmouch, A Mobile software agents an overview IEEE Communications Magazine, 1998,7(7)26 37 [5] Farmer, WM, Guttman, JD, Swarup, V Security for mobile agents issues and requirements In Proceedings of the 19th National Information Systems Security Conference (NISSC 96), http//csrcnistgov/ nissc/ 1996/ papers/ NISSC96/ paper033/ SWARUP96PDF [6] Karjoth, G, Lange, DB, Oshima, M A security model for aglets IEEE Internet Computing, 1997,1(4) [7] Baumann, J, Hohl, F, Strasser, M Mole concepts of a mobile agent system Journal of World Wide Web, 1997,1(3) [8] Milojicic, D, Laforge, W, Chauhan, D Mobile objects and agents (MOA) design, implementation and lessons learned In Proceedings of the USENIX Conference on Object Oriented Technology and Systems (COOTS 98), Vol 4 New Mexico USENIX, http//wwwinfosystuwienacat/research/agents/ archive/ara-securitypsgz
7 Mobile Agent 1337 [1], Mobile Agent,1998,19(2)7 14 Mobile Agent System by Incremental Timestamp Security Technique WAN Yan, SUN Yong-qiang, ZHU Xiang-hua, TANG Jin (Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai , China) http//wwwsjtueducn Abstract The security technology decides the realization of the mobile agent The primary problem solved by this paper is to prevent replay attacks and acts beyond its authorities of malicious mobile agent The concepts, characters and security of mobile agent are described Afterwards, the concepts and advantages of incremental timestamp are proposed, and a specific example and the demonstrations are also presented The mobile agent system that adopts incremental timestamp can protect execute system from damages of hostile mobile agents The incremental timestamp technology has been verified and realized in the mobile agent system which is developed based on the Lucent Company s Inferno system Key words mobile agent; incremental timestamp; security Received September 30, 2000; accepted April 3, OA OA (1) OA ;(2) ;(3) OA ;(4) OA OA ;(5) / ;(6) OA ;(7) / ;(8) OA ;(9) (025) yangming@seueducn
Simulating a Finite State Mobile Agent System
Simulating a Finite State Mobile Agent System Liu Yong, Xu Congfu, Chen Yanyu, and Pan Yunhe College of Computer Science, Zhejiang University, Hangzhou 310027, P.R. China Abstract. This paper analyzes
More informationA Mobile Agent-Based Framework for Active Networks. Ichiro Satoh
A Mobile -Based Framework for Active Networks Ichiro Satoh Department of Information Sciences, Ochanomizu University 2-1-1 Otsuka Bunkyo-ku Tokyo 112-8610, Japan E-mail: ichiro@is.ocha.ac.jp IEEE Systems,
More informationDEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS
Journal of Engineering Science and Technology Vol. 7, No. 5 (2012) 614-622 School of Engineering, Taylor s University DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS AHMED Y. YOUSUF*,
More informationMobile Agents as an Architectural Concept for Internet-based Distributed Applications
Mobile Agents as an Architectural Concept for Internet-based Distributed Applications The WASP Project Approach Stefan Fünfrocken, Friedemann Mattern Department of Computer Science, Darmstadt University
More informationMOBILE AGENTS TECHNOLOGY AND MOBILITY
MOBILE AGENTS TECHNOLOGY AND MOBILITY Adel Aneiba, S. J. Rees Faculty of Computing, Engineering and Technology, Staffordshire University, PO BOX 334, Beaconside, Stafford ST18 ODG, UK Email :{ A.Aneiba,
More informationA Security Framework for Mobile Agent Systems
A Security Framework for Mobile Agent Systems Omer Mansoor Paracha DISSERTATION.COM Boca Raton A Security Framework for Mobile Agent Systems Copyright 2006 Omer Mansoor Paracha All rights reserved. No
More informationAn Algorithmic Theory of Mobile Agents
An Algorithmic Theory of Mobile Agents Evangelos Kranakis 1 and Danny Krizanc 2 1 School of Computer Science, Carleton University, Ottawa, ON, Canada. 2 Department of Mathematics and Computer Science,
More informationLazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System
Lazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System Taesoon Park 1,IlsooByun 1, and Heon Y. Yeom 2 1 Department of Computer Engineering, Sejong University, Seoul
More informationMobile Agent Paradigm in Computer Networks
Mobile Agent Paradigm in Computer Networks Nguyen Hong Van DSV, Stockholm University, Forum 100, SE-164 40 Kista, Sweden Email: si-hvan@dsv.su.se ABSTRACT : Mobile agent technology has recently emerged
More informationA Finite State Mobile Agent Computation Model
A Finite State Mobile Agent Computation Model Yong Liu, Congfu Xu, Zhaohui Wu, Weidong Chen, and Yunhe Pan College of Computer Science, Zhejiang University Hangzhou 310027, PR China Abstract In this paper,
More informationXML-based agent communication and migration for distributed applications in Mobile-C
Vol.2, Issue.1, Jan-Feb 2012 pp-403-407 ISSN: 2249-6645 XML-based agent communication and migration for distributed applications in Mobile-C Khaoula ADDAKIRI Mohamed BAHAJ Noreddine GHERABI Abstract Agent
More information2002 Journal of Software
0-9825/2002/13(01)0051-08 2002 Journal of Software Vol13, No1,, (,0) E-mail qiaoyingbj@hotmailcom http//ieliscasaccn,,,,,,, ; ; ; TP301 A,,,,,Mok [1],,, Krithi Ramamritham [2],,,,GManimaran [3] Anita Mittal
More informationMobile agent technology has great potential
RESEARCH FEATURE Mailbox-Based Scheme for Mobile Communications The authors present a flexible and adaptive scheme that associates each mobile agent with a mailbox but lets them decouple. Their 3D model
More informationPerformance Evaluation of Mobile Agents for E-Commerce Applications
Performance Evaluation of Mobile Agents for E-Commerce Applications Rahul Jha and Sridhar Iyer Kanwal Rekhi School of Information Technology, Indian Institute of Technology Bombay, Powai, Mumbai - 4 76.
More informationANALYSIS OF MOBILE AGENT
Volume 2, No. 11, November 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info ANALYSIS OF MOBILE AGENT Lect. Prakash V. Rajguru* 1, Dr. Sushant B.Deshmukh
More informationCreating and Running Mobile Agents with XJ DOME
Creating and Running Mobile Agents with XJ DOME Kirill Bolshakov, Andrei Borshchev, Alex Filippoff, Yuri Karpov, and Victor Roudakov Distributed Computing & Networking Dept. St.Petersburg Technical University
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More information2002 Journal of Software.. (stacking).
1000-9825/2002/13(02)0245-05 2002 Journal of Software Vol13, No2,,, (,200433) E-mail: {wyji,ayzhou,zhangl}@fudaneducn http://wwwcsfudaneducn : (GA) (stacking), 2,,, : ; ; ; ; : TP18 :A, [1],,, :,, :,,,,
More information2002 Journal of Software
1000-9825/2002/13(01)0092-07 2002 Journal of Software Vol13, No1,, (,100871) E-mail {zouwei,sjs,sunyc}@cspkueducn http//wwwpkueducn,,,,, ; ; ; TP311 A, (component-based software development, CBSD) CBSD,,,,
More informationNetwork Processing of Mobile Agents, by Mobile Agents, for Mobile Agents
Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents Ichiro Satoh National Institute of Informatics / Japan Science and Technology Corporation 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo
More informationMiddleware Design Framework for Mobile Computing
ISSN: 2222-4254 IJES Middleware Design Framework for Mobile Computing Imran Sarwar Bajwa School of Computer Science, University of Birmingham, Birmingham, B15 2TT, UK i.s.bajwa@cs.bham.ac.uk Abstract.
More informationMobile Agent Programming in Ajanta
Mobile Agent Programming in Ajanta Anand R. Tripathi Neeran M. Karnik Manish K. Vora Tanvir Ahmed Ram D. Singh Department of Computer Science University of Minnesota, Minneapolis MN 55455 Abstract This
More informationTime Series Clustering Ensemble Algorithm Based on Locality Preserving Projection
Based on Locality Preserving Projection 2 Information & Technology College, Hebei University of Economics & Business, 05006 Shijiazhuang, China E-mail: 92475577@qq.com Xiaoqing Weng Information & Technology
More informationResearch on Full-text Retrieval based on Lucene in Enterprise Content Management System Lixin Xu 1, a, XiaoLin Fu 2, b, Chunhua Zhang 1, c
Applied Mechanics and Materials Submitted: 2014-07-18 ISSN: 1662-7482, Vols. 644-650, pp 1950-1953 Accepted: 2014-07-21 doi:10.4028/www.scientific.net/amm.644-650.1950 Online: 2014-09-22 2014 Trans Tech
More informationRisk-Aware Vulnerability Analysis of Electric Grids from Attacker s Perspective
Risk-Aware Vulnerability Analysis of Electric Grids Presenter: Yihai Zhu Authors: Yihai Zhu, Jun Yan Yan Sun, Haibo He Dept. of Electrical, Computer & Biomedical Engineering University of Rhode Island
More informationSecuring Mobile Agents for Electronic Commerce: an Experiment
Securing Mobile Agents for Electronic Commerce: an Experiment Anthony H. W. Chan, Caris K. M. Wong, T. Y. Wong, Michael R. Lyu Department of Computer Science and Engineering The Chinese University of Hong
More informationA Compatible Public Service Platform for Multi-Electronic Certification Authority
Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,
More informationTHREATS AND SECURITY MEASURES FOR SYSTEMS USING MOBILE AGENTS
THREATS AND SECURITY MEASURES FOR SYSTEMS USING MOBILE AGENTS Vinay Sridhara vsridhar@usc.edu University of Southern California, Los Angeles CS555 Advanced Operating Systems Abstract The main disadvantage
More informationRemote Control System Based on Compressed Image
Remote Control System Based on Compressed Image Weichuan Liao School of Fundamental Science, East China Jiaotong University, Nanchang, Jiangxi, P.R. China Abstract. Client computer controlling remote server
More informationFast Grain Shape Determination Algorithm Based on Parallel Processing
39 3 Vol.39, No.3 3 Opto-Electronic Engineering March, 3 5X(3 66 6,,,, (. ( Britton Chance 4374. 4374 (GPU (CUDA GPU (CPU 4 TP39 A.3969/j.issn.3-5X..3. Fast Grain Shape Determination Algorithm Based on
More informationRESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS
RESUME WEI LI Graduate School of Computer and Information Sciences Nova Southeastern University 3301 College Avenue, Fort Lauderdale-Davie, FL 33314 Office: (954) 262-2068 Fax: (954) 262-3915 Email: lwei@nova.edu
More informationAN EFFICIENT DEADLOCK DETECTION AND RESOLUTION ALGORITHM FOR GENERALIZED DEADLOCKS. Wei Lu, Chengkai Yu, Weiwei Xing, Xiaoping Che and Yong Yang
International Journal of Innovative Computing, Information and Control ICIC International c 2017 ISSN 1349-4198 Volume 13, Number 2, April 2017 pp. 703 710 AN EFFICIENT DEADLOCK DETECTION AND RESOLUTION
More informationVol. 1, Issue VIII, Sep ISSN
Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,
More informationDesign and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System
Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System Shi Chuan, Zhang Yang and Zhou Yuefei 1 Introduction Command automation system provides an effective
More informationMole 3.0: A Middleware for Java-Based Mobile Software Agents
Mole 3.0: A Middleware for Java-Based Mobile Software Agents J. Baumann, F. Hohl, K. Rothermel, M. Schwehm, M.Straßer Institute of Parallel and Distributed High-Performance Systems University of Stuttgart
More informationA Scalable Hash-Based Mobile Agent Location Mechanism
A Scalable Hash-Based Mobile Agent Location Mechanism Georgia Kastidou, Evaggelia Pitoura George Samaras Department of Computer Science Department of Computer Science University of Ioannina, Greece University
More informationRemote monitoring system based on C/S and B/S mixed mode Kaibing Song1, a, Yinsong Wang2,band Dandan Shang3,c
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Remote monitoring system based on C/S and B/S mixed mode Kaibing Song1, a, Yinsong Wang2,band Dandan Shang3,c
More informationAgent Fabrication and Its Implementation for Agent-based Electronic Commerce
Agent Fabrication and Its Implementation for Agent-based Electronic Commerce Sheng-Uei Guan and Fangming Zhu Department of Electrical and Computer Engineering National University of Singapore 10 Kent Ridge
More informationApplication of Autonomous Software Agents for Internet Security
SFWR 4C03 Winter 2005 Application of Autonomous Software Agents for Internet Security Researcher: Balwant Kamboj Revision History: 2005/03/28 Introduction As the Internet is becoming a major player in
More informationAn Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol
International Journal of Network Security, Vol.14, No.1, PP.39 46, Jan. 2012 39 An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol Sandeep Kumar Sood Department of Computer
More informationDesign and Implementation of Portable Development Framework in Signal Processing Platform
2017 2nd International Conference on Software, Multimedia and Communication Engineering (SMCE 2017) ISBN: 978-1-60595-458-5 Design and Implementation of Portable Development Framework in Signal Processing
More informationResearch on Power Quality Monitoring and Analyzing System Based on Embedded Technology
2010 China International Conference on Electricity Distribution 1 Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology Zhang Hong-tao, Ye Ying, An Qing China Zhoukou Power
More informationA Secure Data Transmission Scheme in Wireless Sensor Networks
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Secure Data Transmission Scheme in Wireless Sensor Networks,2 Mingxin YANG, 3 Jingsha HE, 4 Ruohong LIU College of Computer Science and
More informationStudy on Improving the Quality of Reconstructed NURBS Surfaces
Study on Improving the Quality of Reconstructed NURBS Surfaces Shufeng jiang, Shigang Wang, Yong Yan School of Mechatronic Engineering, Qiqihar University, Qiqihar 161006, China Abstract In aspect of surface
More informationAuthenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,
More informationApproaching the coordinates of 3D objects alternately from multiple orthogonal views
16 11 011 11 Journal of Image and Graphics Vol. 16 No. 11 Nov. 011 TP16. 1 A 1006-8961 011 11-1996-06. 3 J. 011 16 11 1996-001 3 1 1 10093 10016 3 Approaching the coordinates of 3D objects alternately
More informationTag Based Image Search by Social Re-ranking
Tag Based Image Search by Social Re-ranking Vilas Dilip Mane, Prof.Nilesh P. Sable Student, Department of Computer Engineering, Imperial College of Engineering & Research, Wagholi, Pune, Savitribai Phule
More informationThe Study and Implementation of Text-to-Speech System for Agricultural Information
The Study and Implementation of Text-to-Speech System for Agricultural Information Huoguo Zheng 1,2,*, Haiyan Hu 1,2, Shihong Liu 1,2, and Hong Meng 1,2 1 Agricultural Information Institute, Chinese Academy
More informationContext-Aware Adaptive Object Migration
Universität Ulm Fakultät für Informatik Verteilte Systeme Context-Aware Adaptive Object Migration Rüdiger Kapitza Holger Schmidt Franz J. Hauck Bericht Nr. VS-R04-2006 2006-08-30 Context-Aware Adaptive
More informationDouble Vertex Graphs and Complete Double Vertex Graphs. Jobby Jacob, Wayne Goddard and Renu Laskar Clemson University April, 2007
Double Vertex Graphs and Complete Double Vertex Graphs Jobby Jacob, Wayne Goddard and Renu Laskar Clemson University April, 2007 Abstract Let G = (V, E) be a graph of order n 2. The double vertex graph,
More informationSecurity Mechanisms for Using Mobile Agents in Electronic Commerce
Security Mechanisms for Using Mobile Agents in Electronic Commerce Paulo Jorge Marques, Luís Moura Silva, João Gabriel Silva Departamento de Engenharia Informática, Universidade de Coimbra, Portugal {pmarques,
More informationA Framework for Building Reusable Mobile Agents for Network Management
A Framework for Building Reusable Mobile Agents for Network Management Ichiro Satoh Λ National Institute of Informatics / Japan Science and Technology Corporation 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo
More informationCryptanalysis of a timestamp-based password authentication scheme 1
Cryptanalysis of a timestamp-based password authentication scheme 1 Lizhen Yang a Kefei Chen a a Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, P.R.China
More informationDesign and Implementation of a Random Access File System for NVRAM
This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Design and Implementation of a Random Access
More informationFSRM Feedback Algorithm based on Learning Theory
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 699-703 699 FSRM Feedback Algorithm based on Learning Theory Open Access Zhang Shui-Li *, Dong
More informationJacquard Control System of Warp Knitting Machine Based on Embedded System
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Control System of Warp Knitting Machine Based on Embedded System To cite this article: Li Ce et al 2018 IOP Conf. Ser.: Mater.
More informationA framework for an Operating System-based Mobile Agent Interoperability
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 6 (Sep. - Oct. 2013), PP 01-06 A framework for an Operating System-based Mobile Agent Interoperability
More informationCompiled Visual Programs by VisPro
Compiled Visual Programs by VisPro Ke -Bing Zhang 1 Mehmet A. Orgun 1 Kang Zhang 2 1 Department of Computing, ICS, Macquarie University, Sydney, NSW 2109, Australia {kebing, mehmet}@ics.mq.edu.au 2 Department
More informationResearch on Availability of Virtual Machine Hot Standby based on Double Shadow Page Tables
International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013) Research on Availability of Virtual Machine Hot Standby based on Double Shadow Page Tables Zhiyun Zheng, Huiling
More informationA Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment*
A Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment* Ying Liu, Jingbo Xia, and Jing Dai Telecommunication Engineering Institute, Air Force Engineering University, Xi an,
More informationD Agents: Security in a multiple-language, mobile-agent system
D Agents: Security in a multiple-language, mobile-agent system Robert S. Gray 1 and David Kotz 2 and George Cybenko 1 and Daniela Rus 2 1 Thayer School of Engineering, Dartmouth College, Hanover NH 03755,
More informationSmall World Properties Generated by a New Algorithm Under Same Degree of All Nodes
Commun. Theor. Phys. (Beijing, China) 45 (2006) pp. 950 954 c International Academic Publishers Vol. 45, No. 5, May 15, 2006 Small World Properties Generated by a New Algorithm Under Same Degree of All
More informationA flexible biometrics remote user authentication scheme
Computer Standards & Interfaces 27 (2004) 19 23 www.elsevier.com/locate/csi A flexible biometrics remote user authentication scheme Chu-Hsing Lin*, Yi-Yi Lai Department of Computer Science and Information
More informationCO 2 Flow Metering through Multi-Modal Sensing and Statistical Data Fusion. Yong Yan, Xue Wang, Tao Wang Lijun Sun, Lijuan Wang, Jinyu Liu
CO 2 Flow Metering through Multi-Modal Sensing and Statistical Data Fusion Yong Yan, Xue Wang, Tao Wang Lijun Sun, Lijuan Wang, Jinyu Liu Flow Test Facility for Flowmeter Calibration and Evaluation under
More informationDesign and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b
2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 1
More informationA Robust Image Zero-Watermarking Algorithm Based on DWT and PCA
A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA Xiaoxu Leng, Jun Xiao, and Ying Wang Graduate University of Chinese Academy of Sciences, 100049 Beijing, China lengxiaoxu@163.com, {xiaojun,ywang}@gucas.ac.cn
More informationDesign of Intelligent System for Watering Flowers Based on IOT
4th International Conference on Computer, Mechatronics, Control and Electronic Engineering (ICCMCEE 2015) Design of Intelligent System for Watering Flowers Based on IOT Hong-Jun GU a, Shi-Dong Zhu, Yan-Fen
More information2002 Journal of Software
1000-9825/2002/13(09)1846-06 2002 Journal of Software Vol13, No9,,, (,100080) E-mail: lijie@ieliscasaccn http://ieliscasaccn :,,,,, : ; ; ; ; ; : TP391 : A Takeo Igarashi 3D Teddy [1] Teddy, 3D Teddy Teddy,
More informationAn Internet router level topology automatically discovering system
2002 12 Vol.23 No.12 23 12 JOURNAL OF CHINA INSTITUTE OF COMMUNICATIONS October 2002 1 Internet 1,2 1,2 1,2,3 1,2 (1. 150001 2. 150001 3., 100031) Internet CERNET IP Internet Internet TP393.02 B 1000-436X(2002)12-0054-09
More informationIntelligent Mobile Monitoring and Control Network of Oil Pipeline Based on Internet of Things
Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 6, November 2017 Intelligent Mobile Monitoring and Control Network of Oil
More informationWorld Scientific Research Journal (WSRJ) ISSN: Design and Implementation of Stepper Motor Control System Based on 52 MCU
World Scientific Research Journal (WSRJ) ISSN: 2472-3703 www.wsr-j.org Design and Implementation of Stepper Motor Control System Based on 52 MCU Xinglan Zhang a, Xianda Zhang b, * and Xin Zhong c School
More informationContent-based Indexing and Retrieval supported by Mobile Agent Technology
Content-based Indexing and Retrieval supported by Mobile Agent Technology Harald Kosch, Mario Döller and László Böszörményi Institute of Information Technology, University Klagenfurt, Austria harald.kosch(mdoeller,laszlo.boeszoermenyi)@itec.uni-klu.ac.at
More informationDesign on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b
3rd International Conference on Management, Education Technology and Sports Science (METSS 2016) Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b 1 Basic Teaching
More informationApproaches to Capturing Java Threads State
Approaches to Capturing Java Threads State Abstract This paper describes a range of approaches to capturing the state of Java threads. The capture and restoration of Java threads state have two main purposes:
More informationAN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE
AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE Changwu Zhu 1, Guanxiang Yan 2, Zhi Liu 3, Li Gao 1,* 1 Department of Computer Science, Hua Zhong Normal University, Wuhan 430079, China
More informationResearch on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1, Shengmei Luo 1, Tao Wen 2
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1,
More informationDOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )
ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software
More informationThe Application of Wireless Sensor in Aquaculture Water Quality Monitoring
The Application of Wireless Sensor in Aquaculture Water Quality Monitoring Wen Ding, Yinchi Ma Beijing Fisheries Research Institute, Beijing, 100068, China {dingwen, mayinchi}@bjfishery.com Abstract. The
More informationA Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios
A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios John Page, Arkady Zaslavsky, Maria Indrawan School of Computer Science and Software Engineering Monash University,
More informationResearch on Community Structure in Bus Transport Networks
Commun. Theor. Phys. (Beijing, China) 52 (2009) pp. 1025 1030 c Chinese Physical Society and IOP Publishing Ltd Vol. 52, No. 6, December 15, 2009 Research on Community Structure in Bus Transport Networks
More informationResearch on An Electronic Map Retrieval Algorithm Based on Big Data
Research on An Electronic Map Retrieval Algorithm Based on Big Data 1 College of Computer Science and Technology,Jilin Agricultural University Changchun, 130118,China E-mail: liemperor@163.com Rujing Yao
More informationDepartment of CSE. The Chinese University of Hong Kong. 1 Introduction. academic as well as in the commercial and legal
-based Multimedia Data Sharing Platform Anson Lee, Michael Lyu, Irwin King Department of CSE The Chinese University of Hong Kong Shatin, New Territories, Hong Kong Abstract This paper proposes an agentbased
More informationApplication of Wang-Yu Algorithm in the Geometric Constraint Problem
Application of Wang-u Algorithm in the Geometric Constraint Problem 1 Department of Computer Science and Technology, Jilin University Changchun, 130012, China E-mail: liwh@jlu.edu.cn Mingyu Sun 2 Department
More informationAN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS
AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS Pardeep Saini* Computer sci. & engg. & YIET Ravinder Chouhan Computer sci.engg. & YIET Abstract - An adhoc network is a collection of
More informationDesign of Fault Diagnosis System of FPSO Production Process Based on MSPCA
2009 Fifth International Conference on Information Assurance and Security Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA GAO Qiang, HAN Miao, HU Shu-liang, DONG Hai-jie ianjin
More information[Telchy, 4(11): November, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785
[Telchy, 4(): November, 5] ISSN: 77-9655 (IOR), Publication Impact Factor:.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLIGENT OPTIMIZATION AND SCHEDULING OF NETWORKED
More informationShort-term Linkable Group Signatures with Categorized Batch Verification
Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical
More informationAn Improved DV-Hop Algorithm for Resisting Wormhole Attack
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1443-1448 1443 Open Access An Improved DV-Hop Algorithm for Resisting Wormhole Attack Xiaoying
More informationThe Research of Collision Detection Algorithm Based on Separating axis Theorem
The Research of Collision Detection lgorithm Based on Separating axis Theorem bstract Cheng Liang a, Xiaojian Liu School of Computer and Software Engineering, Xihua University, Chengdu, 610039, China a
More informationAn Architecture for Next Generation Mobile Agent Infrastructure
An Architecture for Next Generation Mobile Agent Infrastructure Ichiro Satoh Department of Information Sciences, Ochanomizu University / Japan Science and Technology Corporation Abstract This paper presents
More informationegov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO
egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO e-government Survey 2014 United Nations Page 2 EGDI: E-Government Development Index National ID & Digital Signature Estonian Prime Minister Andrus Ansip
More informationDistributed Communication for Highly Mobile Agents
Distributed Communication for Highly Mobile Agents Mohammad Samarah and Philip Chan The division of Electrical and Computer Science and Engineering Florida Institute of Technology, Melbourne, FL 32901
More informationEvaluation of the μcontroller Networks Communication for EtherCAT Process Data Interface
Evaluation of the μcontroller Networks Communication for EtherCAT Process Data Interface Li Jiang 1, Mingxin Hou 1, Fanshao Wei*,1, Minghe Jin 1, Hong Liu 1 Harbin Institute of Technology, Harbin, China
More informationA method of three-dimensional subdivision of arbitrary polyhedron by. using pyramids
5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) A method of three-dimensional subdivision of arbitrary polyhedron by using pyramids LIU Ji-bo1,a*, Wang Zhi-hong1,b,
More informationDevelopment of Database and Establishment of Information Network for Agricultural Byproducts Processing
Development of Database and Establishment of Information Network for Agricultural Byproducts Processing Zhang Shuming, Yan Chuliang April 5, 2004 No,1,Beisatan,Deshengmenwai Beijing 100083,P.R.China 1
More informationThe Analysis of Communication Architecture and Control Mode of Wide Area Power Systems Control
The Analysis of Communication Architecture and Control Mode of Wide Area Power Systems Control Tong Xiaoyang, Liao Guodong, Wang Xiaoru, Zhong Shan School of Electrical Engineering, Southwest Jiaotong
More informationA SECURE DOMAIN NAME SYSTEM BASED ON INTRUSION TOLERANCE
Proceedings of the Seventh International Conference on Learning and Cybernetics, Kunming, 12-15 July 2008 A SECURE DOMAIN NAME SYSTEM BASED ON INTRUSION TOLERANCE WEI ZHOU 1, 2, LIU CHEN 3, 4 1 School
More informationResearch on the safety of the communication link of the Radio Based Cab Signaling system
Research on the safety of the communication link of the Radio Based Cab Signaling system C. Li, Y. Zhang, J. Wang & H. Wang Automation Research Institute of Transportation Science & Technology, Beijing
More informationA Modular k-nearest Neighbor Classification Method for Massively Parallel Text Categorization
A Modular k-nearest Neighbor Classification Method for Massively Parallel Text Categorization Hai Zhao and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University, 1954
More informationA New Method Of VPN Based On LSP Technology
2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing
More information