Academia.eduAcademia.edu

Mobile Agent

description7,580 papers
group243 followers
lightbulbAbout this topic
A mobile agent is a software program that can autonomously move across different networked environments, executing tasks on behalf of a user or system. It is designed to operate independently, adapting to varying conditions and resources while facilitating distributed computing and communication.
lightbulbAbout this topic
A mobile agent is a software program that can autonomously move across different networked environments, executing tasks on behalf of a user or system. It is designed to operate independently, adapting to varying conditions and resources while facilitating distributed computing and communication.
As the number of mobile nodes registering with a network rapidly increases in Mobile IP, multiple mobility (home or foreign) agents can be allocated to a network in order to improve performance and availability. Previous fault-tolerant... more
Abstract—At Delft University of Technology there is a project running on the development of a traffic information-system. The paper presents a using of XML for multimodal communication with an intelligent travel assistant. The personal... more
The proliferation of small mobile devices and wireless networks has resulted in an increasing demand to support the applications found in wired environments on mobile devices. In real time replication systems, such as collaborative... more
In this paper we describe a disaster management system. It is assumed that each individual in the field is equipped with a PDA (Personal Digital Assistant) and that can communicate with other PDAs in the vicinity. Together the PDAs form... more
This paper presents the overall design of a multi-agent framework for tuning the performance of an application executing in a distributed environment. The multi-agent framework provides services like resource brokering, analyzing... more
Jini is able to support applications in heterogeneous, dynamic computing environments and is also being used to develop agent-based applications. This paper presents the design of a multiagent framework for resource brokering and... more
The information age is now passing through an evolutionary phase. As the capacity of networks is increasing to handle and process huge volume of information traffic, the management of such information systems is becoming a trivial issue.... more
Intelligent mobile agents are today accepted as powerful tools for data mining in a distributed environment. The use of data mining algorithms further beefs up the intelligence in software agents. Knowledge discovery and data mining... more
Knowledge management solutions relying on central repositories sometimes have not met expectations, since users often create knowledge adhoc using their individual vocabulary and using their own decentral IT infrastructure (e.g., their... more
Virtual Home Environment (VHE) encompasses the deployment and management of adaptable services that retain any personalized service aspects, irrespective of terminal, network' and geographic location. We assert that the dynamic nature of... more
IP multicast is used to deliver services to groups of users. However, this approach needs an infrastructure support in place, which makes the service not always available. We propose a novel application-level multicast approach based on... more
Network and service management have attracted a lot of attention in terms of research and standardisation in recent years. Architectural frameworks such as the TMN try to address the management needs of broadband networks and services,... more
This paper presents a new multiagent middleware named Siebog, made to provide high performance and platform independence for software agents. This framework was built by combining the features of the Radigost and XJAF agent frameworks. It... more
Consider a stationary agent A at an unknown location and a mobile agent B that must move to the vicinity of and then circumnavigate A at a prescribed distance from A. In doing so, B can only measure its distance from A, and knows its own... more
Consider a stationary agent A at an unknown location and a mobile agent B that must move to the vicinity of and then circumnavigate A at a prescribed distance from A. In doing so, B can only measure its distance from A, and knows its own... more
Agents' research has been going on for more than two decades now. The idea of improving assistance by agents capable of responding to the needs and emotional states of the users is not new, yet not much has been achieved so far. The main... more
Today product development activities are becoming more and more agile, adaptable, and cost-effective. Multi-agent-based system technology has found wide applications in managing company’s information. This paper applies Multi-mobile-agent... more
In this paper, we present a software framework, called HDS (Heterogeneous Distributed System), that tries to simplify the realization of distributed applications and, in particular, of multi-agent systems, by: i) abstracting the use of... more
There are beginning to be a lot of agents executing on the web, and some of them are starting to move around. While most agents are static, in that they exist as a single process or thread on one host computer, others can pick up and move... more
Multiagent-based middleware has emerged as a key technology in the field of distributed systems, gaining considerable attention in recent years. This paper provides an overview of multiagent-based middleware, surveys different types of... more
Bibliographic information published by Die Deutsche Bibliothek Die Deutsche Bibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data is available in the Internet at <http.
To realize its promise of providing scaleable and optimal use of network resources, mobile agent technology must be integrated with non-mobile architectures (e.g., client-server) while taking into account the specific needs of... more
We propose a productivity-based account of vagueness. Predicates remain bivalent over the intended universe, but their extensions may be productive, explaining the persistence of borderline cases as a structural failure of effective... more
Abstract—Recent years have seen significant research in finding closed form expressions for the delay of the RLC interconnect which improves upon the Elmore delay model. However, several of these formulae assume a step excitation. But in... more
There has been a growing interest in mobile, multi-hop wireless networks in recent years. One of the major concerns in this context is to design a communication protocol that provides QoS guarantee. Because of mobility, a node involved in... more
Supporting high volume of data transmission in a highly dynamic architecture like Mobile Ad hoc Networks (MANET) still remains a major point of research. In this paper, we have attempted to address the issue of managing an uninterrupted... more
We consider the map construction problem in a simple, connected graph by a set of mobile computation entities or agents that start from scattered locations throughout the graph. The problem is further complicated by dangerous elements,... more
Consider a networked environment, supporting mobile agents, where there is a black hole: a harmful host that disposes of visiting agents upon their arrival, leaving no observable trace of such a destruction. The black hole search problem... more
A black hole is a highly harmful host that disposes of visiting agents upon their arrival. It is known that it is possible for a team of mobile agents to locate a black hole in an asynchronous ring network if each node is equipped with a... more
In this paper we consider a dangerous process located at a node of a network (called Black Hole ) and a team of mobile agents deployed to locate that node. The nature of the danger is such that when an agent enters the dangerous node, it... more
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the graph topology and starting from the same node, the team must explore the graph. This problem, known as graph exploration, was initially formulated by... more
A black hole is a harmful host that destroys incoming agents without leaving any observable trace of such a destruction. The black hole search problem is to unambiguously determine the location of the black hole. A team of agents,... more
Consider a networked environment, supporting mobile agents, where there is a black hole: a harmful host that disposes of visiting agents upon their arrival, leaving no observable trace of such a destruction. The black hole search problem... more
We prove that, for the black hole search problem, the pure token model is computationally as powerful as the whiteboard model; furthermore the complexity is exactly the same. More precisely, we prove that a team of two asynchronous... more
The Rendezvous of anonymous mobile agents in a anonymous network is an intensively studied problem; it calls for k anonymous, mobile agents to gather in the same site. We study this problem when in the network there is a black hole: a... more
We prove that, for the black hole search problem in networks of arbitrary but known topology, the pebble model of agent interaction is computationally as powerful as the whiteboard model; furthermore the complexity is exactly the same.... more
Management of large-scale Network-Centric Systems (NCS) and their applications is an extremely complex and challenging task due to factors such as centralized management architectures, lack of coordination and compatibility among... more
Management of large-scale Network-Centric Systems (NCS) and their applications is an extremely complex and challenging task due to factors such as centralized management architectures, lack of coordination and compatibility among... more
The ACM module provides the application developers with all the tools required to specify the appropriate management schemes to manage any quality of service requirement or application attribute/functionality (e.g., performance, fault,... more
This paper presents a strategy for the support of Personal Communication Services in TINA compliant systems through the use of mobile agents. The paper reflects the vision of the EC/ACTS research project DOLMEN that has developed OSAM, an... more
This paper describes the role of agent in distributed data mining, comparison of various agent frameworks and also focusses on jade agent framework as a suitable framework for distributed data mining and discovery of patterns from multi... more
Now a day's Heterogeneous wireless network is a promising field of research interest. Various challenges exist in this hybrid combination like load balancing, resource management and so on. In this paper we introduce a reliable load... more
The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless... more
Steady-state egress of hematopoietic progenitor cells can be rapidly amplified by mobilizing agents such as AMD3100, the mechanism, however, is poorly understood. We report that AMD3100 increased the homeostatic release of the chemokine... more
Recent advances of computing and networking technology have shifted computing convention from stationary to mobile. A forecast conducted by Gartner indicates that global mobile handset sales will increase exponentially in 2008 by 10% from... more
The purpose of this paper is to introduce an innovative framework for implementation of ambient intelligence (AmI) environments. Compared to the existing state-of-the-art approaches, this framework creates a more decentralized and... more
Software agents extend the current, information-based Internet to include autonomous mobile processing. In most countries such processes, i.e. software agents are, however, without an explicit legal status. Many of the legal implications... more
The paper is devoted to scheduling with AND/OR precedence constraints. The events are nodes of a certain graph, while the precedence relation is defined by its edges. The non-negative edge weights represent delays. An event of type AND... more
Download research papers for free!