Search Results

There are 72265 results for: content related to: A secure migration process for mobile agents

  1. Mobile agent-based computational steering for distributed applications

    Concurrency and Computation: Practice and Experience

    Volume 21, Issue 18, 25 December 2009, Pages: 2377–2399, Yu-Cheng Chou, David Ko and Harry H. Cheng

    Version of Record online : 21 AUG 2009, DOI: 10.1002/cpe.1458

  2. Mobile-C: a mobile agent platform for mobile C/C++ agents

    Software: Practice and Experience

    Volume 36, Issue 15, December 2006, Pages: 1711–1733, Bo Chen, Harry H. Cheng and Joe Palen

    Version of Record online : 13 JUL 2006, DOI: 10.1002/spe.742

  3. Mobile Agent Computing Paradigm for Building a Flexible Structural Health Monitoring Sensor Network

    Computer-Aided Civil and Infrastructure Engineering

    Volume 25, Issue 7, October 2010, Pages: 504–516, Bo Chen and Wenjia Liu

    Version of Record online : 17 FEB 2010, DOI: 10.1111/j.1467-8667.2010.00656.x

  4. Mobile Network Objects

    Standard Article

    Wiley Encyclopedia of Electrical and Electronics Engineering

    Lubomir F. Bic, Michael B. Dillencourt and Munehiro Fukuda

    Published Online : 27 DEC 1999, DOI: 10.1002/047134608X.W5336

  5. Security in the Ajanta mobile agent system

    Software: Practice and Experience

    Volume 31, Issue 4, 10 April 2001, Pages: 301–329, Neeran M. Karnik and Anand R. Tripathi

    Version of Record online : 22 JAN 2001, DOI: 10.1002/spe.364

  6. D'Agents: Applications and performance of a mobile-agent system

    Software: Practice and Experience

    Volume 32, Issue 6, May 2002, Pages: 543–573, Robert S. Gray, George Cybenko, David Kotz, Ronald A. Peterson and Daniela Rus

    Version of Record online : 12 APR 2002, DOI: 10.1002/spe.449

  7. An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking

    Wireless Communications and Mobile Computing

    Volume 11, Issue 11, November 2011, Pages: 1446–1462, Oscar Esparza, Jose L. Muñoz, Joan Tomàs-Buliart and Miguel Soriano

    Version of Record online : 1 MAR 2010, DOI: 10.1002/wcm.941

  8. MagicNET: mobile agents data protection system

    Transactions on Emerging Telecommunications Technologies

    Volume 26, Issue 5, May 2015, Pages: 813–835, Muhammad Awais Shibli, Rahat Masood, Yumna Ghazi and Sead Muftic

    Version of Record online : 9 DEC 2013, DOI: 10.1002/ett.2742

  9. Application and programming experience with the Ara mobile agent system

    Software: Practice and Experience

    Volume 32, Issue 6, May 2002, Pages: 515–541, Holger Peine

    Version of Record online : 12 APR 2002, DOI: 10.1002/spe.448

  10. TPM-based protection for mobile agents

    Security and Communication Networks

    Volume 4, Issue 1, January 2011, Pages: 45–60, Antonio Muñoz and Antonio Maña

    Version of Record online : 5 JAN 2010, DOI: 10.1002/sec.158

  11. You have free access to this content
    How to catch a parasite: Parasite Niche Modeler (PaNic) meets Fishbase

    Ecography

    Volume 35, Issue 6, June 2012, Pages: 481–486, Giovanni Strona and Kevin D. Lafferty

    Version of Record online : 20 FEB 2012, DOI: 10.1111/j.1600-0587.2012.07439.x

  12. Mobile Agent Security

    Network Security: Current Status and Future Directions

    Panayiotis Kotzanikolaou, Christos Douligeris, Rosa Mavropodi, Vassilios Chrissikopoulos, Pages: 257–269, 2006

    Published Online : 14 JUN 2006, DOI: 10.1002/9780470099742.ch15

  13. MOLE: A mobile agent system

    Software: Practice and Experience

    Volume 32, Issue 6, May 2002, Pages: 575–603, J. Baumann, F. Hohl, K. Rothermel, M. Strasser and W. Theilmann

    Version of Record online : 12 APR 2002, DOI: 10.1002/spe.450

  14. Distribution of mobile agents in vulnerable networks

    Concurrency and Computation: Practice and Experience

    Volume 19, Issue 7, May 2007, Pages: 1047–1064, Wenyu Qu, Masaru Kitsuregawa, Hong Shen and Yingwei Jin

    Version of Record online : 28 SEP 2006, DOI: 10.1002/cpe.1095

  15. A security scheme for Aglets

    Software: Practice and Experience

    Volume 32, Issue 6, May 2002, Pages: 497–514, Kouichi Ono and Hideki Tai

    Version of Record online : 12 APR 2002, DOI: 10.1002/spe.447

  16. A new solution for assigning cryptographic keys to control access in mobile agent environments

    Wireless Communications and Mobile Computing

    Volume 6, Issue 1, February 2006, Pages: 137–146, Chin-Chen Chang and Iuon-Chang Lin

    Version of Record online : 9 JAN 2006, DOI: 10.1002/wcm.276

  17. SpatialAgents: integrating user mobility and program mobility in ubiquitous computing environments

    Wireless Communications and Mobile Computing

    Volume 3, Issue 4, June 2003, Pages: 411–423, Ichiro Satoh

    Version of Record online : 25 JUN 2003, DOI: 10.1002/wcm.126

  18. An Adaptive Regulation Approach of Mobile Agent Population Size in Distributed Systems

    International Journal of Intelligent Systems

    Volume 31, Issue 2, February 2016, Pages: 173–188, M. Bakhouya, M. Nemiche and J. Gaber

    Version of Record online : 6 AUG 2015, DOI: 10.1002/int.21750

  19. You have full text access to this OnlineOpen article
    Evolutionary tools for phytosanitary risk analysis: phylogenetic signal as a predictor of host range of plant pests and pathogens

    Evolutionary Applications

    Volume 5, Issue 8, December 2012, Pages: 869–878, Gregory S. Gilbert, Roger Magarey, Karl Suiter and Campbell O. Webb

    Version of Record online : 3 MAY 2012, DOI: 10.1111/j.1752-4571.2012.00265.x

  20. You have free access to this content
    Editorial: Mobile agent systems

    Software: Practice and Experience

    Volume 32, Issue 6, May 2002, Pages: 495–496, Danny B. Lange and Dejan S. Milojicic

    Version of Record online : 12 APR 2002, DOI: 10.1002/spe.446