一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

MAS系統(tǒng)中遷移機(jī)制的研究與實(shí)現(xiàn)

王汝傳 穆鴻 徐小龍

王汝傳, 穆鴻, 徐小龍. MAS系統(tǒng)中遷移機(jī)制的研究與實(shí)現(xiàn)[J]. 電子與信息學(xué)報(bào), 2004, 26(12): 2006-2012.
引用本文: 王汝傳, 穆鴻, 徐小龍. MAS系統(tǒng)中遷移機(jī)制的研究與實(shí)現(xiàn)[J]. 電子與信息學(xué)報(bào), 2004, 26(12): 2006-2012.
Wang Ru-chuan, Mu Hong, Xu Xiao-long. Research and Implementation of Migration Mechanism in MAS[J]. Journal of Electronics & Information Technology, 2004, 26(12): 2006-2012.
Citation: Wang Ru-chuan, Mu Hong, Xu Xiao-long. Research and Implementation of Migration Mechanism in MAS[J]. Journal of Electronics & Information Technology, 2004, 26(12): 2006-2012.

MAS系統(tǒng)中遷移機(jī)制的研究與實(shí)現(xiàn)

Research and Implementation of Migration Mechanism in MAS

  • 摘要: 該文分析了現(xiàn)有移動(dòng)代理系統(tǒng)的幾種代表性的遷移技術(shù),闡述了在作者設(shè)計(jì)的移動(dòng)代理系統(tǒng)(Mobile Agent System,MAS)中代理遷移機(jī)制的具體實(shí)現(xiàn),著重解決了代理的動(dòng)態(tài)路由和與遷移相關(guān)的安全要素的改變,并提出了一種擴(kuò)展的代理遷移機(jī)制,最后給出了應(yīng)用實(shí)例分析。
  • Chess D M. Security issues in mobile code systems. In G Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, New York, NY: Springer-Verlag,1998, 1-14.[2]Karnik N M, Tripathi A R. Design 3s in mobile agent programming systems[J].IEEE Concurrency Magazine.1998, 6(3):52-61[3]Wang X F, Yi X, Lam K Y, Okamoto E. 1998, Secure information gathering agent for internet trading. Proc. of the 4th Australian Workshop on Distributed Artificial Intelligence in joint with the 8th Australian Joint Conference on Artificial Intelligence (DAI 1998), Australia, Lecture Notes in Artificial Intelligence, Springer-Verlag, Vo1.1544: 183-193.[4]陶先平,呂建,張冠群,李新,董桓.一種移動(dòng)Agent結(jié)構(gòu)化遷移機(jī)制的設(shè)計(jì)和實(shí)現(xiàn).軟件學(xué)報(bào),2000,11(7):918-923.[5]Eckel B. Thinking in Java, 2nd Edition, Upper Saddle River, New Jersey: Prentice-Hall, 2000:973-980.[6]Schaaf M, Maurer F. Integrating Java and CORBA: A programmers perspective[J].IEEE Internet Computing Magazine.2001, 5(1):72-78[7]Wilhelm U G, Staamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms[J].IEEE Internet Computing Magazine.2000, 4(5):40-48[8]Farmer W, Guttmann J, Swarup V. (1996). Security for mobile agents: Authentication and state appraisal. In Proc. of the European Symposium on Research in Computer Security (ESORICS),LNCS, No.1146, Berlin: Springer-Verlag, 1996: 118-130.[9]王汝傳,徐小龍.移動(dòng)代理安全機(jī)制的研究.計(jì)算機(jī)學(xué)報(bào),2002,25(12):1294-1301.[10]王汝傳,趙新寧.基于網(wǎng)絡(luò)的移動(dòng)代理系統(tǒng)安全模型研究和分析.計(jì)算機(jī)學(xué)報(bào),2003,26(4):477-483.[11]Schneier B. Applied Cryptography: Protocols.[J].Algorithms, and Source Code in C. New York:John Wiley Sons.1996,:-
  • 加載中
計(jì)量
  • 文章訪問數(shù):  2043
  • HTML全文瀏覽量:  90
  • PDF下載量:  486
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2003-07-12
  • 修回日期:  2004-03-09
  • 刊出日期:  2004-12-19

目錄

    /

    返回文章
    返回