Search

Your search keyword '"MOBILE agent systems"' showing total 1,413 results

Search Constraints

Start Over You searched for: Descriptor "MOBILE agent systems" Remove constraint Descriptor: "MOBILE agent systems"
1,413 results on '"MOBILE agent systems"'

Search Results

1. Spatial Intelligence in E-Commerce: Integrating Mobile Agents with GISs for a Dynamic Recommendation System.

2. Reliability analysis of mobile agent control system with multiple alternative plans.

3. Distributed Multi-Agent Hierarchy Construction for Dynamic DCOPs in Mobile Sensor Teams.

4. RETAD: Vehicle Trajectory Anomaly Detection Based on Reconstruction Error.

5. 계산 오프로딩을 위한 이동에이전트 적용 및 경량화.

7. What are AI agents?

9. Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts.

10. A Parallel Integration Method of Cooperative Target‑ Localization and Cooperative Self‑localization.

11. ANALYSIS ON A HIGH LEVEL OF DATA SECURITY USING A NOVEL CHAOS-BASED CRYPTOGRAPHY BASED ON THE TRUSTWORTHINESS OF MOBILE AGENTS IN DISTRIBUTED ENVIRONMENT.

12. Cooperative and hybrid energy efficient schemE for wireless sensor networks.

13. Anonymous Scheme for Secure Mobile Agent Migration Using Mignotte's Sequence and Back Propagation Artificial Neural Networks.

14. An agent based routing search methodology for improving QoS in MANET.

15. Research on Intelligent Mobile Commerce Transaction Security Mechanisms Based on Mobile Agent.

16. DEEP NEURAL NETWORKS IN COLLECTIVE ROBOTICS CONTROL.

17. A multi-agent protocol for multilateral negotiations in supply chain management.

18. Application of mobile agents in interoperable STEP-NC compliant manufacturing.

19. MANPro: mobile agent-based negotiation process for distributed intelligent manufacturing.

20. On the structuring of distributed systems : the argument for mobility

21. Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing.

22. Symmetric rendezvous with advice: How to rendezvous in a disk.

23. Energy efficient opportunistic edge computing for the Internet of Things.

24. Clearing directed subgraphs by mobile agents: Variations on covering with paths.

25. Mobile Messaging for Offline Group Formation in Prosocial Activities: A Large Field Experiment.

26. Multi-Agent Base Evacuation Support System Using MANET.

27. Formation Control of Swarm Robots Using Mobile Agents.

28. Gathering of robots in a ring with mobile faults.

29. Robust finite time cooperative control of second order agents:A Multi-input Multi-output higher order super-twisting based approach.

30. Mobile Agents: IN DISTRIBUTED NETWORK MANAGEMENT.

31. one life to live.

32. dialing for dollars.

34. RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems

35. Distributed tracking control of multiple nonholonomic mobile agents with input delay.

36. Smaclad: Secure Mobile Agent Based Cross Layer Attack Detection and Mitigation in Wireless Network.

37. Elliptic Curve Cryptosystems-based Date-constrained Hierarchical Key Management Scheme in Internet of Things.

38. On asynchronous rendezvous in general graphs.

39. A trustworthy agent-based encrypted access control method for mobile cloud computing environment.

40. Mobile Technology and Student Academic Success: What Do Students Find Valuable?

41. Identity-based undetachable digital signature for mobile agents in electronic commerce.

42. A Clonal Selection Algorithm for Energy-Efficient Mobile Agent Itinerary Planning in Wireless Sensor Networks.

43. A multi-paradigm approach to model and verify mobile agent software systems.

44. Mobile Agents System Security: A Systematic Survey.

45. Uniform deployment of mobile agents in asynchronous rings.

46. Deterministic gathering with crash faults.

47. Mobile agents-based data aggregation in WSNs: benchmarking itinerary planning approaches.

48. A novel trust-scoring system using trustability co-efficient of variation for identification of secure agent platforms.

49. Study of order lifecycle tracking systems in building material equipment manufacturing enterprises.

50. Security of Cloud System by IDS-AM-Clust.

Catalog

Books, media, physical & digital resources