<--- Back to Details
First PageDocument Content
Mobile agent / Proxy server / Hypertext Transfer Protocol / Remote procedure call / Client–server model / Computing / Distributed computing architecture / Network architecture
Date: 2013-12-23 16:46:42
Mobile agent
Proxy server
Hypertext Transfer Protocol
Remote procedure call
Client–server model
Computing
Distributed computing architecture
Network architecture

Mobile agents: Motivations and state-of-the-art systems Robert Gray, David Kotz, George Cybenko and Daniela Rus Thayer School of Engineering / Department of Computer Science Dartmouth College Hanover, New Hampshire 03755

Add to Reading List

Source URL: www.cs.dartmouth.edu

Download Document from Source Website

File Size: 396,24 KB

Share Document on Facebook

Similar Documents

Concepts and Architecture of a Security-Centric Mobile Agent Server Volker Roth Mehrdad Jalali-Sohi  Fraunhofer Institut f¨ur Graphische Datenverarbeitung

Concepts and Architecture of a Security-Centric Mobile Agent Server Volker Roth Mehrdad Jalali-Sohi Fraunhofer Institut f¨ur Graphische Datenverarbeitung

DocID: 1v0zS - View Document

On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany

On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany

DocID: 1uZJK - View Document

Connecting to the Insured  Applied Mobile® is the first insurance agent mobile application to bring client, policy

Connecting to the Insured Applied Mobile® is the first insurance agent mobile application to bring client, policy

DocID: 1u3LX - View Document

1  Two Foraging Algorithms for Robot Swarms Using Only Local Communication Nicholas R. Hoff III, Amelia Sagoff, Robert J. Wood, Radhika Nagpal

1 Two Foraging Algorithms for Robot Swarms Using Only Local Communication Nicholas R. Hoff III, Amelia Sagoff, Robert J. Wood, Radhika Nagpal

DocID: 1r6SJ - View Document

Abstract  Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

DocID: 1r5Nn - View Document