Wireless microsensor networks have been identified as one of the most important technologies for the 21st century. This paper traces the history of research in sensor networks over the past three decades, including two important programs... more
This paper introduces AntNet, a novel approach to the adaptive learning of routing tables in communications networks. AntNet is a distributed, mobile agents based Monte Carlo system that was inspired by recent work on the ant colony... more
We introduce a calculus describing the movement of processes and devices, in- cluding movement through administrative domains.
The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular,... more
www.sikt.hk-r.se/~soc/ 2 EnerSearch and the ISES project: www.enersearch.se/ Rune Gustavsson ([email protected]) is a professor of computer science at the University of Karlskrona/Ronneby, Sweden.
Threat diagnostic, using AND/OR tree (TDT) and risk analysis, is a mechanism to protect mobile agents against malicious host attacks. The method is based on analyzing the probable causes of mobile agent failure to perform its intended... more
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming under increasing strain from the development and deployment of... more
The availability of positional information is of great importance in many commercial, governmental, and military applications. Localization is commonly accomplished through the use of radio communication between mobile devices (agents)... more
The computational power of networks of small resource-limited mobile agents is explored. Two new models of computation based on pairwise interactions of finite-state agents in populations of finite but unbounded size are defined. With a... more
We introduce a calculus for mobile agents and give its chemical semantics, with a precise de nition for migration, failure, and failure detection. Various examples written in our calculus illustrate how to express remote executions,... more
A good object-oriented design does not necessarily make a good component-based design, and vice versa. What design principles do components introduce? This paper examines component-based programming and how it expands the design space in... more
Global Reporting Initiative (GRI) is the best-known framework for voluntary reporting of environmental and social performance by business worldwide. Using extensive empirical data, including interviews and documentary analysis, we examine... more
This paper presents coordination algorithms for groups of mobile agents performing deployment and coverage tasks. As an important modeling constraint, we assume that each mobile agent has a limited sensing/communication radius. Based on... more
Abstract. Ubiquitous Computing advocates the construction of massively dis- tributed systems that help transform physical spaces into computationally active and intelligent environments. The design of systems and applications in these... more
In order to fully realise the potential of mobile agent technology to address the needs of the network management domain, it is imperative to establish the conditions where mobile agent-based (MA) NMS or SNMP-based NMS should be employed... more
1. ABSTRACT Agent technology is an emerging field and agent-based application design is still a pi o- neering discipline. We are all pioneers, i n- venting and re-inventing sometimes smart but perhaps more not-so-smart solutions to recur-... more
obile agents offer a new paradigm for distributed computation, but their potential benefits must be weighed against the very real security threats they pose. These threats originate not just in malicious agents but in malicious hosts as... more
In the near future, the advent of large-scale networks of mobile agents autonomously performing long-term sensing and communication tasks will be upon us. However, using controlled node mobility to improve communication performance is a... more
Wireless sensor networks (WSNs) are difficult to program and usually run statically-installed software limiting its flexibility. To address this, we developed Agilla, a new middleware that increases network flexibility while simplifying... more
The growing computational power requirements of grand challenge applications has promoted the need for linking highperformance computational resources distributed across multiple organisations. This is fueled by the availability of the... more
We describe the mobile agent paradigm which is becoming increasingly popular for network-centric programming, and compare it with earlier paradigms for distributed computing from which it has evolved. The design of mobile agent systems... more
Mobile agents represent a promising technology for the development of Internet applications. However, mobile computational entities introduce peculiar problems w.r.t. the coordination of the application components. The paper outlines the... more
The purpose of this article was to examine historic institutional autologous stem cell mobilization practices and evaluate factors influencing mobilization failure and kinetics. In this retrospective study we analyzed clinical records of... more
We describe a typing system for a distributed π-calculus which guarantees that distributed agents cannot access the resources of a system without first being granted the capability to do so. The language studied allows agents to move... more
The TACOMA project is concerned with implementing operating system support for agents, processes that migrate through a network. Two TACOMA prototypes have been completed; this paper outlines our experiences in building and using them. A... more
Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we discuss these three issues in the context of D'Agents, a mobile-agent... more
Internet applications face challenges that mobile agents and the adoption of enhanced coordination models may overcome. Each year more applications shift from intranets to the Internet, and Internet-oriented applications become more... more
Public transportation systems are among the most ubiquitous and complex large-scale systems found in modern society. For those unable to drive such as people with cognitive disabilities, these systems are essential gateways for... more
In this paper, we develop an energy-efficient, fault-tolerant approach for collaborative signal and information processing (CSIP) among multiple sensor nodes using a mobile-agent-based computing model. In this model, instead of each... more
Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references. ... RS Gray, "Agent Tcl: A Flexible and Secure... more
It was previously reported that treatment with the sulfated polysaccharide fucoidan or the structurally similar dextran sulfate increased circulating mature white blood cells and hematopoietic progenitor/stem cells (HPCs) in mice and... more
This article first surveys existing protocols for supporting IP mobility and then proposes an extension to the Mobile IP architecture, called TeleMIP. Our architecture attempts to achieve smaller handoff latency by localizing the scope of... more
Recent years have witnessed great advancements in the science and technology of autonomy, robotics, and networking. This paper surveys recent concepts and algorithms for dynamic vehicle routing (DVR), that is, for the automatic planning... more
The provisioning of Web services over the wireless Internet introduces novel challenging issues for service design and implementation: from user/terminal mobility during service execution, to wide heterogeneity of portable access devices... more
Recently, mobile agents have been proposed for efficient data dissemination in sensor networks. In the traditional client/server-based computing architecture, data at multiple sources are transferred to a destination; whereas in the... more
Software deployment is an evolving collection of interrelated processes such as release, install, adapt, reconfigure, update, activate, deactivate, remove, and retire. The connectivity of large networks, such as the Internet, is affecting... more
There is an increasing number of Internet applications that attempt to optimize their network communication by considering the network distance across which data is transferred. Such applications range from replication management to... more