Mobile Agent Research Papers - Academia.edu (original) (raw)

The growing availability of wireless portable devices is leveraging the diffusion of location based services (LBSs) that provide service contents depending on the current position of clients, servers, and involved distributed resources.... more

The growing availability of wireless portable devices is leveraging the diffusion of location based services (LBSs) that provide service contents depending on the current position of clients, servers, and involved distributed resources. When a wide public of final users use LBSs, two primary issues are crucial: how to guarantee the proper level of user privacy given the need to disclose,

Knowbot Programs are mobile agents intended for use in widely distributed systems like the Internet. We describe our experiences implementing security, process migration, and inter-process communication in a prototype system implemented... more

Knowbot Programs are mobile agents intended for use in widely distributed systems like the Internet. We describe our experiences implementing security, process migration, and inter-process communication in a prototype system implemented using the object-oriented programming language Python. This infrastructure supports applications that are composed of multiple, autonomous agents that can migrate to use network resources more efficiently.

This paper introduces AntNet, a new routing algorithm for telecommunication networks. AntNet is an adaptive, distributed, mobile-agents-based algorithm which was inspired by recent work on the ant colony metaphor. We apply AntNet in a... more

This paper introduces AntNet, a new routing algorithm for telecommunication networks. AntNet is an adaptive, distributed, mobile-agents-based algorithm which was inspired by recent work on the ant colony metaphor. We apply AntNet in a datagram network and compare it with both static and adaptive state-of-the-art routing algorithms. We ran experiments for various paradigmatic temporal and spatial traffic distributions. AntNet showed both very good performances and robustness under all the experimental conditions with respect to its competitors.

Cloud Computing is one of the latest computing paradigms in IT sector today where applications, platforms, software and some other IT services are provided over the internet. It is also known as On Demand Computing. Cloud Computing... more

Cloud Computing is one of the latest
computing paradigms in IT sector today where
applications, platforms, software and some other IT
services are provided over the internet. It is also
known as On Demand Computing. Cloud
Computing considers shared pool of configurable
computing resources which requires proper resource
distribution among the tasks, otherwise in some
situations resources may over-utilized or underutilized.
For the sake of efficient resource
utilization, Load Balancing System problem needs
more attention in cloud computing. In This paper,
we have used Agent Based Dynamic Load
Balancing (ABDLB) approach in which mobile
agent plays very important role, which is a software
entity and usually defined as an independent
software program that runs on behalf of a network
administrator. It has ability to learn. After
comparing the proposed method with traditional
load balancing scheme we concluded that Agent
Base load balancing scheme greatly reduces the
communication cost of servers, accelerates the rate
of load balancing which indirectly improves the
Throughput and Response Time of the cloud.

Global Reporting Initiative (GRI) is the best-known framework for voluntary reporting of environmental and social performance by business worldwide. Using extensive empirical data, including interviews and documentary analysis, we examine... more

Global Reporting Initiative (GRI) is the best-known framework for voluntary reporting of environmental and social performance by business worldwide. Using extensive empirical data, including interviews and documentary analysis, we examine GRI's organizational field and conclude that since its modest beginnings in 1999 GRI has been by several measures a successful institutionalization project. But the institutional logic of this new entity, as an instrument for corporate sustainability management, leaves out one of the central elements of the initial vision for GRI: as a mobilizing agent for many societal actors. This emergent logic reflects GRI's dominant constituency – large global companies and financial institutions and international business management consultancies – and not the less active civil society organizations and organized labor. We attribute these developments to factors such as building GRI within the existing institutional structures; the highly inclusive multistakeholder process; and the underdeveloped base of information users. From the institutional theory perspective, this case shows how the process of institutionalization is deeply affected by initial strategies of the founders, and how it reproduces existing power relations. From the governance perspective, this case leads us to question the power of commodified information to mobilize civil society and to strengthen governance based on partnerships.

This paper proposes a language called CLAIM : Computational Language for Autonomous Intelligent and Mobile agents. CLAIM allows designing Multi-Agent Systems that support both stationary and mobile agents. Agents designed thanks to CLAIM... more

This paper proposes a language called CLAIM : Computational Language for Autonomous Intelligent and Mobile agents. CLAIM allows designing Multi-Agent Systems that support both stationary and mobile agents. Agents designed thanks to CLAIM are endowed with cognitive capabilities (e.g. reasoning), are able to communicate with other agents and are mobile. The primitives of mobility are inspired from the ambient calculus. The CLAIM language is supported by a multi-platform system (SyMPA) compliant with the specifications of the MASIF standard (from OMG);i.e. agents can be distributed over several sites and can move from one to another with respect to MASIF specifications. this paper presents the main features of our language CLAIM, resumes the most significant aspects of SyMPA, shows the expressiveness of our language, and discusses the completeness of the mobility.

Rapid growth and expansion of information and communication technology (ICT) have set the pace for an electronic revolution leading to adoption of e-marketplace within the small and medium enterprises (SMEs). Locally, this growth in ICT... more

Rapid growth and expansion of information and communication technology (ICT) have set the pace for an electronic revolution leading to adoption of e-marketplace within the small and medium enterprises (SMEs). Locally, this growth in ICT promises to further bolster the SMEs' position as the engine of growth for the Malaysia economy. However, there are various challenges and issues in setting up an e-marketplace in developing countries which appear to impede the growth of e-marketplace. In this paper, the realities of e-business adoption in Malaysian wood based products industry are discussed. This leads to the proposal of an integrated e-marketplace framework. This framework integrates different types of business mechanisms to facilitate in the trading of wood-based products in Malaysia. These mechanisms comprise of a third-party intermediary portal, mobile agent-based multi-attribute reverse auction and an e-negotiation feature that incorporates the use of the short messaging system service.

Most current IDS are generally centralized and suffer from significant limitations when used in high speed networks, especially when they face distributed attacks. This paper shows that the use of mobile agents has practical ad- vantages... more

Most current IDS are generally centralized and suffer from significant limitations when used in high speed networks, especially when they face distributed attacks. This paper shows that the use of mobile agents has practical ad- vantages for intrusion detection. For this purpose we carried out a comparative experimental study of some IDS, showing their limits and then we propose an implementation of a new MAFIDS (Mobile Agent for Intrusion Detection System) model focusing on misuse approach. The performance of MAFIDS is investigated in terms of detection delay, false alarm and detection rate by comparing it to a centralized IDS over real traffic and a set of simulated attacks.

1. ABSTRACT Agent technology is an emerging field and agent-based application design is still a pi o- neering discipline. We are all pioneers, i n- venting and re-inventing sometimes smart but perhaps more not-so-smart solutions to recur-... more

1. ABSTRACT Agent technology is an emerging field and agent-based application design is still a pi o- neering discipline. We are all pioneers, i n- venting and re-inventing sometimes smart but perhaps more not-so-smart solutions to recur- rent problems. It is here that agent design pat- terns can help by capturing good solutions to common problems in agent design. No

This paper deals with detection of SYN flooding attacks which are the most common type of attacks in a Mobile Agent World. We propose a new framework for the detection of flooding attacks by integrating Divergence measures over Sketch... more

This paper deals with detection of SYN flooding attacks which are the most common type of attacks in a Mobile Agent World. We propose a new framework for the detection of flooding attacks by integrating Divergence measures over Sketch data structure. We compare three divergence measures (Hellinger Distance, Chi-square and Power divergence) to analyze their detection accuracy. The performance of the proposed framework is investigated in terms of detection probability and false alarm ratio. We focus on tuning the parameter of Divergence Measures to optimize the performance. We conduct performance analysis over publicly available real IP traces, in Mobile Agent Network, integrated with flooding attacks. Our experimental results show that Power Divergence outperforms Chi-square divergence and Hellinger distance in network anomalies detection in terms of detection and false alarm.