dc.relation.reference | [1]Aglets. Project home. Retrieved 2005 from http://aglets.sourceforge.net/.
[2]aIsland Project home. Retrieved 2005 from http://aisland.jxta.org/.
[3]AJANTA – Mobile Agents Research Project. Retrieved 2005 from http://www.cs.umn.edu/Ajanta/
[4]Ap Grid. Retrieved 2005 from http://www.apgrid.org.
[5]APAN. Retrieved 2005 from http://www.apan.net.
[6]Yariv Aridor and Mitsuru Oshima. Infrastructure for mobile agents: Requirements and design. In Proceedings of the Second International Workshop on Mobile Agents (MA 1998), pages 38–49, Stuttgart, Germany, September 1998.
[7]Ozalp Babaoglu, Hein Meling, and Alberto Montresor. Anthill: A framework for the development of agent-based peer-to-peer systems. In Proceedings of the Twenty-second International Conference on Distributed Computing Systems (ICDCS 2002), pages 15-22, Vienna, Austria, July 2002.
[8]Jusung Baek. A design of a protocol for detecting a mobile agent clone and its correctness proof using coloured petri nets. Technical report, Technical Report TR-DIC-CSL-1998-002, Info. and Comm., K-JIST, 1998.
[9]Fabio Bellifemine, Agostino Poggi, and Giovanni Rimassa. JADE - A FIPA-compliant agent framework. In Proceedings of the Practical Applications of Intelligent Agents (PAAM '99), pages 97–108, April 1999.
[10]BitTorrent. Official BitTorrent web site. Retrived 2005 from http://bittorrent.com.
[11]Jiannong Cao, Xinyu Feng, Jian Lu, and Sajal K. Das. Mailbox-based scheme for designing mobile agent communication protocols. IEEE Computer, 35(9):54–60, September 2002.
[12]Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the 2000 International Workshop on Design Issues in Anonymity and Unobservability (DIAU 2000), volume 2009, pages 46-66, Berkeley, California, United States, July 2000.
[13]P. E. Clements, Todd Papaioannou, and John Edwards. Aglets: Enabling the Virtual Enterprise. Published and Presented at Managing Enterprises -- Stakeholders, Engineering, Logistics and Achievement (ME-SELA '97), page 425, 1997. Available at http://www.luckyspin.org/Docs/Papers/Mesela97.html.
[14]Frank Dabek, Ben Zhao, Peter Druschel, John Kubiatowicz, and Ion Stoica. Towards a Common API for Structured Peer-to-Peer Overlays. In Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), pages 33–44, Berkeley, California, United States, February 2003.
[15]eMule. emule-project.net. Retrieved 2005 from http://www.emule-project.net.
[16]Chien-Tse Fang. Keyword Search in DHT-based Peer-to-Peer Networks. Master's thesis, National Taiwan University, Taipei, Taiwan, January 2004.
[17]Xinyu Feng, Jiannong Cao, Jian Lu, and Henry Chan. An efficient mailbox-based algorithm for message delivery in mobile agent systems. In Proceedings of the Fifth IEEE International Conference on Mobile Agents (MA 2001), pages 135–151, Atlanta, Georgia, United States, December 2001.
[18]FIPA- The Foundation for Intelligent Physical Agents. Retrieved 2005 from http://www.fipa.org/.
[19]Ian Foster and Carl Kesselman. The Grid: Blueprint for a New Computing Infrastructure. First edn. Morgan Kaufmann (1998)
[20]Ian Foster, Carl Kesselman, Jeffrey M. ~Nick, and Steven Tuecke. The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. Technical report, The Globus Alliance (2002) Available from http://www.globus.org/research/papers/ogsa.pdf.
[21]Gnutelliums LLC. Gnutelliums - Gnutella Download. Retrieved 2005 from http://www.gnutelliums.com/.
[22]Li Gong. Project JXTA: A Technology Overview. http://www.jxta.org/project/www/docs/jxtaview_01nov02.pdf, October 29, 2002.
[23]Robert S. Gray, G.eorge Cybenko, David Kotz, Donald A. Peterson and Daniela Rus. D’Agents: Applications and Performance of a Mobile-Agent System, Software - Practice and Experience, 32(6):543–573, May 2002.
[24]Torsten Illmann, Frank Kargl, Michael Weber, and Tilmann Kruger. Migration in java: problems, classifications and solutions. In Proceedings of the International ICSC Symposium on Multi-Agent and Mobile Agents in Virtual Organizations and E-Commerce (MAMA 2000), pages 281–287, Wollongong, Australia, December 2000.
[25]JADE. Java Agent Development Framework. Retrieved 2005 from http://jade.tilab.com/index.html.
[26]JADE Programmer's Guide. http://jade.tilab.com/doc/programmersguide.pdf.
[27]JXTA project. Sun Microsystems, Inc. Retrieved 2005 from http://www.jxta.org.
[28]JXTA v2.3.x: Java™ Programmer’s Guide. http://www.jxta.org/docs/JxtaProgGuide_v2.3.pdf, Jan 2005.
[29]Neeran M. Karnik, and Anand R. Tripathi. Agent Server Architecture for the Ajanta Mobile-Agent System. In Proceedings of the 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), Las Vegas, July 1998.
[30]Neeran M. Karnik and Anand R. Tripathi. Security in the Ajanta mobile agent system. Software - Practice and Experience, 31(4):301–329, January 2001.
[31]Kazaa. Kazaa file sharing network. Retrieved 2005 from http://www.kazaa.com.
[32]Tak Cheung Lam and Wei Keh-Wei. Mobile agent clone detection using general transferable e-cash. In Proceedings of the International Symposium on Information Security (InforSecu '02), 2002.
[33]Danny B. Lange. Java Aglet Application Programming Interface (J-AAPI) White Paper - Draft 2, IBM Tokyo Research Laboratory, 1997.
[34]Tieyan Li, Zhigang Zhao, and Sizhen You. A-peer: An agent platform integrating peer-to-peer network. In Proceedings of the Third International Workshop on Agent based Cluster and Grid Computing, pages 614-618, Tokyo, Japan, May 2003.
[35]Meng-Kai Lin. Visitant: A Structured Agent-Based Peer-to-Peer System. Master's thesis, National Taiwan University, Taipei, Taiwan, July 2004.
[36]Peter Maymounkov and David Mazieres. Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS 2002), pages 53–65, Cambridge, USA, March 2002.
[37]Dejan S. Milojicic, William LaForge, and Deepika Chauhan. Mobile Objects and Agents (MOA). In Proceedings of the Fourth USENIX Conference on Object-Oriented Technologies and Systems (COOTS 1998), pages 179–194, Santa Fe, New Mexico, United States, April 1998.
[38]Napster Inc. The napster homepage. Retrieved 2005 from http://www.napster.com.
[39]Petr Novák, Milan Rollo, Michal Pìchouèek, and Tomáš Vlèek. X-SecurityArchitecture in AgentCities. http://jade.tilab.com/papers/EXP/x-security.pdf.
[40]Mitsuru Oshima, Guenter Karjoth, and Kouichi Ono. Aglets Specification 1.1 Draft. http://www.trl.ibm.com/aglets/spec11.htm, 1998.
[41]Ulrich Pinsdorf and Volker Roth. Mobile Agent Interoperability Patterns and Practice. In Proceedings of the 9th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2002), pages 238–244. IEEE Computer Society, 2002.
[42]Pacific Rim Applications and Grid Middleware Assembly. http://www.pragma-grid.net/
[43]Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp and Scott Schenker. A Scalable Content-Addressable Network. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2001), pages 161-172. ACM Press, 2001.
[44]Volker Roth and Jan Peters. A Scalable and Secure Global Tracking Service for Mobile Agents. In Proceedings of the 5th International Conference on Mobile Agents (MA 2001), pages 169–181. Springer Verlag, 2001.
[45]Volker Roth and Mehrdad Jalali-Sohi. Concepts and Architecture of a Security-Centric Mobile Agent Server. In Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems (ISADS 2001), pages 435–442. IEEE Computer Society, 2001.
[46]Volker Roth, Ulrich Pinsdorf, Jan Peters, Peter Ebinger, Patric Kabus, and Roger Hartmann. SeMoA Developer's Guide. http://www.semoa.org/docs/develop.pdf, 2003.
[47]Antony Rowstron and Peter Druschel. Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In Proceedings of the 2001 IFIP/ACM International Conference on Distributed Systems Platforms (Middleware 2001), Volume 2218, pages 329-350. Springer-Verlag, 2001.
[48]SeMoA. Retrieved 2005 from http://www.semoa.org/.
[49]Richard Smith. Internet Cryptography. Addison-Wesley, 1997.
[50]Ion Stoica, Robert Morris, David Karger, M.~Frans Kaashoek and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2001), pages 149-160. ACM Press, 2001.
[51]Niranjan Suri, Jeffrey M. Bradshaw, Maggie R. Breedy, Paul T. Groth, Gregory A. Hill, and Renia Jeffers. Strong mobility and fine-grained resource control in NOMADS. In Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents (ASA/MA2000), volume 1882, pages 2–15. Springer-Verlag, September 2000.
[52]Bernard Traversat, Mohamed Abdelaziz, and Eric Pouyoul Bernard. Project JXTA: A Loosely-Consistent DHT Rendezvous Walker. http://www.jxta.org/project/www/docs/jxta-dht.pdf, March 2003.
[53]Anand Tripathi, Neeran Karnik, Manish Vora, Tanvir Ahmed, and Ram Singh. Mobile Agent Programming in Ajanta. In Proceedings of the 19th International Conference on Distributed Computing Systems (ICDCS '99), page 190, 1999.
[54]Bill Venners. Under the hood: The architecture of aglets. Java World. http://www.javaworld.com/javaworld/jw-04-1997/jw-04-hood.html, April 1997.
[55]Tao Xianping, Feng Xinyu, Li Xin, and Zhang Guanqun. Communication mechanism in mogent system. Software, 11(8): pages 1060–1065, 2000.
[56]Ben Y. Zhao, John D. Kubiatowicz, and Anthony D. Joseph. Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing. U. C. Berkeley Technical Report UCB//CSD-01-1141, April 2001. | en |