• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 79
  • 16
  • 10
  • 4
  • 4
  • 1
  • Tagged with
  • 110
  • 110
  • 71
  • 60
  • 36
  • 31
  • 30
  • 20
  • 19
  • 16
  • 15
  • 14
  • 13
  • 13
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Simulation Of A Mobile Agent Middleware For Wireless Sensor Networks

Ozarslan, Suleyman 01 February 2008 (has links) (PDF)
Wireless Sensor Networks (WSNs) have become a significant research area in recent years as they play an increasingly important role in bridging the gap between the physical and the virtual world. However, programming wireless sensor networks is extremely challenging. Middleware for WSNs supports the development of sensing-based applications and facilitates programming wireless sensor networks. Middleware is the software that sits in the middle of applications and operating system. There is a large amount of research on middleware development for WSNs. In this thesis, a first attempt is made to simulate mobile agents running on Agilla middleware using a software application. A Java application (Agilla Simulator) is developed and different agents corresponding to various functions are simulated. The performance of the network, namely the time it takes to execute the agents on the simulator is measured. The results of migration delay and reliability in the simulations of different agents are compared with those of the real world experiments. The comparison results presented in the study show that simulations produce results comparable to real life experiments.
52

Building Secure Systems using Mobile Agents

Shibli, Muhammad Awais January 2006 (has links)
<p>The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some interesting solution emerged like Intrusion Detection and Prevention systems, but these too have some problems, like detecting and responding in real time, because they mostly require inputs from system administrator. Optimistically, we have succeeded in protecting the hosts to some extent by applying the reactive approach, such as antivirus, firewall and intrusion detection and response systems, But, if we critically analyze this approach, we will reach the conclusion that it has inherent flaws, since the number of penetrations, Internet crime cases, identity and financial data thefts, etc. are rising exponentially in recent years. The main reason is that we are using only reactive approach, i.e. protection system is activated only when some security breach occurs. Secondly, current techniques try to fix the overall huge problem of security using only small remedies (firewall, antivirus and intrusion detection and preventions system) – “point solutions”. Therefore, there is a need to develop a strategy using Mobile Agents in order to operate in reactive and proactive manners, what requires providing security on the principle of defense in depth. So, that ultimate goal of securing a system as a whole can be achieved. System is assumed to be secure if unauthorized access (penetrations) is not possible and system is safe against damages. This strategy will include three aspects: (a) autonomously detect vulnerabilities on different hosts (in a distributed network) before an attacker can exploit (b) protect hosts by detecting attempts of intrusions and responding to them in real time; and finally (c) perform tasks related to security management.</p>
53

Scientific computation on a peer-to-peer network using mobile agents

Chakravarti, Arjav Jagannath, January 2004 (has links)
Thesis (Ph. D.)--Ohio State University, 2004. / Title from first page of PDF file. Document formatted into pages; contains xvii, 119 p.; also includes graphics. Includes abstract and vita. Advisor: Gerald Baumgartner, Dept. of Computer and Information Science. Includes bibliographical references (p. 111-119).
54

Consistency in cooperative executions /

Adluri, Vasantha Lakshmi, January 2002 (has links)
Thesis (M.Sc.)--Memorial University of Newfoundland, 2002. / Bibliography: leaves 105-112.
55

Mobilių agentinių sistemų modeliavimas / Mobile agent systems modelling

Preikšaitis, Tomas 11 August 2009 (has links)
Šio darbo tikslas buvo panaudoti dynPLA modelį mobilių agentinių sistemų modeliavimui. dynPLA modelio panaudojimas leido sukurti e-komercijos modelį skirtą knygų paieškos procesui organizuoti internete. Sukurta formali knygų paieškos paieškos procesui organizuoti internete specifikacija buvo ištestuota sukuriant prototipą, panaudojant agentinių sistemų modeliavimo įrankį JADE. Atlikti testavimo eksperimentai su sukurtu prototipu leido verifikuoti agentų migravimo, bei komunikavimo procesus. Sukurtas Internetinio Knygyno Mobilios Agentinės sistemos imitacinis modelis leido įvertinti pasirinktos e-komercijos architektūrinias funkcionavimo (ang. k. performance) charakteristikas: • Vidutinis mobilaus agento užduoties įvykdymo laikas; • Vidutinė direktorijos eilė; • Vidutinė tiekėjų eilė. / The main goal of this paper was to apply mobile agent systems modelling with dynPLA model. dynPLA model practice let to execute e-commerce model commited for book searching process organized in the internet. Established specification of book searching process organized in the internet, was tested by making prototype, using mobile agent system modeling tool JADE. Accomplished testing exsperiments with prototype let us to verify agents migration and communication process. Internet Book-store Mobile Agent system imitation model let us to estimate e-commerce architecture performance characteristics: • Average time of mobile agent performance; • Average queue of directory; • Average queue of providers.
56

Studies in agent based IP traffic congestion management in diffserv networks /

Sankaranarayanan, Suresh. Unknown Date (has links)
Computer networks used in Telecommunication, particularly the Internet, have been used to carry computer data only, but now they carry voice and/or video also. Because each type of this traffic has specific flow characteristics, each type has to be handled with a certain level of guaranteed quality. So based on that, IETF introduced a Quality of Service tool, called Differentiated Service. It offers different levels of service to different classes of traffic. Even then, the problem of congestion arises due to sharing of a finite bandwith. In the case of real time multi media traffic, congestion due to inadequate bandwith contributes heavily to the quality, whereas in non-real time traffic the effect of congestion is to make data transfer take a longer time. In contrast, real time data become become obsolete if they do not arrive on time. Therefore what is needed is some way of ensuring that during periods of congestion, real time traffic is not affected at all, or is at least given a higher priority than non-real time. / The motivation for the research that has been carried out was therefore to develop a rule based traffic management scheme for DiffServ networks with a view to introducing QoS (Quality of Service). This required definition of rules for congestion management/control based on the type and nature of IP traffic encountered, and then constructing and storing these rules to enable future access for application and enforcement. We first developed the required rule base and then developed the software based mobile agents using the Java (RMI) application package, for accessing these rules for application and enforcement. Consequently, these mobile agents act as smart traffic managers at nodes/routers in the computer based communication network and manage congestion. The rule base as well as the mobile agent software developed in Java (RMI), were validated using computer simulation. The contents of the research carried out have been presented in the thesis. / Thesis (PhD)--University of South Australia, 2006.
57

Secure wireless payment protocol /

Wang, Hong, January 1900 (has links)
Thesis (M.C.S.) - Carleton University, 2002. / Includes bibliographical references (p. 114-122). Also available in electronic format on the Internet.
58

Management of ubiquitous networks /

Diaz Puig, Catalina, January 1900 (has links)
Thesis (M. App. Sc.)--Carleton University, 2003. / Includes bibliographical references (p. 179-183). Also available in electronic format on the Internet.
59

Global context information transfer: one way to achieve ubiquitous service access /

Luo, Jiexin, January 1900 (has links)
Thesis (M.C.S.)--Carleton University, 2003. / Includes bibliographical references (p. 162-167). Also available in electronic format on the Internet.
60

Intruder capture by mobile agents in mesh topologies /

Song, Lisa Xiuli, January 1900 (has links)
Thesis (M.C.S.) - Carleton University, 2005. / Includes bibliographical references (p. 127-130). Also available in electronic format on the Internet.

Page generated in 0.4383 seconds