Process migration

DS Milojičić, F Douglis, Y Paindaveine… - ACM Computing …, 2000 - dl.acm.org
Process migration is the act of transferring a process between two machines. It enables
dynamic load distribution, fault resilience, eased system administration, and data access …

Mobile software agents: An overview

VA Pham, A Karmouch - IEEE Communications magazine, 1998 - ieeexplore.ieee.org
The anticipated increase in popular use of the Internet will create more opportunities in
distance learning, electronic commerce, and multimedia communication, but it will also …

[图书][B] Distributed systems

AS Tanenbaum, M Van Steen - 2017 - academia.edu
Distributed Systems Page 1 DS 2006; Ch1 16-Jan-06 Timo Alanko, 2006 1 Distributed
Systems Spring 2006 Timo Alanko 16-Jan-06 2 Sources of material • Tanenbaum, van …

An architecture for intrusion detection using autonomous agents

JS Balasubramaniyan… - … conference (Cat. No …, 1998 - ieeexplore.ieee.org
The intrusion detection system architectures commonly used in commercial and research
systems have a number of problems that limit their configurability, scalability or efficiency …

Intrusion detection using autonomous agents

EH Spafford, D Zamboni - Computer networks, 2000 - Elsevier
AAFID is a distributed intrusion detection architecture and system, developed in CERIAS at
Purdue University. AAFID was the first architecture that proposed the use of autonomous …

[PDF][PDF] Mobile agent security

W Jansen, T Karygiannis - 1999 - csrc.nist.rip
Mobile agent technology offers a new computing paradigm in which a software agent can
suspend its execution on a host computer, transfer itself to another agent-enabled host on …

Security for mobile agents: Authentication and state appraisal

WM Farmer, JD Guttman, V Swarup - … Rome, Italy, September 25–27, 1996 …, 1996 - Springer
Mobile agents are processes which can autonomously migrate to new hosts. Despite its
many practical benefits, mobile agent technology results in significant new security threats …

Traditional saliency reloaded: A good old model in new shape

S Frintrop, T Werner… - Proceedings of the IEEE …, 2015 - cv-foundation.org
In this paper, we show that the seminal, biologically-inspired saliency model by Itti et al. is
still competitive with current state-of-the-art methods for salient object segmentation if some …

Mobile agents and security

MS Greenberg, JC Byington… - IEEE Communications …, 1998 - ieeexplore.ieee.org
The practicality of mobile agents hinges on realistic security techniques. Mobile agent
systems are combination client/servers that transport, and provide an interface with host …

Cryptographic traces for mobile agents

G Vigna - Mobile agents and security, 1998 - Springer
Mobile code systems are technologies that allow applications to move their code, and
possibly the corresponding state, among the nodes of a wide-area network. Code mobility is …