Cooperative search and rescue with a team of mobile robots

JS Jennings, G Whelan… - 1997 8th International …, 1997 - ieeexplore.ieee.org
We present an implemented algorithm for a distributed team of autonomous mobile robots to
search for an object. When one robot finds it, they all gather around it, and then manipulate …

[PS][PS] Agent Tcl: A flexible and secure mobile-agent system

RS Gray - 1997 - usenix.org
An information agent manages all or a portion of a user's information space. The electronic
resources in this space are often distributed across a network and can contain tremendous …

Security for mobile agents: Authentication and state appraisal

WM Farmer, JD Guttman, V Swarup - … Rome, Italy, September 25–27, 1996 …, 1996 - Springer
Mobile agents are processes which can autonomously migrate to new hosts. Despite its
many practical benefits, mobile agent technology results in significant new security threats …

[PDF][PDF] Security for mobile agents: Issues and requirements

WM Farmer, JD Guttman… - Proceedings of the 19th …, 1996 - facultystaff.richmond.edu
Mobile agents are processes which can autonomously migrate to new hosts. Despite its
many practical bene ts, mobile agent technology results in signi cant new security threats …

Privacy-respecting digital investigation

A Dehghantanha, K Franke - 2014 Twelfth Annual International …, 2014 - ieeexplore.ieee.org
The forensics investigation requirements are in direct conflict with the privacy rights of those
whose actions are being investigated. At the same time, once the private data is exposed it …

Distributed agent software system and method having enhanced process mobility and communication in a computer network

S Jagannathan, RA Kelsey, JF Philbin, S Fujita… - US Patent …, 2002 - Google Patents
A distributed software system and method are provided for use with a plurality of potentially
heterogeneous computer machines connected as a network. The system may comprise at …

Authentication for mobile agents

S Berkovits, JD Guttman, V Swarup - Mobile agents and security, 1998 - Springer
In mobile agent systems, program code together with some process state can autonomously
migrate to new hosts. Despite its many practical benefits, mobile agent technology results in …

A simple extension of Java language for controllable transparent migration and its portable implementation

T Sekiguchi, H Masuhara, A Yonezawa - … April 26–28, 1999 Proceedings 3, 1999 - Springer
A scheme has been developed that enables a Java program to be migrated across
computers while preserving its execution state, such as the values of local variables and the …

Implementation and use of the PLT Scheme web server

S Krishnamurthi, PW Hopkins, J McCarthy… - Higher-Order and …, 2007 - Springer
Abstract The PLT Scheme Web Server uses continuations to enable a natural, console-like
program development style. We describe the implementation of the server and its use in the …

TLC: temporal logic of distributed components

J Griffin, M Lesani, N Shadab, X Yin - Proceedings of the ACM on …, 2020 - dl.acm.org
Distributed systems are critical to reliable and scalable computing; however, they are
complicated in nature and prone to bugs. To manage this complexity, network middleware …