2010 2nd International Conference on E-Business and Information System Security 2010
DOI: 10.1109/ebiss.2010.5473724
|View full text |Cite|
|
Sign up to set email alerts
|

Notice of Retraction: A Mobile-Agent Security Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 2 publications
0
0
0
Order By: Relevance
“…For the purposes of this paper, autonomous mobile agents are highly specialized and compact programs designed to perform one or two functions that are capable of migrating from operating platform to operating platform without the requirement of human intervention (Lin & Huang, 2010). Individually, the autonomous mobile agent does not exhibit signs of what could be called intelligence; however, when working as part of a society of agents within a system, the system begins to exhibit general intelligence characteristics such as:…”
Section: What Is An Autonomous Mobile Agent?mentioning
confidence: 99%
“…For the purposes of this paper, autonomous mobile agents are highly specialized and compact programs designed to perform one or two functions that are capable of migrating from operating platform to operating platform without the requirement of human intervention (Lin & Huang, 2010). Individually, the autonomous mobile agent does not exhibit signs of what could be called intelligence; however, when working as part of a society of agents within a system, the system begins to exhibit general intelligence characteristics such as:…”
Section: What Is An Autonomous Mobile Agent?mentioning
confidence: 99%