Filters








37,167 Hits in 5.3 sec

Fault tolerance in a mobile agent based computational grid

R.F. Lopes, F.J. da Silva e Silva
2006 Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06)  
MAG (Mobile Agents for Grid Computing Environments)is a research project that explores the mobile agent paradigm as a way to overcome the design and implementation challenges of developing a Grid middleware  ...  In recent years, Grid computing has emerged as a promising alternative to increase the capacity of processing and storage, through integration and sharing of multi-institutional resources.  ...  Conclusions and Future Work In this paper, we described a strong migration mechanism in the context of MAG, a mobile agent based Grid middleware.  ... 
doi:10.1109/ccgrid.2006.1630899 fatcat:2k4tcdgmbnfipiw3ors643euem

A Serialisation Based Approach for Processes Strong Mobility [chapter]

Soumaya Marzouk, Maher Ben Jemaa, Mohamed Jmaiel
2007 Lecture Notes in Computer Science  
Our approach is based on processes Serialisation using source code transformation, which generates the source code of a strong mobile process.  ...  We present in this paper a generic approach for process transformation into strong mobile entity.  ...  Another prospect consists in using this approach of mobility for the implementation of a load balancing system or fault tolerant grid based applications.  ... 
doi:10.1007/978-3-540-72883-2_12 fatcat:4ftb5bsvlfdsdhoamp4oym462i

Enabling Java mobile computing on the IBM Jikes research virtual machine

Giacomo Cabri, Letizia Leonardi, Raffaele Quitadamo
2006 Proceedings of the 4th international symposium on Principles and practice of programming in Java - PPPJ '06  
Our thread serialization mechanism provides support for both proactive and reactive migration of single-and multithreaded Java applications.  ...  With respect to previous approaches, we implemented the mobility framework without recompiling a previous JVM source code, but simply extending its functionalities with a full Java package.  ...  To summarize, in our mobility framework threads are serialized in a strong fashion: the MobileThread object is serialized as a regular object, while the execution state is transferred as a chain of fully  ... 
doi:10.1145/1168054.1168064 dblp:conf/pppj/CabriLQ06 fatcat:3hu43ap5rjcuvbgc7mnn2bgouq

Experiences implementing efficient Java thread serialization, mobility and persistence

S. Bouchenak, D. Hagimont, S. Krakowiak, N. De Palma, F. Boyer
2004 Software, Practice & Experience  
In this context, Java provides many useful mechanisms for the mobility of code via dynamic class loading, and the mobility or persistence of data via object serialization.  ...  However, Java does not provide any mechanism for the mobility/persistence of computation (i.e. threads). 10 We designed and implemented a new mechanism, called Java thread serialization, that is used to  ...  ACKNOWLEDGEMENTS Java thread serialization is the brainchild of Xavier Rousset de Pina.  ... 
doi:10.1002/spe.569 fatcat:xb27yfupt5fz3izr4vtgdrsjam

Mobile Code in .NET: A Porting Experience [chapter]

Márcio Delamaro, Gian Pietro Picco
2002 Lecture Notes in Computer Science  
The resulting software artifact constitutes, to the best of our knowledge, the first implementation of a mobile code system written for .net.  ...  This approach forced us to verify our mobile code design on a concrete example, rather than just think about the problem in abstract.  ...  Márcio Delamaro thanks CNPq (the Brazilian Federal Funding Agency) for supporting his stay at Politecnico di Milano.  ... 
doi:10.1007/3-540-36112-x_2 fatcat:pvaq2f7boja2hp5jw3zqclad2y

Network Load Balancing with Strong Migration in an Agent Based Grid System Using CSP Approach

Zafer Altug Sayar
2012 International Journal of Grid Computing & Applications  
In this paper we present a dynamic network traffic balancing approach using strong migration on an agent based grid environment.  ...  The paper focuses on three different areas, namely load balancing, strong mobility and CSP (Constraint Satisfaction Problem) approach. We use CSP approach for making task migration decisions.  ...  The future work will be improving our approach dealing with the flexibility of the algorithm changes.  ... 
doi:10.5121/ijgca.2012.3404 fatcat:mcbu3e3ql5c6ppekjkejkymmmy

Encapsulating distribution by remote objects

M Jansen, E Klaver, P Verkaik, M van Steen, A.S Tanenbaum
2001 Information and Software Technology  
Middleware for modern office environments and many other application areas needs to provide support for a myriad of different, highly-mobile objects.  ...  The combination of flexibility and scalability requires support for object-specific solutions that is hardly addressed by current object-based systems such as CORBA.  ...  Acknowledgments The original concept and the basis for the CORE architecture as described in this paper, was part of the Océ-Technologies research efforts, initiated by Teus Hagen who is now at NLnet Foundation  ... 
doi:10.1016/s0950-5849(00)00174-9 fatcat:alenxo626nabdk3d2ax4dsjtui

Mobile JikesRVM: A framework to support transparent Java thread migration

Raffaele Quitadamo, Giacomo Cabri, Letizia Leonardi
2008 Science of Computer Programming  
Section 2 describes some important motivations for strong thread mobility, sketching some potential applications as well.  ...  It can be argued that Java has all the features to make thread mobility possible thanks to its platform-independent bytecode language and the support for object serialization.  ...  To summarize, in our mobility framework threads are serialized in a strong fashion: the MobileThread object is serialized as a regular object, while the execution state is transferred as a chain of fully  ... 
doi:10.1016/j.scico.2007.07.009 fatcat:hjtwi2qjkrbg5pmu35xp2drl34

A mobile agent based push methodology for global parallel computing

Cheng-Zhong Xu, Brian Wims
2000 Concurrency Practice and Experience  
The 1990s are seeing the explosive growth of the Internet and Web-based information sharing and dissemination systems.  ...  The TRAVELER provides a mechanism for clients to wrap their parallel applications as mobile agents. The agents are dispatched to a resource broker.  ...  We would like to thank the anonymous referees for their valuable comments and suggestions.  ... 
doi:10.1002/1096-9128(200007)12:8<705::aid-cpe506>3.0.co;2-x fatcat:vzdzzczalbcwdjuhzuq5ku5h74

A New Approach based on Cryptography and XML Serialization for Mobile Agent Security
english

Hind Idrissi, Arnaud Revel, El Mamoun Souidi
2014 Proceedings of the 6th International Conference on Agents and Artificial Intelligence  
Mobile agents are a special category of software entities, with the capacity to move between nodes of one or more networks.  ...  A solution for this security concern will be presented and performed .It involves the integration of cryptographic mechanisms such as Diffie-Hellman key exchange for authentication between the set (platform  ...  For mobility feature of our approach, we adopt a weak mobility where agent restarts its execution for each visited host, and we make use of the XML serialization mechanism that provides a persistant and  ... 
doi:10.5220/0004812004030411 dblp:conf/icaart/IdrissiRS14 fatcat:gi7ibyu6zfea3lflpholc4v7fa

Secure mobile agent systems using Java

Walter Binder, Volker Roth
2002 Proceedings of the 2002 ACM symposium on Applied computing - SAC '02  
However, serious questions must be raised whether Java is actually up to the task of providing a secure execution environment for mobile agents.  ...  This is due to inherent support for code mobility by means of dynamic class loading and separable class name spaces, as well as a number of security properties, such as language safety and access control  ...  A similar callback method exists for object serialization.  ... 
doi:10.1145/508791.508813 dblp:conf/sac/BinderR02 fatcat:5t3uq7ylrrhlxiqedluztaewb4

Secure mobile agent systems using Java

Walter Binder, Volker Roth
2002 Proceedings of the 2002 ACM symposium on Applied computing - SAC '02  
However, serious questions must be raised whether Java is actually up to the task of providing a secure execution environment for mobile agents.  ...  This is due to inherent support for code mobility by means of dynamic class loading and separable class name spaces, as well as a number of security properties, such as language safety and access control  ...  A similar callback method exists for object serialization.  ... 
doi:10.1145/508797.508813 fatcat:7iwmifnb5vhqbh767c6nmh6q24

Mobile Agent Security Using ID-Based Agreement Protocol and Binary Serialization

Hind Idrissi, El Mamoun Souidi, Arnaud Revel
2015 International Journal of Security and Its Applications  
This approach involves an Identity-Based Key Agreement Protocol to get a session key and ensure authentication, an Advanced Standard Encryption (AES) for the confidentiality of data exchanged, as well  ...  as a Binary Serialization to get an easy and persistent portability of the agent across the network.  ...  Binary serialization of persistent mobility The systems based on mobile agents support two types of mobility: weak and strong.  ... 
doi:10.14257/ijsia.2015.9.5.02 fatcat:f6q74gqdgvgc5ozcayvd3eoz2a

Dynamically Loading Mobile/Cloud Assemblies [chapter]

Robert Pettersen, Håvard D. Johansen, Steffen Viken Valvåg, Dag Johansen
2017 Communications in Computer and Information Science  
Modern distributed systems, such as mobile applications connecting to cloud-based backend services, benefits from a flexible mechanism for loading code dynamically at runtime.  ...  This paper describes LADY: a run-time system extending Microsoft's .NET platform with a reliable, low-latency, and secure mechanism for resolving and loading assemblies.  ...  In our original implementation of satellite execution, referred to as baseline, the execution server receives mobile functions as serialized objects.  ... 
doi:10.1007/978-3-319-62594-2_9 fatcat:ntqa64zivbehtcbq5yp4v7bqmi

Service Based Content Sharing in the Environment of Mobile Adhoc Networks

Hashmi Vallipalli Hashmi Vallipalli
2013 IOSR Journal of Computer Engineering  
The use of UDP for content sharing is more ideal than the use of OBEX. We will overcome some of the barriers to acceptance through our design approach.  ...  A peer-to-peer model that permits efficient file sharing between mobile smartphones over a low-cost transport.  ...  Fig 1 . 1 System model for mobile service-based peer-to-peer sharing Fig 2 : 2 The Receiver-based Discovery Control (RDC) algorithm.  ... 
doi:10.9790/0661-01020712 fatcat:wunjyuzjqbgdpbo7qeunmzmoqu
« Previous Showing results 1 — 15 out of 37,167 results