We propose a system for the detection of unauthorized cloning of mobile agents by malicious hosts. The system can detect clones after the fact, identify the culprit, and then seek...
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
—Recently, many researchers have studied on animated pedagogical agents to improve students’ learning experience in educational systems. In this paper, we describe how personal...
In this paper, we present a consensus algorithm for synchronous distributed systems using cooperating mobile agents. The algorithm is designed within a framework for mobile agent ...
Abstract. This is a position paper reporting the motivations, the starting point and the guidelines that characterise the MERCURIO5 project proposal, submitted to MIUR PRIN 20096 ....