Sciweavers

422 search results - page 5 / 85
» On Exploiting Agent Technology in the Design of Peer-to-Peer...
Sort
View
SAC
2000
ACM
13 years 11 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi
SEMWEB
2010
Springer
13 years 5 months ago
Exploiting Relation Extraction for Ontology Alignment
When multiple ontologies are used within one application system, aligning the ontologies is a prerequisite for interoperability and unhampered semantic navigation and search. Vario...
Elena Beisswanger
PPPJ
2004
ACM
14 years 26 days ago
MailConfigurator: automatic configuration of e-mail accounts through Java mobile agents
: E-Mail is the most exploited service in the Internet. We present an application based on Java mobile agents to automatically perform required steps to register an account. The us...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
TSMC
2002
114views more  TSMC 2002»
13 years 7 months ago
Exploiting design information to derive object distribution models
Object-orientation and distributed systems are quickly becoming norms for new system development, generating renewed interest in distribution schemes traditionally directed at rela...
Sandeep Purao, Hemant K. Jain, Derek L. Nazareth
WETICE
2003
IEEE
14 years 21 days ago
A Case Study in Role-based Agent Interactions
Mobile agents are an emerging approach to develop distributed and parallel applications. They also can be exploited to develop enterprise applications, since they can act as activ...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi