Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intelligent Agents for Telecommunication Environments (Innovative Technology Series)

Buy
Mobile agents are program instances (or processes) capable of moving within the network under their own control. They consist of three parts: code, data state, and execution state. Migration of mobile agents takes place between hosts. These hosts execute the agents and provide functionality to them. This functionality includes communication with other agents and users, migration to other hosts, and other services such as persistency (i.e. storing data or agent snapshots), services lookup (i.e. finding agents that offer a service), location of agents (either locally or on a larger scale), integration of legacy systems such as databases, and the like.

Being the technical basis for applications, mobile agents offer a number of advantages. These include the saving of network bandwidth and increase in the overall performance by allowing the application to process data on or near the source of data (e.g. a database), asynchronous processing, i.e. the possibility to fulfil a task without the need to have a permanent connection from the client to a host, achieving true parallel computation by employing a number of agents working on different nodes, the replacement of a fault model where network failures can interrupt every phase of the computation by one where network failures can influence only the migration of an agent (as the rest is then done locally on the same node), and so on. Additionally, mobile agents "inherit" the advantages of mobile code systems, especially the possibility to transport functionality automatically to nodes where it has not been installed before.

For mobile agents, security is a very important aspect since neither the provider of a host or an agent-based service, nor the owner of an agent wants to be harmed by employing this technology. This is a non-trivial requirement in mobile agent systems, because firstly, the executing party has no vital interest in executing a program correctly, and secondly, the employer of a program has to give away the control over its execution.
(HTML tags aren't allowed.)

An Introduction to LTE: LTE, LTE-Advanced, SAE, VoLTE and 4G Mobile Communications
An Introduction to LTE: LTE, LTE-Advanced, SAE, VoLTE and 4G Mobile Communications

Following on from the successful first edition (March 2012), this book gives a clear explanation of what LTE does and how it works. The content is expressed at a systems level, offering readers the opportunity to grasp the key factors that make LTE the hot topic amongst vendors and operators across the globe. The book assumes no more than a...

Professional Python Frameworks: Web 2.0 Programming with Django and Turbogears (Programmer to Programmer)
Professional Python Frameworks: Web 2.0 Programming with Django and Turbogears (Programmer to Programmer)
As two of the leading MVC web frameworks for Python, Django and TurboGears allow you to develop and launch sites in a fraction of the time compared to traditional techniques and they provide greater stability, scalability, and management than alternatives. Packed with examples, this book will help you discover a new methodology for designing,...
Microsoft  Windows  2000 Server TCP/IP Core Networking Guide (IT Professional)
Microsoft Windows 2000 Server TCP/IP Core Networking Guide (IT Professional)

Maximize enterprise networking and connectivity with tools and resources direct from Microsoft.

Set up and troubleshoot all facets of TCP/IP networking in Windows® 2000 with expertise from those who know the technology best—the Windows 2000 development team. This guide delivers essential architectural and...


Gitolite Essentials
Gitolite Essentials

Leverage powerful branch and user access control with Git for your own private collaborative repositories

Overview

  • Learn to manage the many repositories and the users accessing these repositories in the Git server
  • Walks you through the most important ideas and concepts in Gitolite supported...
PayPal APIs: Up and Running: A Developer's Guide
PayPal APIs: Up and Running: A Developer's Guide

Virtually every application delivery model is experiencing a surging demand for transaction convenience. In this book, I introduce PayPal APIs, along with instructions and resources for their integration in different environments, including websites and mobile applications.

The goal of this book is to help you understand...

An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
Assessing the most valuable technology for an organization is becoming a growing challenge for business professionals confronted with an expanding array of options. This book is an A-Z compendium of technological terms written for the non-technical executive, allowing quick identification of what the term is and why it is significant. This is more...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy