期刊文献+

一种基于Jini技术的移动Agent模型 被引量:3

A Jini-based Mobile Agent Model
下载PDF
导出
摘要 移动Agent被普遍认为是一种有潜力的网络分布式计算技术,但至今仍没得到广泛的应用,主要是因为移动A-gent中尚存在一些主要问题,如环境灵活性、通信、代码迁移、安全等。针对这些问题,提出了一种基于Jini技术的移动Agent模型。通过将Jini中的查找、发现、租约、远程事件、对象存储等概念和服务加入到移动Agent中,创建了一个包含两种网络中间件(代理基站和代理站点)的动态分布式移动Agent模型,该模型提供了一种新的查找、通信、安全和容错方案以提高移动代理的健壮性、安全性和代理间的交互性。同时对该模型中关键技术的实现机制作了分析。 The mobile agent is widely considered as a promising network distributed computing paradigm,however,so far it has not been fully applied for it's some limitations such as environment flexibility,communication,code migration,security etc.For these problems ,a Jini-based mobile agent model is proposed.By adding some concepts and services of Jini such as lookup,discovery,remote event and lease into mobile agent ,a dynamic distributed mobile agent model con-sisting of two network middlewares(AgentBase and AgentStation)is constructed.The model provides a new communica-tion,collaboration,security and fault tolerance approach to improve the mobile agent's robustness,security and inter-op-eration between agents.At the same time ,the implementation of critical technology in the model is analyzed.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第16期146-148,共3页 Computer Engineering and Applications
基金 国家863高技术研究发展计划项目:烟草行业现代集成制造系统总体方案设计及关键技术攻关(编号:2001AA411160)
关键词 移动AGENT Jini 查找服务 远程事件 租约 mobile agent ,Jini ,lookup service,remote event ,lease
  • 相关文献

参考文献5

  • 1General Magic.Mobile agents white paper.http://www.generalmagic.com/technology/techwhitepaper.html,1998
  • 2W Keith Edwards.Core jini[M].PrenticeHall,ISBN 0-13-0114469-X,1999
  • 3Sun.Jini (TM ArchitectureSpecification ) .hitp://www.sun.com/jinni/specs/,2001
  • 4Sun Java Remote Method Invocation(RMI)technology.http://java.sun.com/javaone/j avaone98/sessions/T406/,1998
  • 5Eric Freeman,Susan Hupfer,Ken Arnold.JavaSpace Principles,Patterns and Practice[M].Addison-Wesley,ISBN 0201309556,1999

同被引文献30

  • 1章隆兵,吴少刚,蔡飞,胡伟武.PC机群上共享存储与消息传递的比较[J].软件学报,2004,15(6):842-849. 被引量:8
  • 2李静,黄国青.提高J2EE项目开发效率的一种新途径研究[J].计算机工程与设计,2004,25(7):1122-1123. 被引量:2
  • 3张林,徐锋,王远,吕建.一种信任管理系统中层次式monitor机制的设计与实现[J].南京大学学报(自然科学版),2007,43(2):191-198. 被引量:3
  • 4Satyanarayanan M. Pervasive computing: Vision and challenges. IEEE Personal Communications, 2001, 8(4): 10-17.
  • 5Garlan D, Siewiorek D P, Smailagic A, et al. Project aura: Toward distraction-free pervasive computing. IEEE Pervasive Computing, 2002, 1(2):22-31.
  • 6Weiser M. The computer for the 21st century. Scientific American, 1991, 261(30) :94-104.
  • 7Antoine Fillinger NIST Smart Space Laboratory. http://www. nist. gov/smartspace/. 2008-06.
  • 8Balan R, Flinn J, Satyanarayanan M, et al. The case for cyber foraging. Proceedings of the 10th ACM SIGOPS European Workshop, Saint- Emilion, France, 2002, 87-92.
  • 9Want R, Pering T, Danneels G, et al. The personal server: Changing the way we think about ubiquitous computing. Borriello G H. Proceedings of the 4th International Conference on Ubiquitous Computing. Berlin= Springer, 2002, 194-209.
  • 10Jini Network Technolgoy. http://www. sun. com/software/jini . 1998-11.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部