咨询与建议

限定检索结果

文献类型

  • 66 篇 期刊文献
  • 50 篇 会议
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 119 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 107 篇 工学
    • 85 篇 计算机科学与技术...
    • 39 篇 电气工程
    • 35 篇 软件工程
    • 31 篇 信息与通信工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 网络空间安全
  • 11 篇 理学
    • 7 篇 数学
    • 3 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 2 篇 经济学
    • 2 篇 应用经济学

主题

  • 119 篇 mobile code
  • 21 篇 java
  • 17 篇 security
  • 11 篇 mobile agents
  • 10 篇 mobile agent
  • 6 篇 access control
  • 5 篇 remote execution
  • 5 篇 active networks
  • 5 篇 distributed appl...
  • 4 篇 authentication
  • 4 篇 wireless sensor ...
  • 4 篇 distributed obje...
  • 4 篇 distributed syst...
  • 4 篇 middleware
  • 4 篇 distributed comp...
  • 4 篇 mobile objects
  • 4 篇 ubiquitous compu...
  • 4 篇 process calculi
  • 3 篇 performance
  • 3 篇 object orientati...

机构

  • 3 篇 univ minnesota d...
  • 3 篇 univ calif san d...
  • 2 篇 natl chiao tung ...
  • 2 篇 univ arizona dep...
  • 2 篇 politecn torino ...
  • 2 篇 cornell univ dep...
  • 2 篇 univ calif santa...
  • 2 篇 univ oulu dept e...
  • 2 篇 inria f-06902 so...
  • 2 篇 univ calif davis...
  • 1 篇 institute of con...
  • 1 篇 mozilla online l...
  • 1 篇 sun microsystems...
  • 1 篇 univ surrey ctr ...
  • 1 篇 univ british col...
  • 1 篇 ecole mines ales...
  • 1 篇 s cent univ nati...
  • 1 篇 univ florence di...
  • 1 篇 univ s carolina ...
  • 1 篇 digital equipmen...

作者

  • 6 篇 vigna g
  • 4 篇 picco gp
  • 3 篇 karnik nm
  • 3 篇 pasquale j
  • 3 篇 tripathi ar
  • 2 篇 newhouse t
  • 2 篇 brooks r
  • 2 篇 peterson ra
  • 2 篇 bridges p
  • 2 篇 ghezzi c
  • 2 篇 shieh sp
  • 2 篇 liu weiwei
  • 2 篇 röning j
  • 2 篇 franz michael
  • 2 篇 han zhen
  • 2 篇 alouf s
  • 2 篇 gray rs
  • 2 篇 zucca elena
  • 2 篇 pandey r
  • 2 篇 massacci fabio

语言

  • 109 篇 英文
  • 10 篇 其他
检索条件"主题词=Mobile code"
119 条 记 录,以下是1-10 订阅
排序:
Striving for sensing: Taming your mobile code to share a robot sensor network
收藏 引用
INFORMATION SCIENCES 2014年 277卷 338-357页
作者: Borrego, Carlos Castillo, Sergio Robles, Sergi UAB dEIC Barcelona 08193 Spain
This article presents a general purpose, multi-application mobile node sensor network based on mobile code. This intelligent system can work in delay and disruption tolerant (DIN) scenarios. mobile nodes host software... 详细信息
来源: 评论
Towards a mobile code management environment for complex, real-time, distributed systems
收藏 引用
REAL-TIME SYSTEMS 2001年 第1-2期21卷 165-189页
作者: Stoyen, AD Petrov, PV Univ Nebraska Ctr Management Informat Technol Omaha NE 68182 USA
We present a novel mobile code management environment, currently under design and development. Our design employs an open architecture, suitable for "plug-and-play" with COTS and other groups' tools. Whi... 详细信息
来源: 评论
Using mobile code to create ubiquitous augmented reality
收藏 引用
WIRELESS NETWORKS 2002年 第2-3期8卷 199-211页
作者: Kangas, KJ Röning, J Univ Oulu Dept EE Comp Engn Lab FIN-90401 Oulu Finland
Augmented reality systems supplement reality by adding virtual objects into a real-world view. In this article, we describe a flexible mobile code approach for implementing ubiquitous, active, and mobile augmented rea... 详细信息
来源: 评论
Programming languages for mobile code
收藏 引用
ACM COMPUTING SURVEYS 1997年 第3期29卷 213-239页
作者: Thorn, T Inria/Irisa Campus de Beaulieu
Sun's announcement of the programming language Java more than anything popularized the notion of mobile code, that is, programs traveling on a heterogeneous network and automatically executing upon arrival at the ... 详细信息
来源: 评论
Using mobile code to provide fault tolerance in tuple space based coordination languages
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2003年 第1-2期46卷 137-162页
作者: Rowstron, AIT Microsoft Res Ltd Cambridge CB3 0FB England
Tuple space based coordination languages suffer from poor fault tolerance to agent failure. Traditionally, transaction type mechanisms have been adopted in them to provide this type of fault tolerance. However, transa... 详细信息
来源: 评论
mobile code Alternatives for Secure Environments
收藏 引用
Informatica 2000年 第1期11卷 49-64页
作者: Pakštas, Algirdas Shagaev, Igor University of Sunderland Sch. of Comp. Eng. and Technology Sunderland SR1 3SD Chester Road United Kingdom Inst. of Mathematics and Informatics 2600 Vilnius Akademijos 4 Lithuania Institute of Control Sciences Moscow Profsoyuznaya St. 65 Russian Federation
Growing popularity of the mobile code requires to consider various aspects related to its security. In the aviation industry there is a case when additional information needs to be delivered to the pilot by uploading ... 详细信息
来源: 评论
Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems
收藏 引用
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 2003年 第2期52卷 462-465页
作者: Wu, TC Hsu, CL Natl Taiwan Univ Sci & Technol Dept Informat Management Taipei 106 Taiwan
Shieh et al. proposed two multisignature schemes for message recovery-the parallel multisignature scheme and the serial multisignature scheme-for authenticating delegates in mobile code systems. In this paper, we will... 详细信息
来源: 评论
Protecting network users in mobile code systems
收藏 引用
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 2004年 第2期64卷 191-200页
作者: Shieh, SP Yang, WH Natl Chiao Tung Univ Dept Comp Sci & Informat Engn Hsinchu 30010 Taiwan
Conventional access control mechanisms are rather insensitive to occurrences of context-dependent illegal accesses. Insensitivity to context-dependent accesses may lead to failure to protect network users and resource... 详细信息
来源: 评论
A mobile code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT
收藏 引用
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 2019年 134卷 198-206页
作者: Tariq, Noshina Asim, Muhammad Maamar, Zakaria Farooqi, M. Zubair Faci, Noura Baker, Thar Natl Univ Comp & Emerging Sci Dept Comp Sci Islamabad Pakistan Zayed Univ Coll Technol Innovat Dubai U Arab Emirates Air Univ Dept Comp Sci Islamabad Pakistan Claude Bernard Lyon 1 Univ LIRIS Dept Comp Sci Lyon France Liverpool John Moores Univ Dept Comp Sci Liverpool Merseyside England
The ubiquitous use of Internet-of-Things (IoT) is enabling a new era of wireless Sensor Nodes (SNs) that can be subject to attacks like any other piece of hardware and software. Unfortunately, an open and challenging ... 详细信息
来源: 评论
Bidirectional mobile code trust management using tamper resistant hardware
收藏 引用
mobile NETWORKS & APPLICATIONS 2003年 第2期8卷 137-143页
作者: Zachary, J Brooks, R Univ S Carolina Dept Comp Sci & Engn Columbia SC 29208 USA
Trust management in a networked environment consists of authentication and integrity checking. In a mobile computing environment, both remote hosts and mobile code are suspect. We present a model that addresses trust ... 详细信息
来源: 评论