Design issues in mobile-agent programming systems

被引:81
作者
Karnik, NM [1 ]
Tripathi, AR [1 ]
机构
[1] Univ Minnesota, Dept Comp Sci, Minneapolis, MN 55455 USA
来源
IEEE CONCURRENCY | 1998年 / 6卷 / 03期
关键词
D O I
10.1109/4434.708256
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article describes the mobile-agent paradigm, which is becoming increasingly popular for network-centric programming, and compares it with earlier paradigms for distributed computing from which it has evolved. The design of mobile-agent systems requires that several system-level issues be resolved, such as the provision of code mobility, object naming, portability, scalability, and a range of security issues that go hand-in-hand with mobile code. Agent programming requires suitable languages and programming models that can support code mobility and runtime systems that provide some fundamental primitives for the creation, migration, and management of agents. The authors discuss these requirements and describe several mobile-agent systems that illustrate different approaches designers have taken to address the problems.
引用
收藏
页码:52 / +
页数:11
相关论文
共 15 条
  • [1] [Anonymous], MOBILE AGENTS ARE TH
  • [2] Farmer W.M., 1996, P 19 NAT INF SYST SE, V2, P591
  • [3] Gray RS, 1996, PROCEEDINGS OF THE FOURTH ANNUAL TCL/TK WORKSHOP, P9
  • [4] Guillemont M., 1982, Local Computer Networks. Proceedings of the IFIP TC 6 International In-Depth Symposium, P207
  • [5] Johansen D., 1995, Proceedings Fifth Workshop on Hot Topics in Operating Systems (HotOS-V) (Cat. No.95TH8059), P42, DOI 10.1109/HOTOS.1995.513452
  • [6] FINE-GRAINED MOBILITY IN THE EMERALD SYSTEM
    JUL, E
    LEVY, H
    HUTCHINSON, N
    BLACK, A
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1988, 6 (01): : 109 - 133
  • [7] Karjoth G., 1997, IEEE Internet Computing, V1, P68, DOI 10.1109/4236.612220
  • [8] Karnik NM, 1998, INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-IV, PROCEEDINGS, P66
  • [9] *OBJ INC, 1997, OBJ OBJ VOYAG COR PA
  • [10] Schneier Bruce, 1996, APPL CRYPTOGRAPHY