Listing 1 - 3 of 3 |
Sort by
|
Choose an application
Didactics of technology --- MS Word --- Word --- computersoftware --- informatica --- informaticatoepassingen --- tekstverwerking --- windows
Choose an application
AI(Artificial intelligence) --- Artificial intelligence --- Artificial thinking --- Artificiële intelligentie --- Electronic brains --- Intellectronics --- Intelligence [Artificial ] --- Intelligence artificielle --- Intelligent agents (Computer software) --- Intelligent agents (Computersoftware) --- Intelligent agents (Logiciel d'ordinateur) --- Intelligent machines --- Kunstmatige intelligentie --- Machine intelligence --- Thinking [Artificial ] --- Bureautique Kantoorautomatisering --- Intranet Intranet --- Systèmes informatiques Geïnformatiseerde systemen --- Web Web --- Agent (informatique) Agent (informatica) --- Internet Internet --- Cerveaux électroniques --- Machines intelligentes --- Pensée artificielle --- Industrial management --- Data processing
Choose an application
New paradigms can popularize old technologies. A new standalone" paradigm, the electronic desktop, popularized the personal computer. A new connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in the physical world. The authority can be established, for example, cryptographically. A mobile agent can travel from one place to another subject to the des- nation place’s approval. The source and destination places can be in the same computer or in di erent computers. In either case,the agentinitiates the trip by executing a go" instruction which takes as an argument the name or address of the destination place. The next instruction in the agent’s program is executed in the destination place, rather than in the source place. Thus, in a sense, the mobile agent paradigm reduces networking to a program instruction. A mobile agent can interact programmatically with the places it visits and, if the other agents approve, with the other agents it encounters in those places.
Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Informatique--Sécurité --- Mobile agents (Computer software) --- Mobile agents (Computersoftware) --- Mobile agents (Logiciel d'ordinateur) --- Sécurité informatique --- Computer security. --- 681.3 *C2 --- 681.3*C24 --- Computer communication networks: data communications; OSI; security and protection --- Distributed systems: distributed databases; distributed applications; networkoperating systems --- Computer Science --- Engineering & Applied Sciences --- Mobile agents (Computer software). --- 681.3*C24 Distributed systems: distributed databases; distributed applications; networkoperating systems --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Sécurité informatique --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Agents, Mobile (Computer software) --- Mobile Internet agents (Computer software) --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Artificial intelligence. --- Management information systems. --- Computer Science. --- Data Encryption. --- Operating Systems. --- Computer Communication Networks. --- Artificial Intelligence (incl. Robotics). --- Management of Computing and Information Systems. --- Intelligent agents (Computer software) --- Data protection --- Security systems --- Hacking --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Information Systems. --- Cryptology. --- Artificial Intelligence.
Listing 1 - 3 of 3 |
Sort by
|