Results 21 to 30 of about 9,278,000 (361)
Secure agent data integrity shield [PDF]
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection.
Borselius +15 more
core +1 more source
A trustworthy mobile agent infrastructure for network management [PDF]
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core +1 more source
Objective. We sought to evaluate the immune responses to a bivalent Haemophilus influenzae glycoconjugate vaccine against serotypes “a” (Hia) and “b” (Hib) in the presence of the preexisting immunity to Hib. Methods.
Angjelina Konini +2 more
doaj +1 more source
Augmenting Agent Platforms to Facilitate Conversation Reasoning [PDF]
Within Multi Agent Systems, communication by means of Agent Communication Languages (ACLs) has a key role to play in the co-operation, co-ordination and knowledge-sharing between agents.
Collier`, Rem W., Lillis, David
core +1 more source
Cancer: How a plant metabolite analog suppresses tumor growth A synthetic analog of a chemical found in fruit suppresses tumor growth by targeting an RNA-binding protein (hnRNPA2B1) and preventing the production of a pro-cancer regulatory factor.
Nak-Kyun Soung +21 more
doaj +1 more source
New Cyclic Lipopeptides of the Iturin Class Produced by Saltern-Derived Bacillus sp. KCB14S006
Salterns, one of the most extreme natural hypersaline environments, are a rich source of halophilic and halotolerant microorganisms, but they remain largely underexplored ecological niches in the discovery of bioactive secondary metabolites. In continued
Sangkeun Son +16 more
doaj +1 more source
Remote Debugging Mechanism Based on MILS Multi-level Security Architecture [PDF]
Aiming at the features of multi-level security architecture,and the remote debugging technology based on the Multiple Independent Levels of Security(MILS) multilevel security architecture,this paper proposes a unified management and synergic debugging ...
LI Jian,CHEN Ge,YE Xiaoyun,FU Kai,HE Wei
doaj +1 more source
Practical applications of multi-agent systems in electric power systems [PDF]
The transformation of energy networks from passive to active systems requires the embedding of intelligence within the network. One suitable approach to integrating distributed intelligent systems is multi-agent systems technology, where components of ...
Ai +42 more
core +1 more source
Multi-agent deep reinforcement learning: a survey
The advances in reinforcement learning have recorded sublime success in various domains. Although the multi-agent domain has been overshadowed by its single-agent counterpart during this progress, multi-agent reinforcement learning gains rapid traction ...
Sven Gronauer, K. Diepold
semanticscholar +1 more source
Integrity protection for code-on-demand mobile agents in e-commerce [PDF]
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling ...
Chan, TK, Guan, SU, Wang, TH
core +1 more source

