Results 271 to 280 of about 365,445 (329)
Some of the next articles are maybe not open access.
IEEE Journal on Selected Areas in Communications, 2023
To support rapidly increasing services and applications from users, multi-tier computing is emerged as a promising system-level computing architecture by distributing computing/caching/communication/networking capabilities between cloud servers to users,
Chuan Sun +5 more
semanticscholar +1 more source
To support rapidly increasing services and applications from users, multi-tier computing is emerged as a promising system-level computing architecture by distributing computing/caching/communication/networking capabilities between cloud servers to users,
Chuan Sun +5 more
semanticscholar +1 more source
Parallel biometrics computing using mobile agents
2003 International Conference on Parallel Processing, 2003. Proceedings., 2003We present an efficient and effective approach to personal identification by parallel biometrics computing using mobile agents. To overcome the limitations of the existing password-based authentication services on the Internet, we integrate multiple personal features including fingerprints, palmprints, hand geometry and face into a hierarchical ...
J. You, D. Zhang, J. Cao, M. Guo
openaire +1 more source
Reinforcement Learning Based Energy-Efficient Collaborative Inference for Mobile Edge Computing
IEEE Transactions on Communications, 2023Collaborative inference in mobile edge computing (MEC) enables mobile devices to offload the computation tasks for the computation-intensive perception services, and the inference policy determines the inference latency and energy consumption.
Yilin Xiao +6 more
semanticscholar +1 more source
Mobile agents for computer intrusion detection
Thirty-Sixth Southeastern Symposium on System Theory, 2004. Proceedings of the, 2004In the age of the Internet, computer intrusion detections are at best a black art. The science to perceive, track, and understand intrusions is still at its infancy. Many different technologies and topologies are under investigation to see which model provides adequate data for intrusion detection.
S.Y. Foo, M. Arradondo
openaire +1 more source
Mobile agents and grid computing
2004Publisher Summary This chapter describes mobile agents as an effective solution for grid service provision. A short overview is first introduced on the grid paradigm and the most known research activities in the field. Then, mobile agents are discussed and a comparison with the remote procedure call (RPC) method is made as far as the most effective ...
F. Agostaro +3 more
openaire +1 more source
Distributed Parallel Migration Computing Based on Mobile Agents
2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems, 2005Mobile agents provide a new method for the distributed parallel computation. This paper presents the advantages of using mobile agents in a distributed parallel seismic data migration system, and describes the architecture and concrete technologies for implementation.
null Qicheng Liu, null Xiaohong Chen
openaire +1 more source
Mobile Agent Enabled Application Mobility for Pervasive Computing
2006Applications that can follow mobile users when they change to a different environment are in high demand by pervasive computing. In this paper, we describe a mobile agent based paradigm for enabling an application to migrate with the user in pervasive computing environments.
Ping Yu +3 more
openaire +1 more source
Multi-Agent Reinforcement Learning for Task Offloading in Crowd-Edge Computing
IEEE Transactions on Mobile ComputingThe Crowd-edge (CE) computing paradigm facilitates the utilization of the computational resources through simultaneously relying the edge computing and the collaboration among various mobile devices (MDs).
Su Yao +7 more
semanticscholar +1 more source
Universally Composable Secure Mobile Agent Computation
2004We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally composable security for mobile agent computation that is geared toward a complex networking environment where arbitrary protocol instances may be executing concurrently.
Ke Xu, Stephen R. Tate
openaire +1 more source
Dynamic Task Offloading in Multi-Agent Mobile Edge Computing Networks
Global Communications Conference, 2019Mobile edge computing allows resource-constrained mobile devices to offload their computationally-intensive tasks to powerful devices at the edge of the network.
Javad Heydari +2 more
semanticscholar +1 more source

