Font Size: a A A

Move The Main Part Of The Key Technologies

Posted on:2002-02-13Degree:DoctorType:Dissertation
Country:ChinaCandidate:C G WuFull Text:PDF
GTID:1118360185495620Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The mobility and intelligence have provided the mobile agent with much more advantages and better prospect than the traditional computing technologies. This dissertation, with the support of China's 863 Hi-Tec Project, describes our researches on some of key problems faced by the mobile agent technology and some innovative ideas and schemes on migration, docking, security and fault-tolerance.This dissertation puts forward the module-based mobile agent framework, which adopts the module-scheduling method to describe the working process of the mobile agent. The reuse of the modules in a single machine or in a LAN and the change in the executing process of an agent from serialization to concurrence have improved the efficiency of the agent's execution in terms of the migration. With the Master host in a LAN as the docking manager and storing the operating results on the host where the agent resides, the messaging mechanism is use to realize the docking. Some improvement is made from the point view of reducing the docking overhead of the system.This dissertation uses the double-encrypting method based on the public key technology to protect the agent from being eavesdropped, providing a feasible measure to detect counterfeit codes in the host to ensure the security of the agent in the process of transmission. A static resource-managing agent is set in the system to check the identity and the authority of the mobile agent, providing an effective measure to detect malicious users who want to pass the authentication by defrauding other user's signature. This dissertation uses the First-Order Logic to describe the access authority of the agent, which is more flexible and expressive. In addition, in terms of fault-tolerance, a rescheduling method is used to avoid the site where the transmission of the agent fails so as to ensure the normal execution of the agent.This dissertation puts forward a learning-based agent negotiation method, which obtains the decision-making method of the dealer on the transaction by learning the person-to-person transaction process, and then makes negotiation on...
Keywords/Search Tags:mobile agent, module, migration, docking, security, fault-tolerance, authentication, negotiation, learning, decision tree, semantic network, information retrieval
PDF Full Text Request
Related items