Login / Signup
A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Data and Time Checking Technology.
Jiehong Wu
Guiran Chang
Jia Li
Published in:
IIH-MSP (2007)
Keyphrases
</>
mobile agents
data collection
artificial intelligence
data sources
data analysis
computational intelligence
distributed data
reinforcement learning
multi agent
mobile environments
central processor