Sign in

A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Data and Time Checking Technology.

Jiehong WuGuiran ChangJia Li
Published in: IIH-MSP (2007)
Keyphrases
  • mobile agents
  • data collection
  • artificial intelligence
  • data sources
  • data analysis
  • computational intelligence
  • distributed data
  • reinforcement learning
  • multi agent
  • mobile environments
  • central processor