Proceedings of the Fifth International Conference on Autonomous Agents 2001
DOI: 10.1145/375735.376291
|View full text |Cite
|
Sign up to set email alerts
|

Portable resource control in the J-SEAL2 mobile agent system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2002
2002
2014
2014

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(22 citation statements)
references
References 5 publications
0
22
0
Order By: Relevance
“…Since a mobile agent can bring the necessary functionalities with it and perform its tasks autonomously, it can reduce the necessity for interaction with other sites. In the minimal case, a mobile agent requires that the connection be established only when it performs migration (Binder, Hulaas & Villazon, 2001). The concept of a mobile agent also creates the possibility that new functions and knowledge can be introduced to the entire multi-agent system from a host or controller outside the system via a single accessible member of the intelligent multiple mobile robot system (Kambayashi & Takimoto, 2005).…”
Section: Discussionmentioning
confidence: 99%
“…Since a mobile agent can bring the necessary functionalities with it and perform its tasks autonomously, it can reduce the necessity for interaction with other sites. In the minimal case, a mobile agent requires that the connection be established only when it performs migration (Binder, Hulaas & Villazon, 2001). The concept of a mobile agent also creates the possibility that new functions and knowledge can be introduced to the entire multi-agent system from a host or controller outside the system via a single accessible member of the intelligent multiple mobile robot system (Kambayashi & Takimoto, 2005).…”
Section: Discussionmentioning
confidence: 99%
“…The MCG approach is based on frameworks for mobile agents that rely on mechanisms such as sandboxing to allow control of resource usage by hosted applications [4], as represented in Figure 2.…”
Section: Control Of Network Node Computing Resourcesmentioning
confidence: 99%
“…Jinsight provides a variety of different analyses through a visual framework, relying on trace data collection and analysis [36][37][38]. J-SEAL2 uses performance instrumentation to ensure that processes or threads don't overuse system resources, using byte code instrumentation to monitor memory and CPU utilization [7][8][9].…”
Section: Related Workmentioning
confidence: 99%