<--- Back to Details
First PageDocument Content
Simple Network Management Protocol / Joint Inter-Domain Management / Desktop Management Interface / Telecommunications Management Network / RMON / Mobile agent / Common Object Request Broker Architecture / Multi-agent system / Common Information Model / Network management / Computing / Information technology management
Date: 2001-06-11 15:11:40
Simple Network Management Protocol
Joint Inter-Domain Management
Desktop Management Interface
Telecommunications Management Network
RMON
Mobile agent
Common Object Request Broker Architecture
Multi-agent system
Common Information Model
Network management
Computing
Information technology management

Add to Reading List

Source URL: lcawww.epfl.ch.

Download Document from Source Website

File Size: 65,25 KB

Share Document on Facebook

Similar Documents

Concepts and Architecture of a Security-Centric Mobile Agent Server Volker Roth Mehrdad Jalali-Sohi Fraunhofer Institut f¨ur Graphische Datenverarbeitung

DocID: 1v0zS - View Document

On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany

DocID: 1uZJK - View Document

Connecting to the Insured Applied Mobile® is the first insurance agent mobile application to bring client, policy

DocID: 1u3LX - View Document

Multi-agent systems / Artificial intelligence / Ant robotics / Robot / Biology / Swarm behaviour / Mobile robot / Autonomous robot / Swarm robotics / Swarm intelligence / Computing / Ant

1 Two Foraging Algorithms for Robot Swarms Using Only Local Communication Nicholas R. Hoff III, Amelia Sagoff, Robert J. Wood, Radhika Nagpal

DocID: 1r6SJ - View Document

Security / Cryptography / Computing / Formal sciences / Theoretical computer science / Secure multi-party computation / Cryptographic protocol / Mobile agent / Algorithm / Transmission Control Protocol / Computer security

Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

DocID: 1r5Nn - View Document