{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:47:11Z","timestamp":1752551231408},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540633433"},{"type":"electronic","value":"9783540694304"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-63343-x_52","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T20:37:53Z","timestamp":1330288673000},"page":"253-266","source":"Crossref","is-referenced-by-count":57,"title":["Aglets: Programming mobile agents in Java"],"prefix":"10.1007","author":[{"given":"Danny B.","family":"Lange","sequence":"first","affiliation":[]},{"given":"Mitsuru","family":"Oshima","sequence":"additional","affiliation":[]},{"given":"G\u00fcnter","family":"Karjoth","sequence":"additional","affiliation":[]},{"given":"Kazuya","family":"Kosaka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,7,29]]},"reference":[{"unstructured":"Sun Microsystems Inc.: Java. http:\/\/java.sun.com","key":"20_CR1"},{"unstructured":"Sun Microsystems Inc.: Jeeves-a Java-Powered Internet Server and Framework. http:\/\/www.javasoft.com\/products\/Jeeves\/","key":"20_CR2"},{"unstructured":"IBM Corp.: Java Aglet Application Programming Interface (J-AAPI) White Paper-Draft. http:\/\/www.trl.ibm.co.jp\/aglets\/JAAPI-whitepaper.html","key":"20_CR3"},{"unstructured":"IBM Corp.: The Aglets homepage. http:\/\/www.trl.ibm.co.jp\/aglets\/","key":"20_CR4"},{"unstructured":"Sun Microsystems Inc.: Object Serialization. http:\/\/www.javasoft.com\/products\/JDK\/1.1\/docs\/guide\/serialization\/","key":"20_CR5"},{"unstructured":"IBM Corp.: Agent Transfer Protocol ATP\/0.1 Draft. http:\/\/www.trl.ibm.co. jp\/atp\/atp.htm","key":"20_CR6"},{"unstructured":"Sun Microsystems Inc.: The JavaSecurity API and Digital Signatures. http:\/\/www.javasoft.com\/products\/JDK\/1.1\/docs\/guide\/security\/","key":"20_CR7"},{"unstructured":"Gray, R.: Agent Tcl: A flexible and secure mobile-agent system. Fourth Annual Tcl\/Tk\/Workshop (TCL 96), 1996","key":"20_CR8"},{"unstructured":"Ousterhout, J.: Tcl and the Tk Toolkit. Addison-Wesley, 1994","key":"20_CR9"},{"unstructured":"Strasser, M., Baumann, J., Radouniklis, N., and Hohl, F.: MOLE-A Java Based Mobile Agent System. http:\/\/www.informatik.uni-stuttgart.de\/ipvr\/vs\/projekte\/mole.html","key":"20_CR10"},{"unstructured":"Harrison, C., Chess, D., and Kershenbaum, A.: Mobile Agent: Are they a good idea? Research Report RC19887, IBM Research Division, 1995","key":"20_CR11"},{"doi-asserted-by":"crossref","unstructured":"Tardo, J. and Valente, L.: Mobile Agent Security and TeleScript. IEEE CompCon, 1996","key":"20_CR12","DOI":"10.1109\/CMPCON.1996.501749"},{"unstructured":"Yonezawa, A. and Tokoro, M.: Object-Oriented Concurrent Programming. MIT Press","key":"20_CR13"},{"unstructured":"Yokote, Y. and Tokoro, M.: Experience and Evolution of ConcurrentSmalltalk. OOPSLA '87 Proceedings","key":"20_CR14"},{"unstructured":"Bennet, J.: The Design and Implementation of Distributed Smalltalk. OOPSLA'87 Proceedings","key":"20_CR15"},{"doi-asserted-by":"crossref","unstructured":"Dean, D., Felten, D., and Wallach, D.: Java Security: From HotJava to Netscape and Beyond. IEEE Symposium on Security and Privacy, May 1996","key":"20_CR16","DOI":"10.1109\/SECPRI.1996.502681"},{"doi-asserted-by":"crossref","unstructured":"Genesereth, M. and Ketchpel, S.: Software Agents. Communications of the ACM, Volume 37, Number 7, July 1994","key":"20_CR17","DOI":"10.1145\/176789.176794"},{"unstructured":"Li, W. and Messerschmitt, D.: Java-To-Go. http:\/\/ptolemy.eecs.berkeley.edu\/dgm\/javatools\/java-to-go\/","key":"20_CR18"},{"unstructured":"Katsuno, Y., Nakahara, M., and Tokoro, M.: Agent-Oriented Language, MALS. Computer Software, Vol.14, No. 2, 1997, JSSST","key":"20_CR19"}],"container-title":["Lecture Notes in Computer Science","Worldwide Computing and Its Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-63343-X_52.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:43:41Z","timestamp":1619574221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-63343-X_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540633433","9783540694304"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-63343-x_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}