{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T17:43:49Z","timestamp":1694627029292},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,7,25]],"date-time":"2008-07-25T00:00:00Z","timestamp":1216944000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s11227-008-0220-2","type":"journal-article","created":{"date-parts":[[2008,7,24]],"date-time":"2008-07-24T14:09:31Z","timestamp":1216908571000},"page":"360-388","source":"Crossref","is-referenced-by-count":2,"title":["Statistical behaviors of mobile agents in network routing"],"prefix":"10.1007","volume":"60","author":[{"given":"Wenyu","family":"Qu","sequence":"first","affiliation":[]},{"given":"Keqiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Masaru","family":"Kitsuregawa","sequence":"additional","affiliation":[]},{"given":"Weilian","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,7,25]]},"reference":[{"key":"220_CR1","unstructured":"Baek JW, Yeo JH, Kim GT, Yeom HY (2001) Cost effective mobile agent planning for distributed information retrieval. In: Proc of the 21st int\u2019l conf on distributed computing systems (ICDCS\u201901), pp\u00a065\u201372, 2001"},{"key":"220_CR2","unstructured":"Baek JW, Kim GT, Yeom HY (2002) Cost-effective planning of timed mobile agents, In: Proc of the int\u2019l conf information technology: coding and computing (ITCC\u201902), pp\u00a0536\u2013541, 2002"},{"key":"220_CR3","unstructured":"Baek JW, Yeo JH, Yeom HY (2002) Agent chaining: an approach to dynamic mobile agent planning. In: Proc the 22nd int\u2019l conf on distributed computing systems (ICDCS\u201902), pp\u00a0579\u2013586, 2002"},{"key":"220_CR4","doi-asserted-by":"crossref","unstructured":"Beckers R, Deneubourg JL, Goss S (1992) Trails and U-turns in the selection of the shortest path by the ant lasius niger. Theor Biol (159): 397\u2013415","DOI":"10.1016\/S0022-5193(05)80686-1"},{"issue":"1\u20132","key":"220_CR5","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/S0020-0255(98)10041-5","volume":"113","author":"F Bergadano","year":"1999","unstructured":"Bergadano F, Puliafito A, Riccobene S, Ruffo G (1999) Java-based and secure learning agents for information retrieval in distributed systems. Inf Sci 113(1\u20132):55\u201384","journal-title":"Inf Sci"},{"issue":"1","key":"220_CR6","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.1998.5340400","volume":"1","author":"A Bieszczad","year":"1998","unstructured":"Bieszczad A, Pagurek B, White T (1998) Mobile agents for network management. IEEE Commun Surv 1(1):2\u20139","journal-title":"IEEE Commun Surv"},{"key":"220_CR7","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/978-3-642-60018-0_19","volume-title":"Intelligent information agents: agents-based information discovery and management on the Internet","author":"B Brewington","year":"1999","unstructured":"Brewington B, Gray R, Moizumi K, Kotz D, Cybenko G, Rus D (1999) Mobile agents in distributed information retrieval. In: Klusch M (ed) Intelligent information agents: agents-based information discovery and management on the Internet. Springer, Berlin, pp 355\u2013395, Chapter 15"},{"issue":"6","key":"220_CR8","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/35.587723","volume":"35","author":"KL Calvert","year":"1997","unstructured":"Calvert KL, Doar MB, Zegura EW (1997) Modelling Internet topology. IEEE Commun Mag 35(6):160\u2013163","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"220_CR9","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/643477.643479","volume":"3","author":"J Claessens","year":"2003","unstructured":"Claessens J, Preneel B, Vandewalle J (2003) How can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ACM Trans Internet Technol 3(1):28\u201348","journal-title":"ACM Trans Internet Technol"},{"key":"220_CR10","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1613\/jair.530","volume":"9","author":"GD Caro","year":"1998","unstructured":"Caro GD, Dorigo M (1998) AntNet: distributed stigmergetic control for communications networks. J\u00a0Artif Intell Res 9:317\u2013365","journal-title":"J\u00a0Artif Intell Res"},{"key":"220_CR11","unstructured":"Caro GD, Dorigo M (1998) Mobile agents for adaptive routing. In: Proc of the 31st Hawaii int conf on system sciences, pp\u00a074\u201383"},{"issue":"1","key":"220_CR12","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1002\/nem.464","volume":"13","author":"K Curran","year":"2003","unstructured":"Curran K, Woods D, McDermot N, Bradley C (2003) The effects of badly behaved routers on Internet congestion. Int J Netw Manag 13(1):83\u201394","journal-title":"Int J Netw Manag"},{"issue":"1","key":"220_CR13","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/3477.484436","volume":"26","author":"M Dorigo","year":"1996","unstructured":"Dorigo M, Maniezzo V, Colorni A (1996) The ant system: optimization by a colony of cooperating agents. IEEE Trans Syst Man Cybern Part B 26(1):29\u201341","journal-title":"IEEE Trans Syst Man Cybern Part B"},{"issue":"7","key":"220_CR14","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1145\/792704.792710","volume":"46","author":"TC Du","year":"2003","unstructured":"Du TC, Li EY, Chang AP (2003) Mobile agents in distributed network management. Commun ACM 46(7):127\u2013132","journal-title":"Commun ACM"},{"key":"220_CR15","volume-title":"Computers and intractability: a guide to the theory of NP-completeness","author":"M Garey","year":"1979","unstructured":"Garey M, Johnson D (1979) Computers and intractability: a guide to the theory of NP-completeness. Freeman, New York"},{"key":"220_CR16","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1007\/BF00462870","volume":"79","author":"S Goss","year":"1989","unstructured":"Goss S, Aron S, Deneubourg JL, Pasteels JM (1989) Self-organized shortcuts in the Argentine ant. Naturwissenschaften 79:579\u2013581","journal-title":"Naturwissenschaften"},{"issue":"4","key":"220_CR17","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1109\/TKDE.2003.1209014","volume":"15","author":"M He","year":"2003","unstructured":"He M, Jennings NR, Leung H (2003) On agent-mediated electronic commerce. IEEE Trans Know Data Eng 15(4):985\u20131003","journal-title":"IEEE Trans Know Data Eng"},{"issue":"6","key":"220_CR18","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/5254.895863","volume":"15","author":"PS Heck","year":"2000","unstructured":"Heck PS, Ghosh S (2000) A study of synthetic creativity through behavior modeling and simulation of an ant colony. IEEE Intell Syst 15(6):58\u201366","journal-title":"IEEE Intell Syst"},{"key":"220_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-10306-7","volume-title":"The Ants","author":"B H\u0151lldobler","year":"1990","unstructured":"H\u0151lldobler B, Wilson EO (1990) The Ants. Springer, Berlin"},{"issue":"2","key":"220_CR20","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1145\/636865.636869","volume":"50","author":"DN Jayasimha","year":"2003","unstructured":"Jayasimha DN, Schwiebert L, Manivannan D, May JA (2003) A foundation for designing deadlock-free routing algorithms in wormhole networks. J ACM 50(2):250\u2013275","journal-title":"J ACM"},{"key":"220_CR21","unstructured":"Kim SH, Robertazzi TG (2000) Mobile agent modeling. SUNY at Stony Brook Technical Report 786"},{"issue":"3","key":"220_CR22","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/311124.311130","volume":"33","author":"D Kotz","year":"1999","unstructured":"Kotz D, Gray RW (1999) Mobile agents and the future of the Internet. ACM Oper Syst Rev 33(3):7\u201313","journal-title":"ACM Oper Syst Rev"},{"issue":"4","key":"220_CR23","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/4236.612220","volume":"1","author":"G Karjoth","year":"1997","unstructured":"Karjoth G, Lange D, Oshima M (1997) A security model for aglets. IEEE Internet Comput 1(4):68\u201377","journal-title":"IEEE Internet Comput"},{"key":"220_CR24","volume-title":"Programming and Developing Java Mobile Agents with Aglets","author":"D Lange","year":"1998","unstructured":"Lange D, Oshima M (1998) Programming and Developing Java Mobile Agents with Aglets. Addison-Wesley, Reading"},{"key":"220_CR25","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/295685.298136","volume":"42","author":"D Lange","year":"1999","unstructured":"Lange D, Oshima M (1999) Seven good reasons for mobile agents. Commun ACM 42:88\u201389","journal-title":"Commun ACM"},{"issue":"5","key":"220_CR26","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1109\/TNET.2002.803909","volume":"10","author":"Y Lee","year":"2002","unstructured":"Lee Y, Tien JM (2002) Static and dynamic approaches to modeling end-to end routing in circuit-switched networks. IEEE\/ACM Trans Netw 10(5):693\u2013705","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"2","key":"220_CR27","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TMC.2002.1038347","volume":"1","author":"W Lou","year":"2002","unstructured":"Lou W, Wu J (2002) On reducing broadcast redundancy in ad hoc wireless networks. IEEE Trans Mobile Comput 1(2):111\u2013123","journal-title":"IEEE Trans Mobile Comput"},{"issue":"3","key":"220_CR28","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/295685.295716","volume":"42","author":"P Maes","year":"1999","unstructured":"Maes P, Guttman RH, Moukas AG (1999) Agents that buy and sell. Commun ACM 42(3):81\u201391","journal-title":"Commun ACM"},{"issue":"2","key":"220_CR29","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MCC.2000.846190","volume":"8","author":"D Milojicic","year":"2000","unstructured":"Milojicic D (2000) Guest editor\u2019s introduction: agent systems and applications. IEEE Concurr 8(2):22\u201323","journal-title":"IEEE Concurr"},{"issue":"2","key":"220_CR30","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1109\/TC.2003.1176987","volume":"52","author":"S Pleisch","year":"2003","unstructured":"Pleisch S, Schiper A (2003) Fault-tolerant mobile agent execution. IEEE Trans Comput 52(2):209\u2013222","journal-title":"IEEE Trans Comput"},{"key":"220_CR31","unstructured":"Qu W, Shen H, Sum J (2003) New analysis on mobile agents based network routing. In: Proc of the 3rd int\u2019l conf on hybrid intelligent systems (HIS\u201903), pp\u00a0769\u2013778"},{"issue":"2","key":"220_CR32","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/506147.506153","volume":"49","author":"T Roughgarden","year":"2002","unstructured":"Roughgarden T, Tardos E (2002) How bad is selfish routing? J ACM 49(2):236\u2013259","journal-title":"J ACM"},{"key":"220_CR33","unstructured":"Sheldon T, Linktionary. http:\/\/www.linktionary.com\/"},{"issue":"1","key":"220_CR34","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/71.980024","volume":"13","author":"I Stojmenovic","year":"2002","unstructured":"Stojmenovic I, Seddigh S, Zunic J (2002) Domination sets and neighbor elimination based broadcasting algorithms in wireless networks. IEEE Trans Parallel Distrib Syst 13(1):14\u201325","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"220_CR35","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/TPDS.2003.1189578","volume":"14","author":"J Sum","year":"2003","unstructured":"Sum J, Shen H, Leung C, Young G (2003) Analysis on a mobile agent-based ant algorithm for network routing and management. IEEE Trans Parallel Distrib Syst 14(3):193\u2013202","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"220_CR36","doi-asserted-by":"crossref","unstructured":"Theilmann W, Rothermel K (2000) Optimizing the dissemination of mobile agents for distributed information filtering. IEEE Concurr, pp\u00a053\u201361","DOI":"10.1109\/4434.846194"},{"key":"220_CR37","unstructured":"Varga A, OMNeT++: Discrete Event Simulation System: User Manual. http:\/\/www.omnetpp.org\/"},{"key":"220_CR38","unstructured":"Webopedia Online Computer Dictionary for Computer and Internet Terms and Definitions. http:\/\/www.webopedia.com\/"},{"key":"220_CR39","unstructured":"White T, Pagurek B, Oppacher F, ASGA: improving the ant system by integration with genetic algorithms. In: Proc of the 3rd conf on genetic programming (GP\/SGA\u201998), pp\u00a0610\u2013617"},{"issue":"1","key":"220_CR40","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/TSE.2003.1166587","volume":"29","author":"D Xu","year":"2003","unstructured":"Xu D, Yin J, Deng Y, Ding J (2003) A formal architectural model for logical agent mobility. IEEE Trans Softw Eng 29(1):31\u201345","journal-title":"IEEE Trans Softw Eng"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-008-0220-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-008-0220-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-008-0220-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:23:57Z","timestamp":1559384637000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-008-0220-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,25]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["220"],"URL":"https:\/\/doi.org\/10.1007\/s11227-008-0220-2","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,7,25]]}}}