{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T06:40:19Z","timestamp":1736750419284,"version":"3.32.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SCI CHINA SER F"],"published-print":{"date-parts":[[2006,12]]},"DOI":"10.1007\/s11432-006-2032-4","type":"journal-article","created":{"date-parts":[[2007,1,25]],"date-time":"2007-01-25T11:34:18Z","timestamp":1169724858000},"page":"885-905","source":"Crossref","is-referenced-by-count":1,"title":["Mobile agent-enabled framework for structuring and building distributed systems on the internet"],"prefix":"10.1007","volume":"49","author":[{"given":"Jiannong","family":"Cao","sequence":"first","affiliation":[]},{"given":"Jingyang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Weiwei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xuhui","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"2032_CR1","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/295685.298136","volume":"42","author":"D. B. Lange","year":"1999","unstructured":"Lange D B, Oshima M. Seven good reasons for mobile agents. Communication of the ACM, 1999, 42(3): 88\u201389","journal-title":"Communication of the ACM"},{"issue":"7","key":"2032_CR2","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/35.689628","volume":"36","author":"V. A. Pham","year":"1998","unstructured":"Pham V A, Karmouch A. Mobile software agents: An overview. IEEE Communications, 1998, 36(7): 26\u201337","journal-title":"IEEE Communications"},{"key":"2032_CR3","doi-asserted-by":"crossref","unstructured":"Funfrocken S. Integrating Java-based mobile agents into web servers under security concerns. In: Proceedings of 31st Hawaii International Conference on System Sciences (HICSS31), 1998, 34\u201343","DOI":"10.1109\/HICSS.1998.649164"},{"key":"2032_CR4","unstructured":"Cao J N, Chan G H, Jia W, et al. Checkpointing and rollback of wide-area distributed applications using mobile agents, In Proceedings of 15th International Parallel and Distributed Processing Symposium, 2001, 1\u20136"},{"issue":"10","key":"2032_CR5","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1016\/S0743-7315(03)00099-6","volume":"63","author":"J. N. Cao","year":"2003","unstructured":"Cao J N, Sun Y, Wang X, et al. Scalable load balancing on distributed web servers using mobile agents. Journal of Parallel and Distributed Computing (Elsevier Science), 2003, 63(10): 996\u20131005","journal-title":"Journal of Parallel and Distributed Computing (Elsevier Science)"},{"key":"2032_CR6","first-page":"138","volume":"2535","author":"J. N. Cao","year":"2002","unstructured":"Cao J N, Wang X B, Wu J. A mobile agent enabled fully distributed mutual exclusion algorithm. In: Proceedings of 6th IEEE International Conference on Mobile Agents (MA\u201902), Barcelona, LNCS, 2002, 2535: 138\u2013153","journal-title":"Proceedings of 6th IEEE International Conference on Mobile Agents (MA\u201902), Barcelona, LNCS"},{"issue":"11","key":"2032_CR7","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/2.43525","volume":"22","author":"M. Singhal","year":"1989","unstructured":"Singhal M. Deadlock detection in distributed systems. IEEE Computer, 1989, 22(11): 37\u201348","journal-title":"IEEE Computer"},{"issue":"4","key":"2032_CR8","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1145\/45075.46163","volume":"19","author":"E. Knapp","year":"1987","unstructured":"Knapp E. Deadlock detection in distributed databases. ACM Computing Surveys, 1987, 19(4): 303\u2013328","journal-title":"ACM Computing Surveys"},{"key":"2032_CR9","doi-asserted-by":"crossref","unstructured":"Bracha G, Toueg S. A distributed algorithm for generalized deadlock detection. Tech Rep TR, Cornell University, Ithaca, N.Y., 1983. 83\u2013558","DOI":"10.1145\/800222.806756"},{"issue":"2","key":"2032_CR10","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1145\/357360.357365","volume":"1","author":"K. M. Chandy","year":"1983","unstructured":"Chandy K M, Misra J, Haas L M. Distributed deadlock detection. ACM Transaction on Computer Systems, 1983, 1(2): 144\u2013156","journal-title":"ACM Transaction on Computer Systems"},{"key":"2032_CR11","doi-asserted-by":"crossref","unstructured":"Chen S G, Deng Y, Attie P, et al. Optimal deadlock detection in distributed systems based on locally constructed wait-for graphs. In: Proceedings of the 16th International Conference on Distributed Computing Systems, 1996. 613\u2013619","DOI":"10.1109\/ICDCS.1996.508012"},{"issue":"10","key":"2032_CR12","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1109\/32.6189","volume":"14","author":"A. K. Elmagarmid","year":"1988","unstructured":"Elmagarmid A K, Soundararajan N, Liu M T. A distributed deadlock detection and resolution algorithm and its correctness proof. IEEE Transactions on Software Engineering, 1988, 14(10): 1443\u20131452","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"2032_CR13","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s007780050075","volume":"8","author":"N. Krivokapic","year":"1999","unstructured":"Krivokapic N, Kemper A, Gudes E. Deadlock detection in distributed database systems: A new algorithm and a comparative performance analysis. The VLDB Journal, 1999, 8(2): 79\u2013100","journal-title":"The VLDB Journal"},{"issue":"1","key":"2032_CR14","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/32.263754","volume":"20","author":"A. D. Kshemkalyani","year":"1994","unstructured":"Kshemkalyani A D, Singhal M. Efficient detection and resolution of generalized distributed deadlocks. IEEE Transactions on Software Engineering, 1994, 20(1): 43\u201354","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2032_CR15","unstructured":"Lee S, Kim J L. An efficient distributed deadlock detection algorithm. In: Proceedings of the 15th International Conference on Distributed Computing Systems, 1995. 169\u2013178"},{"key":"2032_CR16","doi-asserted-by":"crossref","unstructured":"Mayo J, Kearns P. Distributed deadlock detection and resolution based on hardware clocks. In: Proceedings of 19th IEEE International Conference on Distributed Computing Systems, 1999, 208\u2013215","DOI":"10.1109\/ICDCS.1999.776522"},{"key":"2032_CR17","doi-asserted-by":"crossref","unstructured":"Mitchell D P, Merritt M J. A distributed algorithm for deadlock detection and resolution. In: Proceedings of the ACM Symposium on Principles of Distributed Computing, New York, USA, 1984. 282\u2013284","DOI":"10.1145\/800222.806755"},{"issue":"2","key":"2032_CR18","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/319702.319717","volume":"7","author":"R. Obermarck","year":"1982","unstructured":"Obermarck R. Distributed deadlock detection algorithm. ACM Transactions on Database Systems, 1982, 7(2): 187\u2013208","journal-title":"ACM Transactions on Database Systems"},{"issue":"8","key":"2032_CR19","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1109\/TPDS.2003.1225056","volume":"14","author":"J. M. M. Rubio","year":"2003","unstructured":"Rubio J M M, Lopez P, Duato J. FC3D: flow control-based distributed deadlock detection mechanism for true fully adaptive routing in wormhole networks. IEEE Transactions on Parallel and Distributed Systems, 2003, 14(8): 765\u2013779","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"2032_CR20","unstructured":"Young M K, Ten H L, Soudarajan N. Efficient distributed deadlock detection and resolution using probes, tokens, and barriers. In: Proceedings of 1999 International Conference on Parallel and Distributed Systems, 1997. 584\u2013591"},{"issue":"4","key":"2032_CR21","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/69.940736","volume":"13","author":"S. Lee","year":"2001","unstructured":"Lee S, Kim J L. Performance analysis of distributed deadlock detection algorithms. IEEE Transaction on Knowledge and Data Engineering, 2001, 13(4): 623\u2013636","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"key":"2032_CR22","doi-asserted-by":"crossref","unstructured":"Min K O, Belford G G. Workload analysis for performance study of distributed deadlock detection algorithms. In: Proceedings of the Eighth Symposium on Reliable Distributed Systems, 1989. 104\u2013111","DOI":"10.1109\/RELDIS.1989.72754"},{"key":"2032_CR23","doi-asserted-by":"crossref","unstructured":"Bukhres O. Performance comparison of distributed deadlock detection algorithms. In: Proceedings of Eighth IEEE International Conference on Data Engineering, 1992. 210\u2013217","DOI":"10.1109\/ICDE.1992.213190"},{"issue":"6","key":"2032_CR24","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1109\/12.53595","volume":"39","author":"S. C. Shyu","year":"1990","unstructured":"Shyu S C, Li V O K. Performance analysis of static locking in distributed database systems. IEEE Transaction on Computers, 1990, 39(6): 741\u2013751","journal-title":"IEEE Transaction on Computers"},{"key":"2032_CR25","doi-asserted-by":"crossref","unstructured":"Choudhary A N. Cost of distributed deadlock detection: A performance study. In: Proceedings the 6th International Conference on Data Engineering, 1990. 174\u2013181","DOI":"10.1109\/ICDE.1990.113467"},{"key":"2032_CR26","doi-asserted-by":"crossref","unstructured":"Baldeschwidler J, Blumofe R, Brewer E. Atlas: An infrastructure for global computing. In: Proceedings of the 7th ACMSIGOPS European Workshop: Systems Support for Worldwide Applications, 1996","DOI":"10.1145\/504450.504482"},{"key":"2032_CR27","doi-asserted-by":"crossref","unstructured":"Brecht T, Sandhu H, Shan M, et al. ParaWeb: Towards worldwide supercomputing. In: Proceedings of the 7th ACMSIGOPS European Workshop: Systems Support for Worldwide Applications, 1996. 181\u2013188","DOI":"10.1145\/504450.504484"},{"issue":"11","key":"2032_CR28","doi-asserted-by":"crossref","first-page":"1139","DOI":"10.1002\/(SICI)1096-9128(199711)9:11<1139::AID-CPE349>3.0.CO;2-K","volume":"9","author":"B. Christiansen","year":"1997","unstructured":"Christiansen B, et al. Javalin: Internet-based parallel computing using Java, Concurrency. Practice and Experience, 1997, 9(11): 1139\u20131160","journal-title":"Practice and Experience"},{"key":"2032_CR29","doi-asserted-by":"crossref","unstructured":"Nisan N, London S, Regev O, et al. Globally distributed computation over the Internet \u2014 The Popcorn project. In: Proceedings of the 18th Intern Conf on Distributed Computing Systems, 1998. 592\u2013601","DOI":"10.1109\/ICDCS.1998.679836"},{"key":"2032_CR30","doi-asserted-by":"crossref","unstructured":"Xu C Z, Wims B. A mobile agent based push methodology for global parallel computing. Practice and Experience, 2000","DOI":"10.1002\/1096-9128(200007)12:8<705::AID-CPE506>3.0.CO;2-X"},{"key":"2032_CR31","unstructured":"Badrinath B R, Acharya A, Imielinski T. Impact of mobility on distributed computations. Technical Report, Department of Computer Science, Rutgers University, 1995"},{"key":"2032_CR32","unstructured":"Fukuda M, Bic L F, Dillencourt M B, et al. Messengers: distributed computing using mobile autonomous objects. Inform Sci, 1997"},{"key":"2032_CR33","volume-title":"Distributed System Design","author":"J. Wu","year":"1999","unstructured":"Wu J. Distributed System Design. USA: CRC Press, 1999"},{"issue":"4","key":"2032_CR34","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1145\/45075.46163","volume":"19","author":"E. Knapp","year":"1987","unstructured":"Knapp E. Deadlock detection in distributed databases. ACM Comput Sur, 1987, 19(4): 303\u2013328","journal-title":"ACM Comput Sur"}],"container-title":["Science in China Series F: Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-006-2032-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-006-2032-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-006-2032-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T05:53:15Z","timestamp":1736747595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-006-2032-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12]]},"references-count":34,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["2032"],"URL":"https:\/\/doi.org\/10.1007\/s11432-006-2032-4","relation":{},"ISSN":["1009-2757","1862-2836"],"issn-type":[{"type":"print","value":"1009-2757"},{"type":"electronic","value":"1862-2836"}],"subject":[],"published":{"date-parts":[[2006,12]]}}}