{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,13]],"date-time":"2025-04-13T04:53:25Z","timestamp":1744520005552},"reference-count":32,"publisher":"Elsevier BV","issue":"2-3","license":[{"start":{"date-parts":[[1999,7,1]],"date-time":"1999-07-01T00:00:00Z","timestamp":930787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[1999,7]]},"DOI":"10.1016\/s0164-1212(99)00027-8","type":"journal-article","created":{"date-parts":[[2003,4,5]],"date-time":"2003-04-05T02:09:52Z","timestamp":1049508592000},"page":"75-87","source":"Crossref","is-referenced-by-count":21,"title":["Intelligent mobile agents in large distributed autonomous cooperative systems"],"prefix":"10.1016","volume":"47","author":[{"given":"Johnny S.K.","family":"Wong","sequence":"first","affiliation":[]},{"given":"Armin R.","family":"Mikler","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0164-1212(99)00027-8_BIB1","unstructured":"Baumann, J., 1995. Agents: A triptychon of problems. In: Proceedings of the ECOOP '95 Workshop. Objects and Agents: Love at First Sight or a Shotgun-Wedding?"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB2","doi-asserted-by":"crossref","unstructured":"Berkovits, S., Guttman, J., Swarup, V., 1998. Authentication for Mobile Agents. In: Mobile Agents and Security LNCS 1419, pp. 114\u2013136","DOI":"10.1007\/3-540-68671-1_7"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB3","unstructured":"Bradshaw, J.M., 1997. Software Agents, AAAI Press, Menlo Park, California\/The MIT. Massachusetts Institute of Technology, Cambridge, Massachusetts and London, UK"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB4","doi-asserted-by":"crossref","unstructured":"Chavez, A., Moukas, G.A, Maes, P., 1997. Challenger: A multi-agent system for distributed resource allocation. In: Proceedings of the International Conference on Autonomous Agents, Marina Del Ray, California","DOI":"10.1145\/267658.267736"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB5","unstructured":"Chow, R., Johnson, T., 1997. Distributed Operating Systems and Algorithms. Addison-Wesley, Longman"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB6","unstructured":"Crosbie, M., Spafford, G., 1995. Defending a computer system using autonomous agents. In: Proceedings of the 18th National Information Systems Security Conference"},{"issue":"2","key":"10.1016\/S0164-1212(99)00027-8_BIB7","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/4434.678787","article-title":"Tunnel agents for enhanced internet QoS","volume":"6","author":"de Meer","year":"1998","journal-title":"IEEE Concurrency"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB8","unstructured":"Farmer, W., Guttman, J., Swarup, V., 1996. Security for mobile agents: Issues and requirements. In: National Information Systems Security Conference. National Institute of Standards and Technology"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB9","unstructured":"Havaldar, R., Wong, J., 1998. Jamba: A Secure Framework for Distributed Computing Systems, Submitted for publication"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB10","doi-asserted-by":"crossref","unstructured":"Helmer, G., Wong, J., Honavar, V., Miller, L., 1998. Intelligent agents for intrusion detection. IEEE Information Technology Conference, Syracuse, New York, pp. 121\u2013124","DOI":"10.1109\/IT.1998.713396"},{"issue":"3","key":"10.1016\/S0164-1212(99)00027-8_BIB11","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1017\/S026988890000789X","article-title":"Software agents: An overview","volume":"11","author":"Nwana","year":"1996","journal-title":"Knowledge Engineering Review"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB12","first-page":"275","article-title":"A roadmap of agent research and development","volume":"1","author":"Jenning","year":"1998","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB13","doi-asserted-by":"crossref","unstructured":"Jenning, N., Wooldridge, M., 1998. Applying agent technology. In: Jenning, N., Wooldridge, M. (Eds.), Agent Technology: Foundations, Applications and Markets. Springer, Berlin, Germany","DOI":"10.1007\/978-3-662-03678-5"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB14","doi-asserted-by":"crossref","unstructured":"Krause, S., 1997. MAGNA\u2013A DPE-based Platform for Mobile Agents in Electronic Service Markets. In: The Proceedings of the Third International Symposium on Autonomous Decentralized Systems (ISADS '97)","DOI":"10.1109\/ISADS.1997.590608"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB15","unstructured":"Luce, R.D., Raiffa, H., 1985. Games and Decisions. Dover Publications, New York"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB16","unstructured":"Lynch, N.A., 1996. Distributed Algorithms. Morgan Kaufmann Publishers, San Francisco, California"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB17","doi-asserted-by":"crossref","unstructured":"Maes, P., 1994. Modeling adaptive autonomous agents. Artificial Life Journal 1 (1\/2), MIT Press, Cambridge, MA","DOI":"10.1162\/artl.1993.1.1_2.135"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB18","doi-asserted-by":"crossref","unstructured":"Magendanz, T., Rothermel, K., Krause, S., 1996. Intelligent agents: an emerging technology for next generation telecommunications? Proceedings of INFOCOM '96, San Francisco, California, pp. 24\u201328","DOI":"10.1109\/INFCOM.1996.493313"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB19","unstructured":"Mikler, A.R., Honavar, V.G., Wong, J.S.K., 1996. Analysis of utility-Theoretic heuristics for intelligent adaptive network routing. In: Proceedings of the International Conference on Artificial Intelligence Portland, Oregon, vol. 1, pp. 96\u2013102"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB20","doi-asserted-by":"crossref","unstructured":"Minar, N.N., Kramer, K.H., Maes, P., 1998. Cooperating Mobile Agents for Mapping Networks. In: Proceedings of the First Hungarian National Conference on Agent Based Computing","DOI":"10.1007\/978-3-642-58418-3_12"},{"issue":"8","key":"10.1016\/S0164-1212(99)00027-8_BIB21","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MC.1998.707613","article-title":"Active networks: The programmable pipeline","volume":"31","author":"Ortiz","year":"1998","journal-title":"IEEE Computer"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB22","unstructured":"Pearl, J., 1984. Heuristics: Intelligent Search Strategies for Computer Problem Solving. Addison-Wesley, Reading, MA"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB23","unstructured":"Rosenschein, J.S., Zlotkin, G., 1994. Rules of Encounter. The MIT Press, Cambridge, MA"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB24","unstructured":"Rothermel, K., Baumann, J., 1997. Mobile Software-Agenten: Chancen und Risiken, Internet \u2013 von der Grundlagentechnologie zum Wirtschaftsfaktor, dpunkt-Verlag"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB25","unstructured":"Sargent, P., 1998. Back to school for a brand new ABC. In: The Guardian, 12 March 1992, p. 28"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB26","unstructured":"Schelen, O., Pink, S., 1998. Resource reservation agents in the internet. In: Proceedings of Eighth International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV '98). Cambridge, UK"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB27","doi-asserted-by":"crossref","unstructured":"Schelen, O., Pink, S., 1997. An Agent-based Architecture for Advance Reservations. In: Proceedings of IEEE 22nd Annual Conference on Computer Networks (LCN '97), Minneapolis","DOI":"10.1109\/LCN.1997.631014"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB28","unstructured":"Smith, E.J., 1998. Interview with David Tennenhouse DARPA. Computing Research News 10 (3)"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB29","doi-asserted-by":"crossref","unstructured":"Tennenhouse, D.L., Wetherall, D., 1996. Towards an active network architecture. In: Proceedings of Multimedia Computing and Networking, San Jose, CA","DOI":"10.1145\/231699.231701"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB30","unstructured":"Treese, G., 1988. Berkeley UNIX on 1000 Workstations: Athena Changes to 4.3BSD. In: Proceedings of the 1988 Winter USENIX Conference, Dallas, TX, pp. 175\u2013182"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB31","unstructured":"van Doorn, L., 1994. nfsbug.c, Available online at http:\/\/www.asmodeus.com\/archive\/Xnix\/nfsbug\/nfsbug.c"},{"key":"10.1016\/S0164-1212(99)00027-8_BIB32","doi-asserted-by":"crossref","unstructured":"Wooldridge, M., Jennings, N.R., 1998. Pitfalls of agent-oriented development. In: Proceedings of the Autonomous Agents 98 Conference, Minneapolis, pp. 385\u2013391","DOI":"10.1145\/280765.280867"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121299000278?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121299000278?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T21:38:53Z","timestamp":1580247533000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121299000278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,7]]},"references-count":32,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[1999,7]]}},"alternative-id":["S0164121299000278"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(99)00027-8","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[1999,7]]}}}