Supercompilers for parallel and vector computers
Supercompilers for parallel and vector computers
Efficiently computing static single assignment form and the control dependence graph
ACM Transactions on Programming Languages and Systems (TOPLAS)
PLDI '93 Proceedings of the ACM SIGPLAN 1993 conference on Programming language design and implementation
Accurate static branch prediction by value range propagation
PLDI '95 Proceedings of the ACM SIGPLAN 1995 conference on Programming language design and implementation
Call graph construction in object-oriented languages
Proceedings of the 12th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Reducing transfer delay using Java class file splitting and prefetching
Proceedings of the 14th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
A framework for call graph construction algorithms
ACM Transactions on Programming Languages and Systems (TOPLAS)
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
Towards autonomous mobile agents with emergent migration behaviour
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Hi-index | 0.00 |
Mobile agents were introduced as a new design paradigm for distributed systems. One advantage of mobile agents is to reduce network traffic as compared to the client-server paradigm, simply by moving code close to the data instead of moving large amount of data to the client. Unfortunately, many mobile agent toolkit suffer from to simple migration techniques. Therefore, we argue in this paper for an new migration technique that supports an adaptive decision on the code and data relocation technique. We propose several techniques for code analysis and alteration and present an algorithm to determine the optimal migration strategy within this model under the assumption of full knowledge about the application and network environment.