Ant-based load balancing in telecommunications networks
Adaptive Behavior
Transportable information agents
AGENTS '97 Proceedings of the first international conference on Autonomous agents
Modeling ant navigation with an autonomous agent
Proceedings of the fifth international conference on simulation of adaptive behavior on From animals to animats 5
Co-operating mobile agents for distributed parallel processing
Proceedings of the third annual conference on Autonomous Agents
Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence
Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence
Agent Tcl: Targeting the Needs of Mobile Computers
IEEE Internet Computing
Enabling a Mobile Network Manager (MNM) Through Mobile Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
The organization of work in social insect colonies
Complexity - Special issue: Selection, tinkering, and emergence in complex networks
Mobile Agents for Adaptive Routing
HICSS '98 Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences-Volume 7 - Volume 7
Ant system: optimization by a colony of cooperating agents
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Nature-Inspired Computing Technology and Applications
BT Technology Journal
Human Identity in the Age of Software Agents
CT '01 Proceedings of the 4th International Conference on Cognitive Technology: Instruments of Mind
An Evolutionary Design Algorithm for Ring-based SDH optical core networks
BT Technology Journal
Hi-index | 0.00 |
Agents need resources and protection from hostile influences, in both natural and artificial environments. This paper specifically considers social insects and software mobile agent systems, in order to understand how the need for mobility, resource acquisition and security can influence the design and operation of agent systems. Evolution has honed the movement, resource-gathering and defensive skills of the social insects in a multitude of ways. The paper reviews some of these strategies and assesses whether they may provide useful insights into the design and implementation of mobile software agents. This process is necessary as current mobile agent systems have been handicapped by a lack of convincing security measures which has prevented their adoption in mainstream computing services.This paper therefore examines the strategies for movement, resource acquisition and defence adopted by the social insects and considers how they may be applied to enhance the design of mobile agents.