Institutional Repository | Ajayi Crowther University
Please use this identifier to cite or link to this item: https://repository.acu.edu.ng:443//handle/123456789/369
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOyediran, M. O-
dc.contributor.authorFagbola, T. M-
dc.contributor.authorOlabiyisi, S. O-
dc.contributor.authorOmidiora, E. O-
dc.contributor.authorFawole, A. O-
dc.date.accessioned2023-12-04T14:58:47Z-
dc.date.available2023-12-04T14:58:47Z-
dc.date.issued2016-06-09-
dc.identifier.urihttp://repository.acu.edu.ng:8080/jspui/handle/123456789/369-
dc.description.abstractMobile agent is a software object that migrates through many nodes of a heterogeneous network of computers under its own control in order to perform task using resources of these nodes, during the past several years, mobile agent has received significant attention. Not only in the wide range of commercial and law enforcement applications, but also the availability of feasible technologies, Although current migration process of mobile agent systems have reached a certain level of maturity, Autonomous migration of mobile agent is an area that has witnessed a lot of research activity and their development is still limited by the conditions brought about by many real applications. Several approaches have been proposed for the migration process of mobile agent. This paper provides an up-to date survey of migration process of mobile agent research. To present a comprehensive survey, we categorize existing mobile agent migration process approaches and present detailed descriptions of representative methods within each category with special focus on the soft computing approaches.en_US
dc.language.isoenen_US
dc.publisherProceedings of the World Congress on Engineering and Computer Scienceen_US
dc.subjectMobile agenten_US
dc.subjectMigrationen_US
dc.subjectItineraryen_US
dc.titleA Survey on Migration Process of Mobile Agenten_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Engineering

Files in This Item:
File Description SizeFormat 
Oyediran et al_2016b.pdf1.04 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.