1 - 6
- Braun, Peter, Dr.
- San Francisco, CA : Elsevier : Morgan Kaufmann ; Heidelberg : Dpunkt.verlag, ©2005.
- Description
- Book — 1 online resource (xxi, 441 pages) : illustrations
- Summary
-
- Part I Motivation for and Introduction to Mobile Agents
- 1 Designing Innovative Distributed Systems
- 2 From Client-Server to Mobile Agents
- Part II Mobile Agents Concepts, Functions, and Possible Problems
- 3 Mobile Agent Migration
- 4 Mobile Agent Communication
- 5 Mobile Agent Security
- Part III The Kalong Mobility Model Specification and Implementation
- Chapter 6 Specifications of the Kalong Mobility Model
- Chapter 7 Using Kalong
- Chapter 8 Evaluation
- Part IV The Tracy Mobile Agent Toolkit
- Chapter 9 Running a Tracy Agency
- Chapter 10 Programming Agents with Tracy
- Bibliography
- Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Braun, Peter, Dr.
- San Francisco, CA : Elsevier : Morgan Kaufmann ; Heidelberg : Dpunkt.verlag, ©2005.
- Description
- Book — 1 online resource (xxi, 441 pages) : illustrations
- Summary
-
- Part I Motivation for and Introduction to Mobile Agents
- 1 Designing Innovative Distributed Systems
- 2 From Client-Server to Mobile Agents
- Part II Mobile Agents Concepts, Functions, and Possible Problems
- 3 Mobile Agent Migration
- 4 Mobile Agent Communication
- 5 Mobile Agent Security
- Part III The Kalong Mobility Model Specification and Implementation
- Chapter 6 Specifications of the Kalong Mobility Model
- Chapter 7 Using Kalong
- Chapter 8 Evaluation
- Part IV The Tracy Mobile Agent Toolkit
- Chapter 9 Running a Tracy Agency
- Chapter 10 Programming Agents with Tracy
- Bibliography
- Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Hoboken, N.J. : Wiley-Interscience, 2012.
- Description
- Book — 1 online resource (xiii, 331 pages) : illustrations Digital: data file.
- Summary
-
- FOREWORD ix PREFACE xi CONTRIBUTORS xiii PART I INTRODUCTION 1
- 1 Mobile Agents and Applications in Networking and Distributed Computing 3 PART II PRINCIPLES OF APPLYING MOBILE AGENTS 17
- 2 Mobile Agent Communications 19
- 3 Distributed Security Algorithms for Mobile Agents 41
- 4 Mobile Agent Coordination 71
- 5 Cooperating Mobile Agents 93 PART III MOBILE AGENT BASED TECHNIQUES AND APPLICATIONS 127
- 6 Network Routing 129
- 7 Resource and Service Discovery 161
- 8 Distributed Control 189
- 9 Distributed Databases and Transaction Processing 219
- 10 Mobile Agents in Mobile and Wireless Computing 243 PART IV DESIGN AND EVALUATION 263
- 11 Naplet: Microkernel and Pluggable Design of Mobile Agent Systems 265
- 12 Performance Evaluation of Mobile Agent Platforms and Comparison with Client--Server Technologies 299 Index 323.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
4. Apple Configurator 2 [2016]
- Valencia, Samuel, speaker.
- [Place of publication not identified] : Peachpit, [2016]
- Description
- Video — 1 online resource (1 streaming video file (56 min., 22 sec.)) : digital, sound, color
- Summary
-
"Learn the basic concepts behind Apple Configurator and the types of devices it supports. Discover the new concept of Blueprints and working with MDM and DEP. For those users that have worked with Apple Configurator 1 before, you'll learn the steps to migrate your data to the current version. Learn to set up a clean Apple Configurator 2 workstation, discover what a Supervision Identity is, and create an organization. Customize the preferences and look and feel of Apple Configurator 2. Learn how to "prepare" an iOS device and export data. Also, discover options in the advanced menu. Learn to create a new Blueprint, create profiles and add Apps, and create prepare steps. This will allow you to have a template to use when you connect an unsupervised iOS device. In this video, learn about Supervising devices as you create Blueprints for devices that will allow for additional management features. You might find yourself using Apple Configurator 2 as an initial preparation method but using an MDM for continual management. In this lesson you'll see how to get the best of both worlds by having AC2 auto enroll your devices in an MDM solution. Apple's introduction of the Device Enrollment Program has allowed for much easier deployment of iOS devices. Apple Configurator 2 has the ability to work with DEP as well. Not everything can be done in the GUI (Graphical User Interface). More often than not, more advanced tools are available in UNIX. This video uncovers some of those tools and explains how to use them. Ever wanted to stop Photos from popping up every time you plug in a device? Or are you receiving an error you can't explain when trying to prepare? Learn how to make changes to AC2 under the hood that can help you be more efficient."--Resource description page.
- Kranakis, Evangelos.
- Cham, Switzerland : Springer, ©2010.
- Description
- Book — 1 online resource (xvi, 106 pages) : illustrations (some color)
- Summary
-
- 1. Models for mobile agent computing
- Introduction
- What is a mobile agent
- Why mobile agents
- An algorithmic model for mobile agents
- Mobile agents
- Distributed networks
- Resource measures
- Mobile agent rendezvous
- Outline of the book
- Comments and bibliographic remarks.
- 2. Deterministic rendezvous in a ring
- Introduction
- A single stationary token
- The feasibility of rendezvous
- The time complexity of rendezvous
- Memory tradeoff for rendezvous with detection
- Limits to the memory trade-off
- Movable tokens
- Comments and bibliographic remarks.
- 3. Multiple agent rendezvous in a ring
- Introduction
- Impossibility of rendezvous
- Rendezvous with detection
- Conditional solutions
- Comments and bibliographic remarks.
- 4. Randomized rendezvous in a ring
- Introduction
- Random walk algorithm
- Randomization and tokens
- Time/memory trade-offs
- Coin half tour algorithm
- Approximate counting algorithm
- Comments and bibliographic remarks.
- 5. Other models
- Introduction
- Leader election and rendezvous
- Rendezvous with failing tokens
- Rendezvous when tokens fail upon release
- Rendezvous when tokens can fail at any time
- The cost of token failure
- Flickering tokens
- Asynchronous rendezvous
- Look-compute-move
- Model and terminology
- Impossibility results
- Gathering configurations with a single multiplicity
- Gathering rigid configurations
- Gathering an odd number of robots
- Dangerous networks
- Black-hole search in an asynchronous ring
- Rendezvous in asynchronous rings in spite of a black-hole
- Comments and bibliographic remarks.
- 6. Other topologies
- Introduction
- Synchronous torus
- Memory lower bounds for rendezvous
- Rendezvous algorithms
- Trees
- Arbitrary graphs
- Comments and bibliographic remarks.
- Bibliography
- Glossary
- Authors' biographies
- Index.
- Kingaby, Simon A.
- Berkeley, CA : Apress L. P., 2021.
- Description
- Book — 1 online resource (425 p.)
- Summary
-
- Part I: Getting Started
- Chapter 1: Voice User Interfaces
- Chapter 2: Routines and Blueprints
- Chapter 3: The Developer Accounts
- Chapter 4: Creating the VUI for a Custom Data-driven Skill
- Chapter 5: Writing the Back-end Code
- Chapter 6: Publishing an Alexa Skill
- Part II: Custom Skill Development
- Chapter 7: Custom Alexa Skills
- Chapter 8: Beyond Hello World
- Chapter 9: Configuring the VUI
- Chapter 10: Using APL to Present on Screens
- Chapter 11: Coding the Lambda Function
- Chapter 12: Unit Testing an Alexa Skill
- Chapter 13: Storing the Data
- Part III: Using APIs in Advanced Skills
- Chapter 14: A Personal Net Worth Skill
- Chapter 15: The Real Estate API
- Chapter 16: The Stock Market API
- Chapter 17: What's Next?
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.