Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications
The emergence of Metaverse, a digital environment built on Web 3.0 technologies, has
garnered significant attention from various industries and fields, including science and …
garnered significant attention from various industries and fields, including science and …
Searching for a black hole in arbitrary networks: Optimal mobile agents protocols
Consider a networked environment, supporting mobile agents, where there is a black hole: a
harmful host that disposes of visiting agents upon their arrival, leaving no observable trace …
harmful host that disposes of visiting agents upon their arrival, leaving no observable trace …
Message authorization
AT Emigh, JA Roskind - US Patent 8,645,697, 2014 - Google Patents
(60) Provisional application No. 60/493,991, filed on Aug. 3229 R 1658 MEs al. 8, 2003,
provisional application No. 60/518,382, filed 6,484.197 B1 1 1/2002 Donohue on Nov. 7 …
provisional application No. 60/518,382, filed 6,484.197 B1 1 1/2002 Donohue on Nov. 7 …
Black hole search in directed graphs
We consider the problem of cooperative network exploration by agents under the
assumption that there is a harmful host present in the network that destroys the incoming …
assumption that there is a harmful host present in the network that destroys the incoming …
Mobile agent watermarking and fingerprinting: tracing malicious hosts
Mobile agents are software entities consisting of code and data that can migrate
autonomously from host to host executing their code. Despite its benefits, security issues …
autonomously from host to host executing their code. Despite its benefits, security issues …
Adaptation of proxy certificates to non-repudiation protocol of agent-based mobile payment systems
Non-repudiation of a mobile payment transaction ensures that when a buyer (B) sends some
messages to a seller (S), neither B nor S can deny having participated in this transaction. An …
messages to a seller (S), neither B nor S can deny having participated in this transaction. An …
Secure brokerage mechanisms for mobile electronic commerce
The possibility of making the Internet accessible via mobile devices has generated an
important opportunity for electronic commerce. Nevertheless, some deficiencies deter a …
important opportunity for electronic commerce. Nevertheless, some deficiencies deter a …
Cycling through a dangerous network: a simple efficient strategy for black hole search
In this paper we consider a dangerous process located at a node of a network (called Black
Hole) and a team of mobile agents deployed to locate that node. The nature of the danger is …
Hole) and a team of mobile agents deployed to locate that node. The nature of the danger is …
Punishing manipulation attacks in mobile agent systems
Mobile agents are software entities consisting of code, data and state that can migrate
autonomously from host to host performing some actions on behalf of a user. Unfortunately …
autonomously from host to host performing some actions on behalf of a user. Unfortunately …
Implementation of a mobile agent platform based on web services
IE Foukarakis, AI Kostaridis, CG Biniaris… - Mobile Agents for …, 2003 - Springer
This paper proposes a framework that allows a convenient and flexible implementation of a
mobile agent platform. We present an architecture that integrates the mobile agent …
mobile agent platform. We present an architecture that integrates the mobile agent …