Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Code mobility
Known as:
Mobile code
In distributed computing, code mobility is the ability for running programs, code or objects to be migrated (or moved) from one machine or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Aglets
Code on demand
Computer program
Cross-cutting concern
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Mobile Agent Security Using Reference Monitor Based Security Framework
S. Armoogum
,
N. Mohamudally
,
N. Nissanke
International Conference on Emerging Security…
2015
Corpus ID: 63073611
: In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially…
Expand
2014
2014
Advanced Structural Health Monitoring Based on Multiagent Technology
K. Smarsly
,
K. Law
Computation for Humanity
2014
Corpus ID: 14597563
Highly Cited
2010
Highly Cited
2010
Scheduling and development support in the Scavenger cyber foraging system
Mads Darø Kristensen
,
N. Bouvin
Pervasive and Mobile Computing
2010
Corpus ID: 31834276
Highly Cited
2006
Highly Cited
2006
Intermediate-representation recovery from low-level code
T. Reps
,
Gogul Balakrishnan
,
Junghee Lim
ACM SIGPLAN Workshop on Partial Evaluation and…
2006
Corpus ID: 3244574
The goal of our work is to create tools that an analyst can use to understand the workings of COTS components, plugins, mobile…
Expand
2003
2003
Introducing New Internet Services : Why and How
P. Chouhan
2003
Corpus ID: 16379173
classes These are the classes that can only be used via subclasses that complete their implementation. They are denoted by the…
Expand
2002
2002
Certificates for mobile code security
H. K. Tan
,
L. Moreau
ACM Symposium on Applied Computing
2002
Corpus ID: 1802180
The problem of protecting mobile code from malicious hosts is an important security issue, for which many solutions have been…
Expand
2001
2001
The Case for Recombinant Computing
W. K. Edwards
,
Mark W. Newman
,
J. Sedivy
2001
Corpus ID: 7078049
Interoperability among a group of devices, applications, and services is typically pred icated on those entities having some…
Expand
Highly Cited
2000
Highly Cited
2000
Security Fundamentals for E-Commerce
V. Hassler
2000
Corpus ID: 154283898
Introduction to security security mechanisms key management and certificates electronic payment systems payment security services…
Expand
1999
1999
Intelligent mobile agents: towards network fault management automation
M. El-Darieby
,
A. Bieszczad
Integrated Network Management VI. Distributed…
1999
Corpus ID: 317060
Mobile agents, equipped with intelligence, provide a relatively new technology that will help automate network management…
Expand
1998
1998
Developing interactive educational engineering software for the world wide web with Java
John A. Reed
,
A. Afjeh
Comput. Educ.
1998
Corpus ID: 11629694
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE