Abstract
This paper is researched to design agent for the progress management. And this paper is intended to help the design agent and progress management based on the project management. Also, there are many defects that cause the domain problems during the project development. This paper remove the risk of the lifecycle and progress management that check the risk items in the process and also manage the progress and quality problems. Therefore, we are use of the incremental method for the remove of risk items. The analysis is made based on the types required for making use of the defect data. In this case, additional measures must be taken besides merely recording defects. And the theory is apply to the agent web security access control system for the security requirement. This paper provides an design of intelligence agent for the progress management. And the process can also be managed by using lifecycle and progress milestone, which can greatly improve the software process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ISO/IEC 15408-1,2,3:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model
The Report of the President’s Commission on Critical Infrastructure Protection CCEB (Common Criteria Editorial Board), Common Criteria for Information Technology Security Evaluation, Version 2.0 (May 1998)
DOD (U.S. Department of Defense), Trusted Computer System Evaluation Criteria, DOD5200.28-STD, December 1985. 1.0 (December 1992)
ISO/IEC Guide 65—General Requirements for Bodies Operating Product Certification Systems (1996)
Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94–10 (September 1991)
Boehm, B.: Software Risk Management. IEEE Computer Society Press, Los Alamitos (1989)
Boehm, B., Egyed, A., Kwan, J., Madachy, R.: Developing Multimedia Applications with the WinWin Spiral Model. In: Jazayeri, M. (ed.) ESEC 1997 and ESEC-FSE 1997. LNCS, vol. 1301, pp. 20–39. Springer, Heidelberg (1997)
Boehm, B., Bose, P.: A Collaborative Spiral Process Model Based on Theory W. In: Proceedings, ICSP3, IEEE (1994)
Lee, E.-S., Hwang, S.-M.: Definition of Security Requirement Items and Its Process to Security and Progress Management. In: Intelligent Control and Automation. LNCIS, vol. 344, Springer, Heidelberg (August 2006)
Lee, E.-S., Hwang, S.-M.: Design Implementation of Web Security Access Control System for Semantic Web Ontoloty. In: Intelligent Control and Automation. LNCIS, vol. 344, pp. 1090–1095. Springer, Heidelberg (2006)
Lee, E.-S., Lee, M.: Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement. In: Intelligent Control and Automation. LNCIS, vol. 344, Springer, Heidelberg (2006)
Lee, E.-s., Lee, S.-H.: Design Progress Management for Security Requirements in Ubiquitous Computing Using COQUALMO. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, pp. 555–564. Springer, Heidelberg (2006)
Pressman, R.S.: Software Engineering. McGraw-Hill, New York (1997)
Cho, N.-d., Lee, E.-s.: Design and implementation of semantic web search system using ontology and anchor text. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, pp. 546–554. Springer, Heidelberg (2006)
Luger, G.F.: Artificial intelligence. Addison-Wesley, Reading (2001)
Lawrence, S.: Software engineering. Prentice-Hall, Englewood Cliffs (2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, Hk., Hwang, SM., Lee, ES. (2007). Design of Intelligence Mobile Agent Lifecycle for the Progress Management and Mobile Computing. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2007. Lecture Notes in Computer Science(), vol 4496. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72830-6_75
Download citation
DOI: https://doi.org/10.1007/978-3-540-72830-6_75
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72829-0
Online ISBN: 978-3-540-72830-6
eBook Packages: Computer ScienceComputer Science (R0)