Skip to main content

Design of Intelligence Mobile Agent Lifecycle for the Progress Management and Mobile Computing

  • Conference paper
Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4496))

  • 784 Accesses

Abstract

This paper is researched to design agent for the progress management. And this paper is intended to help the design agent and progress management based on the project management. Also, there are many defects that cause the domain problems during the project development. This paper remove the risk of the lifecycle and progress management that check the risk items in the process and also manage the progress and quality problems. Therefore, we are use of the incremental method for the remove of risk items. The analysis is made based on the types required for making use of the defect data. In this case, additional measures must be taken besides merely recording defects. And the theory is apply to the agent web security access control system for the security requirement. This paper provides an design of intelligence agent for the progress management. And the process can also be managed by using lifecycle and progress milestone, which can greatly improve the software process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ISO/IEC 15408-1,2,3:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model

    Google Scholar 

  2. The Report of the President’s Commission on Critical Infrastructure Protection CCEB (Common Criteria Editorial Board), Common Criteria for Information Technology Security Evaluation, Version 2.0 (May 1998)

    Google Scholar 

  3. DOD (U.S. Department of Defense), Trusted Computer System Evaluation Criteria, DOD5200.28-STD, December 1985. 1.0 (December 1992)

    Google Scholar 

  4. ISO/IEC Guide 65—General Requirements for Bodies Operating Product Certification Systems (1996)

    Google Scholar 

  5. Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94–10 (September 1991)

    Google Scholar 

  6. Boehm, B.: Software Risk Management. IEEE Computer Society Press, Los Alamitos (1989)

    Book  Google Scholar 

  7. Boehm, B., Egyed, A., Kwan, J., Madachy, R.: Developing Multimedia Applications with the WinWin Spiral Model. In: Jazayeri, M. (ed.) ESEC 1997 and ESEC-FSE 1997. LNCS, vol. 1301, pp. 20–39. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  8. Boehm, B., Bose, P.: A Collaborative Spiral Process Model Based on Theory W. In: Proceedings, ICSP3, IEEE (1994)

    Google Scholar 

  9. Lee, E.-S., Hwang, S.-M.: Definition of Security Requirement Items and Its Process to Security and Progress Management. In: Intelligent Control and Automation. LNCIS, vol. 344, Springer, Heidelberg (August 2006)

    Google Scholar 

  10. Lee, E.-S., Hwang, S.-M.: Design Implementation of Web Security Access Control System for Semantic Web Ontoloty. In: Intelligent Control and Automation. LNCIS, vol. 344, pp. 1090–1095. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Lee, E.-S., Lee, M.: Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement. In: Intelligent Control and Automation. LNCIS, vol. 344, Springer, Heidelberg (2006)

    Google Scholar 

  12. Lee, E.-s., Lee, S.-H.: Design Progress Management for Security Requirements in Ubiquitous Computing Using COQUALMO. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, pp. 555–564. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Pressman, R.S.: Software Engineering. McGraw-Hill, New York (1997)

    MATH  Google Scholar 

  14. Cho, N.-d., Lee, E.-s.: Design and implementation of semantic web search system using ontology and anchor text. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, pp. 546–554. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Luger, G.F.: Artificial intelligence. Addison-Wesley, Reading (2001)

    Google Scholar 

  16. Lawrence, S.: Software engineering. Prentice-Hall, Englewood Cliffs (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ngoc Thanh Nguyen Adam Grzech Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, Hk., Hwang, SM., Lee, ES. (2007). Design of Intelligence Mobile Agent Lifecycle for the Progress Management and Mobile Computing. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2007. Lecture Notes in Computer Science(), vol 4496. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72830-6_75

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72830-6_75

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72829-0

  • Online ISBN: 978-3-540-72830-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics