Advertisement

Mobile Computation: Calculus and Languages (A Tutorial)

  • N. Raja
  • R. K. Shyamasundar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1538)

Abstract

This paper provides a brief overview of a tutorial on current research directions in mobile computation. In particular we provide an overview of the various abstract calculi for mobility, an overview of the programming languages that have been developed for mobile computation, and provide a comparative study of the language abstractions via the calculi and discuss the underlying challenges

Keywords

Mobile Agent Mobile Computation Administrative Domain Mobile Code General Magic 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abadi, M., Gordon, A.D.: A calculus for Cryptographic Protocols: the SPI Calculus. Proc. ACM Conference on Computer and Communications Security, ACM Press (1997) 36–47.Google Scholar
  2. 2.
    Agha, G.: Actors: A Model of Concurrent Computing in Distributed Systems. MIT Press (1986).Google Scholar
  3. 3.
    Arnold, K., Gosling, J.: The Java Programming Language. Sun Microsystems (1996).Google Scholar
  4. 4.
    Boudol, G., Castellani, I., Hennessy, M., Kiehn, A.: A Theory of Processes with Localities. Formal Aspects of Computing, 6 (1994) 165–200.zbMATHCrossRefGoogle Scholar
  5. 5.
    Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems, 8 (1990) 18–36.CrossRefGoogle Scholar
  6. 6.
    Cardelli, L., Gordon, A.D.: Mobile Ambients. Foundations of Software Science and Computational Structures, Lecture Notes in Computer Science, Vol. 1378, Springer-Verlag (1998) 140–155.CrossRefGoogle Scholar
  7. 7.
    Cardelli, L.: Abstractions for Mobile Computation. Manuscript (1998).Google Scholar
  8. 8.
    Cardelli, L., Davies, R.: Service Combinators for Web Computing. DEC Research Report(1997).Google Scholar
  9. 9.
    Cardelli, L.: A Language with Distributed Scope. Computing Systems 8 (1995) 27–59.Google Scholar
  10. 10.
    Carriero, N., Gelernter, D.: Linda in Context. Communications of the ACM 32 (1989) 444–458.CrossRefGoogle Scholar
  11. 11.
    Carriero, N., Gelernter, D., Zuck, L.: Bauhaus Linda. Proc. Object-Based Models and Languages for Concurrent Systems, Lecture Notes in Computer Science, Vol. 924. Springer-Verlag (1995) 66–76.Google Scholar
  12. 12.
    Chess, D.M.: Security Issues in Mobile Code Systems. Mobile Agents and Security, Lecture Notes in Computer Science, Vol 1419. Springer-Verlag (1998).CrossRefGoogle Scholar
  13. 13.
    Fournet, C, Gonthier G.: The Reflexive CHAM and the Join Calculus. Proc. POPL, ACM Press (1996) 372–385.Google Scholar
  14. 14.
    Fournet, C, Gonthier G., Lévy, J-J., Maranget, L., Rémy, D.: A Calculus of Mobile Agents. Proc. CONCUR’96, Lecture Notes in Computer Science, Springer-Verlag (1996) 406–421.Google Scholar
  15. 15.
    General Magic: The Telescript Home Page. Available at http://www.genmagic.com/Telescript.
  16. 16.
    General Magic: Mobile Agents White Paper.Google Scholar
  17. 17.
    Honda, K., Tokoro, M.: An Object Calculus for Asynchronous Communication. Proc. ECOOP’91, Lecture Notes in Computer Science, Vol. 521. Springer-Verlag (1991) 133–147.Google Scholar
  18. 18.
    Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall (1988).Google Scholar
  19. 19.
    Leroy, X.: Objective Caml. Available at http://www.pauillac.inria.fr/ocaml/.
  20. 20.
    Lucent Technologies: The Inferno Home Page. Available at http://www.inferno.belllabs.com/inferno/index.html.
  21. 21.
    Milner, R.: Communication and Concurrency. Prentice-Hall (1988).Google Scholar
  22. 22.
    Milner, R., Parrow, J., Walker, D.: A Calculus of Mobile Processes, Parts 1-2. Information and Computation 100 (1992) 1–77.zbMATHCrossRefMathSciNetGoogle Scholar
  23. 23.
    Necula, G.C., Lee P.: Safe, Untrusted Agents Using Proof-Carrying Code. Mobile Agents and Security, Lecture Notes in Computer Science, Vol 1419. Springer-Verlag (1998).CrossRefGoogle Scholar
  24. 24.
    Ousterhout, J.K.: Tcl and the TkToolkit. Addison-Wesley (1994).Google Scholar
  25. 25.
    Raja, N., Shyamasundar, R.K.: Actors as a Coordinating Model of Computation. Perspectives of System Informatics, Lecture Notes in Computer Science, Vol 1181. Springer-Verlag (1996) 191–202.Google Scholar
  26. 26.
    Reisig, W.: Petrinets. EATCS Monographs on Theoretical Computer Science (1990).Google Scholar
  27. 27.
    Roman, G-C., McCann, P.J., Plun, J.Y.: Mobile UNITY: reasoning and Specification in Mobile Computing. ACM Transactions on Software Engineering and Methodology, 6 (1997) 250–282.CrossRefGoogle Scholar
  28. 28.
    Stamos, J.W., Gifford, D.K.: Remote Evaluation. ACM Transactions on Programming Languages and Systems 12 (1990) 537–565.CrossRefGoogle Scholar
  29. 29.
    Thomsen, B.: Calculi for higher-order communicating systems, Ph.D. thesis, Imperial College, London University (1990).Google Scholar
  30. 30.
    Thorn, T.: Programming Languages for Mobile Code. ACM Computing Surveys, 29 (1997) 213–239.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • N. Raja
    • 1
  • R. K. Shyamasundar
    • 1
  1. 1.School of Technology & Computer ScienceTata Institute of Fundamental ResearchMumbaiIndia

Personalised recommendations