215 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Chapter 9 DOI: 10.4018/978-1-61350-107-8.ch009 INTRODUCTION In recent years, a mobile agent is used in many applications like Data mining (Klusch et al., 2003), Grid computing (Kuang et al., 2002), P2P networks (Lu and Fu, 2006), Network routing (Manvi and Venkatram, 2007) etc. The key reasons for in- corporating the mobile agent concept in various applications are Reduction of the network load, Reduce network latency, Dynamic Adaption, Ro- bust and fault-tolerant and Client Customization. In the multimedia environment, content dis- covery is the major aspect to bring the content to every user. For this, mobile agent can play a S. Venkatesan Indian Institute of Information Technology-Allahabad, India C. Chellappan Anna University, India P. Dhavachelvan Pondicherry University, India Recovery of Ubiquitous Multimedia Content Discovery Mobile Agent ABSTRACT Multimedia content is ubiquitous; therefore it is very diffcult to bring all the hidden contents to the every one of universe. Mobile agent technology is the effcient technique to discover and bring the multimedia content to the universe with the help of dynamic itinerary movement. While mobile agent is roaming to discover the ubiquitous content, it has to go and visit multiple servers with different character in nature (that is server may be legitimate or hostile; hostile intention is to disturb the agent functional- ities either by killing the agent or modifying the agent functionalities). Whenever the agent is disturbed (agent is altered or killed) by the hostile servers while roaming to discover the content, we should have the recovery mechanism to rollback the agent. This chapter adopts the K-response recovery model to rollback the original agent even then it is cracked or killed by the malicious servers while discovering the multimedia content.