Jieqing Ai

Learn More
college of management zhejiang changzheng professional and technical college Hangzhou,China Abstract—With the number of services increasing in a rapid speed in the internet, it becomes a research hotspot to discover target service according to the service requirement. When single service can not satisfy the service requirement, services can be composed to(More)
In a dynamic e-Business environment, constructing Virtual Society (VS) by creating Service cooperation has become the mainstream approach for reforming the development of application software systems. And e-contract is one of the important ways to support autonomic service cooperation. However, because of the inherent non-controllability of agents across(More)
college of management zhejiang changzheng professional and technical college Hangzhou,China Abstract—Traditional goal theory adopts Kripkean possible world semantics based normal modal logic to describe goal operator, which has monotonic trait. This paper argues that goal has non-monotonic nature; therefore, defeasible logic is imported to build goal(More)
Service composition technology promises a new solution to an age-old problem: how to implement complex, large scale, cross-enterprise business application. However, we must ensure the compatibility between component services in composite service. Current research works in this field only concern semantics compatibility of service interface, yet ignoring the(More)
Motivation is an indispensable element in reasoning rational behavior of intelligent agent. Recent study on the semantics explanation of motivation operator has its shortcomings such as the impossibility to solve logic omniscience problem. This shortcoming fundamentally restrict agent from applying to real application domain. This paper proposes three(More)
RFID (Radio-Frequency IDentification) is attractive for the strong visibility it provides into logistics operations. In this paper, we explore fair-exchange techniques to encourage honest reporting of item receipt in RFID-tagged supply chains and present a fair ownership transfer system for RFID-tagged supply chains. In our system, a receiver can only(More)
A multi-party-signature protocol enables an ensemble of entities to sign on a message to produce a compressed signature. Recently, a lot of multi-party-signature protocols have been proposed in the security field. However, these schemes suffer either from impractical assumptions or from loose security reductions. This paper address all these issues by(More)
—Agents are prone to constitute virtual organization in the internet to support novel application such as grid computing. Due to autonomous nature of agent, norm must be provided to control agent's behavior. This paper contends that norm formation process is an argumentation process, and import defeasible logic to formalize this process. Case study shows(More)
  • 1