Jieqing Ai

  • Citations Per Year
Learn More
With the number of services increasing in a rapid speed in the internet, it becomes a research hotspot to discover target service according to the service requirement. When single service can not satisfy the service requirement, services can be composed to provide complex function. There are already a lot of service composition methods, so it is crucial to(More)
Motivation is an indispensable element in reasoning rational behavior of intelligent agent. Recent study on the semantics explanation of motivation operator has its shortcomings such as the impossibility to solve logic omniscience problem. This shortcoming fundamentally restrict agent from applying to real application domain. This paper proposes three(More)
In a dynamic e-Business environment, constructing Virtual Society (VS) by creating Service cooperation has become the mainstream approach for reforming the development of application software systems. And e-contract is one of the important ways to support autonomic service cooperation. However, because of the inherent non-controllability of agents across(More)
Traditional goal theory adopts Kripkean possible world semantics based normal modal logic to describe goal operator, which has monotonic trait. This paper argues that goal has non-monotonic nature; therefore, defeasible logic is imported to build goal theory. Case study shows that the novel goal theory can solve logic omniscience ideally. Keywords-Modal(More)
Service composition technology promises a new solution to an age-old problem: how to implement complex, large scale, cross-enterprise business application. However, we must ensure the compatibility between component services in composite service. Current research works in this field only concern semantics compatibility of service interface, yet ignoring the(More)
Agents are prone to constitute virtual organization in the internet to support novel application such as grid computing. Due to autonomous nature of agent, norm must be provided to control agent’s behavior. This paper contends that norm formation process is an argumentation process, and import defeasible logic to formalize this process. Case study shows(More)
In order to protect vital data in today’s internet environment and prevent misuse, especially insider abuse by valid users, we propose a novel two-step detecting approach to distinguish potential misuse behaviour (namely anomalous user behaviour) from normal behaviour. First, we capture the access patterns of users by using association rules. Then, based on(More)
A multi-party-signature protocol enables an ensemble of entities to sign on a message to produce a compressed signature. Recently, a lot of multi-party-signature protocols have been proposed in the security field. However, these schemes suffer either from impractical assumptions or from loose security reductions. This paper address all these issues by(More)
RFID (Radio-Frequency IDentification) is attractive for the strong visibility it provides into logistics operations. In this paper, we explore fair-exchange techniques to encourage honest reporting of item receipt in RFID-tagged supply chains and present a fair ownership transfer system for RFID-tagged supply chains. In our system, a receiver can only(More)