The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RFID (Radio-Frequency IDentification) is attractive for the strong visibility it provides into logistics operations. In this paper, we explore fair-exchange techniques to encourage honest reporting of item receipt in RFID-tagged supply chains and present a fair ownership transfer system for RFID-tagged supply chains. In our system, a receiver can only access the data and/or functions of the RFID tag...
A multi-party-signature protocol enables an ensemble of entities to sign on a message to produce a compressed signature. Recently, a lot of multi-party-signature protocols have been proposed in the security field. However, these schemes suffer either from impractical assumptions or from loose security reductions. This paper address all these issues by presentting a practical multi-party-signature...
Agents are prone to constitute virtual organization in the Internet to support novel application such as grid computing. Due to autonomous nature of agent, norm must be provided to control agent's behavior. This paper contends that norm formation process is an argumentation process, and import defeasible logic to formalize this process. Case study shows that norm can be formed in a seamless way in...
Service composition technology promises a new solution to an age-old problem: how to implement complex, large scale, cross-enterprise business application. However, we must ensure the compatibility between component services in composite service. Current research works in this field only concern semantics compatibility of service interface, yet ignoring the compatibility of service behavior. Therefore,...
With the number of services increasing in a rapid speed in the Internet, it becomes a research hotspot to discover target service according to the service requirement. When single service can not satisfy the service requirement, services can be composed to provide complex function. There are already a lot of service composition methods, so it is crucial to provide a method to verify the correctness...
Motivation is an indispensable element in reasoning rational behavior of intelligent agent. Recent study on the semantics explanation of motivation operator has its shortcomings such as the impossibility to solve logic omniscience problem. This shortcoming fundamentally restrict agent from applying to real application domain. This paper proposes three proposition semantics to describe motivation operator...
Traditional goal theory adopts Kripkean possible world semantics based normal modal logic to describe goal operator, which has monotonic trait. This paper argues that goal has non-monotonic nature; therefore, defeasible logic is imported to build goal theory. Case study shows that the novel goal theory can solve logic omniscience ideally.
Grid computing technology is a promising method to implement large-scale distributed resources sharing and cooperative problem solving across virtual organization. Agent with its intelligent nature is fit for representing network entity to encapsulate, provide and invoke grid service in the Internet. However, the challenging problem is how to reflect the changing business requirement in grid computing...
It is a challenging problem to ensure the global goal of virtual organization together with maintaining the autonomous ability of individual agent in open, dynamic and heterogeneous network environment. Aiming at this problem, this paper proposes a model of agent social based on norms, policies, and contracts to form and operate VO. This model is divided into three layers: macro regulation layer,...
Stem algorithm is a robust static software watermarking scheme. It can resist many common attacks except collusive attacks. In this paper we propose an improved Stern algorithm, make it has the ability of resisting collusive attacks and simplify its implementation at the same time. Furthermore, we describe the implementation of our algorithm and the issues that arise when targeting MSIL. We then validated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.