Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jingyi Xiong is active.

Publication


Featured researches published by Jingyi Xiong.


international conference on communication technology | 2010

The model and the security mechanism of the information retrieval system based on mobile multi-agent

Xiaolong Xu; Jingyi Xiong; Chunling Cheng

Traditional information retrieval systems have several shortcomings in common, such as delaying in information updating, costing additional host and network resources, and so on. The promise of mobile multi-agent technology is becoming highly attractive. We approach to apply the mobile multi-agent technology to information retrieval in order to build a brand-new system. Although the mobile multi-agent technology advantages information retrieval systems, it also brings several new negative problems. The most serious one is the security problem because of agents mobility and initiative. In this paper, we firstly analyze the drawbacks of current information retrieval systems, and then describe how to employ the mobile multi-agent technology to the information retrieval system to improve its performance. What we discuss mainly in this paper is the security problems of the information retrieval system based on mobile multi-agent (IRSMMA). We analyze threats to the security of the new system, study out the security policies, and at last establish a robust and secure architecture name MMASA (Mobile Multi-Agent Security Architecture), which can effectively protect our system, and also adapt to other network application based on mobile multi-agent because of its generality.


Archive | 2012

Multi-intelligent body-based hierarchical cloud computing model construction method

Danwei Chen; Chunling Cheng; Jingyi Xiong; Xiaolong Xu; Geng Yang; Dengyin Zhang; Min Zhang; Yun Zhang


Archive | 2011

Compound intellectual cloud method based on P2P computing technology

Xiaolong Xu; Ruchuan Wang; Danwei Chen; Lijuan Sun; Jingyi Xiong; Xiaochen Dou; Zhetao Mei; Xiang Gao


Archive | 2012

Virus checking method based on immune algorithm in mixed peer-to-peer network

Chunling Cheng; Qian Chai; Xiaolong Xu; Jingyi Xiong; Changyao Zhao; Baochun Yang; Jianyi Qian


Archive | 2010

Method for sorting network virus reports

Qian Chai; Chunling Cheng; Jianyi Qian; Jingyi Xiong; Xiaolong Xu; Baochun Yang; Changyao Zhao


Archive | 2011

Method for ensuring quality of service of knowledge system based on cloud computing technology

Xiaolong Xu; Lingjuan Li; Chunling Cheng; Jingyi Xiong; Jiaxing Wu; Weijian Geng; Jie Wang; Limiao Gu


Archive | 2012

Multiple-mobile-agent credible interaction method for information acquisition system in open network

Xiaolong Xu; Ruchuan Wang; Lijuan Sun; Danwei Chen; Jingyi Xiong; Zhetao Mei; Xiang Gao; Xiaochen Dou


Archive | 2012

Classification method for malicious code based on A_Kohonen neural network

Xiaolong Xu; Jingyi Xiong; Geng Yang; Yanfei Sun; Danwei Chen; Jialun Cao; Yilong Zhang; Qinwen Zou; Lingling Cao; Jinglan Zhou


Archive | 2010

Cloud money-based hierarchical cloud computing system excitation method

Danwei Chen; Chunling Cheng; Jingyi Xiong; Xiaolong Xu; Dengyin Zhang; Min Zhang; Yun Zhang


Archive | 2010

Trust evaluation method in computing environment without central network

Xiaolong Xu; Ruchuan Wang; Dengyin Zhang; Danwei Chen; Jingyi Xiong; Xiang Gao; Zhetao Mei; Xiaochen Dou

Collaboration


Dive into the Jingyi Xiong's collaboration.

Top Co-Authors

Avatar

Xiaolong Xu

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Chunling Cheng

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Ruchuan Wang

Nanjing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge