Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A hybrid trust management framework for a multi-service social IoT network
N Narang, S Kar - Computer Communications, 2021 - Elsevier
Abstract Social IoT (or SIoT) is an alternate architectural pattern for IoT, which involves IoT
devices with social behavioural attributes. A SIoT-based service network makes use of …
devices with social behavioural attributes. A SIoT-based service network makes use of …
[PDF][PDF] Les systèmes de recommandation à base de confiance
CA Haydar - Université de Lorraine, 2014 - docnum.univ-lorraine.fr
Cette thèse examine l'apport de la modélisation et de l'exploitation de la confiance aux SR.
Ce chapitre est consacré aux approches de la modélisation de la confiance en informatique …
Ce chapitre est consacré aux approches de la modélisation de la confiance en informatique …
A Transaction Frequency Based Trust for E-Commerce.
D Huang, S Xu - Computers, Materials & Continua, 2023 - search.ebscohost.com
Most traditional trust computing models in E-commerce do not take the transaction frequency
among participating entities into consideration, which makes it easy for one party of the …
among participating entities into consideration, which makes it easy for one party of the …
A new trust evaluation model based on cloud theory in e-commerce environment
HY Cai, Z Li, JF Tian - 2011 2nd International Symposium on …, 2011 - ieeexplore.ieee.org
To solve the subjective and uncertainly about trust in e-commerce system, a new trust model
based on multidimensional trust cloud is proposed, which is on the basis of the past …
based on multidimensional trust cloud is proposed, which is on the basis of the past …
On information leakage by indexes over data fragments
Data fragmentation has recently emerged as a complementary approach to encryption for
protecting confidentiality of sensitive associations when storing data at external parties. In …
protecting confidentiality of sensitive associations when storing data at external parties. In …
Taxonomy of problem management activities
M Kajko-Mattsson, U Westblom… - Proceedings Fifth …, 2001 - ieeexplore.ieee.org
Maintenance categories differ too much in order to be covered by one and the same generic
process model. Too general process models do not give enough guidance when building …
process model. Too general process models do not give enough guidance when building …
[PDF][PDF] Trust Management in Peer-to-Peer Networks.
Z Yu, J Zhu, G Shen, H Liu - J. Softw., 2014 - jsoftware.us
In recent years, various applications of Peer-to-Peer (P2P) computing have been widely
used because of its unique advantages, which have played an important role in commerce …
used because of its unique advantages, which have played an important role in commerce …
[PDF][PDF] Efficient File Sharing Mechanism In P2P Using Energy Efficient Clustering Mechanism
PA Mary, M Radhakrishnan - Appl. Math, 2017 - naturalspublishing.com
Effective and secured file sharing is the essential factor in real time networks. Common
distributed network environment faces numerous problems in existing file sharing …
distributed network environment faces numerous problems in existing file sharing …
Trust model based on Bayesian network in e-commerce
DQ Li, LL Li, H Yang - … Conference on E-Business and E …, 2010 - ieeexplore.ieee.org
Trust is a key constraining factor in the development of electronic commerce. The parties
must establish a certain trust model between each other before the beginning of transaction …
must establish a certain trust model between each other before the beginning of transaction …
A Trust Model in P2P E-Commerce Systems
Z Yu, G Shen, H Liu - 2012 8th International Conference on …, 2012 - ieeexplore.ieee.org
In Peer-to-Peer (P2P) e-commerce systems, peers' features such as heterogeneity,
anonymity and autonomy lead to some security problems, such as forging, slandering and …
anonymity and autonomy lead to some security problems, such as forging, slandering and …