Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data provenance in the internet of things
M Elkhodr, B Alsinglawi… - 2018 32nd international …, 2018 - ieeexplore.ieee.org
There is a need to create a trusted and secure IoT environment to share information, create
knowledge and perform digital transactions. Trustworthy data collection, mining and fusion is …
knowledge and perform digital transactions. Trustworthy data collection, mining and fusion is …
Data provenance and trust establishment in the Internet of Things
Abstract The Internet of Things (IoT) is a network of heterogeneous networks encompassing
various forms of communications form the current traditional communication models to …
various forms of communications form the current traditional communication models to …
Evaluation of Information Security Software Using Quality and Reliability Criteria
It is determined that the stable operation of critical infrastructure depends on the reliability
and continuity of software for the protection of information resources. Failure to operate a …
and continuity of software for the protection of information resources. Failure to operate a …
Towards semantic comparison of multi-granularity process traces
A process trace describes the steps taken in a workflow to generate a particular result.
Understanding a process trace is critical to be able to verify data, enable its re-use and to …
Understanding a process trace is critical to be able to verify data, enable its re-use and to …
Shared services in information technology and supply chain management
MNA Loges - 2013 - essay.utwente.nl
After the emergence of shared service centers shared services became most common in the
fields of Human Resource Management and Finance. On the contrary, fields such as …
fields of Human Resource Management and Finance. On the contrary, fields such as …
An architecture for justified assessments of service provider reputation
In a service-oriented system, an accurate assessment of reputation is essential for selecting
between alternative providers. In many cases, providers have differing characteristics that …
between alternative providers. In many cases, providers have differing characteristics that …
Provenance-based trust estimation for service composition
J Jiang, Q Bai - AI 2013: Advances in Artificial Intelligence: 26th …, 2013 - Springer
Provenance information can greatly enhance transparency and accountability of shared
services. In this paper, we introduce a trust estimation approach which can derive trust …
services. In this paper, we introduce a trust estimation approach which can derive trust …
[PDF][PDF] Trust mining and analysis in complex systems
J Jiang - 2014 - openrepository.aut.ac.nz
A complex system, as a collection of loosely coupled interacting components, can group and
create functioning units together. Complex systems have become a powerful framework for …
create functioning units together. Complex systems have become a powerful framework for …