نتایج جستجو برای: trust propagation
تعداد نتایج: 166646 فیلتر نتایج به سال:
In this we introduce a decentralized node admission with essential and fundamental security service in mobile ad hoc networks (MANETs). It is required to securely strive with dynamic relationship and topology as well as to bootstrap other important security primitives. Efficient one-to-many dissemination, essential for consensus, now becomes a challenge; enough number of destinations cannot del...
In this paper, we present several experiments of belief propagation in multi-agent communities. Each agent in the simulation has an initial random vocabulary (4 words) corresponding to each possible movement (north, south, east and west). Agents move and communicate the associated word to the surrounding agents, which can be convinced by the 'speaking agent', and change their corresponding word...
Wireless Sensor Networks (WSNs) are increasingly used and will certainly be part of our everyday lives. Many routing protocols were designed with respect to WSNs capacities to allow the achievement of numerous applications. One of the not well investigated areas in WSNs is the queue management issue. The purpose of this paper is to present an analysis of the impact of queue buffer size awarenes...
In a pervasive computing environment, the need to establish trust amongst distributed services has attracted increasing attentions from both the industry and academia. As a widely adopted solution to carry a principal’s identity and attributes of different organizations, the credential-based trust establishment has become popular over Internet. In this paper, we propose a hybrid negotiation tre...
Standard neural network based on general back propagation learning using delta method or gradient descent method has some great faults like poor optimization of error-weight objective function, low learning rate, instability .This paper introduces a hybrid supervised back propagation learning algorithm which uses trust-region method of unconstrained optimization of the error objective function ...
Trust and reputation systems are widely employed in WSNs in order to help decision making processes by assessing trustworthiness of sensor nodes in a data aggregation process. However, in unattended and hostile environments, some sophisticated malicious attacks such as collusion attacks can distort the computed trust scores and lead to low quality or deceptive services as well as to undermine t...
Trust is essential in virtually all economic interactions. In this paper, we build on previous work analyzing the “trust game” from the perspective of evolutionary dynamics. There are two players: an “investor” and a “trustee.” The investor begins with one monetary unit and can choose to transfer it to the trustee. The transfer, if made, is multiplied by a factor b > 1 representing the gains th...
The decentralized administrative controlled-nature of mobile ad hoc networks (MANETs) presents security vulnerabilities which can lead to attacks such as malicious modification of packets. To enhance security in MANETs, Trust and Reputation Management systems (TRM) have been developed to serve as measures in mitigating threats arising from unusual behaviours of nodes. In this paper we propose a...
Collaboration, interaction and information sharing are some of the key concepts of the next generation of web applications known as ‘Web 2.0’ [2]. A recommender system (RS) [3] matches this description very well. Such a system is designed to suggest items (movies, articles, ...) to users who might be interested in them. One of the widely used approaches is collaborative filtering, a technique t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید