نتایج جستجو برای: trust propagation

تعداد نتایج: 166646  

Journal: :Journal of Spacecraft and Rockets 2023

Different discretization and trust-region methods are compared for the low-thrust fuel-optimal trajectory optimization problem using successive convex programming. In particular, differential integral formulations of adaptive pseudospectral Legendre–Gauss–Radau method, an arbitrary-order Legendre–Gauss–Lobatto technique based on Hermite interpolation, a first-order-hold considered. The number p...

2003
Peter Szolovits Arthur C. Smith

Many recent studies of trust and reputation are made in the context of commercial reputation or rating systems for online communities. Most of these systems have been constructed without a formal rating model or much regard for our sociological understanding of these concepts. We first provide a critical overview of the state of research on trust and reputation. We then propose a formal quantit...

Journal: :Applied Soft Computing 2021

Abstract Trust is a typical relationship in social network, which group decision making problems relates to the inner among experts. To obtain complete trust of networked experts, firstly, novel knowledge coverage-based propagation operator proposed estimate between pairs unknown The novelty this resides its account domain coverage Desirable properties regarding boundary conditions, generalisat...

2012
Behnam Hajian Tony White

This paper focuses on finding important nodes in a social network based on their behaviour as well as the structure of the network; a problem of considerable interest in social recommender systems. This paper views the propagation of information in a social network as a process of infection. Furthermore, a proposal regarding infection and trust is made. The paper proposes an algorithm called th...

2006
András A. Benczúr Károly Csalogány Tamás Sarlós

We investigate the usability of similarity search in fighting Web spam based on the assumption that an unknown spam page is more similar to certain known spam pages than to honest pages. In order to be successful, search engine spam never appears in isolation: we observe link farms and alliances for the sole purpose of search engine ranking manipulation. The artificial nature and strong inside ...

2007
Kai Han Binoy Ravindran Douglas Jensen

In a decentralized network system, an authenticated node is referred to as a Byzantine node, if it is fully controlled by a traitor or an adversary, and can perform destructive behavior to disrupt the system. Typically, Byzantine nodes together or individually attack point-to-point information propagation by denying or faking messages. In this paper, we assume that Byzantine nodes are of some i...

Journal: :journal of mechanical research and application 2009
mehdi pourmahmoud

modelling of crack propagation by finite element method under mixed mode conditions is of prime importance in fracture mechanics. this paper describes an application of finite element method to the analysis of mixed mode crack growth in linear elastic fracture mechanics. crack growth process is simulated by an incremental crack-extension analysis based on the maximum principal stress criterion,...

Journal: :journal of advances in computer research 0

the increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. through the development of semantic web, one major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. this raises the question of how much credence to give each resource. each user knows the trustworthiness of ...

Journal: :EURASIP J. Adv. Sig. Proc. 2008
Nayef A. Alsindi Kaveh Pahlavan

In recent years there has been growing interest in ad-hoc and wireless sensor networks (WSNs) for a variety of indoor applications. Localization information in these networks is an enabling technology and in some applications it is the main sought after parameter. The cooperative localization performance of WSNs is constrained by the behavior of the utilized ranging technology in dense cluttere...

2010
Jaydip Sen

In a multi-hop mobile ad hoc network (MANET), mobile nodes cooperate to form a network without using any infrastructure such as access points or base stations. The mobility of the nodes and the fundamentally limited capacity of the wireless medium, together with wireless transmission effects such as attenuation, multi-path propagation, and interference combine to create significant challenges f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید