[PDF][PDF] 基于DS 证据理论的多传感器多特征目标识别

冯立杰, 樊瑶 - 科技导报, 2014 - kjdb.org
摘要传统多传感器环境下的目标识别方法主要有两种: 利用多传感器获得的数据进行数据融合,
利用每个传感器信号的特征向量进行特征融合. 但这两种方法均存在目标识别精度不高的问题 …

An improved global trust value computing method in P2P system

F Yu, H Zhang, F Yan, S Gao - International Conference on Autonomic and …, 2006 - Springer
Building a trust and reputation mechanism in P2P system is very important. This paper gives
an improved global trust value computing method of choosing trusted source peers in P2P …

Combined trust model based on evidence theory in iterated prisoner's dilemma game

B Chen, B Zhang, W Zhu - International Journal of Systems …, 2011 - Taylor & Francis
In the iterated prisoner's dilemma game, agents often play defection based on mutual
distrust for the sake of their own benefits. However, most game strategies and mechanisms …

A P2P e-commerce reputation model based on fuzzy logic

J Li, L Liu, J Xu - 2010 10th IEEE International Conference on …, 2010 - ieeexplore.ieee.org
Peer-to-Peer (P2P) networking is beneficial when removing a centralized server. On the
other hand, new mechanisms are required to compensate for the central authority …

Trust model based on rewards and punishment mechanism

M Xiaoxue, W Zixian, B Jing… - 2010 Second International …, 2010 - ieeexplore.ieee.org
With the large-scale, open distributed systems appear, creates a dynamic trust management
to make up for lack of a static trust mechanism. However, the existing trust models have the …

Identity anonymity for grid computing coordination based on trusted computing

Z Shi, Y He, X Huai, H Zhang - Sixth International Conference …, 2007 - ieeexplore.ieee.org
This paper proposes a novel anonymous coordination authentication scenario for grid
computing security based on trusted computing technology, which can provide efficient and …

基于DS 理论的多源证据融合云安全信任模型

束柬, 梁昌勇 - 计算机科学, 2016 - cqvip.com
云计算技术在带来信息更大范围共享, 成本更低等便捷的同时, 也面临着隐私泄露,
信息丢失等新的安全问题. 如何在海量分布式的云系统中识别和管理节点的可信度成为云安全 …

A trust model based on the extended subjective logic for P2P networks

X Ma, Z Wang, F Liu, J Bian - 2010 2nd International …, 2010 - ieeexplore.ieee.org
In order to alleviate the lack of trust in P2P environment, a malicious node attacks and so on,
through the expansion of Josang subjective logic thought, proposed a extended subjective …

P2P 环境下基于Vague 集理论的主观信任模型研究

黄德才, 翁挺, 龚卫华, 朱凌 - 小型微型计算机系统, 2011 - cqvip.com
在诸如文件共享等无中心的P2P 环境下, 资源共享是用户自愿的行为, 用户不承担任何责任,
很难通过传统的信任机制来建立用户之间的信任. 参考社会学的人际关系模型和Bayesian …

A trust model of P2P network based on reputation and risk

D Ruizhong, T Junfeng, W Zixian… - 2009 WRI World …, 2009 - ieeexplore.ieee.org
As P2P system has dynamic open and anonymous characteristics, and these seriously
restrict P2P system of cooperation between the users and system reliability and availability …