-
2
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Josang A., Ismail, R., Boyd C., "A survey of trust and reputation systems for online service provision", Decision Support Systems, vol. 43, no. 2, pp.618-644, 2007.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
3
-
-
0033903726
-
Supporting trust in virtual communities
-
Washington, DC, USA, IEEE Computer Society
-
Abdul-Rahman A., Hailes S., "Supporting trust in virtual communities", In HICSS '00: Proceedings of the 33rd Hawaii International Conference on System Sciences, Volume 6, Washington, DC, USA, IEEE Computer Society, pp.6007-6016, 2000.
-
(2000)
HICSS '00: Proceedings of the 33rd Hawaii International Conference on System Sciences
, vol.6
, pp. 6007-6016
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
4
-
-
34249811174
-
A survey of trust in computer science and the Semantic Web
-
Artz D., Gil Y., "A survey of trust in computer science and the Semantic Web", Web Semantics, vol. 5, nol.2, pp. 58-71, 2007.
-
(2007)
Web Semantics
, vol.5
, Issue.2
, pp. 58-71
-
-
Artz, D.1
Gil, Y.2
-
5
-
-
38049055329
-
Trust and reputation systems
-
In Aldini A and Gorrieri R eds., Berlin: Springer-Verlag
-
Josang A., "Trust and Reputation Systems", In Aldini A and Gorrieri R eds. Foundations of Security Analysis and Design, LNCS 4677, Berlin: Springer-Verlag, pp.209-245, 2007.
-
(2007)
Foundations of Security Analysis and Design, LNCS 4677
, pp. 209-245
-
-
Josang, A.1
-
6
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Marti S., et al., "Mitigating routing misbehavior in mobile ad hoc networks", In International Conference on Mobile Computing and Networking: Proceedings of the 6 th annual international conference on Mobile computing and networking, vol. 6, no. 11, pp. 255-265, 2000.
-
(2000)
International Conference on Mobile Computing and Networking: Proceedings of the 6 Th Annual International Conference on Mobile Computing and Networking
, vol.6
, Issue.11
, pp. 255-265
-
-
Marti, S.1
-
7
-
-
0036969459
-
Context aware detection of selfish nodes in DSR based ad-hoc networks
-
Krishna Paul, "Context aware detection of selfish nodes in DSR based ad-hoc networks", In Proceedings of IEEE Global Telecommunications Conference, pp.178-182, 2002.
-
(2002)
Proceedings of IEEE Global Telecommunications Conference
, pp. 178-182
-
-
Paul, K.1
-
11
-
-
33745257035
-
Quantifying trust in mobile adhoc networks
-
Virendra M., Jadliwala M., Chandrasekaran, M., Upadhyaya S., "Quantifying trust in mobile adhoc networks", In IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS'05), pp. 65-71, 2005.
-
(2005)
IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS'05)
, pp. 65-71
-
-
Virendra, M.1
Jadliwala, M.2
Chandrasekaran, M.3
Upadhyaya, S.4
-
12
-
-
44849093503
-
Reputation-based Framework for High Integrity Sensor Networks
-
Article 15
-
Saurabh Ganeriwal, Laura K. Balzano, Mani B. Srivastava, "Reputation-based Framework for High Integrity Sensor Networks", ACM Transactions on Sensor Networks, vol. 4, no. 3, Article 15, pp. 1-37, 2008.
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.3
, pp. 1-37
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
13
-
-
33745679191
-
Behavior-based trust in wireless sensor network
-
Springer Berlin
-
Huang L., Li L., Tan Q., "Behavior-based trust in wireless sensor network", In APWeb Workshops, Springer Berlin, pp. 214-223, 2006.
-
(2006)
APWeb Workshops
, pp. 214-223
-
-
Huang, L.1
Li, L.2
Tan, Q.3
-
14
-
-
79960128746
-
A New secure routing algorithm for mobile Ad-hoc networks
-
Shunxian Zhou, "A New Secure Routing Algorithm for Mobile Ad-hoc Networks", IJACT: International Journal of Advancements in Computing Technology, Vol. 3, No. 5, pp. 275 ∼ 284, 2011.
-
(2011)
IJACT: International Journal of Advancements in Computing Technology
, vol.3
, Issue.5
, pp. 275-284
-
-
Zhou, S.1
-
15
-
-
79953758768
-
MANET Performance enhancing with packet buffering
-
Ela Kumar, Ravinder Nath Rajotiya, "MANET Performance Enhancing with Packet Buffering", IJACT: International Journal of Advancements in Computing Technology, Vol. 3, No. 2, pp. 1 ∼ 7, 2011.
-
(2011)
IJACT: International Journal of Advancements in Computing Technology
, vol.3
, Issue.2
, pp. 1-7
-
-
Kumar, E.1
Rajotiya, R.N.2
-
16
-
-
0000516376
-
Upper and lower probabilities induced by a multi-valued mapping
-
Dempster A. P., "Upper and lower probabilities induced by a multi-valued mapping", Ann Mathematical Statistics, vol. 38, no. 2, pp. 325-339, 1967.
-
(1967)
Ann Mathematical Statistics
, vol.38
, Issue.2
, pp. 325-339
-
-
Dempster, A.P.1
-
18
-
-
77957784845
-
Dempster-shafer theory and statistical inference with weak beliefs
-
Ryan Martin, Jianchun Zhang, Chuanhai Liu, "Dempster-Shafer Theory and Statistical Inference with Weak Beliefs", Statistical Science, Vol. 25, No. 1, pp. 72-87, 2010.
-
(2010)
Statistical Science
, vol.25
, Issue.1
, pp. 72-87
-
-
Martin, R.1
Zhang, J.2
Liu, C.3
-
19
-
-
79957981455
-
Combination rule of D-S evidence theory based on the strategy of cross merging between evidences Original Research Article
-
Kaihong Guo, Wenli Li, "Combination rule of D-S evidence theory based on the strategy of cross merging between evidences Original Research Article", Expert Systems with Applications, Vol. 38, no. 10, pp. 13360-13366, 2011.
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.10
, pp. 13360-13366
-
-
Guo, K.1
Li, W.2
-
20
-
-
0035341839
-
Rule and utility based evidential reasoning approach for multiple attribute decision analysis under uncertainty
-
Yang J. B., "Rule and utility based evidential reasoning approach for multiple attribute decision analysis under uncertainty", European Journal of Operational Research, Vol. 131, No. 1, pp. 31-61, 2001.
-
(2001)
European Journal of Operational Research
, vol.131
, Issue.1
, pp. 31-61
-
-
Yang, J.B.1
|