메뉴 건너뛰기




Volumn 21, Issue 21, 2017, Pages 6297-6315

Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification

Author keywords

Apriori algorithm; Artificial intelligence; Na ve Bayes classifier; Pervasive computing; Trust model

Indexed keywords

ARTIFICIAL INTELLIGENCE; BEHAVIORAL RESEARCH; COMPUTER ARCHITECTURE; DECISION MAKING; LEARNING ALGORITHMS; NETWORK ARCHITECTURE; SECURITY OF DATA; SODIUM; TRUSTED COMPUTING;

EID: 84968571632     PISSN: 14327643     EISSN: 14337479     Source Type: Journal    
DOI: 10.1007/s00500-016-2183-1     Document Type: Article
Times cited : (76)

References (68)
  • 1
    • 0027621699 scopus 로고
    • Mining association rules between sets of items in large databases
    • Agrawal R, Imieliński T, Swami A (1993) Mining association rules between sets of items in large databases. ACM SIGMOD Rec 22(2):207–216
    • (1993) ACM SIGMOD Rec , vol.22 , Issue.2 , pp. 207-216
    • Agrawal, R.1    Imieliński, T.2    Swami, A.3
  • 3
    • 84906093350 scopus 로고    scopus 로고
    • Privacy, trust and identity in pervasive computing: a review of technical challenges and future research directions
    • Al-Karkhi A, Al-Yasiri A, Linge N (2012) Privacy, trust and identity in pervasive computing: a review of technical challenges and future research directions. Int J Distrib Parallel Syst (IJDPS) 3(3):197–218
    • (2012) Int J Distrib Parallel Syst (IJDPS) , vol.3 , Issue.3 , pp. 197-218
    • Al-Karkhi, A.1    Al-Yasiri, A.2    Linge, N.3
  • 5
    • 35248873087 scopus 로고    scopus 로고
    • Experience with the keynote trust management system: applications and future directions
    • In:, Nixon, P, Terzis, S, (eds) Springer, Berlin
    • Blaze M, Ioannidis J, Keromytis AD (2003) Experience with the keynote trust management system: applications and future directions. In: Nixon P, Terzis S (eds) Trust management. Springer, Berlin, pp 284–300
    • (2003) Trust management , pp. 284-300
    • Blaze, M.1    Ioannidis, J.2    Keromytis, A.D.3
  • 8
    • 79953822842 scopus 로고    scopus 로고
    • Affect detection: An interdisciplinary review of models, methods, and their applications
    • Calvo RA, D’Mello S (2010) Affect detection: An interdisciplinary review of models, methods, and their applications. IEEE Trans Affect Comput 1(1):18–37
    • (2010) IEEE Trans Affect Comput , vol.1 , Issue.1 , pp. 18-37
    • Calvo, R.A.1    D’Mello, S.2
  • 10
    • 84942372929 scopus 로고    scopus 로고
    • A triadic closure and homophily-based recommendation system for online social networks
    • Carullo G, Castiglione A, De Santis A, Palmieri F (2015) A triadic closure and homophily-based recommendation system for online social networks. World Wide Web 18(6):1579–1601
    • (2015) World Wide Web , vol.18 , Issue.6 , pp. 1579-1601
    • Carullo, G.1    Castiglione, A.2    De Santis, A.3    Palmieri, F.4
  • 13
    • 0002336395 scopus 로고
    • Chapter 4: Trust as a commodity
    • Basil Blackwell, Oxford, vol, In:, Gambetta, D, (ed
    • Dasgupta P (1988) Chapter 4: Trust as a commodity. In: Gambetta D (ed) Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, vol 4, pp 49–72
    • (1988) Trust: making and breaking cooperative relations , vol.4 , pp. 49-72
    • Dasgupta, P.1
  • 15
    • 0242641140 scopus 로고    scopus 로고
    • The digitization of word of mouth: promise and challenges of online feedback mechanisms
    • Dellarocas C (2003) The digitization of word of mouth: promise and challenges of online feedback mechanisms. Manag Sci 49(10):1407–1424
    • (2003) Manag Sci , vol.49 , Issue.10 , pp. 1407-1424
    • Dellarocas, C.1
  • 16
    • 78751649542 scopus 로고    scopus 로고
    • Trust management in ubiquitous computing: a Bayesian approach
    • Denko MK, Sun T, Woungang I (2011) Trust management in ubiquitous computing: a Bayesian approach. Comput Commun 34(3):398–406
    • (2011) Comput Commun , vol.34 , Issue.3 , pp. 398-406
    • Denko, M.K.1    Sun, T.2    Woungang, I.3
  • 19
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to ROC analysis
    • Fawcett T (2006) An introduction to ROC analysis. Pattern Recognit Lett 27(8):861–874
    • (2006) Pattern Recognit Lett , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1
  • 20
    • 0002283033 scopus 로고    scopus 로고
    • From data mining to knowledge discovery in databases
    • Fayyad U, Piatetsky-Shapiro G, Smyth P (1996) From data mining to knowledge discovery in databases. AI Mag 17(3):37
    • (1996) AI Mag , vol.17 , Issue.3 , pp. 37
    • Fayyad, U.1    Piatetsky-Shapiro, G.2    Smyth, P.3
  • 24
    • 84955478304 scopus 로고    scopus 로고
    • A cognitive neural architecture able to learn and communicate through natural language
    • Golosio B, Cangelosi A, Gamotina O, Masala GL (2015) A cognitive neural architecture able to learn and communicate through natural language. Plos One J 10(11):1–37
    • (2015) Plos One J , vol.10 , Issue.11 , pp. 1-37
    • Golosio, B.1    Cangelosi, A.2    Gamotina, O.3    Masala, G.L.4
  • 27
    • 0009481412 scopus 로고    scopus 로고
    • A survey of trust in internet applications
    • Grandison T, Sloman M (2000) A survey of trust in internet applications. IEEE Commun Surv Tutor 3(4):2–16
    • (2000) IEEE Commun Surv Tutor , vol.3 , Issue.4 , pp. 2-16
    • Grandison, T.1    Sloman, M.2
  • 29
    • 0346457324 scopus 로고    scopus 로고
    • Online association rule mining
    • Hidber C (1999) Online association rule mining. ACM 28(2):145–156
    • (1999) ACM , vol.28 , Issue.2 , pp. 145-156
    • Hidber, C.1
  • 30
    • 71649094416 scopus 로고    scopus 로고
    • A survey of attack and defense techniques for reputation systems
    • Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv (CSUR) 42(1):1
    • (2009) ACM Comput Surv (CSUR) , vol.42 , Issue.1 , pp. 1
    • Hoffman, K.1    Zage, D.2    Nita-Rotaru, C.3
  • 31
    • 84898621801 scopus 로고    scopus 로고
    • International conference on interactive collaborative learning (ICL)
    • Ivanova M (2013) Researching affective computing techniques for intelligent tutoring systems. In
    • Ivanova M (2013) Researching affective computing techniques for intelligent tutoring systems. In: 2013 International conference on interactive collaborative learning (ICL). IEEE
    • (2013) IEEE
  • 32
    • 84877991984 scopus 로고    scopus 로고
    • Q-apriori algorithm of multivalue attribute association rules mining
    • Jiang L, Meng FR, Zhou Y (2011) Q-apriori algorithm of multivalue attribute association rules mining. Comput Eng 37(9):81–83
    • (2011) Comput Eng , vol.37 , Issue.9 , pp. 81-83
    • Jiang, L.1    Meng, F.R.2    Zhou, Y.3
  • 33
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in pervasive computing environments
    • Kagal L, Finin T, Joshi A (2001) Trust-based security in pervasive computing environments. Computer 34(12):154–157
    • (2001) Computer , vol.34 , Issue.12 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 40
    • 84905743463 scopus 로고    scopus 로고
    • The simulation of an emotional robot implemented with fuzzy logic
    • Leu FY, Liu JC, Hsu YT, Huang YL (2014) The simulation of an emotional robot implemented with fuzzy logic. Soft Comput J 18(9):1729–1743
    • (2014) Soft Comput J , vol.18 , Issue.9 , pp. 1729-1743
    • Leu, F.Y.1    Liu, J.C.2    Hsu, Y.T.3    Huang, Y.L.4
  • 41
    • 84957069091 scopus 로고    scopus 로고
    • Naive (bayes) at forty: The independence assumption in information retrieval
    • In:, Springer, Berlin
    • Lewis DD (1998) Naive (bayes) at forty: The independence assumption in information retrieval. In: Machine learning: ECML-98, Springer, Berlin, pp 4–15
    • (1998) Machine learning: ECML-98 , pp. 4-15
    • Lewis, D.D.1
  • 43
    • 3142662162 scopus 로고    scopus 로고
    • Web-based reputation management systems: problems and suggested solutions
    • Malaga RA (2001) Web-based reputation management systems: problems and suggested solutions. Electron Commer Res 1(4):403–417
    • (2001) Electron Commer Res , vol.1 , Issue.4 , pp. 403-417
    • Malaga, R.A.1
  • 47
    • 78751642869 scopus 로고    scopus 로고
    • A context-based trust management model for pervasive computing systems
    • Razavi N, Rahmani AM, Mohsenzadeh M (2009) A context-based trust management model for pervasive computing systems. Int J Comput Sci Inf Secur 6(1):137–142
    • (2009) Int J Comput Sci Inf Secur , vol.6 , Issue.1 , pp. 137-142
    • Razavi, N.1    Rahmani, A.M.2    Mohsenzadeh, M.3
  • 48
    • 84863971844 scopus 로고    scopus 로고
    • The effects of an interactive software agent on student affective dynamics while using; an intelligent tutoring system
    • Rodrigo MMT (2012) The effects of an interactive software agent on student affective dynamics while using; an intelligent tutoring system. IEEE Trans Affect Comput 3(2):224–236
    • (2012) IEEE Trans Affect Comput , vol.3 , Issue.2 , pp. 224-236
    • Rodrigo, M.M.T.1
  • 51
    • 84964494064 scopus 로고    scopus 로고
    • Web-based reputation management systems: problems and suggested solutions
    • Sharifi A, Khosravi M, Shah A (2013) Web-based reputation management systems: problems and suggested solutions. Int J Eng Innov Technol (IJEIT) 3(4):40–45
    • (2013) Int J Eng Innov Technol (IJEIT) , vol.3 , Issue.4 , pp. 40-45
    • Sharifi, A.1    Khosravi, M.2    Shah, A.3
  • 53
    • 0030157416 scopus 로고    scopus 로고
    • Mining quantitative association rules in large relational tables
    • Srikant R, Agrawal R (1996) Mining quantitative association rules in large relational tables. ACM SIGMOD Rec 25(2):1–12
    • (1996) ACM SIGMOD Rec , vol.25 , Issue.2 , pp. 1-12
    • Srikant, R.1    Agrawal, R.2
  • 54
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun 24(2):318–328
    • (2006) IEEE J Sel Areas Commun , vol.24 , Issue.2 , pp. 318-328
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 57
    • 84924081025 scopus 로고    scopus 로고
    • Speech emotion recognition using Fourier parameters
    • Wang K, An N, Li BN, Zhang Y (2015) Speech emotion recognition using Fourier parameters. IEEE Trans Affect Comput 6(1):69–75
    • (2015) IEEE Trans Affect Comput , vol.6 , Issue.1 , pp. 69-75
    • Wang, K.1    An, N.2    Li, B.N.3    Zhang, Y.4
  • 61
    • 23044484863 scopus 로고    scopus 로고
    • The computer for the 21st century
    • Weiser M (1999) The computer for the 21st century. Mobile Comput Commun Rev 3(3):3–11
    • (1999) Mobile Comput Commun Rev , vol.3 , Issue.3 , pp. 3-11
    • Weiser, M.1
  • 64
    • 3142738238 scopus 로고    scopus 로고
    • Peertrust: supporting reputation-based trust for peer-to-peer electronic communities
    • Xiong L, Liu L (2004) Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857
    • (2004) IEEE Trans Knowl Data Eng , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 66
    • 33750334203 scopus 로고    scopus 로고
    • A dynamic trust model based on naive bayes classifier for ubiquitous environments
    • In:, Gerndt, M, Kranzlmüller, D, (eds) Springer, Berlin
    • Yuan W, Guan D, Lee S, Lee Y (2006) A dynamic trust model based on naive bayes classifier for ubiquitous environments. In: Gerndt M, Kranzlmüller D (eds) High performance computing and communications. Springer, Berlin, pp 562–571
    • (2006) High performance computing and communications , pp. 562-571
    • Yuan, W.1    Guan, D.2    Lee, S.3    Lee, Y.4
  • 67
    • 33749617232 scopus 로고    scopus 로고
    • Trust promoting seals in electronic markets: impact on online shopping decisions
    • Zhang H (2005) Trust promoting seals in electronic markets: impact on online shopping decisions. J Inf Technol Theory Appl (JITTA) 6(4):29–40
    • (2005) J Inf Technol Theory Appl (JITTA) , vol.6 , Issue.4 , pp. 29-40
    • Zhang, H.1
  • 68
    • 85031765626 scopus 로고    scopus 로고
    • Improved apriori for continuous attributes
    • Zhou S, He S, Wang W (2013) Improved apriori for continuous attributes. Int J Inf Sci Intell Syst 2(1):37–43
    • (2013) Int J Inf Sci Intell Syst , vol.2 , Issue.1 , pp. 37-43
    • Zhou, S.1    He, S.2    Wang, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.