Computer Science ›› 2015, Vol. 42 ›› Issue (1): 113-118.doi: 10.11896/j.issn.1002-137X.2015.01.027
Previous Articles Next Articles
CHEN Wei-dong, LI Min-qiang and ZHAO Qing-zhan
[1] Wang Y,Vassileva J.Toward Trust and Reputation Based Web Service Selection:A Survey[J].International Transactions on Systems Science and Applications,2007,3(2):118-132 [2] Yolum P,Singh M P.An agent-based approach for trustworthy service location[C]∥Proc.of the 1st Int’l Workshop on Agents and Peer-to-Peer Computing.2002:45-56 [3] Sensoy M,Pembe F C,Zirtiloglu H,et al.A Experience-Basedservice provider selection in agent-mediated e-commerce[J].Engineering Applications of Artificial Intelligence,2007,0(3):325-335 [4] Yu B,Singh M P.Social Networks and Trust:Detecting Deception in Reputation management [C]∥Proc.Int’l Joint Conf.Autonomous Agents and Multi-agent Systems.2003:73-80 [5] Galizia S,Gugliotta A,Domingue J.A Trust Based Methodology for Web Service Selection[C]∥International Conference on Semantic Computing.2007:193-201 [6] Manikrao U S,Prabhakar T V.Dynamic Selection of Web Services with Recommendation System[C]∥International Confe-rence on Next Generation Web services Practices.August 2005:342-352 [7] Maximilien E M,Singh M P.Toward autonomic Web servicestrust and selection [C]∥Proceedings of the 2nd International Conference on Service Oriented Computing.ACM Press,2004:212-221 [8] Maximilien E M,Singh M P.Conceptual Model of Service Reputation[C]∥Special Section on Semantic Web and Data Management.SIGMOD Record,2002:264-283 [9] Aberer K,Despotovic Z.Managing trust in a peer-2-peer information system[C]∥Proceedings of CIKM.2001:142-156 [10] Damiani E,Vimercati D,D C,et al.Resources in peer-to-peernetworks [C]∥Proceedings of ACM conference on computer and communications security (CCCS).2002:185-198 [11] Kamvar S D,Schlosser M T,Garcia-Molina H.The eigentrust algorithm for reputation management in P2P networks[C]∥Proceedings of World Wide Web (WWW) Conference.2003:346-353 [12] Buchegger S,Boudec J L.A robust reputation system for P2P and mobile ad-hoc networks[C]∥Proceedings of workshop on economics of peer-to-peer systems (P2PEcon).2004:271-282 [13] Srivatsa M,Xiong L,Liu L.Trust guard:countering vulner abilities in reputation management for decentralized overlay networks[C]∥Proceedings of World Wide Web (WWW) Confe-rence.2005:286-294 [14] Walsh K,Sirer E G.Experience with an object reputation system for peer-to-peer file sharing[C]∥Proceedings of Unix Networked Systems Design and Implementation.2006:389-396 [15] Gambetta D.Can we trust? [M]∥Gambetta D,ed.Trust:Ma-king and Breaking Cooperative Relations.Oxford:Basil Blackwell,1990:213-238 [16] Abdul-Rahman,Hailes S.Supporting trust in virtual communities[C]∥Proc.of the 33rd Hawaii Int’l Conf.on System Sciences.Hawaii:IEEE Computer Society Press,2000:4-7 [17] Xiong L,Liu L.PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities [J].IEEE Trans.Knowl.Data Eng.(TKDE),2004,16(7):843-857 [18] Uchegger S,LeBoudec J-Y.A robust reputation system for p2p and mobile ad-hoc networks[C]∥Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems.2004:213-225 [19] Motallebi M R,Ishikawa F,Honiden S.Trust Computation in Web Service Compositions Using Bayesian Networks[C]∥International Conference on Web Services.2012:623-626 [20] Yang Nian-hua,Chen Xin,Yu Hui-qun.A Reputation Evaluation Technique for Web Services [J].Security and Its Applications,2012,6(2):329-334 [21] Malik Z,Bouguettaya A.Reputation Bootstrapping for TrustEstablishment among Web Services [J].IEEE Internet Computing,2009,13(1):40-47 [22] 李治军,姜守旭,李晓义.采用排名反馈的 P2P名誉评价模型[J].软件学报,2011,2(4):745-760 [23] 杨超,刘念祖.RepTrust:P2P环境下基于声誉的信任模型[J].计算机科学,2011,8(3):126-132 [24] 王勇,侯洁,白杨,等.基于反馈相关性的P2P网络信任模型[J].计算机科学,2013(2):67-74 [25] 于坤.P2P网络激励兼容的声誉评价及服务分配[J].计算机应用研究,2012,9(6):78-84 [26] 杨旭东.一种从Web日志中挖掘用户浏览偏爱路径的算法[J].重庆理工大学学报,2012,6(10) |
No related articles found! |
|