Journal of Guangxi Normal University(Natural Science Edition) ›› 2010, Vol. 28 ›› Issue (3): 160-164.
Previous Articles Next Articles
QIN Yong-bin, XU Dao-yun, WEI Jia-yin
CLC Number:
[1] 林怀清,李之棠.P2P信任模型关键技术的研究进展[J].小型微型计算机系统,2007,28(9):1599-1603. [2] 贾凡,谢蒂,杨义先.一种时域上的P2P信任模型[J].计算机工程与应用,2007,43(19):115-117. [3] 张骞,张霞,文学志,等.Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报,2006,17(1):96-107. [4] HOU Meng-shu,LU Xian-liang,ZHOU Xu,et al.A trust model of p2p system besed on confirmation theory[J].ACM SIGOPS Operating System Review,2005,39(1):56-62. [5] XIONG Li,LIU Ling.PeerTrust-supporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Transactions on Knowledge andData Engineering,2004,16(7):843-857. [6] SONG Wei-hua,PHOHA Vir V.Neural network-based reputation model in a distributed system[C]//Proceedings of 2004 IEEE International Conference on E-Commerce Technology.San Diego,California,USA:IEEE,2004:321-324. [7] 孟宪福,史磊,王迎春.P2P环境下信任模型研究[J].郑州大学学报:理学版,2007,39(4):122-125. [8] 徐锋,吕建,郑玮,等.一个软件服务协同中信任评估模型的设计[J].软件学报,2003,14(6):1043-1051. [9] WANG Yong-hong,SINGH M P.Trust via evidence combination:a mathmatical approach based on certainty[OL]//A revised and extended version of [Wang and Singh 2007].2007[2009-06-30].ftp://ftp.eos.ncsu.edu/pub/unity/lockers/ftp/cscanontech/2006/TR-2006-11.pdf. |
[1] | TIAN Shikun, TANG Shengda. Scheduling Policy of P2P Real-time Communication with Strict Delay in Fading Channel [J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(6): 122-130. |
[2] | LIANG Yuting, LUO Yuling, ZHANG Shunsheng. Review on Chaotic Image Encryption Based on Compressed Sensing [J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(5): 49-58. |
[3] | XIU Guilin, ZHANG Bowei, LIU Fan, LUO Ao. Server Trusted Framework Based on Trusted CPU Chip [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 43-50. |
[4] | ZHOU Ronglong,LUO Yuling,BI Jinjie,CEN Mingcan,QIU Senhui,LIAO Zhixian. Applications of Image Parallel Encryption Algorithm in Handheld Devices [J]. Journal of Guangxi Normal University(Natural Science Edition), 2019, 37(3): 60-70. |
[5] | LIU Dianting, WU Lina. Domain Experts Recommendation in Social Network Basedon the LDA Theme Model of Trust [J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(4): 51-58. |
[6] | YU Chunqiang , FU Rui , CHEN Yan , LEI Yun , ZHANG Xianquan , WANG Xiaoyun. Protecting Method of Regions of Interest of ImageBased on Information Hiding [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(2): 67-73. |
[7] | SHEN Li-na, JIANG Zhong-cheng, YIN Hui, QIN Xing-ming, LUO Wei-qun. Karst Ecological Environmental System Security Assessment of Guohua Rocky Desertification Area [J]. Journal of Guangxi Normal University(Natural Science Edition), 2014, 32(3): 141-149. |
|