-
1
Edge computing offloading policies and resource allocation considering system fairness in trusted environments
Published 2024-03-01Subjects: Get full text
Article -
2
-
3
Trust transitivity algorithm based on multiple influencing factors for grid environment
Published 2011-01-01Subjects: Get full text
Article -
4
-
5
Context-aware and self-adaptive trust model for pervasive computing
Published 2012-11-01Subjects: Get full text
Article -
6
Distributed trust model based on parameter modeling
Published 2013-04-01Subjects: Get full text
Article -
7
Dynamic P2P trust model based on time-window feedback mechanism
Published 2010-01-01Subjects: Get full text
Article -
8
Fuzzy trust model for wireless sensor networks with intrusion tolerance
Published 2010-01-01Subjects: Get full text
Article -
9
Dynamic trust model based on recommendation chain classification in complex network environment
Published 2015-09-01Subjects: Get full text
Article -
10
A Verifiable Discrete Trust Model (VDTM) Using Congruent Federated Learning (CFL) for Social Internet of Vehicles
Published 2024-01-01Subjects: Get full text
Article -
11
Robust multi-dimensional trust model for improving the survivability of ad hoc networks
Published 2010-01-01Subjects: Get full text
Article -
12
Collaborative filtering recommendation algorithm based on one-jump trust model
Published 2015-06-01Subjects: Get full text
Article -
13
Trust comprehensive evaluation based on the fuzzy inference theory in P2P network
Published 2009-01-01Subjects: Get full text
Article -
14
Trust model based on individual experience
Published 2008-01-01Subjects: “…trust model…”
Get full text
Article -
15
Colluding clique detector based on activity similarity in P2P trust model
Published 2009-01-01Subjects: Get full text
Article -
16
Research on trust measure and management for open distributed systems based on dynamic grouping
Published 2015-01-01Subjects: Get full text
Article -
17
Trust-driven job scheduling heuristics for computing grid
Published 2006-01-01Subjects: Get full text
Article -
18
Novel continuous identity authentication method based on mouse behavior
Published 2022-10-01Subjects: Get full text
Article -
19
Subjective trust evaluation model based on membership cloud theory
Published 2008-01-01Subjects: “…subjective trust model…”
Get full text
Article -
20
Research on selective trust-path search and aggregation in distributed environment
Published 2012-09-01Subjects: Get full text
Article