Showing 41 - 60 results of 249 for search 'computational trust', query time: 0.10s Refine Results
  1. 41
  2. 42

    Combining non-Monotone trust rregion method with a new adaptive radius for unconstrained optimization problems by Seyed Hamzeh Mirzaei, Ali Ashrafi

    Published 2024-06-01
    “…Purpose: One of the most effective methods for solving unconstrained optimization problems is the trust region method. The strategy of determining the radius of the trust region has a significant effect on the efficiency of this method. …”
    Get full text
    Article
  3. 43
  4. 44

    A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls by Jun-Hyung Park, Sung-Chae Park, Heung-Youl Youm

    Published 2025-01-01
    “…To address these challenges, this study proposes an enhanced security model that integrates the concepts of Multi-Level Security (MLS) and Zero Trust (ZT). The proposed model classifies data into the following three sensitivity levels: “Classified”, “Sensitive”, and “Open”. …”
    Get full text
    Article
  5. 45
  6. 46

    Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things by Junyu Ren, Haibin Wan, Chaoyang Zhu, Tuanfa Qin

    Published 2023-03-01
    “…To address the challenges, fog computing is generally employed in IoMT systems. However, it raises additional concerns of trust and security. …”
    Get full text
    Article
  7. 47
  8. 48
  9. 49

    Communication-Based Book Recommendation in Computational Social Systems by Long Zuo, Shuo Xiong, Xin Qi, Zheng Wen, Yiwen Tang

    Published 2021-01-01
    “…Therefore, this paper proposes a new method that uses a computational social system, including a trust model based on community relationships, to improve the user similarity calculation accuracy to enhance personalized recommendation. …”
    Get full text
    Article
  10. 50
  11. 51
  12. 52
  13. 53
  14. 54
  15. 55

    A Survey of Game-Theoretic Approach for Resource Management in Cloud Computing by M. O. Agbaje, O. B. Ohwo, T. G. Ayanwola, Ogunyolu Olufunmilola

    Published 2022-01-01
    “…It allows businesses and individuals to subcontract their computing needs as well as trust a network provider with its data warehousing and processing. …”
    Get full text
    Article
  16. 56
  17. 57

    Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing by Changbo Ke, Zhiqiu Huang, Weiwei Li, Yi Sun, Fangxiong Xiao

    Published 2014-01-01
    “…Cloud computing has provided services for users as a software paradigm. …”
    Get full text
    Article
  18. 58
  19. 59
  20. 60

    TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices by Jaemin Park, Sungjin Park

    Published 2025-01-01
    “…Remote attestation (RA) is a process for checking whether a device’s underlying Trusted Computing Base (TCB) and sensing data from the TCB are trustworthy. …”
    Get full text
    Article