κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph (English)
- New search for: Chen, S.
- New search for: Wang, G.
- New search for: Jia, W.
- New search for: Chen, S.
- New search for: Wang, G.
- New search for: Jia, W.
In:
INFORMATION SCIENCES
;
318
;
123-143
;
2015
-
ISSN:
- Article (Journal) / Print
-
Title:κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph
-
Contributors:
-
Published in:INFORMATION SCIENCES ; 318 ; 123-143
-
Publisher:
- New search for: Elsevier Science B.V., Amsterdam.
-
Publication date:2015-01-01
-
Size:21 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 020
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 020 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 318
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A polynomial algorithm for solving system of inequalities in max-plus algebraWang, Hui-li / Wang, Xue-ping et al. | 2015
- 14
-
Feature selection for clustering using instance-based learning by exploring the nearest and farthest neighborsChen, Chien-Hsing et al. | 2015
- 28
-
A sequential Bayesian alternative to the classical parallel fuzzy clustering modelAbadpour, Arash et al. | 2015
- 48
-
Special issue on Security, Privacy and Trust in network-based Big DataWang, Hua / Jiang, Xiaohong / Kambourakis, Georgios et al. | 2015
- 51
-
A graph-based comprehensive reputation model: Exploiting the social context of opinions to enhance trust in social commerceYan, Su-Rong / Zheng, Xiao-Lin / Wang, Yan / Song, William Wei / Zhang, Wen-Yu et al. | 2014
- 73
-
Trustworthy answers for top-k queries on uncertain Big Data in decision makingNguyen, H.T.H. / Cao, J. et al. | 2014
- 91
-
Detecting anomalies from big network traffic data using an adaptive detection approachZhang, Ji / Li, Hongzhou / Gao, Qigang / Wang, Hai / Luo, Yonglong et al. | 2014
- 111
-
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryptionWei, Guiyi / Shao, Jun / Xiang, Yang / Zhu, Pingping / Lu, Rongxing et al. | 2014
- 123
-
κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graphChen, Shuhong / Wang, Guojun / Jia, Weijia et al. | 2014
- 144
-
Universal designated verifier transitive signatures for graph-based big dataHou, Shuquan / Huang, Xinyi / Liu, Joseph K. / Li, Jin / Xu, Li et al. | 2015
- IFC
-
Inside Front Cover - Editorial Board| 2015