Trust and Reputation Based Model Selection Mechanism for Decision-Making (English)
- New search for: Zhang, Bo
- New search for: Xiang, Yang
- New search for: Xu, Qiang
- New search for: Zhang, Bo
- New search for: Xiang, Yang
- New search for: Xu, Qiang
In:
NSWCTC, International Conference on Networks Security, Wireless Communications and Trusted Computing, 2
;
14-17
;
2010
-
ISBN:
- Conference paper / Print
-
Title:Trust and Reputation Based Model Selection Mechanism for Decision-Making
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE Computer Society
-
Place of publication:Los Alamitos
-
Publication date:2010
-
Size:4 Seiten, 13 Quellen
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 7
-
Detecting New Decentralized Botnet Based on Kalman Filter and Multi-chart CUSUM AmplificationKang, Jian / Song, Yuan-Zhang et al. | 2010
- 14
-
Trust and Reputation Based Model Selection Mechanism for Decision-MakingZhang, Bo / Xiang, Yang / Xu, Qiang et al. | 2010
- 20
-
Bounds of Channel Assignment Problem for Cellular Networks Modelled as Triangular GridsDuan, Zi-ming / Lv, Ping-li / Miao, Lian-ying / Miao, Zheng-ke et al. | 2010
- 65
-
An Improved Fuzzy Clustering Method for Text MiningDeng, Jiabin / Hu, JuanLi / Chi, Hehua / Wu, Juebo et al. | 2010
- 81
-
A Hypervisor-Based Secure Storage SchemeWang, Dan / Feng, Dengguo et al. | 2010
- 134
-
The Novel Contention Window Control Scheme for IEEE 802.11 Mac ProtocolBalador, Ali / Movaghar, Ali et al. | 2010
- 143
-
Tasks Security Scheduling Based on DPSO in Heterogeneous Grid EnvironmentZhang, Dongfeng / Zhu, Hai / Wang, Yuping / Miao, Zihui et al. | 2010
- 171
-
A Secure Access Approach of UMTS Terminal Based on Trusted ComputingWen, Yingyou / Peng, Xuena / Chen, Shuyi / Zhao, Hong et al. | 2010
- 206
-
A Grid Reputation Model Based on Service QualityDu, Ruizhong / Ma, Xiaoxue / Wang, Zixian / Zhang, Fang et al. | 2010
- 256
-
A Protocol for Bilinear Parings-Based AttestationChen, Ting / Yu, Huiqun / Chen, Wei et al. | 2010
- 282
-
NLSBT: A Localization Scheme for Underwater 3D Acoustic Sensor NetworkLiao, Jun-guo / Zhu, Bin / He, Yong et al. | 2010
- 361
-
Resisting RST Watermarking Algorithm for Image Content AuthenticationLv, Lintao / Hao, Liang / Lv, Hui et al. | 2010
- 362
-
Research on the Cascaded Suppression Method of Blanket Jamming in Satellite Navigation ReceiversShang, Haiying / An, Jianping / Gong, Wenfei et al. | 2010
- 430
-
Semi-proxy Based on Protocol Analysis: A New Design of HTTP Anti-virus GatewayJiang, Zetao / Zhu, Linghong / Xiao, Qinghui et al. | 2010
- 446
-
Design of Passive RFID Reader Based on Mobile PhoneZhang, Ping-chuan / Ma, Guo-feng et al. | 2010
- 454
-
The Model of Trusted Network Connect Based on Credibility of the HierarchyFang, Juan / Zeng, Hongli et al. | 2010
- 537
-
A Hybrid Group Key Management Architecture for Heterogeneous MANETWei, Chu-yuan et al. | 2010
- 564
-
[Roster - Volume 1]| 2010
- 570
-
[Roster - Volume 2]| 2010
- C1
-
[Front cover - Vol 2]| 2010
- C1
-
[Front cover - Vol 1]| 2010
- i
-
[Title page i - Volume 2]| 2010
- i
-
[Title page i - Volume 1]| 2010
- iii
-
[Title page iii - Volume 2]| 2010
- iii
-
[Title page iii - Volume 1]| 2010
- iv
-
[Copyright notice - Volume 1]| 2010
- iv
-
[Copyright notice - Volume 2]| 2010
- v
-
Table of contents - Volume 2| 2010
- v
-
Table of contents - Volume 1| 2010
- xv
-
Organizing Committee - Volume 2| 2010
- xv
-
Organizing Committee - Volume 1| 2010
- xvi
-
Program Committee - Volume 2| 2010
- xvi
-
Program Committee - Volume 1| 2010
- xvii
-
list-reviewer| 2010