2014 IEEE Global Conference on Wireless Computing &Amp; Networking (GCWCN) 2014
DOI: 10.1109/gcwcn.2014.7030882
|View full text |Cite
|
Sign up to set email alerts
|

Bayesian network based trust model with time window for Pure P2P computing systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…To demonstrate the performance of our LCT model, we deploy and implement a cross-domain scenario, and conduct comprehensive experiments and analysis in this work. The results indicate that our LCT model is superior to the BN model [4] and the CR model, and significantly improves the successful interaction rates of the honest entities without increasing the risks of interacting with the malicious entities. The remainder of this paper is organized as follows.…”
Section: ) Our Lct Model Is Of High Performancementioning
confidence: 90%
See 1 more Smart Citation
“…To demonstrate the performance of our LCT model, we deploy and implement a cross-domain scenario, and conduct comprehensive experiments and analysis in this work. The results indicate that our LCT model is superior to the BN model [4] and the CR model, and significantly improves the successful interaction rates of the honest entities without increasing the risks of interacting with the malicious entities. The remainder of this paper is organized as follows.…”
Section: ) Our Lct Model Is Of High Performancementioning
confidence: 90%
“…Honest behaviors should be stimulated while malicious ones should be punished. Recently, a mass of trust models for the mobile distributed environment have been proposed [3][4][5][6][7][8][9][10][11][12][13][14]. In the classic trust models (as shown in Fig.…”
Section: Introductionmentioning
confidence: 99%
“…Trust factor has been introduced by using probability function. [8] Author represents task scheduling in multiprocessor system. By creating a queue, a novel scheduling approach has been designed, which uses a searching algorithm that is breath first search.…”
Section: Task Scheduling Algorithmsmentioning
confidence: 99%
“…In this paper, we focus on a Bayesian perspective for trust modeling for agents in networked computing systems. In spite of a few attempts to model trust using Bayesian techniques [76,77,78,79,80,81,82,83,84,85], the field lacks a global overview for variants of Bayesian trust models and a discussion on their connections between each other. We present a study to fill in this gap.…”
Section: Introductionmentioning
confidence: 99%