[1] |
WU Hang, JIANG Hong.
Collaborative Filtering Recommendation Integrating Potential Social Trust Model
[J]. Computer Engineering and Applications, 2019, 55(20): 114-121.
|
[2] |
ZHAO Zhiguo, TAN Bang, XIA Shiying, TAN Minsheng.
P2P network comprehensive trust model based on time series
[J]. Computer Engineering and Applications, 2017, 53(15): 127-131.
|
[3] |
ZHENG Xiaoyao, LUO Yonglong, CHEN Fulong, SUN Liping.
New dynamic trust model for P2P network with detection
[J]. Computer Engineering and Applications, 2016, 52(2): 135-140.
|
[4] |
JI Meili1, WANG Xinhua1,2.
Research on cooperative caching in mobile P2P network
[J]. Computer Engineering and Applications, 2012, 48(9): 70-73.
|
[5] |
LI Jie.
P2P trust evaluation model with amount of information for rough set
[J]. Computer Engineering and Applications, 2012, 48(6): 90-93.
|
[6] |
WANG Weisheng 1, ZHANG Yong2.
Efficient and Robust Peer-to-Peer Authentication(ER2PA) scheme for Wireless Sensor Networks(WSN)
[J]. Computer Engineering and Applications, 2012, 48(5): 66-70.
|
[7] |
KANG Songlin, WANG Yandong, LI Hui.
Application of trust model in wireless sensor networks intrusion detection
[J]. Computer Engineering and Applications, 2012, 48(5): 89-92.
|
[8] |
REN Feng, CAO Dun, FU Ming.
OLAP query algorithm based on real-time semantic dimension hierarchical
[J]. Computer Engineering and Applications, 2012, 48(4): 149-151.
|
[9] |
LI Chunxiu1,2, LIU Fang’ai1,2.
Resources search strategy based on ant colony algorithm in unstructured P2P networks
[J]. Computer Engineering and Applications, 2012, 48(4): 97-99.
|
[10] |
ZHOU Lipeng, Moydin Kamil.
Cluster head selection algorithm in WSN considering security and remaining energy
[J]. Computer Engineering and Applications, 2012, 48(3): 88-90.
|
[11] |
CHENG Fan, WANG Xiaoming.
Access control based on clustering in Ad Hoc networks
[J]. Computer Engineering and Applications, 2012, 48(28): 97-100.
|
[12] |
YANG Maoyun1, REN Shijin1, HOU Mo1, ZHENG Enhui2.
Optimizing J?sang’s subjective trust model
[J]. Computer Engineering and Applications, 2012, 48(24): 106-112.
|
[13] |
WU Hui1, YU Jiong1, YU Feiran2.
Dynamic access control algorithm based on trust model in cloud computing
[J]. Computer Engineering and Applications, 2012, 48(23): 102-106.
|
[14] |
FAN Yuanyuan, MI Xifeng.
Structured P2P approach for high efficient distributed task scheduling
[J]. Computer Engineering and Applications, 2012, 48(19): 97-100.
|
[15] |
BAO Meiying1,2, SHEN Jinxiang2.
Research on security of constraints resource scheduling in grid environment
[J]. Computer Engineering and Applications, 2012, 48(17): 134-138.
|