[1] |
WANG Jin, ZHANG Yonghui, GU Xiang.
Trust-aware privacy-preserving scheme for VANET
[J]. Computer Engineering and Applications, 2018, 54(6): 62-67.
|
[2] |
DUAN Dekun, FU Xiufen.
Research on user cold start problem in hybrid collaborative filtering algorithm
[J]. Computer Engineering and Applications, 2017, 53(21): 151-156.
|
[3] |
WANG Qian, WANG Jinhua.
Collaborative filtering recommendation algorithm combining trust mechanism with user preferences
[J]. Computer Engineering and Applications, 2015, 51(10): 261-265.
|
[4] |
LIAO Liefa, ZHANG Weinan.
Trust model of P2P system based on trade characteristics and transaction feedback
[J]. Computer Engineering and Applications, 2014, 50(20): 100-104.
|
[5] |
WANG Chao, ZHONG Hong, SHI Runhua, LU Xiaoling.
Trust evaluation model based on reputation for C2C e-commerce
[J]. Computer Engineering and Applications, 2014, 50(17): 120-124.
|
[6] |
LIN Xiaohui, HU Can, ZHANG Junling.
Utility-based node cooperation in WSNs
[J]. Computer Engineering and Applications, 2014, 50(14): 68-73.
|
[7] |
QIN Zhiguang, YANG Yi, YANG Lei, ZHONG Ting.
Using push-pull mode to achieve reputation system in P2P networks
[J]. Computer Engineering and Applications, 2013, 49(5): 88-92.
|
[8] |
YANG Zhixing, TANG Hongbo, BAI Yi, YANG Sen.
Distributed trust model for mobile P2P networks
[J]. Computer Engineering and Applications, 2013, 49(23): 75-80.
|
[9] |
LU Zhigang1,2.
Dual-fuzzy comprehensive evaluation model for subjective e-commerce reputation
[J]. Computer Engineering and Applications, 2012, 48(29): 34-41.
|
[10] |
SUN Lingling1,2, LUO Yonglong1,2, GUO Liangmin1,2, SUN Liping1,2.
Accumulated score trust model based on reputation
[J]. Computer Engineering and Applications, 2012, 48(27): 69-73.
|
[11] |
LI Zonghai1, LIU Shaojun1, WANG Yan1, WEI Chuanbo2.
Defending against wormhole attacks in wireless sensor networks
[J]. Computer Engineering and Applications, 2012, 48(27): 94-98.
|
[12] |
LUO Weimin1, XIONG Jiang1, LIU Jing2, LIU Jingbo1.
Trust mechanism based on negative evaluation dissemination for P2P networks
[J]. Computer Engineering and Applications, 2012, 48(26): 104-108.
|
[13] |
LI Yundi, MU Kun.
Research on dynamic trust model in open network environment
[J]. Computer Engineering and Applications, 2012, 48(23): 107-110.
|
[14] |
HU Yanhua1, WANG Zhibin2, LI Jianjun1.
Hierarchical task scheduling model based on trust mechanism in grid computing
[J]. Computer Engineering and Applications, 2012, 48(16): 117-122.
|
[15] |
HU Yanhua1, WANG Zhibin2, LI Jianjun1.
Hierarchical task scheduling model based on trust mechanism in grid computing
[J]. Computer Engineering and Applications, 2012, 48(16): 117-122.
|