Nothing Special   »   [go: up one dir, main page]

Dubey et al., 2014 - Google Patents

Bayesian network based trust model with time window for pure P2P computing systems

Dubey et al., 2014

View PDF
Document ID
16054409243786919001
Author
Dubey J
Tokekar V
Publication year
Publication venue
2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN)

External Links

Snippet

In recent years P2P computing systems gain popularity and impact due to the anonymity, dynamism, scalability, and cost sharing. Due to autonomy of peers and open environment, security is big issue in P2P computing systems. Traditional security mechanisms used in …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/12Computer systems based on biological models using genetic models
    • G06N3/126Genetic algorithms, i.e. information processing using digital simulations of the genetic system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network

Similar Documents

Publication Publication Date Title
Yu et al. A survey of multi-agent trust management systems
Witt et al. Decentral and incentivized federated learning frameworks: A systematic literature review
Nitti et al. A subjective model for trustworthiness evaluation in the social internet of things
Kurdi HonestPeer: An enhanced EigenTrust algorithm for reputation management in P2P systems
Ng et al. A hierarchical incentive design toward motivating participation in coded federated learning
Balusamy et al. Bio-inspired algorithms for cloud computing: a review
Kurniawan et al. A trust model-based Bayesian decision theory in large scale Internet of Things
Alam et al. Trust management in social internet of things (SIoT): a survey
Tian et al. A DS evidence theory based fuzzy trust model in file-sharing P2P networks
Dubey et al. Bayesian network based trust model with time window for pure P2P computing systems
Magdich et al. Context-awareness trust management model for trustworthy communications in the social internet of things
Chen et al. Prevention method of block withholding attack based on miners’ mining behavior in blockchain
Jain et al. Blockchain enabled trusted task offloading scheme for fog computing: A deep reinforcement learning approach
Khan et al. Machine learning aided blockchain assisted framework for wireless networks
Saravana Kumar et al. Trust based resource selection with optimization technique
Bidgoly et al. Robustness evaluation of trust and reputation systems using a deep reinforcement learning approach
Chen et al. Parameter-estimation based trust model for unstructured peer-to-peer networks
Raamakirtinan et al. Identifying influential spreaders in complex networks based on weighted mixed degree decomposition method
Al-Shamaileh et al. Evaluating trust and reputation models for IoT environment
Zhuohao et al. A Blockchain-Based Auditable Semi-Asynchronous Federated Learning for Heterogeneous Clients
Abadi et al. A comprehensive soft security model for Cognitive Internet of Things
Cai et al. Influence maximization for dynamic allocation in voter dynamics
Kim et al. Application of max-sum algorithm to radar coordination and scheduling
Manimala et al. Hybrid Chameleon and Honey Badger Optimization Algorithm for QoS-Based Cloud Service Composition Problem.
Zade et al. An improved Caledonian crow learning algorithm based on ring topology for security-aware workflow scheduling in cloud computing