The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust is a fundamental issue in Pervasive computing, especially when they are applied in unstructured P2P systems. The computational models of trust play an important role in determining who and how to interact in open and dynamic environments. However, current models are not efficient or scalable enough with the expansion of system. To this end, a computation trust model with confidence is proposed...
The strength of model link lies in analyzing spatial data and generating useful information. The linked model have a quantitative specification essentially like empirically based models: statistical models provide high degrees of precision and specified levels of sensitivity and reliability. It also hoped to solve some problems encountered by empirically based approaches through behavioral parameter...
For the maximize profits, the decision of how to obtain optimal quantity for the two kinds of perishable high-tech products is discussed, with two-direction substitutable demand and considering the cost of out-of-stock products. By establishing stochastic demand model, the optimal ordering quantity policy is derived, with two-direction substitutable demand. A numerical example is used to demonstrate...
RBAC (role-based access control) has been widely investigated and adopted for its simplicity and effectiveness. However, there still exist some defects in it, including: (1) traditional RBAC does not consider time and context factors. (2) traditional RBAC only defines a simple logical relationship among roles and permissions, which makes it incompetent to solve authorization problem for large-scale...
As the most important component of pervasive computing in mobile business, context-aware system gets more and more attention from the researchers. One of the basic technologies used to implement the contexts' description and reasoning in context-aware systems is ontology which has the big advantage at knowledge presenting and sharing. However, the shortage of the existing methods with ontology is...
The paper describes an incremental advance in search engine from Internet information searching to information summarizing service. This incremental innovation requires only existing text summarization technologies and can be achieved within a shorter time frame than other radical innovations that may require years of effort on to-be-developed or to-be-validated technologies. The potential business...
With the information explosion speeds up the increasing of computing complexity rapidly, the traditional centralized computing patterns are under great pressure to process those large-scale distributed information. However, the agent-based computation and high-level interaction protocols foster the modern computation and distributed information processing successfully. The multi-agent system (MAS)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.