The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MANET is a multi-hop network comprised of nodes that need to work in collaboration with each other for effective routing. But unfortunately, there is possibility of some nodes misbehaving for their own interests and disturbing the network. Therefore, reliability among nodes is very important in the network. Uncertainty is of prior importance, which deeply impacts a node's anticipation of others behavior...
Trust plays an important role in decision making especially in cases of uncertainty and incomplete information. There are many challenges to trust calculation. In this paper, we identify the challenges and offer a middleware solution. Our solution consists of a SCOUT middleware and a SCOUT client (Trust Calculator) that can be used by an application to facilitate trust calculation. As validation,...
The main purpose of this paper is to present a new approach for High-Stake Decision Support Systems. We introduce the challenge of the exploitation of heterogeneous community-based knowledge for decision-aid in critical situations. Knowledge shared in e-communities can be very rich, but is also inherently chaotic and questionable. Such uncontrolled knowledge is not usually considered in High-Stake...
One way to minimize threats in P2P system is to exploit reputation to help evaluate the trustworthiness and predict the future behaviors of peers. In this paper, a set of parameters are identified for describing the trust of a peer. And a trust model based on fuzzy techniques is presented. The trust model uses Amplifier of Malicious Behavior (AMB) to intensify malicious behaviors and helps peers identify...
One way to minimize threats in P2P system is to exploit reputation to help evaluate the trustworthiness and predict the future behaviors of peers. Most existing methods for trust management, which are based on reputation, focus on preventing network from the malicious peers. In fact, peers' capabilities to fulfill the tasks are also important factors, which will greatly impact the efficiency of P2P...
Effectiveness of P2P systems highly depends on efficiency of their search algorithms. With existence of malicious and dishonest nodes, reputation systems are essential to evaluate the trustworthiness of participating peers and to combat subversive peer behaviors. Surprisingly majority of the available reputation systems, ignore the underlying search algorithm and assume it pre-existing. In this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.