X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
telecommunications (37) 37
computer science (30) 30
computer science, information systems (30) 30
trusted computing (26) 26
algorithms (24) 24
computer communication networks (24) 24
privacy (24) 24
trusted third parties (24) 24
wireless sensor networks (22) 22
trust (18) 18
analysis (17) 17
communications engineering, networks (17) 17
engineering (17) 17
computer security (16) 16
engineering, electrical & electronic (16) 16
wireless networks (16) 16
security (15) 15
computer networks (14) 14
computer simulation (12) 12
ad hoc networks (11) 11
computer science, theory & methods (11) 11
authentication (10) 10
networks (10) 10
sensors (10) 10
social networks (10) 10
computer science, software engineering (9) 9
cryptography (9) 9
information systems applications (9) 9
location-based services (9) 9
methods (9) 9
remote attestation (9) 9
routing (9) 9
trustworthiness (9) 9
computer science, artificial intelligence (8) 8
data security (8) 8
encryption (8) 8
monitoring (8) 8
remote sensors (8) 8
signal,image and speech processing (8) 8
trusted routing (8) 8
artificial intelligence (7) 7
computers (7) 7
congresses (7) 7
data encryption (7) 7
information systems and communication service (7) 7
internet (7) 7
management (7) 7
network security (7) 7
nodes (7) 7
protection (7) 7
queries (7) 7
recommender systems (7) 7
research (7) 7
trusted third party (7) 7
wireless sensor network (7) 7
authentifizierung (6) 6
computer communication systems (6) 6
information technology (6) 6
informatique (6) 6
internet of things (6) 6
multi-user (6) 6
protocol (6) 6
scheme (6) 6
security measures (6) 6
studies (6) 6
telecommunication (6) 6
ad-hoc-netz (5) 5
cloud computing (5) 5
collaboration (5) 5
computational modeling (5) 5
delays (5) 5
design (5) 5
information systems (5) 5
kongress (5) 5
location based services (5) 5
management of computing and information systems (5) 5
measurement (5) 5
mobile communication systems (5) 5
routing protocols (5) 5
safety and security measures (5) 5
servers (5) 5
software engineering (5) 5
usage (5) 5
vehicles (5) 5
accuracy (4) 4
article subject (4) 4
chemical technology (4) 4
chemistry, analytical (4) 4
communities (4) 4
computation (4) 4
computer privacy (4) 4
computer science, general (4) 4
computer science, hardware & architecture (4) 4
computer software (4) 4
cryptology (4) 4
delay (4) 4
educational institutions (4) 4
electrical engineering (4) 4
electronic devices (4) 4
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Multimedia tools and applications, ISSN 1573-7721, 2017, Volume 77, Issue 4, pp. 4187 - 4202
.... Then, the semantic interest community is constructed through the hierarchical clustering method. Users with a high degree of diversity are selected as trusted neighbors to construct a hybrid recommendation model with a combination of accuracy and diversity. The experimental results show that the hybrid model can improve the diversity of the recommendation system by adjusting the weight factor while having less influence on the accuracy. 
Hybrid recommendation system | Data Structures, Cryptology and Information Theory | Special Purpose and Application-Based Systems | Interest community | Computer Science | Diversity | Trusted neighbor | Multimedia Information Systems | Computer Communication Networks | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Analysis | Algorithms | Accuracy | Ontology | Communities | Semantics | Hybrid systems | Clustering | Model accuracy | Recommender systems
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2015, Volume 63, pp. 183 - 188
.... The simulation results show that network performs better when neighbor node trust management based anomaly detection technique is in place. 
Trusted Node | Risk | Wireless Sensor Network | Intrusion Detection System | Trust | Wireless sensor network | Trusted node | Intrusion detection system
Journal Article
Knowledge-based systems, ISSN 0950-7051, 2016, Volume 103, pp. 19 - 27
Location-based services can provide users’ surroundings anywhere and anytime. While this service brings convenience for users, the disclosure of user’s... 
Location based service | Privacy preference | Location privacy model | k nearest neighbor query | Farthest POI attack | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Computer science | Privacy | Analysis | Query processing | Trusted third parties | Tradeoffs | Strategy | Mathematical models | Knowledge base | Strength
Journal Article
Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, 06/2018, pp. 1 - 11
Journal Article
Wireless Personal Communications, ISSN 0929-6212, 9/2014, Volume 78, Issue 1, pp. 1 - 28
Journal Article
AI Communications, ISSN 0921-7126, 09/2015, Volume 28, Issue 4, pp. 693 - 708
Wireless Sensor Networks (WSNs) have been extensively used in various applications such as environmental monitoring, industrial monitoring, agriculture, green... 
error resilient function | Wireless Sensor Networks | message authentication code | software agents | trusted neighbors | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Journal Article
Knowledge-based systems, ISSN 0950-7051, 2014, Volume 57, pp. 57 - 68
...” to incorporate social trust information (i.e., trusted neighbors explicitly specified by users... 
Trusted neighbors | Collaborative filtering | Data sparsity | Recommender systems | Cold start | INFORMATION | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Cold starts | Filtration | Filtering | Similarity | Confidence | Merging | Knowledge base | Ratings
Journal Article
Xiaoxing Weixing Jisuanji Xitong = Journal of Chinese Computer Systems, ISSN 1000-1220, 01/2018, Issue 7, p. 1482
... it easy to leak location privacy. In order to solve this problem,this paper proposed a homogeneous incremental nearest neighbor query method based on differential perturbation for location privacy protection,adding controllable... 
Privacy | Queries | Algorithms | Trusted third parties | Response time (computers) | Perturbation | Computer privacy
Journal Article
by Hu, L and Wang, J-J and Ni, W-W
Computer Science, ISSN 1002-137X, 08/2012, Volume 39, Issue 8, pp. 173 - 177
With the development of spatial positioning and wireless communication technology, location based services have been promoted greatly. Users can get services... 
Privacy | Query processing | Trusted third parties | Strategy | Mathematical models | Clients | Position (location) | Servers
Journal Article
Knowledge-based systems, ISSN 0950-7051, 2019, Volume 164, pp. 122 - 138
The popularity of social networks has significantly promoted online individual interaction in the society. In online individual interaction, trust plays a... 
Social networks | Trust propagation | Trusted neighbor selection | Interest topics | Trust inference | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Algorithms | Trustworthiness | Network topologies | Semantics | Inference | Topology | Cost analysis | Trust
Journal Article
IEEE access, ISSN 2169-3536, 2019, Volume 7, pp. 61331 - 61341
Journal Article
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE), 10/2014, pp. 233 - 238
... user's trusted neighbors are incorporated to complement and represent the preferences of the active user... 
cold start | collaborative filtering | Accuracy | Collaboration | Prediction algorithms | Educational institutions | data sparsity | Recommender systems | Testing | trusted neighbors | recommender systems
Conference Proceeding
2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 10/2017, Volume 2018-, pp. 21 - 24
Trusted routing is a hot spot in network security. Lots of efforts have been made on trusted routing validation for Interior Gateway Protocols (IGP), e.g.,... 
Trusted Routing | NETCONF | Neighbor | YANG | Routing | Centrally Controlling | IGP | Authentication | Routing protocols | Real-time systems | SDN | Monitoring | OSPF
Conference Proceeding
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, 10/2014, pp. 407 - 416
Resource limitation is considered as a major bottleneck in smart phones. This paper aims to address this problem by proposing a collaborative ad-hoc network of... 
Trusted neighbor devices | Resource limitation | Databases | Collaborative computing | Communities | Middleware | Smart phones
Conference Proceeding
International Journal of Digital Content Technology and its Applications, ISSN 1975-9339, 06/2012, Volume 6, Issue 10, pp. 412 - 420
Journal Article
Lecture Notes in Electrical Engineering, ISSN 1876-1100, 2012, Volume 180, pp. 103 - 117
Conference Proceeding
Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, ISSN 1671-8860, 05/2010, Volume 35, Issue 5, pp. 607 - 609
Journal Article
KSII transactions on Internet and information systems, ISSN 1976-7277, 2014, Volume 8, Issue 1, pp. 74 - 90
...), ant colony optimization (ACO) and Physarum optimization (PO). For trust mechanism, B-iTRP monitors neighbors' behavior in real time and then assesses neighbors' trusts based on AIS... 
Trusted Routing | Artificial Immune System | MWSNs | Bio-inspired | AD HOC | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Wireless sensor networks | Algorithms | Research | Computer network protocols | Mathematical optimization | 컴퓨터학
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.