一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機號碼
標(biāo)題
留言內(nèi)容
驗證碼

基于拓撲勢的P2P社區(qū)推薦信任模型

韓祺祎 任夢吟 文紅

韓祺祎, 任夢吟, 文紅. 基于拓撲勢的P2P社區(qū)推薦信任模型[J]. 電子與信息學(xué)報, 2015, 37(6): 1279-1284. doi: 10.11999/JEIT141303
引用本文: 韓祺祎, 任夢吟, 文紅. 基于拓撲勢的P2P社區(qū)推薦信任模型[J]. 電子與信息學(xué)報, 2015, 37(6): 1279-1284. doi: 10.11999/JEIT141303
Han Qi-yi, Ren Meng-yin, Wen Hong. Topological Potential Based Recommendation Trust Model for P2P Communities System[J]. Journal of Electronics & Information Technology, 2015, 37(6): 1279-1284. doi: 10.11999/JEIT141303
Citation: Han Qi-yi, Ren Meng-yin, Wen Hong. Topological Potential Based Recommendation Trust Model for P2P Communities System[J]. Journal of Electronics & Information Technology, 2015, 37(6): 1279-1284. doi: 10.11999/JEIT141303

基于拓撲勢的P2P社區(qū)推薦信任模型

doi: 10.11999/JEIT141303
基金項目: 

國家自然科學(xué)基金(61032003, 61271172)和教育部博士點基金(20120185110030, 20130185130002, 20120185110025)資助課題

Topological Potential Based Recommendation Trust Model for P2P Communities System

  • 摘要: 對等網(wǎng)(P2P)系統(tǒng)因其開放性和匿名性等特點易受到惡意攻擊和非法濫用,建立基于社區(qū)的信任模型是一個行之有效的解決途徑。而現(xiàn)有的模型忽略了節(jié)點的動態(tài)性、活躍度及影響范圍。該文在分析了P2P用戶模型后,提出一種基于拓撲勢的P2P社區(qū)推薦信任模型,綜合評估了節(jié)點的影響力、交易量及信任度。在該模型中,分別建立了社區(qū)內(nèi)部和跨社區(qū)信任度計算機制,給出了超級節(jié)點評選算法。最后的仿真實驗結(jié)果驗證了該信任模型的有效性和魯棒性。
  • Feldman M, Padimitriou C, Chuang J, et al.. Free-riding and whitewashing in peer-to-peer systems[J]. IEEE Selected Areas in Communications, 2006, 24(5): 1010-1019.
    Saroiu S, Gummadi P K, and Gribble S D. A measurement study of peer-to-peer file sharing systems[C]. SPIE International Conference on Multimedia Computing and Networking, San Jose, USA, 2002: 156-170.
    Huang Kun and Wang Lu. Research of trust model based on peer-to-peer network security[C]. IEEE International Conference on Information Technology and Applications, Chengdu, China, 2013: 126-129.
    Ahmet C and Bharat B. SORT: a self-organizing trust model for peer-to-peer systems[J]. IEEE Transactions on Dependable and Secure Computing, 2013, 10(1): 14-27.
    Kamvar D and Schlosser T. EigenRep: reputation management in P2P networks[C]. The 12th ACM International World Wide Web Conference, Budapest, Hungary, 2003: 123-134.
    竇文, 王懷民, 賈焰, 等. 構(gòu)造基于推薦的Peer-to-Peer環(huán)境下的Trust模型[J]. 軟件學(xué)報, 2004, 15(4): 571-583.
    Dou Wen, Wang Huai-min, Jia Yan, et al.. A recommendation-based peer-to-peer trust model[J]. Journal of Software, 2004, 15(4): 571-583.
    Zhou Run-fang, Hwang Kai, and Cai Min. GossipsTrust for fast reputation aggregation in peer-to-peer networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(9): 1282-1295.
    Xu Hai-mei, Liu Yu-lin, Qi Shou-qing, et al.. A novel trust model based on probability and statistics for peer to peer networks[C]. IEEE International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, Chengdu, China, 2013: 2047-2050.
    Wang Guo-jun, Felix M, Guo Song, et al.. Neighbor similarity trust against sybil attack in P2P e-commerce[J]. IEEE Transactions on Parallel and Distributed Systems, DOI: 10.1109/TPDS.2014.2312932.
    Li Xiong and Ling Liu. PeerTrust: supporting reputation- based trust for peer-to-peer electronic communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 843-857.
    田春岐, 江建慧, 胡治國, 等. 一種基于聚集超級節(jié)點的P2P網(wǎng)絡(luò)信任模型[J]. 計算機學(xué)報, 2010, 33(2): 345-355.
    Tian Chun-qi, Jiang Jian-hui, Hu Zhi-guo, et al.. A novel super peer based trust model for peer to peer networks[J]. Chinese Journal of Computers, 2010, 33(2): 345-355.
    Adele J, Rameez R, Tamas V, et al.. Systemic risk and user-level performance in private P2P communities[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(12): 2503-2512.
    Niu Chang-yong, Luo Heng, Fan Ming, et al.. On feedback similarity measurement in web of trust[C]. IEEE Global Congress on Intelligent Systems, Xiamen, China, 2009, 3: 33-37.
    Wang Jun-she, Li Xiao-long, and Zhang Yun. Research of P2P network trust model[C]. IEEE International Conference on Intelligent Human-Machine Systems and Cybernetics, Hangzhou, China, 2013: 70-73.
    張健沛, 李泓波, 楊靜, 等. 基于拓撲勢的網(wǎng)絡(luò)社區(qū)結(jié)點重要度排序算法[J]. 哈爾濱工程大學(xué)學(xué)報, 2012, 33(6): 745-752.
    Zhang Jian-pei, Li Hong-bo, Yang Jing, et al.. An importance-sorting algorithm of network community nodes based on topological potential[J]. Journal of Harbin Engineering University, 2012, 33(6): 745-752.
    淦文燕, 赫南, 李德毅, 等. 一種基于拓撲勢的網(wǎng)絡(luò)社區(qū)發(fā)現(xiàn)方法[J]. 軟件學(xué)報, 2009, 20(8): 2241-2254.
    Gan Wen-yan, He Nan, Li De-yi, et al.. Community discovery method in networks based on topological potential[J]. Journal of Software, 2009, 20(8): 22412254.
    王子厚, 韓言妮, 林濤, 等. 可重構(gòu)網(wǎng)絡(luò)中基于中心度與拓撲勢排序的資源分配算法[J]. 通信學(xué)報, 2012, 33(8): 10-20.
    Wang Zi-hou, Han Yan-ni, Lin Tao, et al.. Resource allocation algorithms in the reconfigurable network based on network centrality and topology potential[J]. Journal on Communications, 2012, 33(8): 10-20.
  • 加載中
計量
  • 文章訪問數(shù):  1539
  • HTML全文瀏覽量:  167
  • PDF下載量:  629
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2014-10-11
  • 修回日期:  2015-01-04
  • 刊出日期:  2015-06-19

目錄

    /

    返回文章
    返回