JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2014, Vol. 44 ›› Issue (5): 29-34.doi: 10.6040/j.issn.1672-3961.0.2013.286
Previous Articles Next Articles
CHENG Tianliang, ZHAI Yuqing
CLC Number:
[1] AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al.Wireless sensor networks: a survey[J].Computer Networks, 2002, 38(4):393-422. [2] HAENGGI M, REUTHER A I, GOODMAN J I, et al.Handbook of sensor networks:compact wireless and wired sensing systems[M].Boca Raton:CRC Press, 2004:27-59. [3] POTTIE G J, KAISER W J.Wireless integrated network sensors[J].Communications of the ACM, 2000, 43(5):51-58. [4] SU W T, CHANG K M, KUO Y H.eHIP:an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks[J].Computer Networks, 2007, 51(4):1151-1168. [5] YAO Z, KIM D, DOH Y.PLUS:parameterized and localized trust management scheme for sensor networks security[C]//Mobile Ad Hoc and Sensor Systems (MASS).Hong Kong:Springer, 2006:437-446. [6] FENG R, XU X, ZHOU X, et al.A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory[J].Sensors, 2011, 11(2):1345-1360. [7] YICK J, MUKHERJEE B, GHOSAL D.Wireless sensor network survey[J].Computer Networks, 2008, 52(12):2292-2330. [8] KIM T K, SEO H S.A trust model using fuzzy logic in wireless sensor networks[J].World Academy of Science, Engineering and Technology, 2008, 42(4):63-66. [9] GANERIWAL S, SRIVASTAVA M B.Reputation-based framework for high integrity sensor networks[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM, 2004:66-77. [10] SHAIKH R A, JAMEEL H, D'AURIOL B J, et al.Group-based trust management scheme for clustered wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems, 2009, 20(11):1698-1712. [11] ZAHARIADIS T, LELIGOU H C, TRAKADAS P, et al.Trust management in wireless sensor networks[J].European Transactions on Telecommunications, 2010, 21(4):386-395. [12] LIU D, NING P, DU W.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems.Washington, D C, USA:IEEE, 2005:609-619. [13] CHO Y, QU G, WU Y.Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks[C]//IEEE Symposium on Security and Privacy Workshops (SPW) San Francisco.CA, USA:IEEE, 2012:134-141. [14] PIRESJR W R, DE PAULA FIGUEIREDO T H, WONG H C, et al.Malicious node detection in wireless sensor networks[C]//Proceedings of the 18th Conference on International Parallel and Distributed Processing Symposium.[S.l]:IEEE, 2004:24-35. [15] VARLAMIS I, EIRINAKI M, LOUTA M.Application of social network metrics to a trust-aware collaborative model for generating personalized user recommendations [M].Vienna:Springer, 2013:49-74. [16] VARLAMIS I, LOUTA M.Towards a personalized blog site recommendation system:a collaborative rating approach[C]//4th International Workshop on Semantic Media Adaptation and Personalization.San Sebastain, Spain:IEEE, 2009:38-43. [17] KALE A.Modeling trust and influence on blogosphere using link polarity[D].Washington:MaryLand University, 2007. [18] MASSA P, AVESANI P.Controversial users demand local trust metrics:an experimental study on Epinions.com community[C]//Proceedings of the National Conference on Artificial Intelligence.Menlo Park, CA:AAAI Press, 2005:121-127. [19] YU B, SINGH M P.A social mechanism of reputation management in electronic communities [M]//Cooperative Information Agents IV-The Future of Information Agents in Cyberspace.Berlin:Springer, 2000:154-165. [20] 张润萌.基于可信机制的个性化推荐技术及其应用研究[D].南京:东南大学, 2011.ZHANG Runmeng.Personalized recommendation technology and its application based on credible mechanism[D].Nanjing:Southeast University, 2011. [21] 孔德华.基于信任的云服务推荐系统的研究与实现[D].南京:东南大学,2013.KONG Dehua.Research and implementation of a trusted recommendation system based on cloud services[D].Nanjing:Southeast University, 2013. [22] 张彭成.基于信任的云服务组合机制的研究[D].南京:东南大学,2013.ZHANG Pengcheng.A combination of cloud services mechanism based on trust[D].Nanjing:Southeast University, 2013. [23] Leon Gu.Dirichlet distribution, dirichlet process and dirichlet process Mixture[R/OL].[2013-10-10].http://www.cs.cmu.edu/~epxing/Class/10701-08s/recitation/dirichlet.pdf. [24] WERNER-ALLEN G, JOHNSON J, RUIZ M, et al.Monitoring volcanic eruptions with a wireless sensor network[C]//Proceedings of the Second European Workshop on Wireless Sensor Networks.Turkey:IEEE, 2005:108-120. [25] ZHANG Y, LEE W.Intrusion detection in wireless ad-hoc networks[C]//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston:ACM, 2000:275-283. |
[1] | LI Shijin, WANG Shengte, HUANG Leping. Change detection with remote sensing images based on forward-backward heterogenicity [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 1-9. |
[2] | WANG Huan, ZHOU Zhongmei. An over sampling algorithm based on clustering [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 134-139. |
[3] | ZHANG Peirui, YANG Yan, XING Huanlai, YU Xiuying. Incremental multi-view clustering algorithm based on kernel K-means [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 48-53. |
[4] | DU Xixi, LIU Huafeng, JING Liping. An additive co-clustering for recommendation of integrating social network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 96-102. |
[5] | YANG Tianpeng, XU Kunpeng, CHEN Lifei. Coefficient of variation clustering algorithm for non-uniform data [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 140-145. |
[6] | DAI Shiyu, LIU Shuqin. Estimation of speed and acceleration of the Maglev platform by state observer [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(2): 114-120. |
[7] | PANG Renming, WANG Bo, YE Hao, ZHANG Haifeng, LI Mingliang. Clustering of blast furnace historical data based on PCA similarity factor and spectral clustering [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(5): 143-149. |
[8] | HAN Guangdong, ZHANG Tong, CHEN Haiquan, WANG Shenghai, ZHANG Jinnan. Payload pendulation dynamic analysis of ship-mounted crane [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(1): 112-118. |
[9] | WEI Lulu, LAI Yanhua, LU Yongda. The influence of transmission loss on the cold of Stirling cryocooler [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(5): 116-119. |
[10] | ZHOU Wang, ZHANG Chenlin, WU Jianxin. Qualitative balanced clustering algorithm based on Hartigan-Wong and Lloyd [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(5): 37-44. |
[11] | JI Xingquan, HAN Guozheng, LI Kejun, FU Rongrong, ZHU Yanghe. Application of improved K-means clustering algorithm based on density in distribution network block partitioning [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(4): 41-46. |
[12] | LI Shuo, SHI Yuliang. The method of spot cluster recommendation in location-based social networks [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(3): 44-50. |
[13] | JIANG Feng, DU Junwei, LIU Guozhu, SUI Yuefei. A weight-based initial centers selection algorithm for K-modes clustering [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(2): 29-34. |
[14] | FAN Shuyan, DING Shifei. An improved multi-scale Graph cut algorithm [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(1): 28-33. |
[15] | XU Pingan, TANG Yan, SHI Jiaokai, ZHANG Huirong. K-Means clustering algorithm based on the Schrödinger equation [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(1): 34-41. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 335
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 1208
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Cited |
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Shared | ||||||||||||||||||||||||||||||||||||||||||||||||||
Discussed |
|