Evaluation of network trust using provenance based on distributed local intelligence
暂无分享,去创建一个
Prasant Mohapatra | Jin-Hee Cho | Gulustan Dogan | Theodore Brown | Tarek F. Abdelzaher | Mohammad Maifi Hasan Khan | Kannan Govindan
[1] Chris Cornelis,et al. Towards a Provenance-Preserving Trust Model in Agent Networks , 2006, MTW.
[2] Jennifer Golbeck,et al. Using Trust and Provenance for Content Filtering on the Semantic Web , 2006, MTW.
[3] Lance M. Kaplan,et al. Target localization using proximity binary sensors , 2010, 2010 IEEE Aerospace Conference.
[4] Daniel Crawl,et al. A Provenance-Based Fault Tolerance Mechanism for Scientific Workflows , 2008, IPAW.
[5] Margo Seltzer,et al. Foundations for provenance-aware systems , 2010 .
[6] Juliana Freire,et al. Provenance and scientific workflows: challenges and opportunities , 2008, SIGMOD Conference.
[7] Luc Moreau,et al. Stream ancestor function: A mechanism for fine-grained provenance in stream processing systems , 2012, 2012 Sixth International Conference on Research Challenges in Information Science (RCIS).
[8] Frank Kelly. Dynamic Routing in Stochastic Networks , 1995 .
[9] Margo I. Seltzer,et al. Provenance: a future history , 2009, OOPSLA Companion.
[10] Omer F. Rana,et al. Evaluating Provenance-based Trust for Scientific Workflows , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).
[11] Ian Foster,et al. The First Provenance Challenge , 2008 .
[12] Wang Chiew Tan. Provenance in Databases: Past, Current, and Future , 2007, IEEE Data Eng. Bull..
[13] Pramod K. Varshney,et al. An intelligent deployment and clustering algorithm for a distributed mobile sensor network , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[14] Jennifer Widom,et al. Trio: A System for Integrated Management of Data, Accuracy, and Lineage , 2004, CIDR.
[15] Ping Ji,et al. Tiered architecture for on-line detection, isolation and repair of faults in wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[16] James Cheney,et al. Causality and the Semantics of Provenance , 2010, DCM.
[17] Yang-Sae Moon,et al. Assessing the Trustworthiness of Streaming Data , 2010 .