Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks
暂无分享,去创建一个
Ananthram Swami | Jin-Hee Cho | Ing-Ray Chen | Yating Wang | Kevin S. Chan | A. Swami | Yating Wang | I. Chen | Jin-Hee Cho
[1] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[2] Edward W. Knightly,et al. Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[3] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[4] Benjamin Klöpper,et al. Towards robust service compositions in the context of functionally diverse services , 2012, WWW.
[5] Ananthram Swami,et al. Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[6] Christian Glaßer,et al. Approximability and Hardness in Multi-objective Optimization , 2010, CiE.
[7] Niranjan Suri. Dynamic service-oriented architectures for tactical edge networks , 2009, WEWST '09.
[8] Nizar Bouguila,et al. QoS-Based Reputation Feedback Fusion under Unknown Correlation , 2014, ICAIS.
[9] Anupam Joshi,et al. A distributed service composition protocol for pervasive environments , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[10] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[11] Fei Tao,et al. Resource Service Composition and Its Optimal-Selection Based on Particle Swarm Optimization in Manufacturing Grid System , 2008, IEEE Transactions on Industrial Informatics.
[12] Yong Wang,et al. Trust-Aware Component Service Selection Algorithm in Service Composition , 2009, 2009 Fourth International Conference on Frontier of Computer Science and Technology.
[13] Munindar P. Singh. Trustworthy Service Composition: Challenges and Research Questions , 2002, Trust, Reputation, and Security.
[14] Ing-Ray Chen,et al. A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..
[15] Sokol Kosta,et al. Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[16] Jin-Hee Cho,et al. Trust Management for Encounter-Based Routing in Delay Tolerant Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[17] Jin-Hee Cho,et al. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[18] Carlo Ghezzi,et al. Optimizing Service Selection and Allocation in Situational Computing Applications , 2013, IEEE Transactions on Services Computing.
[19] M. B. Blake,et al. Trust-based Dynamic Web service Composition using Social Network Analysis , 2010, 2010 IEEE International Workshop on: Business Applications of Social Network Analysis (BASNA).
[20] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[21] Boleslaw K. Szymanski,et al. A Model-Driven Approach to the Construction, Composition and Analysis of Services on Sensor Networks , 2010 .
[22] Anja Strunk. QoS-Aware Service Composition: A Survey , 2010, 2010 Eighth IEEE European Conference on Web Services.
[23] Anne H. H. Ngu,et al. QoS-aware middleware for Web services composition , 2004, IEEE Transactions on Software Engineering.
[24] Thomas Risse,et al. Combining global optimization with local selection for efficient QoS-aware service composition , 2009, WWW '09.
[25] Ray-Yuan Sheu,et al. Real-time Multi-agent Adaptive Tactical Pervasive Service-Oriented Collaborations (TAPS) , 2010 .
[26] Ping Sun. Service Composition and Optimal Selection with Trust Constraints , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.
[27] Munindar P. Singh,et al. Trustworthy Service Selection and Composition , 2011, TAAS.
[28] Mohan Kumar,et al. Dynamic Service Composition in Pervasive Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[29] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[30] Nizar Bouguila,et al. Correlated multi-dimensional qos metrics for trust evaluation within web services , 2014, AAMAS.
[31] Audun Jøsang,et al. Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[32] Ananthram Swami,et al. Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[33] Amiya Nayak,et al. A Distributed Constraint Satisfaction Problem Approach to Virtual Device Composition , 2012, IEEE Transactions on Parallel and Distributed Systems.
[34] Eleonora Borgia,et al. The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..
[35] F.T. Johnsen,et al. Pervasive service discovery across heterogeneous tactical networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[36] Munindar P. Singh,et al. Behind the Curtain: Service Selection via Trust in Composite Services , 2012, 2012 IEEE 19th International Conference on Web Services.
[37] Ing-Ray Chen,et al. Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.
[38] Zhe Zhang,et al. Shin: Generalized Trust Propagation with Limited Evidence , 2013, Computer.
[39] Frank T. Johnsen,et al. Semantic Service Discovery for Interoperability in Tactical Military Networks , 2010 .
[40] Jamal Bentahar,et al. A survey on trust and reputation models for Web services: Single, composite, and communities , 2015, Decis. Support Syst..
[41] Nizar Bouguila,et al. Probabilistic approach for QoS-aware recommender system for trustworthy web service selection , 2014, Applied Intelligence.
[42] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[43] Tao Yu,et al. Efficient algorithms for Web services selection with end-to-end QoS constraints , 2007, TWEB.
[44] Tucker R. Balch,et al. A Generic Framework for Distributed Multirobot Cooperation , 2011, J. Intell. Robotic Syst..
[45] Jin-Hee Cho,et al. Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[46] Jana Koehler,et al. Web Service Composition - Current Solutions and Open Problems , 2003 .
[47] Xiaomeng Su,et al. A Survey of Automated Web Service Composition Methods , 2004, SWSWPC.
[48] Shouhuai Xu,et al. Enhancing Data Trustworthiness via Assured Digital Signing , 2012, IEEE Transactions on Dependable and Secure Computing.
[49] Jin-Hee Cho,et al. Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks , 2010, IEEE Transactions on Reliability.
[50] Ing-Ray Chen,et al. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.
[51] Tao Yu,et al. A broker-based framework for QoS-aware Web service composition , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.
[52] Jamal Bentahar,et al. Analyzing the Relationships between some Parameters of Web Services Reputation , 2010, 2010 IEEE International Conference on Web Services.