Author of the publication

A Fuzzy Set Based Trust and Reputation Model in P2P Networks.

, , and . IDEAL, volume 3177 of Lecture Notes in Computer Science, page 211-217. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigation of line tunnel field effect transistor with Ge/Si heterojunction., , , , and . ASICON, page 1-4. IEEE, (2015)Time elasticity evaluation of flight turnaround ground service process., , , , , and . ICIT, page 519-524. ACM, (2021)Hierarchical modular structure in gene coexpression networks.. ISB, page 118-124. IEEE, (2012)A Multiple Regression Approach for Building Genetic Networks., , , , and . BMEI (1), page 18-23. IEEE Computer Society, (2008)A Probabilistic Model for Clustering Text Documents with Multiple Fields., , , and . ECIR, volume 4425 of Lecture Notes in Computer Science, page 331-342. Springer, (2007)An Efficient Vehicular Intrusion Detection Method Based on Edge Intelligence., , , , and . CSCWD, page 2999-3004. IEEE, (2024)Data Aggregation Scheme Based on Compressed Sensing in Wireless Sensor Network., , and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 556-561. Springer, (2012)On the Existence of Coupled Fractional Jerk Equations with Multi-Point Boundary Conditions., , and . Axioms, 10 (2): 103 (2021)Existence of a solution for the fractional differential equation with nonlinear boundary conditions.. Comput. Math. Appl., 61 (4): 1202-1208 (2011)Using Social Media for E-government Services: A Service-level Perspective of Citizen Adoption., and . ICIEI, page 193-198. ACM, (2023)