Author of the publication

On Trustworthy Reputation Evidence Establishment: Rating Analysis and Defense against Dishonesty.

, , , and . AICT, page 309-314. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Policy-Based Service-Oriented Grid Architecture., , , and . GCC (2), volume 3033 of Lecture Notes in Computer Science, page 597-603. Springer, (2003)Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach., , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 239-248. Springer, (2007)A MAC-Routing Integrated Protocol for Geographic Forwarding in Wireless Sensor Networks., , and . FGCN (2), page 285-290. IEEE Computer Society, (2007)A Trustworthy Resource Selection Approach in Grid with Fuzzy Reputation Aggregation., , and . AWIC, volume 43 of Advances in Soft Computing, page 142-147. Springer, (2007)Towards Reliable Rating Filtering in Grid Reputation Systems: A Pre-Evaluating Set Based Bias-Tuned Approach1., , and . DASC, page 129-136. IEEE Computer Society, (2006)A Pre-evaluating Set based Bias-tuned Reputation Evaluation Method for Trust Establishment in Grid., , and . ICNS, page 64. IEEE Computer Society, (2006)Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering., , , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 444-454. Springer, (2008)On Trustworthy Reputation Evidence Establishment: Rating Analysis and Defense against Dishonesty., , , and . AICT, page 309-314. IEEE Computer Society, (2008)FE-MAC: a forwarding election-based MAC protocol for wireless sensor networks., , and . WICON, page 38. ICST, (2007)