Toggle navigation
Home
About
About Journal
Historical Evolution
Indexed In
Awards
Reference Index
Editorial Board
Journal Online
Archive
Project Articles
Most Download Articles
Most Read Articles
Instruction
Contribution Column
Author Guidelines
Template
FAQ
Copyright Agreement
Expenses
Academic Integrity
Contact
Contact Us
Location Map
Subscription
Advertisement
中文
Journals
Publication Years
Keywords
Search within results
(((GENG Ji[Author]) AND 1[Journal]) AND year[Order])
AND
OR
NOT
Title
Author
Institution
Keyword
Abstract
PACS
DOI
Please wait a minute...
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Timelag weakening strategy for enhancing reliability of trust evaluation
HAN Zhigeng CHEN Geng JIANG Jian WANG Liangmin
Journal of Computer Applications 2014, 34 (
1
): 82-85. DOI:
10.11772/j.issn.1001-9081.2014.01.0082
Abstract
(
512
)
PDF
(608KB)(
518
)
Knowledge map
Save
To reduce the negative impact of the inherent time lag property of trust evaluation on the result of evaluation, new time lag weakening policies for enhancing trust evaluation reliability were proposed by integrating the trust trends of target entity into trust evaluation process with second derivative as the measurement tool. In order to check the effectiveness of this strategy, with the idea of reverse engineering, the authors used it to extend the famous trust revaluation model proposed by Srivatsa. The results show the parts of trust evaluation result with the extended model is closer to the real behavior of the target entity than that of the original model, and the former is more capable of inhibiting the fluctuating behavior of malicious entity. All of these indicate that the time lag weakening policies can be used to enhance the reliability of trust evaluation.
Related Articles
|
Metrics
Select
Markov-based survivability model for Web applications
QIN Zhiguang SONG Xu GENG Ji CHEN Wei
Journal of Computer Applications 2013, 33 (
02
): 400-403. DOI:
10.3724/SP.J.1087.2013.00400
Abstract
(
770
)
PDF
(637KB)(
461
)
Knowledge map
Save
Current survivability models can hardly bring up a practical solution, nor reflect the properties of Web applications. Firstly, the properties of Web applications were analyzed, especially the differences between atomic Web applications and composite Web applications. Secondly, the mathematical model reflecting the invoking relationship of the atomic Web applications for the development of composite Web application was constructed. Lastly, a survivability model for atomic Web applications and a Markov-based survivability model for composite Web applications with regard to runtime environment were proposed. And on the basis of these models, a recovery approach for Web applications was given, when part or all of the functions failed in adverse environment. Besides, a case was analyzed using these models, and its recovery procedures were given, in which the high survivability was guaranteed.
Related Articles
|
Metrics
Select
Reliable assurance model for distributed system survivability
GENG Ji CHEN Fei NIE Peng CHEN Wei QIN Zhi-guang
Journal of Computer Applications 2012, 32 (
10
): 2748-2751. DOI:
10.3724/SP.J.1087.2012.02748
Abstract
(
633
)
PDF
(619KB)(
387
)
Knowledge map
Save
The cooperative rollback recovery mechanism based on checkpointing is an effective mechanism for the survivability of distributed system. The existing cooperative rollback recovery mechanism based on checkpointing presumes that the communication channel is reliable. However, this assumption is not always true in actual application scenarios. For the actual application scenarios of distributed system, a reliable assurance model for the survivability of distributed system was proposed, based on the checkpointing-based rollback recovery mechanism. Through the creation of redundant communication channel and process migration mechanism, the proposed model assures the survivability of distributed system in actual application scenarios where the communication channel is not reliable.
Reference
|
Related Articles
|
Metrics
Select
Study on fast packet filter under network processor IXP2400
ZHONG Ting,LIU Yong,GENG Ji
Journal of Computer Applications 2005, 25 (
11
): 2568-2570.
Abstract
(
1349
)
PDF
(617KB)(
1330
)
Knowledge map
Save
The efficiency of packet filter is vital for firewalls.An efficient packet filter solution based on INTEL IXP2400 was talked about.This solution optimized packet filter through dynamic rule table,static rule tree and hardware hash unit.The firewall designed in this way can reach 1000M line speed.
Related Articles
|
Metrics