×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [42]
内容类型
会议论文 [21]
期刊论文 [21]
发表日期
2019 [2]
2016 [14]
2015 [1]
2014 [1]
2013 [1]
2012 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共42条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Hybrid Inverse Parameter Identification of Fully Coupled Ductile Damage Model for Steel Sheet DP600 with Two Different Algorithms: Trust Region and Genetic Algorithms
期刊论文
JOURNAL OF MATERIALS ENGINEERING AND PERFORMANCE, 2019, 卷号: 28, 期号: 5, 页码: 3149-3156
作者:
Cao, Ke
;
Yue, Zhen-ming
;
Zhao, Xiao-di
;
Qi, Jiashuo
;
Gao, Jun
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
adaptive algorithm
ductile damage
identification
inverse methodology
simulation
A dynamic trust model in internet of things
期刊论文
Soft Computing, 2019
作者:
Wang E.K.
;
Chen C.-M.
;
Zhao D.
;
Ip W.H.
;
Yung K.L.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
Internet of things
Markov chain
Trust model
Trust prediction
Model for hiding data relationships based on chunk-confusion in cloud computing
期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 837-844
作者:
Chen, Yu
;
Shi, Yuliang
;
Cui, LiZhen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/16
Cloud computing
Data relationships
Forgery
Hide
Privacy protection
Condition assessment model of distribution transformer based on multi-period information fusion
期刊论文
Gaodianya Jishu/High Voltage Engineering, 2016, 卷号: 42, 期号: 7, 页码: 2054-2062
作者:
Sun, Ying
;
Gao, He
;
Li, Kejun
;
Liang, Yongliang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/16
Condition evaluation function
Expert evaluating trust factor
Improved evidence theory
Multi-period
Similarity clustering analysis
Applying trust enhancements to reactive routing protocols in mobile ad hoc networks
期刊论文
WIRELESS NETWORKS, 2016, 卷号: 22, 期号: 7, 页码: 2239-2257
作者:
Xia, Hui
;
Yu, Jia
;
Pan, Zhen-kuan
;
Cheng, Xiang-guo
;
Sha, Edwin H. -M.
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/16
Mobile ad hoc network
Malicious node
Decentralized trust inference
model
Trust-enhanced routing protocol
Data-driven route maintenance
mechanism
Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 卷号: 62, 页码: 112-127
作者:
Xia, Hui
;
Yu, Jia
;
Tian, Cheng-liang
;
Pan, Zhen-kuan
;
Sha, Edwin
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/16
Decentralized trust inference model
Trust attributes
Fuzzy AHP
Light-weight trust-enhanced routing protocol
Data-driven route
maintenance mechanism
Attack resistance
Malicious node detection
Node trust prediction framework in mobile Ad Hoc networks
期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 50-56
作者:
Xia, Hui
;
Wang, Guo-Dong
;
Pan, Zhen-Kuan
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/16
Mobile ad hoc network
Trust assessment
Trust prediction
Trust quantification
Unbiased GM(1,1) model
An analytical model of data plane performance subject to prioritized service
期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 1537-1542
作者:
Ren, Yongjian
;
Jin, Dailiang
;
Zheng, Dongyu
;
Liu, Lei
;
Wei, Xinjing
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/17
Performance evaluation
Priority queue
SDN
Self-similarity
Prediction of consecutive road node congestion based on Queueing model
期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 1531-1536
作者:
Zheng, Dongyu
;
Jin, Dailiang
;
Hao, Yuanzhe
;
Liu, Lei
;
Wei, Xinjing
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/17
Congestion control
Consecutive queueing model
ITS
Self-similar
Healthcare fraud detection based on trustworthiness of doctors
期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 74-81
作者:
Cui, Haoyi
;
Li, Qingzhong
;
Li, Hui
;
Yan, Zhongmin
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/17
Copy precision behavior
Healthcare fraud detection
Rational treatment model
Trustworthiness of doctors
©版权所有 ©2017 CSpace - Powered by
CSpace