Complex Path Based Trust Calculation Method in Social Network

来源 :2014年国际计算机科学与软件工程学术会议 | 被引量 : 0次 | 上传用户:mx520ht
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Social network has already been an important way to facilitate information exchange.One key challenge in social network is how to evaluate the reliability of users complex relationships.In this paper,we propose a complex trusted path-based algorithm for computing trust.Our main works are (1) we consider the users in social networks as vertices in a graph; (2) complex path composition in SNS is proposed according to its topology,and (3) an approach of computing complex path trust is proposed based on its topology.
其他文献
Virtools 5 has strong interactivity,portability is good,operation and low environmental requirements,combined with practical training,and this paper puts forward Virtools 5 development of onboard equi
For the intention that students can better grasp the related knowledge about NC technology,understand the use and operation of NC equipment,get familiar with the NC programming,the author researched a
Recent years have seen more and more embedded devices used in IA (information appliance),PDA and industrial automation.In this paper,we propose a novel version of the application of embedded devices i
With the rapid development of Internet technology,how to establish the field of intelligent irrigation system based on Internet of things technology,realize the rational management of agricultural wat
The system combined closely with actual crop growth in Guanzhong arid area,and was on the basis of construction of agricultural information database and remote sensing database.It used C# application
The network monitoring can be divided into two modes: active and passive.These two modes can prevent crime.But both of them are highly tort.So we must protect the citizens privacy rights by legislatio
This paper proposes a highly secure image watermarking and digital signature algorithm based on ECC and MIRACL,the former is on the basis of ECDLP very difficult to solve,and the latter implements all
As one of the era core competitiveness,big data has become a hotspot in the field of information technology after cloud computing,Internet of things.Big data bring decision value for the enterprise an
We proprosed a symbolic approach and model learing approach for automatic testing.The main idea of our approach is to build an abstract interaction machine as well as its refinement process in order t
Right now,more and more attention has been absorbed by the safety and security protection system of residential area.Through an engineering design project,the security protection system based on digit