[1] Kyu-Han K,Min A W,Gupta D,et al.Improving energy efficiency of Wi-Fi sensing on smartphones[A].Proceedings of 2011 IEEE INFOCOM[C].Shanghai,China:2011.2930-2938.
[2] Wei D,Dave V,Lili Q,et al.Secure friend discovery in mobile social networks[A].Proceedings of 2011 IEEE INFOCOM[C].Shanghai,China:2011.1647-1655.
[3] Fan J,Du Y,Gao W,et al.Geography-aware active data dissemination in mobile social networks[A].IEEE 7th International Conference on Mobile Adhoc and Sensor Systems[C].San Francisco,CA:2010.109-118.
[4] Liang X H,Li X D,Shen X S.Enabling trustworthy service evaluation in service-oriented mobile social networks[J].IEEE Trans on Parallel and Distributed Systems,2014,25(2):310-320.
[5] Zhang T,Ma J,Xi N,et al.Trustworthy service composition in service-oriented mobile social networks[A].21th IEEE International Conference on Web Services[C].Anchorage,Alaska:2014.684-687.
[6] Vu L H,Hauswirth M,Aberer K.QoS-based service selection and ranking with trust and reputation management[A].Proceedings of On the Move to Meaningful Internet Systems 2005:CoopIS,DOA,and ODBASE[C].Berlin Heidelberg:2005.466-483.
[7] Jsang A,Ismail R,Boyd C.A survey of trust and reputation systems for online service provision[J].Decision Support Systems,2007,43(2):618-644.
[8] Al-Oufi S,Kim H N,El Saddik A.A group trust metric for identifying people of trust in online social networks[J].Expert Systems with Applications,2012,39(18):13173-13181.
[9] Noor T H,Sheng Q Z,Zeadally S,et al.Trust management of services in cloud environments:Obstacles and solutions[J].ACM Comput Surv,2013,46(1):1-30.
[10] Wang Y,Lin K J,Wong D,et al.Trust management towards service-oriented applications[J].Service Oriented Computing and Applications,2009,3(2):129-146.
[11] Li L,Wang Y,Lim E P.Trust-oriented composite service selection and discovery[A].7th International Joint Conference of Service-Oriented Computing[C].Berlin,Heidelberg:2009:50-67.
[12] Hang C W,Singh M P.Trustworthy service selection and composition[J].ACM Trans Auton Adapt Syst,2011,6(1):1-17.
[13] Nepal S,Malik Z,Bouguettaya A.Reputation management for composite services in service-oriented systems[J].International Journal of Web Services Research.2011,8(2):29-52.
[14] Zhang T,Ma J,Li Q,et al.Trust-based service composition in multi-domain environments under time constraint[J].Science China Information Sciences,2014,57:092109(16).
[15] Liu Y,Ngu A H,Zeng L Z.QoS Computation and Policing in Dynamic Web Service Selection[M].Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters.New York,NY:2004.66-73.
[16] Li L,Wang Y,Lim E P.Trust-oriented composite service selection with QoS constraints[J].Journal of Universal Computer Science.2010,16(13):1720-1744.
[17] 王尚广,孙其博,杨放春.Web 服务选择中信誉度评估方法[J].软件学报,2012,23(6):1350-1367. Wang S G,Sun Q B,Yang F C.Reputation evaluation approach in Web service selection[J].Journal of Software,2012,23(6):1350-1367.(in Chinese)
[18] Malik Z,Bouguettaya A.RATEWeb:Reputation assessment for trust establishment among Web services[J].The VLDB Journal,2009,18(4):885-911.
[19] Zhang T,Ma J,Sun C,et al.Service composition in multi-domain environment under time constraint[A].IEEE 20th International Conference on Web Services[C].Santa Clara,CA:2013.227-234.
[20] Nepal S,Malik Z,Bouguettaya A.Reputation propagation in composite services[A].IEEE 7th International Conference on Web Services[C].Los Angeles,CA:2009.295-302.
[21] Kunegis J,Lommatzsch A,Bauckhage C.The slashdot zoo:mining a social network with negative edges[A].Proceedings of the 18th international conference on World Wide Web[C].Madrid,Spain:ACM.2009.741-750.
[22] Hang C W,Wang Y,Singh M P.Operators for propagating trust and their evaluation in social networks[A].Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems[C].Budapest,Hungary:2009:1025-1032.
[23] Lin CY,Cao N,Liu SX,et al.SmallBlue:Social network analysis for expertise search and collective intelligence[A].IEEE 25th International Conference on Data Engineering[C].Shanghai,China:2009.1483-1486.
[24] Liu G F,Wang Y,Orgun M A.Discovering trust networks for the selection of trustworthy service providers in complex contextual social networks[A].IEEE 19th International Conference on Web Services[C].Honolulu,HI:2012.384-391.
[25] Liu G F,Wang Y,Orgun M A.Finding K optimal social trust paths for the selection of trustworthy service providers in complex social networks[A].IEEE 9th International Conference on Web Services[C].Washington DC:2011.41-48.
[26] Abdul-Rahman A,Hailes S.Supporting trust in virtual communities[A].Proceedings of the 33rd Annual Hawaii International Conference on System Sciences[C].Hawaii:2000.1-9.
[27] Golbeck J,Hendler J.Inferring binary trust relationships in Web-based social networks[J].ACM Trans Internet Technol,2006,6(4):497-529.
[28] 王勇,代桂平,侯亚荣.信任感知的组合服务动态选择方法[J].计算机学报,2009,32(8):1668-1675. Wang Y,Dai G P,Hou Y R.Dynamic methods of trust-aware composite service selection[J].Chinese Journal of Computers.2009,32(8),1668-1675.(in Chinese)
[29] 乔秀全,杨春,李晓峰,等.社交网络服务中一种基于用户上下文的信任度计算方法[J].计算机学报,2011,34(12):2403-2413. Qiao X Q,Yang C,Li X F,et al.A trust calculating algorithm based on social networking service users' context[J].Chinese Journal of Computers 2011,34(12),2403-2413.(in Chinese)
[30] 王刚,桂小林.社会网络中交易节点的选取及其信任关系计算方法[J].计算机学报,2013,36(2):368-383. Wang G,Gui X L.Selecting and trust computing for transaction nodes in online social networks[J].Chinese Journal of Computers.2013,36(2),368-383.(in Chinese)
[31] Xi N,Ma J,Sun C,et al.Decentralized information flow verification framework for the service chain composition in mobile computing environments[A].IEEE 20th International Conference on Web Services[C].Santa Clara,CA:2013.563-570.
[32] Ferrante J,Ottenstein K J,Warren J D.The program dependence graph and its use in optimization[J].ACM Trans Program Lang Syst,1987,9(3):319-349.
[33] Wei S,Yen I L,Thuraisingham B,et al.Rule-based run-time information flow control in service cloud[A].2011 IEEE International Conference on Web Services[C].Washington DC:2011.524-531.
[34] Xue Y,Nahrstedt K.Fault tolerant routing in mobile ad hoc networks[A].IEEE Wireless Communications and Networking Conference[C].New Orleans,Louisiana:2003.1174-1179.
[35] Gentle J E,Hrdle W K,Mori Y.Handbook of Computational Statistics:Concepts and Methods[M].2nd edition.Springer,2012.
[36] Liu G F,Wang Y,Orgun M A.Optimal social trust path selection in complex social networks[A].Proceedings of the 24th AAAI Conference on Artificial Intelligence[C].Atlanta,Georgia:2010.1397-1398. |