• 网构软件信任演化模型的形式化研究:面向复杂网络
  • 网构软件信任演化模型的形式化研究:面向复杂网络
21年品牌 40万+商家 超1.5亿件商品

网构软件信任演化模型的形式化研究:面向复杂网络

8 1.4折 59 九品

仅1件

北京房山
认证卖家担保交易快速发货售后保障

作者董宇欣

出版社电子工业出版社

出版时间2022-04

版次1

装帧其他

上书时间2024-05-17

房山杨子旧书

八年老店
已实名 已认证 进店 收藏店铺

   商品详情   

品相描述:九品
图书标准信息
  • 作者 董宇欣
  • 出版社 电子工业出版社
  • 出版时间 2022-04
  • 版次 1
  • ISBN 9787121433870
  • 定价 59.00元
  • 装帧 其他
  • 页数 108页
【内容简介】
本书聚焦于学术界研究的热点问题——网构软件可信性研究,从网构软件的特征出发,以开放网络的动态演化为基础,结合生物学、社会学等领域的相关知识,旨在对网构软件系统提出一种动态演化的、相对“柔性”的可信保障机制。全书共分为七个章节,介绍了国内外相关领域的研究成果与进展,分别对网构软件信任机制、信任度量、信任演化模型、信任评估以及博弈策略展开研究,为网构软件在动态演化环境中的信任机制建立系统的信任演化模型,并进一步提出了未来的研究方向。
【作者简介】
董宇欣,哈尔滨工程大学计算机学院副院长,主要研究方向为大数据与智能应用、工业软件与安全建模、可信软件与社交网络。全国信标委软件与系统工程分技术委员会委员,连续5年获哈尔滨工程大学\"优秀主讲教师”称号,获校优秀毕业设计指导教师、校优秀共产党员称号。主持的教改项目获黑龙江省优秀教学成果二等奖,出版多部教材。
【目录】
第 1 章 绪论 ··················································································1

1.1 课题研究的目的意义·····························································1

1.2 国内外研究现状···································································3

1.2.1 信任机制的研究现状····················································3

1.2.2 信任度量模型的研究现状··············································4

1.2.3 信任演化模型的研究现状··············································5

1.2.4 信任评估模型的研究现状··············································6

1.2.5 信任激励模型的研究现状··············································8

1.3 本书的主要工作及组织结构····················································9

1.3.1 本书的主要工作··························································9

1.3.2 本书的组织结构·······················································.12

参考文献················································································.13

第 2 章 网构软件信任机制研究·························································18

2.1 引言···············································································.18

2.2 信念逻辑与信任关系描述····················································.19

2.2.1 信念逻辑································································.19

2.2.2 信任关系的描述·······················································.20

2.3 信任链建立过程的描述与推演··············································.23

2.3.1 PKI 模型实例··························································.23

2.3.2 信任链随机搜索算法的推演········································.23

2.4 信任链搜索算法··························································.26

2.5 多路径信任聚合算法··························································.28

2.6 实验与分析······································································.30

2.7 本章小结·········································································.33

参考文献················································································.33

第 3 章 基于多维信任属性的动态信任度量方法····································35

3.1 引言···············································································.35

3.2 动态信任模型描述·····························································.36

3.3 基于多维信任属性选取的权值分配········································.41 

3.4 网构软件整体聚类分析·······················································.42

3.5 算例与结果分析································································.43

3.6 本章小结·········································································.47

参考文献················································································.47

第 4 章 基于博弈的网构软件信任演化模型··········································49

4.1 引言···············································································.49

4.2 演化博弈论······································································.50

4.2.1 演化稳定策略··························································.51

4.2.2 复制动态方程··························································.52

4.3 基于 Wright-Fisher 的网构软件信任演化模型 ···························.53

4.3.1 Wright-Fisher 模型····················································.53

4.3.2 基于 Wright-Fisher 过程模型的复制动态方程 ··················.54

4.3.3 选择因子及突变因子的确定········································.55

4.3.4 基于 Wright-Fisher 过程模型的复制动态方程稳定性分析 ···.58

4.4 基于逻辑斯蒂方程的自组织信任博弈演化模型·························.59

4.4.1 逻辑斯蒂模型··························································.59

4.4.2 基于 Wright-Fisher 过程的个体适应性推演 ·····················.61

4.4.3 基于 Logistic 的网构软件自组织信任演化模型 ················.61

4.4.4 STML 的稳定性分析·················································.62

4.4.5 引入“公平规范”的 STML········································.63

4.5 信任演化趋势的模拟实验与分析···········································.64

4.5.1 引入选择因子与信任因子模拟实验·······························.64

4.5.2 引入公平规范的 STML 模拟实验 ·································.66

4.6 本章小结·········································································.67

参考文献················································································.68

第 5 章 网构软件的信任评估及推荐算法·············································69

5.1 引言···············································································.69

5.2 信任的表示······································································.70

5.2.1 直接信任的评估·······
点击展开 点击收起

   相关推荐   

—  没有更多了  —

以下为对购买帮助不大的评价

此功能需要访问孔网APP才能使用
暂时不用
打开孔网APP