网构软件信任演化模型的形式化研究:面向复杂网络
¥
8
1.4折
¥
59
九品
仅1件
作者董宇欣
出版社电子工业出版社
出版时间2022-04
版次1
装帧其他
上书时间2024-05-17
商品详情
- 品相描述:九品
图书标准信息
-
作者
董宇欣
-
出版社
电子工业出版社
-
出版时间
2022-04
-
版次
1
-
ISBN
9787121433870
-
定价
59.00元
-
装帧
其他
-
页数
108页
- 【内容简介】
-
本书聚焦于学术界研究的热点问题——网构软件可信性研究,从网构软件的特征出发,以开放网络的动态演化为基础,结合生物学、社会学等领域的相关知识,旨在对网构软件系统提出一种动态演化的、相对“柔性”的可信保障机制。全书共分为七个章节,介绍了国内外相关领域的研究成果与进展,分别对网构软件信任机制、信任度量、信任演化模型、信任评估以及博弈策略展开研究,为网构软件在动态演化环境中的信任机制建立系统的信任演化模型,并进一步提出了未来的研究方向。
- 【作者简介】
-
董宇欣,哈尔滨工程大学计算机学院副院长,主要研究方向为大数据与智能应用、工业软件与安全建模、可信软件与社交网络。全国信标委软件与系统工程分技术委员会委员,连续5年获哈尔滨工程大学\"优秀主讲教师”称号,获校优秀毕业设计指导教师、校优秀共产党员称号。主持的教改项目获黑龙江省优秀教学成果二等奖,出版多部教材。
- 【目录】
-
第 1 章 绪论 ··················································································1
1.1 课题研究的目的意义·····························································1
1.2 国内外研究现状···································································3
1.2.1 信任机制的研究现状····················································3
1.2.2 信任度量模型的研究现状··············································4
1.2.3 信任演化模型的研究现状··············································5
1.2.4 信任评估模型的研究现状··············································6
1.2.5 信任激励模型的研究现状··············································8
1.3 本书的主要工作及组织结构····················································9
1.3.1 本书的主要工作··························································9
1.3.2 本书的组织结构·······················································.12
参考文献················································································.13
第 2 章 网构软件信任机制研究·························································18
2.1 引言···············································································.18
2.2 信念逻辑与信任关系描述····················································.19
2.2.1 信念逻辑································································.19
2.2.2 信任关系的描述·······················································.20
2.3 信任链建立过程的描述与推演··············································.23
2.3.1 PKI 模型实例··························································.23
2.3.2 信任链随机搜索算法的推演········································.23
2.4 信任链搜索算法··························································.26
2.5 多路径信任聚合算法··························································.28
2.6 实验与分析······································································.30
2.7 本章小结·········································································.33
参考文献················································································.33
第 3 章 基于多维信任属性的动态信任度量方法····································35
3.1 引言···············································································.35
3.2 动态信任模型描述·····························································.36
3.3 基于多维信任属性选取的权值分配········································.41
3.4 网构软件整体聚类分析·······················································.42
3.5 算例与结果分析································································.43
3.6 本章小结·········································································.47
参考文献················································································.47
第 4 章 基于博弈的网构软件信任演化模型··········································49
4.1 引言···············································································.49
4.2 演化博弈论······································································.50
4.2.1 演化稳定策略··························································.51
4.2.2 复制动态方程··························································.52
4.3 基于 Wright-Fisher 的网构软件信任演化模型 ···························.53
4.3.1 Wright-Fisher 模型····················································.53
4.3.2 基于 Wright-Fisher 过程模型的复制动态方程 ··················.54
4.3.3 选择因子及突变因子的确定········································.55
4.3.4 基于 Wright-Fisher 过程模型的复制动态方程稳定性分析 ···.58
4.4 基于逻辑斯蒂方程的自组织信任博弈演化模型·························.59
4.4.1 逻辑斯蒂模型··························································.59
4.4.2 基于 Wright-Fisher 过程的个体适应性推演 ·····················.61
4.4.3 基于 Logistic 的网构软件自组织信任演化模型 ················.61
4.4.4 STML 的稳定性分析·················································.62
4.4.5 引入“公平规范”的 STML········································.63
4.5 信任演化趋势的模拟实验与分析···········································.64
4.5.1 引入选择因子与信任因子模拟实验·······························.64
4.5.2 引入公平规范的 STML 模拟实验 ·································.66
4.6 本章小结·········································································.67
参考文献················································································.68
第 5 章 网构软件的信任评估及推荐算法·············································69
5.1 引言···············································································.69
5.2 信任的表示······································································.70
5.2.1 直接信任的评估·······
点击展开
点击收起
— 没有更多了 —
以下为对购买帮助不大的评价