Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Nakema Deonauth"'
Publikováno v:
IEEE Transactions on Computational Social Systems. 8:1417-1426
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. 9:342-353
Globally, the superfluity of scholarly research conferences in varying disciplines has introduced the issue of scholarly big data and information overload related to both research papers and conference proceedings/sessions. This evident scholarly exp
Autor:
Li Liu, Qiuyuan Yang, Xiangjie Kong, Hannan Bin Liaqat, Ahmedin Mohammed Ahmed, Nakema Deonauth, Feng Xia
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 11 (2015)
Socially aware networking (SAN) provides a new paradigm for intermittently connected networks which exploits social properties of mobile users to guide the design of protocols. In SAN, data forwarding performance will be degraded dramatically due to
Externí odkaz:
https://doaj.org/article/76f230d3dacc4d6dac8d71177b729069
Publikováno v:
Future Internet, Vol 9, Iss 3, p 36 (2017)
The violation of trust as a result of interactions that do not proceed as expected gives rise to the question as to whether broken trust can possibly be recovered. Clearly, trust recovery is more complex than trust initialization and maintenance. Tru
Externí odkaz:
https://doaj.org/article/419f7742fe8a45608006bea561aebbaf
Publikováno v:
IMCOM
Exploring behavioral patterns amongst scholars in Academic Social Networks (ASNs) has attracted significant attention in the field of social computing in recent years. Scholars are faced with a dilemma in which they either opt to cooperate with other
Publikováno v:
Applied Ocean Research. 72:23-38
This paper proposes a method to structurally identify inherent dynamic characteristics based on long-term monitored acceleration data of nonlinear offshore platforms under sea-ice excitation. Not all the inherent characteristics can be excited due to
Publikováno v:
2018 IEEE International Conference on Agents (ICA).
The iterated prisoner's dilemma or IPD game has been widely used in modelling interactions among autonomous agents. According to the tournament competitions organized by Axelrod, Tit-for-Tat emerged as the most effective strategy on the assumption of
Publikováno v:
Future Internet, Vol 9, Iss 3, p 36 (2017)
Future Internet; Volume 9; Issue 3; Pages: 36
Future Internet; Volume 9; Issue 3; Pages: 36
The violation of trust as a result of interactions that do not proceed as expected gives rise to the question as to whether broken trust can possibly be recovered. Clearly, trust recovery is more complex than trust initialization and maintenance. Tru
Publikováno v:
Physica A: Statistical Mechanics and its Applications. 408:181-189
In real societies, whether an individual participates in unpromising interactions sometimes is a probabilistic option instead of an all-or-nothing option, changing according to the risk of interactions. Inspired by this, we introduce an imitation-ind
Autor:
Feng Xia, Nakema Deonauth, Ahmedin Mohammed Ahmed, Xiangjie Kong, Qiuyuan Yang, Hannan Bin Liaqat, Li Liu
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 11 (2015)
Socially aware networking (SAN) provides a new paradigm for intermittently connected networks which exploits social properties of mobile users to guide the design of protocols. In SAN, data forwarding performance will be degraded dramatically due to