搜索资源列表
BnbAI1.1.rar
- 本程序演示了ASL引擎的各个主要模块的使用方法。模拟了盛大公司的同名游戏, 实现其大部分功能。支持大物体、动画物体,支持小龟、猫头鹰、飞碟等坐骑, 支持草丛、帐篷、冰窟等隐藏物体,支持各种主要道具。 所有使用的图片版权归盛大公司所有。 操作说明: 本游戏为单机单人对战。 1p:(可设置) 上:W 下:S 左:A 右:D 放泡泡:空格 2p: 计算机人工智能 (作者:小灰狼Eric Young QQ:123005285) F2:切换窗口/全屏模式 F3:
dRBAC
- dRBAC模型是适应于动态结盟环境的分布式信任管理和访问控制机制,具有第三方委托、值属性和证书预定等三个 特征.但dRBAC模型存在一些不足,体现在以下几个方面:委托的深度没有控制;委托链的循环搜索;角色的隐式提升;职责分 离原则的违背等.源码 针对dRBAC模型存在的问题进行了详细的讨论,提出了合理的解决方案,提高了dRBAC模型的安全性和实用性.本源码是drbac基于角色的访问控制系统的完整源码,实现了基于觉得的访问控制,并修正了规范中存在的bug,程序可以正确运行,上传文件同时
1Trust
- 基于D-S证据理论的信任模型研究与实现,用matlab编写代码仿真实现模拟图形-design and realize of belief model baseed on D-S theory of evidence
DyTrust-p2p
- DyTrust_一种P2P系统中基于时间帧的动态信任模型,在此与各位网友共享了。-DyTrust_ a P2P system based on the time frame of dynamic trust model, in this with you friends shared.
trmsim-wsn_0.1-exec
- TRMSim ,无线传感器网络(信任和声誉模型模拟无线传感器网络)是一个基于Java的模拟器旨在测试信托和声誉模型WSNs 。它提供了一个信托基金和声誉模型称为BTRM -TRMSim-WSN [Trust and Reputation Models Simulator for Wireless Sensor Networks] is a Java-based simulator aimed to test Trust and Reputation models for WSNs. It pro
TrustBuilder_v-3_1
- 帮助陌生人之间建立信任关系的信任协商工具!-Distributed software subjects face the problem of determining one another’s trustworthiness. The problem considered is managing the exchange of credentials between strangers for the purpose of property-based authenticati
eigentrust
- 这是一篇研究P2P信任管理的经典文章,全局信任模型EigenTrust。-This is one of the classic articles P2P Trust Management, the global trust model EigenTrust.
ntrust
- Dogleg trust region, Newton model, dense algorithm
inter-domain-test
- Xen 域间通信的访问控制的例子,主要用于TPM的域间密钥共享协同。在Xen/Linux上实现的一个原型系统。-In this thsis, we introduce a TPM based trust scheme and secure protocol for VM, and develop a prototype system of the secure protocol for Xen/Linux virtualization system. The trust scheme can p
A-Taxonomy-and-Adversarial-Model-for
- In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
ble
- 解非线性等式约束优化问题的新锥模型信赖域算法-Nonlinear equality constrained optimization problems of the new cone model trust region algorithm
region
- 基于简单二次函数模型的带线搜索的信赖域算法-Based on a simple model with a quadratic function line search trust region algorithm
cd4ef1.ZIP
- 基于主观逻辑的PKI信任评估模型Based on subjective logic for PKI trust evaluation model-Based on subjective logic for PKI trust evaluation model
cd4ef1.ZIP
- 一种基于D_S证据理论的P2P信任模型One kind based on the D_S theory of evidence P2P trust model-One kind based on the D_S theory of evidence P2P trust model
cd4ef1.ZIP
- 一种移动P2P网络环境下的动态安全信任模型A mobile P2P network environment dynamic security trust model-A mobile P2P network environment dynamic security trust model
A_SURVEY_OF_Trust_in_internet_Application
- 讲述因特网应用中,关于信任的发展调查等内容。是对网络信任模型介绍的很好的一片文章-About internet applications, the development of trust investigation on the content. Network trust model is well described in an article
adhoc-security
- 提出了一种基于信任模型的机会路由协议,有效地保证了自组网网路的安全正常通信。弥补了机会路由协议中的安全隐患问题-This paper proposes a trust model based routing protocols, effectively guarantee the safety of AD hoc network normal communication.To make up for the safety problems in routing protocol opportun
C1055022313
- Paper is very good towards the trust model and related different techniques that are involved into capturing attacks
trust-value
- 本文提出一种改进模糊评判理论的网络攻 击中的节点可信度评估方法,先利用模糊综合评判理论得到影响网络攻击中的节点可靠度因素集、评判集和仿真单因素可靠度评判方程,构成一个网络攻击中的节点可靠度初始模糊综合评判模型。-This paper presents a method to assess the credibility of nodes in the network attacks fuzzy uation theory in improvements to the fuzzy compr
trust-model-master
- Trust model in general