Bagher Rahimpour Cami

  • Citations Per Year
Learn More
The goal of trust evaluation is to let the most trustworthy resource be selected. Indeed, the trust model should be able to detect threats. Hence, to provide a suitable ground for this selection, trust evaluation models need a mechanism to detect malicious entities. In this paper, we use a hybrid trust model for evaluating trustworthiness of each resource.(More)
Peer-to-peer networks have become increasingly popular in the recent years. In an open peer-to-peer network peers often have to interact with unknown peers and need to manage the risk in their communications. It is very important for peers to select a trustworthy peer to accomplish a task. Peers must be able to determine the trustworthiness of other peers(More)
Nowadays websites provide a vast number of resources for users. Recommender systems have been developed as an essential element of these websites to provide a personalized environment for users. They help users to retrieve interested resources from large sets of available resources. Due to the dynamic feature of user preference, constructing an appropriate(More)
Peer-to-peer networks have become increasingly popular in the recent years. In an open peer-to-peer network peers often have to interact with unknown peers and need to manage the risk in their communications. It is very important for peers to select a trustworthy peer to accomplish a task. Peers must be able to determine the trustworthiness of other peers(More)
The process of data migration is one of the major challenges in the database structure development and improvement. The huge size of databases and the difference in syntax and semantics of tables are some of the crucial problems in data migration field. Data migration is performed in two phases sequentially: structure mapping and migration. In traditional(More)
  • 1