政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/32671
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109948/140897 (78%)
Visitors : 46075475      Online Users : 667
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/32671


    Title: 以新的信賴模型提昇分散計算環境之整體計算品質
    Improving Overall Computation Quality of the Grid&P2P Computing Environment with a New Trust Model
    Authors: 彭士爵
    Peng,Shih-Chueh
    Contributors: 李蔡彥
    Li,Tsai-Yen
    彭士爵
    Peng,Shih-Chueh
    Keywords: 信賴模型
    社會
    社會學
    小世界
    人際關係
    Trust model
    Society
    Sociology
    Small world
    Interpersonal relationship
    Date: 2006
    Issue Date: 2009-09-17 14:01:31 (UTC+8)
    Abstract: 在龐大且開放的分散式計算環境中,傳統的信賴模型由於缺乏完善的信賴程度更新機制,很容易出現節點間推薦優良服務的效能低落、服務熱點產生、甚至是無法有效排擠詐欺服務的問題,因而導致額外成本的付出。本論文利用社會學行動理論與人際環境關係理論,設計的一個新的信賴模型。在此信賴模型中,發展節點間的 「合作」、 「競爭」 以及 「同業公會」 等橫向關係,提升節點間信賴程度的更新效率,進而增進信賴模型的穩定性。我們設計了一個有視覺化介面的分散式計算環境動態模擬器,以測試信賴模型在面對動態環境中無法預期的計算節點 「上線」、 「離線」、 「無預警當機」 甚至 「出現詐欺服務」 時的應變能力。模擬實驗證實,我們的信賴模型在整體服務滿意度、計算成本等指標上,均有較佳的表現。
    In a large open distributed computing environment, due to the lack of a good mechanism for trust update among computing nodes, traditional trust model often encounters problems such as low quality of service recommendation, occurrence of hot spots, and no effective mechanism to exclude deceptive nodes. In this thesis, we use the action theory and inter-person relation theory in social science to design a new trust model with relations between nodes such as cooperation, competition, and guild to improve the efficiency and stability of trust update. We have designed a dynamic simulator with a visual interface for distributed computing to test the abilities of the trust model under scenarios such as bringing nodes on-line, taking nodes off-line, unexpectedly service outage, and occurrence of deceptive nodes. Our experiments revealed that our trust model has superior performance in various indices such as service satisfaction and computational cost.
    Reference: [1] 朱俊茂, 楊壽保, 樊建平, 陳明宇, 「Grid 與 P2P 混合計算環境下基於推薦證據推理的信任模型」, 中國科學技術大學計算機科學技術系, 中國科學計算技術研究所, 民 94.
    [2] 江明修, 曾冠球, 「公共生產力評估」, http://npo.nccu.edu.tw/content/section02/item03_doc/200109.pdf , 2001.
    [3] 林誠謙, 李世昌, 鄧炳坤, 「全球網格(World Wide Grid)發展趨勢」, http://www.sinica.edu.tw/as/advisory/journal/12-2/73-77.pdf, 2002.
    [4] 吳齊殷, 莊庭瑞, 「超連結網絡分析:一項分析網路社會結構的新方法」, 資訊社會研究, 頁 127-148, 民 94.
    [5] 吳明蔚, 「P2P:從技術到新開放價值」, http://web.ydu.edu.tw/~hjw/course/p2p/ref03.pdf, 2002.
    [6] 柯瑞普斯 (M. D. Kreps) 著, 鄧方 譯, 「賽局理論與經濟模型」 (Game Theory and Economic Modeling), 台北 : 五南, 1996.
    [7] 孫本文, 「建設本位文化的標準」, 中國文化建設討論集, 第58-59頁, 經緯書局, 1935.
    [8] 黃振華, 張興建譯, 「社會科學方法論:馬克斯‧涂爾幹‧韋伯」, 台北 : 三貌書齋, 時報出版, 民 81.
    [9] 惠美譯, 季登斯 (Giddens,Anthony) 著, 「資本主義與現代社會理論:馬克斯‧涂爾幹‧韋伯」,台北:遠流, 民78.
    [10]W. Alderson, “Marketing Behavior and Executive Action,” 1957.
    [11]E. Babbie, The Practice of Social Research, C.A. : Wadsworth Publishing Company, 1995.
    [12]E. M. Berman, Productivity in Public and Nonprofit Organizations : Strategies and Techniques, C.A. : Sage, 1998.
    [13]R. Buyya, Economic-based Distributed Resource Management and Scheduling for Grid Computing, http://arxiv.org/pdf/cs.DC/0204048, Monash University, Melbourne, Australia, April 2002.
    [14]L. Charles, P. Jo, S. LeBlanc, ”D-S Theory”, http://www.oz.nthu.edu.tw/~d929802/anthropology/archaeology/ar-01.htm, in Archeological Explanation. 2nd ed. New York: Columbia University Press, 1984.
    [15]L. Dodds, FOAF-a-Matic, http://www.ldodds.com/foaf/foaf-a-matic.zh-tw.html, Creative Commons License, 2003.
    [16]G. E. Caiden, Administrative Reform Comes of Age, N.Y. : Walterde Gruyter, 1991.
    [17]L. Eschenauer, V. D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” in Proceedings of the 9th ACM conference on Computer and. communications security , NY, USA, 2002.
    [18]J. Ferber, Multi-Agent System: An Introduction to Distributed Artificial Intelligence, Addison Wesley Longman, 1999.
    [19]G. Fox, S. Pallickara, The Narada Event Brokering System: Overview and Extensions, Community Grid Labs, Indiana University, 2003.
    [20]G. Fox, S. Pallickara, “NaradaBrokering: A Distributed Middleware Framework and Architecture for Enabling Durable Peer-to-Peer Grids,” Proceedings of the In-ternational Middleware Conference, 2003.
    [21]J. Golbeck, Cai-Nicolas Ziegler, “Investigating Correlations of Trust and Interest Similarity - Do Birds of a Feather Really Flock Together? ” Decision Support Systems, 2005.
    [22]J. Golbeck, “Semantic Web Interaction through Trust Network Recommender Systems,” Proceedings of the End User Semantic Web Interaction Workshop at the 4th International Semantic Web Conference, 2005.
    [23]J. Golbeck, J. Hendler, “Inferring Trust Relationships in Web-based Social Networks,” ACM Transactions on Internet Technology, 2002.
    [24]J. Golbeck, J. Hendler, B. Parsia, “Trust Networks on the Semantic Web,” Proceedings of Cooperative Intelligent Agents, Helsinki, Finland, 2003.
    [25]C. Haythornthwaite, “A Social network theory of tie strength and media use: A framework for evaluating multi-level impacts of new media,” http://alexia.lis.uiuc.edu/~haythorn/sna_theory.html, 1999.
    [26]C. Kadushin, “A Short Introduction to Social Network: A Non-Technical Elementary Primer,” http://construct.haifa.ac.il/~cerpe/papers/kadushin.html, Cerpe Workshop, 2000.
    [27]M. S. Kamvar, “EigenRep: Reputation Management in P2P Networks”, Technical Report, SCCM-02-16, Stanford University, 2002.
    [28]T. Klosy, H. L. Poutr, ”Using Reputation-based Trust for Assessing Agent Reliability,” CWI, Kruislaan 413, NL-1098 SJ Amsterdam, 2004.
    [29]E. R. Merkle, R. A. Richardson, “Digital dating and virtual relating: Conceptualizing computer mediated relationships,” Family Relations, 49(2), 187-192, 2000.
    [30]K. Miller, Communication theories: perspectives, processes, and contexts, pp. 153-193, Boston: McGraw-Hill, 2002.
    [31]G. Shafer, A Mathematical Theory of Evidence,. Princeton University Press, NJ, 1976.
    [32]V. Smirnova, Multi-Agent System for Distributed Data Fusion in Peer-to-Peer Environment, University of Jyväskylä, Department of Mathematical Information Technology, 2002.
    [33]D. J. Watts, “Six Degrees: The Science of a Connected Age,” W W Norton & Co Inc., 2004.
    Description: 碩士
    國立政治大學
    資訊科學學系
    93971020
    95
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0093971020
    Data Type: thesis
    Appears in Collections:[Department of Computer Science ] Theses

    Files in This Item:

    File Description SizeFormat
    97102001.pdf45KbAdobe PDF2794View/Open
    97102002.pdf62KbAdobe PDF2737View/Open
    97102003.pdf63KbAdobe PDF2777View/Open
    97102004.pdf98KbAdobe PDF2821View/Open
    97102005.pdf190KbAdobe PDF21023View/Open
    97102006.pdf256KbAdobe PDF21381View/Open
    97102007.pdf162KbAdobe PDF21227View/Open
    97102008.pdf171KbAdobe PDF21188View/Open
    97102009.pdf320KbAdobe PDF2862View/Open
    97102010.pdf347KbAdobe PDF21475View/Open
    97102011.pdf79KbAdobe PDF2759View/Open
    97102012.pdf98KbAdobe PDF2964View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback