Advances, Systems and Applications
From: An active and verifiable trust evaluation approach for edge computing
rounds | n1 | n2 | n3 | n4 | n5 |
---|---|---|---|---|---|
1 | 0.95 | 0.91 | 0.9045 | 0.9026 | 0.9123 |
2 | 0.905 | 0.981 | 0.9715 | 0.9772 | 0.9749 |
3 | 0.8195 | 0.9639 | 0.9820 | 0.9729 | 0.9702 |
4 | 0.9820 | 0.9675 | 0.9513 | 0.9415 | 0.9473 |
5 | 0.9657 | 0.9383 | 0.9691 | 0.9753 | 0.9728 |
6 | 0.9348 | 0.8827 | 0.9414 | 0.9296 | 0.9367 |
7 | 0.9935 | 0.9987 | 0.9980 | 0.9977 | 0.9974 |
8 | 0.9876 | 0.9777 | 0.9666 | 0.9733 | 0.9759 |
9 | 0.9765 | 0.9953 | 0.9976 | 0.9972 | 0.9969 |
10 | 0.9976 | 0.9958 | 0.9936 | 0.9924 | 0.9916 |