[1] Dempster A P. Upper and lower probabilities induced by a multi-valued mapping[J]. Annals of Mathematical Statistics, 1967, 38(4): 325-339. [2] Otman Basir, Xiaohong Yuan. Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory[J]. Information Fusion, 2007, 8(4): 379-386. [3] 郭代飞, 杨义先, 胡正名. 基于大规模网络的自适应入侵响应模型研究. 北京邮电大学学报, 2004, 27(1): 79-83. Guo Daifei, Yang Yixian, Hu Zhengming. Research of large-scale network-based adaptive intrusion response model[J]. Journal of Beijing University of Posts and Telecommunications, 2004, 27(1): 79-83. [4] 诸葛建伟, 王大为, 陈昱, 等. 基于D-S证据理论的网络异常检测方法. 软件学报, 2006, 17 (3): 463-471. Zhuge Jianwei, Wang Dawei, Chen Yu, et al. A network anomaly detector based on D-S evidence theory[J]. Journal of Software, 2006, 17(3): 463-471. [5] Tian Chunqi, Zhou Shihong, Wang Wendong, et al. A new trust model based on advanced D-S evidence theory for P2P networks//FAST 2006. Hamilton: Ontario, 2006: 270-284. [6] Zadeh L. A Simple view of the Dempster-Shafer theory of evidence and its implication for the rule of combination[J]. Artificial Intelligence Magazine, 1986, 7(1): 85-90. [7] Voorbraak F. On the justification of Dempster's rule of combination[J]. Artificial Intelligence, 1991, 48(2): 171-197. [8] Yager R R. On the dempster-shafer framework and new combination rules. Information Science, 1989, 41(2): 93-137. [9] Murphy C K. Combining belief functions when evidence conflicts[J]. Internation Journal of Approximate Reasoning, 2000, 29(1): 1-9.(上接第83页) [2] Jiang Minqiang, Ling N. Low-delay rate control for real-time H.264/AVC video coding[J]. IEEE Transactions on Multimedia, 2006, 8(3): 467-477. [3] Cui Yubin, Zhuang Bojin, Cai Anni. MB-activity measure based slice grouping and unequal error protection for H.264/AVC video transmission over wireless networks//Proceedings of IIHMSP'07. Kaohsiung: IEEE CS Press, 2007: 383-386. [4] Robertson P, Villebrun E, Hoeher P. A comparison of optimal and sub-optimal map decoding algorithms operating in the log domain//Proceedings of ICC'95. Seattle: IEEE Press, 1995: 1009-1013. [5] Bandyopadhyay S, Wu Zhenyu, Pandit P, et al. Frame loss error concealment for H.264/AVC. (2005-07-08). http://ftp3.itu.ch/av-arch/jvt-site/2005-07-Poznan/JVT-P072.zip. |