Computing with Trust: Definition, Properties, and Algorithms
暂无分享,去创建一个
[1] Georg Lausen,et al. Spreading activation models for trust propagation , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.
[2] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[3] Bobby Bhattacharjee,et al. Using Trust in Recommender Systems: An Experimental Analysis , 2004, iTrust.
[4] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.
[5] Alexander Aiken,et al. Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.
[6] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[7] Kirsten Swearingen,et al. Beyond Algorithms: An HCI Perspective on Recommender Systems , 2001 .
[8] Rino Falcone,et al. Principles of trust for MAS: cognitive anatomy, social importance, and quantification , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).
[9] Jennifer Golbeck,et al. Generating Predictive Movie Recommendations from Trust in Social Networks , 2006, iTrust.
[10] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[11] Georg Lausen,et al. Analyzing Correlation between Trust and User Similarity in Online Communities , 2004, iTrust.
[12] Yaniv,et al. Advice Taking in Decision Making: Egocentric Discounting and Reputation Formation. , 2000, Organizational behavior and human decision processes.
[13] Yong Chen,et al. Trust Propagation in Small Worlds , 2003, iTrust.
[14] Rashmi R. Sinha,et al. Comparing Recommendations Made by Online Systems and Friends , 2001, DELOS.
[15] Jonathan L. Herlocker,et al. Evaluating collaborative filtering recommender systems , 2004, TOIS.
[16] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[17] Paolo Avesani,et al. Trust-Aware Collaborative Filtering for Recommender Systems , 2004, CoopIS/DOA/ODBASE.
[18] C. Castelfranchi,et al. Social Trust : A Cognitive Approach , 2000 .
[19] P. Oscar Boykin,et al. Personal Email Networks: An Effective Anti-Spam Tool , 2004, ArXiv.
[20] Catholijn M. Jonker,et al. Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.
[21] P. Sztompka. Trust: A Sociological Theory , 2000 .
[22] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[23] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[24] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[25] R. Golembiewski,et al. The centrality of interpersonal trust in group processes , 1975 .
[26] K. Suzanne Barber,et al. Belief Revision Process Based on Trust: Agents Evaluating Reputation of Information Sources , 2000, Trust in Cyber-societies.
[27] K. Cook. Trust in Society , 2001 .
[28] J. Golbeck,et al. FilmTrust: movie recommendations using trust in web-based social networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[29] John Riedl,et al. Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.
[30] Jennifer Golbeck,et al. Computing and Applying Trust in Web-based Social Networks , 2005 .