A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks

[1]  K.J.R. Liu,et al.  Behavior modeling and forensics for multimedia social networks , 2009, IEEE Signal Processing Magazine.

[2]  D. Kandel Homophily, Selection, and Socialization in Adolescent Friendships , 1978, American Journal of Sociology.

[3]  Jin Li,et al.  Toward P2P-Based Multimedia Sharing in User Generated Contents , 2012, IEEE Trans. Parallel Distributed Syst..

[4]  Jie Wu,et al.  Generating trusted graphs for trust evaluation in online social networks , 2014, Future Gener. Comput. Syst..

[5]  Jiexin Pu,et al.  Rough Set and Trust Assessment-based Potential Paths Analysis and Mining for Multimedia Social Networks , 2012 .

[6]  Florian Probst,et al.  Online social networks: A survey of a global phenomenon , 2012 .

[7]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[8]  James A. Hendler,et al.  Inferring binary trust relationships in Web-based social networks , 2006, TOIT.

[9]  Fei Shao,et al.  Digital Rights Management and Access Control in Multimedia Social Networks , 2013, ICGEC.

[10]  Erik Duval,et al.  Recommender Systems for Learning , 2012, Springer Briefs in Electrical and Computer Engineering.

[11]  George Karypis,et al.  Item-based top-N recommendation algorithms , 2004, TOIS.

[12]  Yasuhiro Takeuchi,et al.  Global asymptotic stability of an SIR epidemic model with distributed time delay , 2001 .

[13]  Jennifer Neville,et al.  Modeling relationship strength in online social networks , 2010, WWW '10.

[14]  Dan Ionescu,et al.  A Collaborative Cloud-Based Multimedia Sharing Platform for Social Networking Environments , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[15]  Touradj Ebrahimi,et al.  In Tags We Trust: Trust modeling in social tagging of multimedia content , 2012, IEEE Signal Processing Magazine.

[16]  Cécile Paris,et al.  A trust model-based analysis of social networks , 2013, Int. J. Trust. Manag. Comput. Commun..

[17]  Dinesh Kumar Saini,et al.  SEIRS epidemic model with delay for transmission of malicious objects in computer network , 2007, Appl. Math. Comput..

[18]  Mansoor Rezghi,et al.  New algorithm for recommender systems based on singular value decomposition method , 2013, ICCKE 2013.

[19]  Quentin L. Burrell,et al.  The 80/20 Rule: Library Lore or Statistical Law? , 1985, J. Documentation.

[20]  Kanliang Wang,et al.  A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.

[21]  K. J. Ray Liu,et al.  Incentive Cooperation Strategies for Peer-to-Peer Live Multimedia Streaming Social Networks , 2009, IEEE Transactions on Multimedia.

[22]  Jaideep Srivastava,et al.  Social Multimedia Computing , 2010, Computer.

[23]  Paolo Avesani,et al.  Trust-aware recommender systems , 2007, RecSys '07.

[24]  Robin I. M. Dunbar Neocortex size as a constraint on group size in primates , 1992 .

[25]  Jun Hu,et al.  Security Issues in Online Social Networks , 2011, IEEE Internet Computing.

[26]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[27]  Sibel Adali,et al.  Measuring behavioral trust in social networks , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.

[28]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[29]  Alda Lopes Gançarski,et al.  IRIS: A Novel Method of Direct Trust Computation for Generating Trusted Social Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[30]  N. Christakis,et al.  The Spread of Obesity in a Large Social Network Over 32 Years , 2007, The New England journal of medicine.