Effective Usage of Computational Trust Models in Rational Environments
暂无分享,去创建一个
[1] Lars Brückner,et al. On the Simulation of Global Reputation Systems , 2005, J. Artif. Soc. Soc. Simul..
[2] Paul Resnick,et al. Eliciting Informative Feedback: The Peer-Prediction Method , 2005, Manag. Sci..
[3] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[4] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[5] Bernhard von Stengel,et al. Chapter 51 Inspection games , 2002 .
[6] Mudhakar Srivatsa,et al. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.
[7] Nicholas R. Jennings,et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources , 2005, iTrust.
[8] Michael J. North,et al. Experiences creating three implementations of the repast agent modeling toolkit , 2006, TOMC.
[9] Karl Aberer,et al. P2P reputation management: Probabilistic estimation vs. social networks , 2006, Comput. Networks.
[10] Ernesto Damiani,et al. Choosing reputable servents in a P2P network , 2002, WWW.
[11] Weisong Shi,et al. Analysis of ratings on trust inference in open environments , 2008, Perform. Evaluation.
[12] Paul Graham,et al. Hackers & Painters: Big Ideas from the Computer Age , 2010 .
[13] Jennifer Golbeck,et al. Trust on the World Wide Web: A Survey , 2006, Found. Trends Web Sci..
[14] Raouf Boutaba,et al. Management in peer-to-peer systems: Trust, reputation and security , 2006, Comput. Networks.
[15] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[16] Chrysanthos Dellarocas. Efficiency and Robustness of Binary Feedback Mechanisms in Trading Environments with Moral Hazard , 2003 .
[17] Raph Levien,et al. Attack-Resistant Trust Metrics , 2009, Computing with Social Trust.
[18] David Abramson,et al. Economic models for management of resources in peer-to-peer and grid computing , 2001, SPIE ITCom.
[19] Sarvapali D. Ramchurn,et al. Trust evaluation through relationship analysis , 2005, AAMAS '05.
[20] George C. Necula,et al. Proof-carrying code , 1997, POPL '97.
[21] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[22] Mike P. Papazoglou,et al. Service-Oriented Computing , 2008 .
[23] Emmanuelle Anceaume,et al. Incentive-Based Robust Reputation Mechanism for P2P Services , 2006, OPODIS.
[24] A. Jøsang,et al. Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .
[25] Rudolf Avenhaus,et al. Inspection Games , 2009, Encyclopedia of Complexity and Systems Science.
[26] Chrysanthos Dellarocas,et al. Reputation Mechanism Design in Online Trading Environments with Pure Moral Hazard , 2005, Inf. Syst. Res..
[27] Karl Aberer,et al. A Probabilistic Framework for Decentralized Management of Trust and Quality , 2007, CIA.
[28] Krishna P. Gummadi,et al. King: estimating latency between arbitrary internet end hosts , 2002, IMW '02.
[29] Boi Faltings,et al. Minimum payments that reward honest reputation feedback , 2006, EC '06.
[30] Daniel Stutzbach,et al. Understanding churn in peer-to-peer networks , 2006, IMC '06.
[31] E. Friedman,et al. The Social Cost of Cheap Pseudonyms , 2001 .
[32] Paul Resnick,et al. Reputation systems , 2000, CACM.
[33] Karl Aberer,et al. Using identity premium for cooperation enforcement and whitewashing prevention in rational environments , 2010 .
[34] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[35] Karl Aberer,et al. P-Grid: a self-organizing structured P2P system , 2003, SGMD.
[36] R. H. Smith,et al. Reputation Mechanisms , 2005 .
[37] Paul Graham. Hackers and painters - big ideas from the computer age , 2004 .
[38] Zoran Despotovic. Building trust-aware P2P systems , 2005 .
[39] Evimaria Terzi,et al. On Honesty in Sovereign Information Sharing , 2006, EDBT.
[40] Karl Aberer,et al. A Probabilistic Approach to Predict Peers? Performance in P2P Networks , 2004, CIA.
[41] Karl Aberer,et al. Beyond "Web of trust": enabling P2P e-commerce , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..