On the Simulation of a Software Reputation System
暂无分享,去创建一个
[1] Martin Boldt,et al. Preventing Privacy-Invasive Software Using Collaborative Reputation Systems , 2007, Secure Data Management.
[2] Robert Wilensky,et al. Robust Reputations for Peer-to-Peer Marketplaces , 2006, iTrust.
[3] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[4] Audun Jøsang,et al. Simulating the Effect of Reputation Systems on E-markets , 2003, iTrust.
[5] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[6] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[7] Gediminas Adomavicius,et al. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions , 2005, IEEE Transactions on Knowledge and Data Engineering.
[8] Lea Kutvonen,et al. Reputation Management Survey , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[9] John B. Horrigan,et al. A Typology of Information and Communication Technology Users , 2007 .
[10] Frederic P. Miller,et al. Internet Movie Database , 2009 .
[11] A. Jøsang,et al. Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .
[12] Paul Resnick,et al. The value of reputation on eBay: A controlled experiment , 2002 .