Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Networks
暂无分享,去创建一个
[1] Jennifer Golbeck,et al. SUNNY: A New Algorithm for Trust Inference in Social Networks Using Probabilistic Confidence Models , 2007, AAAI.
[2] Martin Ester,et al. TrustWalker: a random walk model for combining trust-based and item-based recommendation , 2009, KDD.
[3] James A. Hendler,et al. Inferring binary trust relationships in Web-based social networks , 2006, TOIT.
[4] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[5] Lei Li,et al. High Performance Approach for Multi-QoS Constrained Web Services Selection , 2007, ICSOC.
[6] Christian Bauckhage,et al. The slashdot zoo: mining a social network with negative edges , 2009, WWW.
[7] Michael R. Lyu,et al. Improving Recommender Systems by Incorporating Social Contextual Information , 2011, TOIS.
[8] Leonard Franken. Quality of service management - a model-based approach , 1996 .
[9] Lifeng Sun,et al. Item-Level Social Influence Prediction with Probabilistic Hybrid Factor Matrix Factorization , 2011, AAAI.
[10] H. Reis,et al. Attraction and close relationships. , 1998 .
[11] DumasMarlon,et al. QoS-Aware Middleware for Web Services Composition , 2004 .
[12] Sharon L. Milgram,et al. The Small World Problem , 1967 .
[13] Jennifer Golbeck,et al. Inferring Trust Relationships in Web-Based Social Networks , 2006 .
[14] Jiawei Han,et al. Mining advisor-advisee relationships from research publication networks , 2010, KDD.
[15] Ilan Yaniv,et al. Receiving Other People's Advice: Influence and Benefit , 2004 .
[16] Quan Z. Sheng,et al. Quality driven web services composition , 2003, WWW '03.
[17] Lei Li,et al. Trust-Oriented Composite Service Selection and Discovery , 2009, ICSOC/ServiceWave.
[18] Stefano Battiston,et al. A model of a trust-based recommendation system on a social network , 2006, Autonomous Agents and Multi-Agent Systems.
[19] Susan T. Fiske,et al. Social Beings: Core Motives in Social Psychology , 2003 .
[20] Marta M. B. Pascoal,et al. Deviation Algorithms for Ranking Shortest Paths , 1999, Int. J. Found. Comput. Sci..
[21] Jianping Wu,et al. A Trust and Reputation based Anti-SPIM Method , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[22] Tao Yu,et al. Efficient algorithms for Web services selection with end-to-end QoS constraints , 2007, TWEB.
[23] Jia Zhang,et al. Web 2.0 Services for Identifying Communities of Practice through Social Networks , 2007, IEEE International Conference on Services Computing (SCC 2007).
[24] M. Kochen,et al. Contacts and influence , 1978 .
[25] Shih-Miao Chin,et al. Computing k-shortest path for nuclear spent fuel highway transportation , 1991 .
[26] Jade Goldstein-Stewart,et al. Annotating Subsets of the Enron Email Corpus , 2006, CEAS.
[27] Elena Smirnova,et al. A model for expert finding in social networks , 2011, SIGIR.
[28] John Meurig Thomas,et al. Close relationships , 1985, Nature.
[29] P. Adler. Market, Hierarchy, and Trust: The Knowledge Economy and the Future of Capitalism , 2001 .
[30] Jaideep Srivastava,et al. Predicting trusts among users of online communities: an epinions case study , 2008, EC '08.
[31] Xuhui Zhang,et al. Mining Social Relationships in Micro-blogging Systems , 2011, HCI.
[32] Rashmi R. Sinha,et al. Comparing Recommendations Made by Online Systems and Friends , 2001, DELOS.
[33] Ronald S. Burt,et al. Decay functions , 2000, Soc. Networks.
[34] Jin Y. Yen. Shortest path network problems , 1975 .
[35] Jure Leskovec,et al. The role of social networks in online shopping: information passing, price of trust, and consumer choice , 2011, EC '11.
[36] Liviu Iftode,et al. Finding hierarchy in directed online social networks , 2011, WWW.
[37] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[38] Vijay Varadharajan,et al. Role-based Recommendation and Trust Evaluation , 2007, The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007).
[39] Bill Pikounis,et al. Comparability assessments of process and product changes made during development of two different monoclonal antibodies. , 2011, Biologicals : journal of the International Association of Biological Standardization.
[40] Yiming Yang,et al. Mining social networks for personalized email prioritization , 2009, KDD.
[41] Bruce Christianson,et al. Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.
[42] Mehmet A. Orgun,et al. A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks , 2010, 2010 IEEE International Conference on Services Computing.
[43] Allen Van Gelder,et al. Computer Algorithms: Introduction to Design and Analysis , 1978 .
[44] Jie Tang,et al. ArnetMiner: extraction and mining of academic social networks , 2008, KDD.
[45] Aram Galstyan,et al. Co-Evolution of Selection and Influence in Social Networks , 2011, AAAI.
[46] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[47] Munindar P. Singh,et al. Operators for propagating trust and their evaluation in social networks , 2009, AAMAS.
[48] E. Potgieter,et al. Development and Change , 1976 .
[49] David Eppstein,et al. Finding the k Shortest Paths , 1999, SIAM J. Comput..
[50] Mehmet A. Orgun,et al. Quality of trust for social trust path selection in complex social networks , 2010, AAMAS.
[51] Sarvapali D. Ramchurn,et al. Trust evaluation through relationship analysis , 2005, AAMAS '05.
[52] Russell Korte,et al. Biases in Decision Making and Implications for Human Resource Development , 2003 .
[53] Mehmet A. Orgun,et al. Optimal Social Trust Path Selection in Complex Social Networks , 2010, AAAI.
[54] Jimeng Sun,et al. SmallBlue: Social Network Analysis for Expertise Search and Collective Intelligence , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[55] Marwan Krunz,et al. Multi-constrained optimal path selection , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[56] Robert K. Merton,et al. The Role-Set: Problems in Sociological Theory , 1957 .
[57] Jie Wu,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Multi-dimensional Evidence-based Trust Management with Multi-trusted Paths , 2022 .
[58] Andrew McCallum,et al. Topic and Role Discovery in Social Networks with Experiments on Enron and Academic Email , 2007, J. Artif. Intell. Res..
[59] Punam Bedi,et al. Trust Based Recommender System for Semantic Web , 2007, IJCAI.