9,807 Hits in 5.1 sec

Trustworthy Agent-Based Recommender System in a Mobile P2P Environment [chapter]

Nabil Sahli, Gabriele Lenzini, Henk Eertink
2012 Lecture Notes in Computer Science  
In this paper, we aim at building a mobile P2P recommender system which dramatically reduces wireless traffic between peers, brings trustworthiness (each peer can choose to rely on opinions of peers whom  ...  In addition, nomadic users demand applications and services that are context-aware, personalised, secure, and trustworthy. Recommender systems are one of these applications.  ...  Using the context, the profile, and the experience (transmitted by the Embedded-Agent ) of the user, Delegate-Agent maintains a personal community of trustworthy recommenders and a list of rated items.  ... 
doi:10.1007/978-3-642-31809-2_6 fatcat:5xeoui3l7bcdhfnlrkjsjuhe4a

Trust, Reputation and User Modeling [chapter]

Julita Vassileva, Jie Zhang
2012 Lecture Notes in Computer Science  
the source of trust recommendation, subjectivity of trust, selecting a newcomer with less probability than trustworthy entities and considering the risk associated with transactions.  ...  Zhang [4] , explores the theme of modelling trust in communities and social networks, proposing a new trust ranking based recommendation model for virtual communities, that does not require extensive  ... 
doi:10.1007/978-3-642-28509-7_21 fatcat:3rbpi6ppl5guzb5b2co2isxzhm

Agent-based Framework for Sensor-to-Sensor Personalization

Nabil Sahli, Nafaa Jabeur, Mohamad Badra
2013 Procedia Computer Science  
To this end, we propose an agent-based framework where sensor nodes delegate software agents (static or mobile) to collect valuable data about the neighboring sensors and the spatial characteristics of  ...  In this paper, we aim at extending personalization by allowing sensors to support each other with services that mutually fit their differences.  ...  The selection of the Virtual World and the association of each sensor to a particular Virtual World are not discussed in this paper.  ... 
doi:10.1016/j.procs.2013.06.030 fatcat:5asgcrox2bhkvlaggofonn3hsa

Towards Secure Mobile Multiagent Based Electronic Marketplace Systems

Klaus Fischer, Dieter Hutter, Matthias Klusch, Werner Stephan
2002 Electronical Notes in Theoretical Computer Science  
In this paper we aim at a generic methodology to validate, assess, and construct mobile multi-agent systems in the domain of virtual market places.  ...  It rests upon research carried out in the past to develop innovative engineering solutions for architectures based on the paradigm of mobile multi-agents.  ...  Based on these recommendations the agent moves to selected relevant auction servers sequentially to participate in respective auctions.  ... 
doi:10.1016/s1571-0661(04)80337-2 fatcat:kny4vf4gqzbklblcn7pldy6bim

Trust and Security in Service-Oriented Environments [chapter]

2006 Trust and Reputation for Service-Oriented Environments  
Thus, real business value, increased consumer confidence, guaranteed quality of product and service could become a reality in the virtual word.  ...  These factors and several others, when taken together, create the imperative for being able to make judgements within such an environment about the other parties' trustworthiness and capability to provide  ...  ), from shopping at the mall ( to bargaining in virtual markets (e-Bay), from e-bill to e-pay, from the virtual community to virtual collaboration, from e-governance (e-administration) to mobile  ... 
doi:10.1002/9780470028261.ch1 fatcat:4od6p4wvbng3jcgdikiv2xk7oe

IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation

Lizi Zhang, Hui Fang, Wee Keong Ng, Jie Zhang
2011 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications  
attention in virtual communities.  ...  recommending trustworthy friends to community members.  ...  With these, we propose an interaction ranking-based recommendation model called IntRank in Alg. 1, to recommend trustworthy friends in virtual communities.  ... 
doi:10.1109/trustcom.2011.36 dblp:conf/trustcom/ZhangFNZ11 fatcat:h5j4mwufwjd63ngmhtwnohrwbe

Service Discovery and Trust in Mobile Social Network in Proximity [article]

Chii Chang, Satish Srirama, Sea Ling
2015 arXiv   pre-print
Such characteristic faces challenges in discovery latency and trustworthiness.  ...  Later, we address the trustworthiness issue in MSNP and propose a scheme to reduce the latency of the trustworthy service discovery for MSNP.  ...  Although the marketing report has shown that mobile SNS applications have successfully become the most popular applications for mobile users, mobile users have been restricted in the virtual communities  ... 
arXiv:1504.01504v1 fatcat:aeemj3ey6fel3awghfnu4j7hcm

Trust-based recommendation systems in Internet of Things: a systematic literature review

Venus Mohammadi, Amir Masoud Rahmani, Aso Mohammed Darwesh, Amir Sahafi
2019 Human-Centric Computing and Information Sciences  
On the other side, the internet and mobile communication facilitate the spatiotemporal connection between distant people with common experience and values.  ...  More recently, technological evolution is introduced by intelligent sensor devices installed in the physical and virtual realm of IoT to act as or on behalf of human beings: the virtual robots [2] .  ...  recommender system in IoT virtual space is more feasible.  ... 
doi:10.1186/s13673-019-0183-8 fatcat:ckozm3ixungbvpc37agoxc5arm

Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing

Weijin Jiang, Yang Wang, Yirong Jiang, Yuhui Xu, Jiahui Chen, Lina Tan, Guo Liang
2019 Computers Materials & Continua  
Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data, the public trust host selection algorithm  ...  In mobile cloud computing, trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.  ...  The "public letter" host selection algorithm provides a method for selecting a trusted interactive object for the host in the mobile agent system, especially the host newly added to the mobile agent system  ... 
doi:10.32604/cmc.2020.05933 fatcat:l7onwzn23rhzzlw2xkt3wfek6i

Let Me Show You Your New Home: Studying the Effect of Proxemic-awareness of Robots on Users' First Impressions

Bjorn Petrak, Katharina Weitz, Ilhan Aslan, Elisabeth Andre
2019 2019 28th IEEE International Conference on Robot and Human Interactive Communication (RO-MAN)  
In order to test this hypothesis, we conducted a user study with 16 participants in a virtual reality setting, comparing the impression of two agents being introduced to their new homes by users.  ...  We found that the proxemic-aware agent was indeed perceived as significantly better considering multiple constructs, including perceived anthropomorphism and trustworthiness.  ...  an agent [32] .  ... 
doi:10.1109/ro-man46459.2019.8956463 dblp:conf/ro-man/PetrakWAA19 fatcat:3fiseo33v5ha3p726watq5fdwi

A Distributed Trust Management Scheme for Data Forwarding in Satellite DTN Emergency Communications

Philip Asuquo, Haitham Cruickshank, Chibueze P. Anyigor Ogah, Ao Lei, Zhili Sun
2018 IEEE Journal on Selected Areas in Communications  
These constraints in resources, in addition to the sparsity and mobility of these nodes often result in intermittent connectivities.  ...  Satellite Communications can be used when other communication systems are either destroyed or overloaded.  ...  The reference scenario for deployment of emergency communication by ETSI for large scale disaster (EQ Scenario) also reflects similar mobility pattern and mobile agents.  ... 
doi:10.1109/jsac.2018.2804098 fatcat:vpsy2vgddzazdes4mdovmzy4te

TAMAP: a new trust-based approach for mobile agent protection

Salima Hacini, Zahia Guessoum, Zizette Boufaida
2007 Journal in Computer Virology  
This paper introduces a trust-based mechanism to improve the security of mobile agents against malicious hosts and to allow their execution in various environments.  ...  This key allows then to deduce the host's trust degree and permits the mobile agent to adapt its execution accordingly to the host trustworthiness, its behavior history and the provided Quality of Service  ...  It also protects the service provider and the mobile agent communication.  ... 
doi:10.1007/s11416-007-0056-y fatcat:fuzfonio7zcc5lmt5m53ozmdqq

On the successful deployment of community policing services the TRILLION project case

Charalampos Z. Patrikakis, Dimitrios G. Kogias, George Loukas, Avgoustinos Filippoupolitis, William Oliff, Syed Sadiqur Rahman, Silvio Sorace, Ernesto La Mattina, Quercia Elisabeth
2018 2018 IEEE International Conference on Consumer Electronics (ICCE)  
in the context of community policing.  ...  In this paper, the authors (all participating in the EU Research project on community policing TRILLION), discuss issues related to the use of innovative technologies, while ensuring societal approval,  ...  This setting enables virtual and controlled communication with virtual characters. The aim here is to maximize the efficiency of communication between officers and citizens.  ... 
doi:10.1109/icce.2018.8326149 dblp:conf/iccel/PatrikakisKLFOR18 fatcat:fcukgfnvz5f2zdxk56wgr4rpii


Yao Wang, Jie Zhang, Julita Vassileva
2014 Computational intelligence  
We describe this framework in the context of web service selection where agents with more capabilities act as super-agents.  ...  In this paper, we propose a novel super-agent based framework for reputation management and community formation in decentralized systems.  ...  A community member can also recommend other agents that it considers trustworthy to join a community.  ... 
doi:10.1111/coin.12026 fatcat:rb4m3t7terhldbn2plfpmym46i

Key changes to improve social presence of a virtual health assistant promoting colorectal cancer screening informed by a technology acceptance model

Melissa J. Vilaro, Danyell S. Wilson-Howard, Mohan S. Zalake, Fatemeh Tavassoli, Benjamin C. Lok, François P. Modave, Thomas J. George, Folakemi Odedina, Peter J. Carek, Janice L. Krieger
2021 BMC Medical Informatics and Decision Making  
Discussion Virtual agents can be adapted to better meet patient expectations such as being a trustworthy and expert source.  ...  Social presence cues helped patients engage with CRC screening messages delivered in this novel digital context.  ...  Acknowledgements Thanks to the participants in all phases of the study as well as community advisory board members who inform various aspects of the larger research study of which this article is part  ... 
doi:10.1186/s12911-021-01549-z pmid:34158046 fatcat:wz6esiwmqjecdedf3onmsyecna
« Previous Showing results 1 — 15 out of 9,807 results