Filters








11,842 Hits in 3.6 sec

Preferential Reasoning on a Web of Trust [chapter]

Stijn Heymans, Davy Van Nieuwenborgh, Dirk Vermeir
2005 Lecture Notes in Computer Science  
We introduce a framework, based on logic programming, for preferential reasoning with agents on the Semantic Web.  ...  Finally, we show how an agent can learn preferences on call literals if it is part of a web of trusted agents.  ...  Preferential Reasoning on a Web of Trust Often, the user has its particular knowledge, in the form of a program, and a sense of which calls he believes more than other calls, e.g. because (part of) one  ... 
doi:10.1007/11574620_28 fatcat:hg42yzz4c5fqpbnyissdz24upi

Mathematics of Web science: structure, dynamics and incentives

J. Chayes
2013 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
Algorithms for graphs: example of recommendation systems on trust networks From a social network, one can build a trust network in which trust is represented-a directed graph with a directed edge from  ...  or worm on the Web).  ... 
doi:10.1098/rsta.2012.0377 pmid:23419846 fatcat:5mydkvq7dng7nfxx2knfycslye

Preferential Attachment in an Internet-mediated Human Network [article]

Chezka Camille P. Arevalo, Jaderick P. Pabico
2015 arXiv   pre-print
Based on our analysis, we found out that users of the site exhibit preferential attachment to users with high number of friends.  ...  In the advent of the Internet, web-mediated social networking has become of great influence to Filipinos.  ...  One possible reason is that the availability of accounts in Friendster is becoming less through time, with some of the accounts going private and unreadable to the web robot.  ... 
arXiv:1507.01082v1 fatcat:minnw2pjt5flplwtu43fn62uhe

Governance of digital content in the era of mass participation

Tobias Regner, Javier A. Barria, Jeremy V. Pitt, Brendan Neville
2010 Electronic Commerce Research  
We propose a platform based on an open contracts design that encourages voluntary payments.  ...  They leverage the efficiency of alternative voluntary payment models based on fairness concerns and reciprocity.  ...  The trust rating of this peer is improved so it could receive preferential treatment in the future.  ... 
doi:10.1007/s10660-010-9043-3 fatcat:6tqsjit4pbcvbn4p654p5nvu2i

Evaluating architectures for independently auditing service level agreements

Ana Carolina Barbosa, Jacques Sauvé, Walfredo Cirne, Mirna Carelli
2006 Future generations computer systems  
The qualitative evaluation compares the architectures based on aspects such as intrusiveness, trust, use of extra requests, possibility of preferential treatment, possibility of auditing consumer load,  ...  For such an integration to be effective, the provider and the consumer of a service must negotiate a service level agreement (SLA), i.e. a contract that specifies what one party can expect from the other  ...  Thanks also to the anonymous reviewers who greatly helped to improve the quality and presentation of the paper.  ... 
doi:10.1016/j.future.2006.01.001 fatcat:ud37tez4yzavjpkm5ujwpdxfx4

The Emergence of Opinion Leaders in Online Review Communities

Yingda Lu, Kinshuk Jerath, Param Vir Singh
2011 Social Science Research Network  
We find that, in the Epinions network, both the widely studied "preferential attachment" effect based on the existing number of inlinks (i.e., a network-based property of a node) and the number and quality  ...  of reviews written (i.e., an intrinsic property of a node) are significant drivers of new incoming trust links to a reviewer (i.e., inlinks to a node).  ...  Acknowledgments All authors contributed equally and have been listed in a random order.  ... 
doi:10.2139/ssrn.1562245 fatcat:ylquuxclyfclbc2mrsxviwqepq

Blogosphere

Nitin Agarwal, Huan Liu
2008 SIGKDD Explorations  
transformed the problem of trust in blogosphere to the one in social friendship networks -Studied propagation of trust among different blog sites -Mined sentiments from a window of words around hyperlinks  ...  The reason? The advertisers are eager to influence her 850,000 readers. Kim, founder and senior editor of MacRumors.com. Web vs.  ...  • Are any of these correlated? • Data collection  ... 
doi:10.1145/1412734.1412737 fatcat:v4ec3j66aragrnczjlisl6yowe

Exercising Qualitative Control in Autonomous Adaptive Survivable Systems [chapter]

Jon Doyle, Michael McGeachie
2003 Lecture Notes in Computer Science  
of the stable foundations of the trust manager's utility judgments.  ...  Flexible adaptation of allocations to changing circumstances places great demands on the methods used to represent the utility information needed by rational decision-making mechanisms.  ...  Mike McGeachie is supported in part by a training grant from the National Library of Medicine, and a grant from the Pfizer corporation.  ... 
doi:10.1007/3-540-36554-0_12 fatcat:vwhelltyznfvnpnrpz3hgfcsym

The Information Ecology of Social Media and Online Communities

Tim Finin, Anupam Joshi, Pranam Kolari, Akshay Java, Anubhav Kale, Amit Karandikar
2008 The AI Magazine  
We describe recent work on building systems that use models of the Blogosphere to recognize spam blogs, find opinions on topics, identify communities of interest, derive trust relationships, and detect  ...  One thing that sets these "Web 2.0" sites apart from traditional Web pages and resources is that they are intertwined with other forms of networked data.  ...  James Mayfield, Justin Martineau and Sandeep Balijepalli for their contributions to the work on sentiment detection.  ... 
doi:10.1609/aimag.v29i3.2158 fatcat:qmuzv4t7gba5vmaic3nzzfldna

HopRec: Hop-Based Recommendation Ability Enhanced Reputation Ranking in P2P Networks

Yufeng WANG, Akihiro NAKAO, Jianhua MA
2010 IEICE transactions on information and systems  
uses hop-based recommendation ability to improve the accuracy of reputation ranking in P2P networks.  ...  Finally, we also show that, if the initial good and malicious seeds could be selected based on peers' degrees, then HopRec and CredibleRank can achieve perfect performance.  ...  how to improve the previous draft of the articles; their comments were of great help.  ... 
doi:10.1587/transinf.e93.d.438 fatcat:igyqgyqoa5btjdxfcjldkq3byu

Multicriteria Subjective Reputation Management Model [chapter]

Michał Majdan, Włodzimierz Ogryczak
2010 Lecture Notes in Computer Science  
In this paper a new reputation management model is presented. It is focused on aggregation of community wide reputation in situation when agents do not share the same preference structure.  ...  The expressive power of subjective utilities concept along with the WOWA aggregation technique provides the reputation management system with a capability to model various preference structures.  ...  Acknowledgements This work has been partially supported by the Polish Ministry of Science and Higher Education under the research grant N N516 4307 33.  ... 
doi:10.1007/978-3-642-13529-3_72 fatcat:7qbeatd4jrgxvjhg2bm76gf3v4

Growing a Web of Trust

Benjamin Schiller, Thorsten Strufe, Dirk Kohlweyer, Jan Seedorf
2015 2015 IEEE 40th Conference on Local Computer Networks (LCN)  
New edges are formed based on realistic assumptions about trust establishment. We analyze the growth of a real-world WoT and perform a parameter study of our model.  ...  Web of Trust (WoT) graphs represent trust relations between people. They are used for research and analysis in various domains. Real-world instances are only available in sizes of up to 55k vertices.  ...  INTRODUCTION Trust between users of a system is often represented by a trust graph called a Web of Trust (WoT).  ... 
doi:10.1109/lcn.2015.7366288 dblp:conf/lcn/SchillerSKS15 fatcat:r2iq4m2hsrhhzhc4jzomob2via

Link Prediction in Complex Networks by Multi Degree Preferential-Attachment Indices [article]

Ke Hu, Ju Xiang, Wanchun Yang, Xiaoke Xu, Yi Tang
2012 arXiv   pre-print
By revisiting the preferential attachment mechanism for generating a scale-free network, here we propose a class of preferential attachment indices which are different from the previous one.  ...  In principle, the rules of links formation of a network model can be considered as a kind of link prediction algorithm.  ...  All the trust relationships interact and form the Web of Trust which is then combined with review ratings to determine which reviews are shown to the user. 12) Slashdot Social network(SS) [40] : Slashdot  ... 
arXiv:1211.1790v1 fatcat:naxuencjv5d3zpkr6vvkd7vciq

Negotiating Exchanges of Private Information for Web Service Eligibility [chapter]

Keping Jia, Bruce Spencer
2003 Lecture Notes in Computer Science  
The prototype is built upon the emerging standard Web Services architecture.  ...  For various reasons, maintaining the privacy of that information is important to these individuals, including avoiding unwelcome communication, spam, from those businesses or their associates.  ...  The user's trusted software agent is a web service that has preinstalled user knowledge.  ... 
doi:10.1007/3-540-44886-1_20 fatcat:wvtvb2ghw5djdbvauaoxzjowyq

How placing limitations on the size of personal networks changes the structural properties of complex networks

Somayeh Koohborfardhaghighi, Jörn Altmann
2014 Proceedings of the 23rd International Conference on World Wide Web - WWW '14 Companion  
Despite the fact that technology has shrunk our world, there is also a limit to how many close friends one can keep and count on. It is a relatively small number.  ...  the structural properties of a complex network, in this paper, we focus on another factor that may contribute to such changes, namely the size of personal networks.  ...  Instead of writing down names immediately, you ask about the context in which trust should be considered. The reason is that trust is a context specific issue.  ... 
doi:10.1145/2567948.2578847 dblp:conf/www/KoohborfardhaghighiA14 fatcat:rem3evlybvdjtdgavzseqhhgpi
« Previous Showing results 1 — 15 out of 11,842 results