Filters








51,852 Hits in 5.3 sec

Trust and Reputation Management in Web-based Social Network [chapter]

Touhid Bhuiyan, Audun Josang, Yue Xu
2010 Web Intelligence and Intelligent Agents  
Currently, none of the web-based social network is considering combining the public reputation of an item with the trust among the members of the network to suggest or recommend an item.  ...  solutions.  ...  Trust and Reputation Management in Web-based Social Network, Web Intelligence and Intelligent Agents, Zeeshan-Ul-Hassan Usmani (Ed.), ISBN: 978-953-7619-85-5, InTech, Available from: http://www.intechopen.com  ... 
doi:10.5772/8375 fatcat:llhbmefwwzddzhk6hejfwx366a

A Categorical Review of Recommender Systems

RVVSV Prasad
2012 International Journal of Distributed and Parallel systems  
Recommender Systems (RS) are software tools and techniques providing suggestions for items and/or services to be of use to a user.  ...  This paper presents a categorical review of the field of recommender systems and describes the state-of-the-art of the recommendation methods that are usually classified into four categories: Content based  ...  For recommender systems, agent research offer ways to manage autonomy, pro-activity, distribution, reputation and trust, etc.  ... 
doi:10.5121/ijdps.2012.3507 fatcat:e5cgc2667fhzbbaqibkjouevo4

The Need for Interoperable Reputation Systems [chapter]

Sandra Steinbrecher
2011 Lecture Notes in Computer Science  
This process should consider both interoperability of reputation systems themselves and their interoperability with applications, trust and identity management systems as we will discuss in this paper.  ...  Reputation objects might be other users, products, web content and anything else that can be rated.  ...  Additionally Stephan Groß and Vashek Matyas provided valuable comments.  ... 
doi:10.1007/978-3-642-19228-9_15 fatcat:noealls4gfaorev7zra7zyz6ya

Interactive Reputation Systems

Johannes Sänger, Günther Pernul
2017 Business & Information Systems Engineering  
Advanced computation models that mitigate their weaknesses, however, are non-transparent to the end-users thus lowering their understandability and the users' trust towards the reputation system.  ...  Results of the evaluation show that interactive reputation systems increase both the users' detection ability (robustness) and understanding of malicious behavior while avoiding trade-offs in usability  ...  reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s12599-017-0493-1 fatcat:hmmmrciyyra6haqq43d6z6xfsy

Reconsidering online reputation systems

Anna Wilson, Stefano De Paoli
2018 European Conference on Computer Supported Cooperative Work  
We question whether the politics, ethics and philosophy that contribute to this paradigm align with those of some of the contexts in which reputation systems are now being used, and suggest that alternative  ...  We suggest that conventional approaches to the design of such systems are rooted in a capitalist, competitive paradigm, relying on methodological individualism, and that the reputation technologies themselves  ...  to trust; and as motivators for more and higher quality participation in certain web-based activities or communities.  ... 
doi:10.18420/ecscw2018_12 dblp:conf/ecscw/WilsonP18 fatcat:vsvd5ohmxnh4tlozb7n2qcdpkm

The design of a reliable reputation system

Gayatri Swamynathan, Kevin C. Almeroth, Ben Y. Zhao
2010 Electronic Commerce Research  
First, we identify a thorough taxonomy on reputation management, and use it as our framework to classify adversarial threats that compromise reliable operation of reputation systems.  ...  Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains.  ...  and are not a particularly novel problem for reputation systems.  ... 
doi:10.1007/s10660-010-9064-y fatcat:trx6nky665el5eb75r2bdvelk4

Personalized Mobile Information Retrieval System

Okkyung Choi, Kangseok Kim, Duksang Wang, Hongjin Yeh, Manpyo Hong
2012 International Journal of Advanced Robotic Systems  
But, most of the current personalized systems on the basis of Social Network are built and constructed mainly in the PC environment, and the systems are neither designed nor implemented in mobile environment  ...  Building a global Network Relations with the internet has made huge changes in personal information system and even comments left on a webpage of SNS(Social Network Services) are appreciated as important  ...  In this paper, we present a novel approach for designing and constructing Semantic Web based Information System using NFC based on Social Network Services to solve the problems of Uncertainty and Vagueness  ... 
doi:10.5772/50910 fatcat:faid5pm2gfbjpeblew2qgj5u7m

Reusable components for online reputation systems

Johannes Sänger, Christian Richthammer, Günther Pernul
2015 Journal of Trust Management  
A problem in this context is that the computation engines applied by most reputation systems available are designed from scratch and rarely consider well established concepts and achievements made by others  ...  of new reputation systems.  ...  Acknowledgment The research leading to these results was supported by the Bavarian State Ministry of Education, Science and the Arts" as part of the FORSEC research association.  ... 
doi:10.1186/s40493-015-0015-3 fatcat:geumooqjrfcr5gdb6mmg7k4j7i

Online Job and Candidate Recommendation System

Punitavathi D, Shinu V, Siva Kumar S, Vidhya Priya S P
2019 International Research Journal of Multidisciplinary Technovation  
To develop an enhanced web application, using web services for both online job and candidate recommendation system.  ...  By using Professional Social Recommender (PSR) and Text field filtering the recommendation of jobs and candidates will be classified.  ...  So that according to our proposed system, the problem definition is the combination of these three networks using web services.  ... 
doi:10.34256/irjmt19212 fatcat:vmbnp7kqenh27osn2fr23qhziq

Estimating the reputation of newcomer web services using a regression-Based method

Okba Tibermacine, Chouki Tibermacine, Foudil Cherif
2018 Journal of Systems and Software  
The lack of evaluating the initial reputation values can subvert the performance of a service recommendation system making it vulnerable to different threats like whitewashing and Sybil attacks, which  ...  In this paper, we propose a novel method to estimate the initial reputation values of newcomer web services.  ...  Our future research work includes the proposition of a complete service recommendation system with a unified reputation management and security model for both single, composite, and community-based Web  ... 
doi:10.1016/j.jss.2018.08.026 fatcat:kxwo3jwtnnf63ndsyopmx4yz5m

A System for Centralizing Online Reputation

Morad Benyoucef, Hui Li, Gregor V. Bochmann
2011 Journal of Emerging Technologies in Web Intelligence  
His present work is in the areas of software engineering for distributed systems, peer-to-peer systems, quality of service and security management for Web applications, and control procedures for optical  ...  Index Terms -Reputation System, Online Trust, Portability, Stochastic Model JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 3, NO. 3, AUGUST 2011 University of Ottawa.  ...  ACKNOWLEDGMENT The authors wish to thank Zhuosong Duan, and Bo Zhang who contributed to the project.  ... 
doi:10.4304/jetwi.3.3.179-187 fatcat:zn3jzpc4ujf2va33yzh5vtxdcq

A survey of UK university web management: staffing, systems and issues

Andrew Cox, Stephen Emmott
2007 Campus-Wide Information Systems  
Methodology/approach The paper is based on a web based questionnaire distributed in summer 2006, and which received 104 usable responses from 87 insitutions.  ...  The role of web manager is partly management of resources, time and people, partly about marketing and liaison and partly also concerned with more technical aspects including interface design and HTML.  ...  IWMW has seen a series of debates about whether to develop a system in- house, adapt an open source system or license a commercial solution.  ... 
doi:10.1108/10650740710835742 fatcat:2cu42l2ljzdgxlygfp4eynyx2i

A Taxonomy to Express Open Challenges in Trust and Reputation Systems

Mozhgan Tavakolifard, Kevin C. Almeroth
2012 Journal of Communications  
During the past decade, online trust and reputation systems have provided cogent answers to emerging challenges in the global computing infrastructures relating to computer and network security, electronic  ...  The critical open challenges that limit the effectiveness of today's trust and reputation systems are discussed by providing a comprehensive literature review.  ...  Malaga examines current approaches in reputation management systems, outlines six main problems with them, and suggests how these problems can be solved [37] .  ... 
doi:10.4304/jcm.7.7.538-551 fatcat:z6wtluf6grbhbiabfmuy5notkm

A survey of security issue in multi-agent systems

Youna Jung, Minsoo Kim, Amirreza Masoumzadeh, James B. D. Joshi
2011 Artificial Intelligence Review  
Unless we guarantee the security services based on agent-based systems, these services will face significant deployment problems.  ...  In this paper, we survey existing work related to security in multi-agent systems, especially focused on access control and trust/reputation, and then present our analyses.  ...  Trust and reputation In addition to access control, trust and reputation are also key issues to provide secure and trustworthy services for modern systems, especially e-business and other web systems  ... 
doi:10.1007/s10462-011-9228-8 fatcat:vnifpd7p3fgjjitw57rn4jp4ai

Oppositional Cuckoo Search Based Weighted Fuzzy Rule System in Malicious Web Sites Detection from Suspicious URLs

Kotoju Rajitha, Doddapaneni VijayaLakshmi
2016 International Journal of Intelligent Engineering and Systems  
Huge web pages are gone by every day over a system and malicious websites may contaminate client machines.  ...  In this work, we design the Malicious Web Sites Detection from Suspicious URLs based on Oppositional Cuckoo Search (OCS) algorithm and fuzzy logic classifier (FLC).  ...  Cuckoo Search Based Weighted Fuzzy Rule System in Malicious Web Sites Detection from Suspicious URLs.  ... 
doi:10.22266/ijies2016.1231.13 fatcat:ngy26labtnfzlk3dr3jdirlugi
« Previous Showing results 1 — 15 out of 51,852 results