-
1
-
-
0012143045
-
Managing trust in a peer-to-peer information system
-
K. Aberer and Z. Despotovic. Managing trust in a peer-to-peer information system. In ACM CIKM, 2001.
-
(2001)
ACM CIKM
-
-
Aberer, K.1
Despotovic, Z.2
-
2
-
-
0003293531
-
Free riding on gnutella
-
E. Adar and B. A. Hubeman. Free riding on gnutella. First Monday, 5(10), 2000.
-
(2000)
First Monday
, vol.5
, Issue.10
-
-
Adar, E.1
Hubeman, B.A.2
-
3
-
-
20844435854
-
Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
-
G. Adomavicius and A. Tuzhilin. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE transactions on knowledge and data engineering, 17(6), 2005.
-
(2005)
IEEE transactions on knowledge and data engineering
, vol.17
, Issue.6
-
-
Adomavicius, G.1
Tuzhilin, A.2
-
4
-
-
0002734008
-
Hotting hatches an egg: A new graph-theoretic approach to collaborative filtering
-
C. C. Aggarwal, J. L. Wolf, K. Wu, and P. S. Yu. Hotting hatches an egg: A new graph-theoretic approach to collaborative filtering. In ACM KDD Conference, 1999.
-
(1999)
ACM KDD Conference
-
-
Aggarwal, C.C.1
Wolf, J.L.2
Wu, K.3
Yu, P.S.4
-
6
-
-
29244433513
-
Management in peer-to-peer systems: Trust, reputation and security
-
R. Boutaba and A. Marshall. Management in peer-to-peer systems: Trust, reputation and security. Computer Networks, 50(4), 2006.
-
(2006)
Computer Networks
, vol.50
, Issue.4
-
-
Boutaba, R.1
Marshall, A.2
-
8
-
-
84982474806
-
An algorithmic approach to concept exploration in a large knowledge network (automatic thesaurus consultation): Symbolic branch-and-bound search vs. connectionist hopfield net activation
-
H. Chen and D. T. Ng. An algorithmic approach to concept exploration in a large knowledge network (automatic thesaurus consultation): symbolic branch-and-bound search vs. connectionist hopfield net activation. Journal of American Society of Information Science, 46(5), 1995.
-
(1995)
Journal of American Society of Information Science
, vol.46
, Issue.5
-
-
Chen, H.1
Ng, D.T.2
-
9
-
-
58149409019
-
A spreading activation theory of semantic processing
-
A. M. Collins and E. F. Loftus. A spreading activation theory of semantic processing. Psychology Review, 82(6), 1975.
-
(1975)
Psychology Review
, vol.82
, Issue.6
-
-
Collins, A.M.1
Loftus, E.F.2
-
10
-
-
77953066525
-
Choosing reputable servents in a p2p network
-
F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Choosing reputable servents in a p2p network. In 11th International Conference on World Wide Web, 2002.
-
(2002)
11th International Conference on World Wide Web
-
-
Cornelli, F.1
Damiani, E.2
di Vimercati, S.D.C.3
Paraboschi, S.4
Samarati, P.5
-
11
-
-
0038011186
-
-
E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-topeer networks. In CCS, 2002.
-
E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-topeer networks. In CCS, 2002.
-
-
-
-
12
-
-
29244482785
-
P2p reputation management: Probabilistic estimation vs. social networks
-
Z. Despotovic and K. Aberer. P2p reputation management: Probabilistic estimation vs. social networks. Computer Networks, 50(4):485-500, 2006.
-
(2006)
Computer Networks
, vol.50
, Issue.4
, pp. 485-500
-
-
Despotovic, Z.1
Aberer, K.2
-
17
-
-
3042697346
-
Evaluating collaborative filtering recommender systems
-
J. L. Herlocker, J. A. Konstan, L. G. Terveen, and J. T. Riedl. Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems, 22(1), 2004.
-
(2004)
ACM Transactions on Information Systems
, vol.22
, Issue.1
-
-
Herlocker, J.L.1
Konstan, J.A.2
Terveen, L.G.3
Riedl, J.T.4
-
18
-
-
3042819722
-
Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering
-
Z. Huang, H. Chen, and D. Zeng. Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering. ACM Transactions in Information Systems, 22(1), 2004.
-
(2004)
ACM Transactions in Information Systems
, vol.22
, Issue.1
-
-
Huang, Z.1
Chen, H.2
Zeng, D.3
-
19
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Josang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decis. Support Syst., 43(2):618-644, 2007.
-
(2007)
Decis. Support Syst
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
20
-
-
38149043562
-
Semantic constraints for trust transitivity
-
Darlinghurst, Australia, Australia, Australian Computer Society, Inc
-
A. Josang and S. Pope. Semantic constraints for trust transitivity. In APCCM'05: Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling, pages 59-68, Darlinghurst, Australia, Australia, 2005. Australian Computer Society, Inc.
-
(2005)
APCCM'05: Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling
, pp. 59-68
-
-
Josang, A.1
Pope, S.2
-
25
-
-
29244436370
-
Taxonomy of trust: Categorizing p2p reputation systems
-
S. Marti and H. Garcia-Molina. Taxonomy of trust: Categorizing p2p reputation systems. Computer Networks, 50(4), 2006.
-
(2006)
Computer Networks
, vol.50
, Issue.4
-
-
Marti, S.1
Garcia-Molina, H.2
-
26
-
-
0003780986
-
The pagerank citation ranking: Bringing order to the web
-
Technical report
-
L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Technical report, 1998.
-
(1998)
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
27
-
-
0002101577
-
Reputation systems
-
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems. Communications of the ACM, 43(12), 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
30
-
-
33646831908
-
Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks
-
M. Srivatsa, L. Xiong, and L. Liu. Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In 14th International conference on World Wide Web, 2005.
-
(2005)
14th International conference on World Wide Web
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
|