-
1
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
Agrawal R, Imieliński T, Swami A (1993) Mining association rules between sets of items in large databases. ACM SIGMOD Rec 22(2):207–216
-
(1993)
ACM SIGMOD Rec
, vol.22
, Issue.2
, pp. 207-216
-
-
Agrawal, R.1
Imieliński, T.2
Swami, A.3
-
2
-
-
85031815063
-
-
Agrawal R, Srikant R, et al (1994) Fast algorithms for mining association rules. In: Proceedings of the 20th international conference on very large data bases, VLDB, vol 1215, pp 487–499
-
(1994)
Fast algorithms for mining association rules. In: Proceedings of the 20th international conference on very large data bases, VLDB, vol 1215, pp 487–499
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
84906093350
-
Privacy, trust and identity in pervasive computing: a review of technical challenges and future research directions
-
Al-Karkhi A, Al-Yasiri A, Linge N (2012) Privacy, trust and identity in pervasive computing: a review of technical challenges and future research directions. Int J Distrib Parallel Syst (IJDPS) 3(3):197–218
-
(2012)
Int J Distrib Parallel Syst (IJDPS)
, vol.3
, Issue.3
, pp. 197-218
-
-
Al-Karkhi, A.1
Al-Yasiri, A.2
Linge, N.3
-
5
-
-
35248873087
-
Experience with the keynote trust management system: applications and future directions
-
In:, Nixon, P, Terzis, S, (eds) Springer, Berlin
-
Blaze M, Ioannidis J, Keromytis AD (2003) Experience with the keynote trust management system: applications and future directions. In: Nixon P, Terzis S (eds) Trust management. Springer, Berlin, pp 284–300
-
(2003)
Trust management
, pp. 284-300
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.D.3
-
7
-
-
78649394789
-
Weka—experiences with a java open-source project
-
Bouckaert RR, Frank E, Hall MA, Holmes G, Pfahringer B, Reutemann P, Witten IH (2010) Weka—experiences with a java open-source project. J Mach Learn Res 11:2533–2541
-
(2010)
J Mach Learn Res
, vol.11
, pp. 2533-2541
-
-
Bouckaert, R.R.1
Frank, E.2
Hall, M.A.3
Holmes, G.4
Pfahringer, B.5
Reutemann, P.6
Witten, I.H.7
-
8
-
-
79953822842
-
Affect detection: An interdisciplinary review of models, methods, and their applications
-
Calvo RA, D’Mello S (2010) Affect detection: An interdisciplinary review of models, methods, and their applications. IEEE Trans Affect Comput 1(1):18–37
-
(2010)
IEEE Trans Affect Comput
, vol.1
, Issue.1
, pp. 18-37
-
-
Calvo, R.A.1
D’Mello, S.2
-
9
-
-
84881034863
-
Feeltrust: providing trustworthy communications in ubiquitous mobile environment
-
Carullo G, Castiglione A, Cattaneo G, De Santis A, Fiore U, Palmieri F (2013) Feeltrust: providing trustworthy communications in ubiquitous mobile environment. In: 2013 IEEE 27th international conference on advanced information networking and applications (AINA). IEEE, pp 1113–1120
-
(2013)
IEEE 27th international conference on advanced information networking and applications (AINA). IEEE
, pp. 1113-1120
-
-
Carullo, G.1
Castiglione, A.2
Cattaneo, G.3
De Santis, A.4
Fiore, U.5
Palmieri, F.6
-
10
-
-
84942372929
-
A triadic closure and homophily-based recommendation system for online social networks
-
Carullo G, Castiglione A, De Santis A, Palmieri F (2015) A triadic closure and homophily-based recommendation system for online social networks. World Wide Web 18(6):1579–1601
-
(2015)
World Wide Web
, vol.18
, Issue.6
, pp. 1579-1601
-
-
Carullo, G.1
Castiglione, A.2
De Santis, A.3
Palmieri, F.4
-
11
-
-
38049001489
-
Modeling of man-in-the-middle attack in the wireless networks
-
Chen Z, Guo S, Zheng K, Yang Y (2007) Modeling of man-in-the-middle attack in the wireless networks. In: International conference on wireless communications, networking and mobile computing, 2007 (WiCom 2007). IEEE, pp 2255–2258
-
(2007)
International conference on wireless communications, networking and mobile computing, 2007 (WiCom 2007). IEEE
, pp. 2255-2258
-
-
Chen, Z.1
Guo, S.2
Zheng, K.3
Yang, Y.4
-
12
-
-
84964507199
-
-
D’Angelo G, Rampone S, Palmieri F (2015) An artificial intelligence-based trust model for pervasive computing. In: Proceedings international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC) 2015
-
(2015)
An artificial intelligence-based trust model for pervasive computing. In: Proceedings international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC) 2015
-
-
D’Angelo, G.1
Rampone, S.2
Palmieri, F.3
-
13
-
-
0002336395
-
Chapter 4: Trust as a commodity
-
Basil Blackwell, Oxford, vol, In:, Gambetta, D, (ed
-
Dasgupta P (1988) Chapter 4: Trust as a commodity. In: Gambetta D (ed) Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, vol 4, pp 49–72
-
(1988)
Trust: making and breaking cooperative relations
, vol.4
, pp. 49-72
-
-
Dasgupta, P.1
-
15
-
-
0242641140
-
The digitization of word of mouth: promise and challenges of online feedback mechanisms
-
Dellarocas C (2003) The digitization of word of mouth: promise and challenges of online feedback mechanisms. Manag Sci 49(10):1407–1424
-
(2003)
Manag Sci
, vol.49
, Issue.10
, pp. 1407-1424
-
-
Dellarocas, C.1
-
16
-
-
78751649542
-
Trust management in ubiquitous computing: a Bayesian approach
-
Denko MK, Sun T, Woungang I (2011) Trust management in ubiquitous computing: a Bayesian approach. Comput Commun 34(3):398–406
-
(2011)
Comput Commun
, vol.34
, Issue.3
, pp. 398-406
-
-
Denko, M.K.1
Sun, T.2
Woungang, I.3
-
18
-
-
0003358457
-
SPKI certificate theory
-
Ellison C, Frantz B, Lampson B, Rivest R, Thomas B, Ylonen T (1999) SPKI certificate theory. IETF RFC 2693
-
(1999)
IETF RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
19
-
-
33646023117
-
An introduction to ROC analysis
-
Fawcett T (2006) An introduction to ROC analysis. Pattern Recognit Lett 27(8):861–874
-
(2006)
Pattern Recognit Lett
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
-
20
-
-
0002283033
-
From data mining to knowledge discovery in databases
-
Fayyad U, Piatetsky-Shapiro G, Smyth P (1996) From data mining to knowledge discovery in databases. AI Mag 17(3):37
-
(1996)
AI Mag
, vol.17
, Issue.3
, pp. 37
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
24
-
-
84955478304
-
A cognitive neural architecture able to learn and communicate through natural language
-
Golosio B, Cangelosi A, Gamotina O, Masala GL (2015) A cognitive neural architecture able to learn and communicate through natural language. Plos One J 10(11):1–37
-
(2015)
Plos One J
, vol.10
, Issue.11
, pp. 1-37
-
-
Golosio, B.1
Cangelosi, A.2
Gamotina, O.3
Masala, G.L.4
-
27
-
-
0009481412
-
A survey of trust in internet applications
-
Grandison T, Sloman M (2000) A survey of trust in internet applications. IEEE Commun Surv Tutor 3(4):2–16
-
(2000)
IEEE Commun Surv Tutor
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
29
-
-
0346457324
-
Online association rule mining
-
Hidber C (1999) Online association rule mining. ACM 28(2):145–156
-
(1999)
ACM
, vol.28
, Issue.2
, pp. 145-156
-
-
Hidber, C.1
-
30
-
-
71649094416
-
A survey of attack and defense techniques for reputation systems
-
Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv (CSUR) 42(1):1
-
(2009)
ACM Comput Surv (CSUR)
, vol.42
, Issue.1
, pp. 1
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
31
-
-
84898621801
-
International conference on interactive collaborative learning (ICL)
-
Ivanova M (2013) Researching affective computing techniques for intelligent tutoring systems. In
-
Ivanova M (2013) Researching affective computing techniques for intelligent tutoring systems. In: 2013 International conference on interactive collaborative learning (ICL). IEEE
-
(2013)
IEEE
-
-
-
32
-
-
84877991984
-
Q-apriori algorithm of multivalue attribute association rules mining
-
Jiang L, Meng FR, Zhou Y (2011) Q-apriori algorithm of multivalue attribute association rules mining. Comput Eng 37(9):81–83
-
(2011)
Comput Eng
, vol.37
, Issue.9
, pp. 81-83
-
-
Jiang, L.1
Meng, F.R.2
Zhou, Y.3
-
33
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
Kagal L, Finin T, Joshi A (2001) Trust-based security in pervasive computing environments. Computer 34(12):154–157
-
(2001)
Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
37
-
-
61649125437
-
Personal history based recommendation service system with collaborative filtering
-
Kim JH, Chung KY, Ryu JK, Rim KW, Lee JH (2008) Personal history based recommendation service system with collaborative filtering. In: Advanced software engineering and its applications, 2008. ASEA 2008. IEEE, pp 261–264
-
(2008)
Advanced software engineering and its applications, 2008. ASEA 2008. IEEE
, pp. 261-264
-
-
Kim, J.H.1
Chung, K.Y.2
Ryu, J.K.3
Rim, K.W.4
Lee, J.H.5
-
40
-
-
84905743463
-
The simulation of an emotional robot implemented with fuzzy logic
-
Leu FY, Liu JC, Hsu YT, Huang YL (2014) The simulation of an emotional robot implemented with fuzzy logic. Soft Comput J 18(9):1729–1743
-
(2014)
Soft Comput J
, vol.18
, Issue.9
, pp. 1729-1743
-
-
Leu, F.Y.1
Liu, J.C.2
Hsu, Y.T.3
Huang, Y.L.4
-
41
-
-
84957069091
-
Naive (bayes) at forty: The independence assumption in information retrieval
-
In:, Springer, Berlin
-
Lewis DD (1998) Naive (bayes) at forty: The independence assumption in information retrieval. In: Machine learning: ECML-98, Springer, Berlin, pp 4–15
-
(1998)
Machine learning: ECML-98
, pp. 4-15
-
-
Lewis, D.D.1
-
43
-
-
3142662162
-
Web-based reputation management systems: problems and suggested solutions
-
Malaga RA (2001) Web-based reputation management systems: problems and suggested solutions. Electron Commer Res 1(4):403–417
-
(2001)
Electron Commer Res
, vol.1
, Issue.4
, pp. 403-417
-
-
Malaga, R.A.1
-
47
-
-
78751642869
-
A context-based trust management model for pervasive computing systems
-
Razavi N, Rahmani AM, Mohsenzadeh M (2009) A context-based trust management model for pervasive computing systems. Int J Comput Sci Inf Secur 6(1):137–142
-
(2009)
Int J Comput Sci Inf Secur
, vol.6
, Issue.1
, pp. 137-142
-
-
Razavi, N.1
Rahmani, A.M.2
Mohsenzadeh, M.3
-
48
-
-
84863971844
-
The effects of an interactive software agent on student affective dynamics while using; an intelligent tutoring system
-
Rodrigo MMT (2012) The effects of an interactive software agent on student affective dynamics while using; an intelligent tutoring system. IEEE Trans Affect Comput 3(2):224–236
-
(2012)
IEEE Trans Affect Comput
, vol.3
, Issue.2
, pp. 224-236
-
-
Rodrigo, M.M.T.1
-
49
-
-
84887437106
-
Quantminer for mining quantitative association rules
-
Salleb-Aouissi A, Vrain C, Nortet C, Kong X, Rathod V, Cassard D (2013) Quantminer for mining quantitative association rules. J Mach Learn Res 14(1):3153–3157
-
(2013)
J Mach Learn Res
, vol.14
, Issue.1
, pp. 3153-3157
-
-
Salleb-Aouissi, A.1
Vrain, C.2
Nortet, C.3
Kong, X.4
Rathod, V.5
Cassard, D.6
-
51
-
-
84964494064
-
Web-based reputation management systems: problems and suggested solutions
-
Sharifi A, Khosravi M, Shah A (2013) Web-based reputation management systems: problems and suggested solutions. Int J Eng Innov Technol (IJEIT) 3(4):40–45
-
(2013)
Int J Eng Innov Technol (IJEIT)
, vol.3
, Issue.4
, pp. 40-45
-
-
Sharifi, A.1
Khosravi, M.2
Shah, A.3
-
53
-
-
0030157416
-
Mining quantitative association rules in large relational tables
-
Srikant R, Agrawal R (1996) Mining quantitative association rules in large relational tables. ACM SIGMOD Rec 25(2):1–12
-
(1996)
ACM SIGMOD Rec
, vol.25
, Issue.2
, pp. 1-12
-
-
Srikant, R.1
Agrawal, R.2
-
54
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun 24(2):318–328
-
(2006)
IEEE J Sel Areas Commun
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
57
-
-
84924081025
-
Speech emotion recognition using Fourier parameters
-
Wang K, An N, Li BN, Zhang Y (2015) Speech emotion recognition using Fourier parameters. IEEE Trans Affect Comput 6(1):69–75
-
(2015)
IEEE Trans Affect Comput
, vol.6
, Issue.1
, pp. 69-75
-
-
Wang, K.1
An, N.2
Li, B.N.3
Zhang, Y.4
-
58
-
-
57649228344
-
A vector-based trust model for p2p e-commerce
-
In:, vol
-
Wang Q, Wang L (2008) A vector-based trust model for p2p e-commerce. In: Fourth international conference on natural computation, 2008. ICNC’08. IEEE, vol 7, pp 117–123
-
(2008)
Fourth international conference on natural computation, 2008. ICNC’08. IEEE
, vol.7
, pp. 117-123
-
-
Wang, Q.1
Wang, L.2
-
61
-
-
23044484863
-
The computer for the 21st century
-
Weiser M (1999) The computer for the 21st century. Mobile Comput Commun Rev 3(3):3–11
-
(1999)
Mobile Comput Commun Rev
, vol.3
, Issue.3
, pp. 3-11
-
-
Weiser, M.1
-
62
-
-
70349604459
-
Research on improved collaborative filtering-based mobile e-commerce personalized recommender system
-
Wu J, Ping L, Wang H, Lin Z, Zhang Q (2008) Research on improved collaborative filtering-based mobile e-commerce personalized recommender system. In: International conference on multimedia and information technology, 2008. MMIT’08. IEEE, pp 143–146
-
(2008)
International conference on multimedia and information technology, 2008. MMIT’08. IEEE
, pp. 143-146
-
-
Wu, J.1
Ping, L.2
Wang, H.3
Lin, Z.4
Zhang, Q.5
-
64
-
-
3142738238
-
Peertrust: supporting reputation-based trust for peer-to-peer electronic communities
-
Xiong L, Liu L (2004) Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857
-
(2004)
IEEE Trans Knowl Data Eng
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
65
-
-
41149110884
-
A security framework with trust management for sensor networks
-
Yao Z, Kim D, Lee I, Kim K, Jang J (2005) A security framework with trust management for sensor networks. In: Workshop of the 1st international conference on security and privacy for emerging areas in communication networks, 2005. IEEE, pp 190–198
-
(2005)
Workshop of the 1st international conference on security and privacy for emerging areas in communication networks, 2005. IEEE
, pp. 190-198
-
-
Yao, Z.1
Kim, D.2
Lee, I.3
Kim, K.4
Jang, J.5
-
66
-
-
33750334203
-
A dynamic trust model based on naive bayes classifier for ubiquitous environments
-
In:, Gerndt, M, Kranzlmüller, D, (eds) Springer, Berlin
-
Yuan W, Guan D, Lee S, Lee Y (2006) A dynamic trust model based on naive bayes classifier for ubiquitous environments. In: Gerndt M, Kranzlmüller D (eds) High performance computing and communications. Springer, Berlin, pp 562–571
-
(2006)
High performance computing and communications
, pp. 562-571
-
-
Yuan, W.1
Guan, D.2
Lee, S.3
Lee, Y.4
-
67
-
-
33749617232
-
Trust promoting seals in electronic markets: impact on online shopping decisions
-
Zhang H (2005) Trust promoting seals in electronic markets: impact on online shopping decisions. J Inf Technol Theory Appl (JITTA) 6(4):29–40
-
(2005)
J Inf Technol Theory Appl (JITTA)
, vol.6
, Issue.4
, pp. 29-40
-
-
Zhang, H.1
-
68
-
-
85031765626
-
Improved apriori for continuous attributes
-
Zhou S, He S, Wang W (2013) Improved apriori for continuous attributes. Int J Inf Sci Intell Syst 2(1):37–43
-
(2013)
Int J Inf Sci Intell Syst
, vol.2
, Issue.1
, pp. 37-43
-
-
Zhou, S.1
He, S.2
Wang, W.3
|