Mostrar el registro sencillo del ítem

dc.contributor.authorVerbiest, Nele
dc.contributor.authorCornelis, Chris
dc.contributor.authorVictor, Patricia
dc.contributor.authorHerrera Viedma, Enrique 
dc.date.accessioned2020-12-22T13:04:10Z
dc.date.available2020-12-22T13:04:10Z
dc.date.issued2010
dc.identifier.citationPublished version: Verbiest N., Cornelis C., Victor P., Herrera-Viedma E. (2010) Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation. In: García-Pedrajas N., Herrera F., Fyfe C., Benítez J.M., Ali M. (eds) Trends in Applied Intelligent Systems. IEA/AIE 2010. Lecture Notes in Computer Science, vol 6098. Springer, Berlin, Heidelberg. [https://doi.org/10.1007/978-3-642-13033-5_46]es_ES
dc.identifier.urihttp://hdl.handle.net/10481/65110
dc.descriptionChris Cornelis would like to thank the Research Foundation Flanders for funding his research. Patricia Victor would like to thank the Institute for the Promotion of Innovation through Science and Technology in Flanders (IWT-Vlaanderen) for funding her research. Enrique Herrera-Viedma would like to thank the financing of andalucian excellence project TIC05299, Feder Funds in FUZZYLING project (TIN2007-61079) and PETRI project (PET 2007-0460).es_ES
dc.description.abstractThe ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation provides this ability by identifying paths that connect users in the network, and by merging trust opinions expressed by users along these paths. However, as individual trust opinions are not always based on perfect knowledge, and since the quality of a trust estimation propagated along a given path may diminish as its length increases, mechanisms are needed to handle these imperfections. In this paper, we propose a set of trust aggregation operators that take into account knowledge defects and path length. We investigate their properties, and discuss how they may be implemented in practice, taking into account characteristics of the network such as the availability of a central authority, or the need to preserve users’ privacy by not publically disclosing their trust information.es_ES
dc.description.sponsorshipF-META project, MEC-FEDER, Spain TIN2007-67494es_ES
dc.description.sponsorshipFWOes_ES
dc.description.sponsorshipInstitute for the Promotion of Innovation by Science and Technology in Flanders (IWT)es_ES
dc.description.sponsorshipAndalucian excellence project TIC05299es_ES
dc.description.sponsorshipFeder Fund in FUZZYLING project TIN2007-61079es_ES
dc.description.sponsorshipFeder Fund in PETRI project PET 2007-0460es_ES
dc.language.isoenges_ES
dc.publisherSpringer Naturees_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 España*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/*
dc.subjectRecommender systemes_ES
dc.subjectCentral Authorityes_ES
dc.subjectAggregation operatorses_ES
dc.subjectTrust Scorees_ES
dc.subjectTrust Networkes_ES
dc.titleStrategies for Incorporating Knowledge Defects and Path Length in Trust Aggregationes_ES
dc.title.alternativeSpringeres_ES
dc.typeinfo:eu-repo/semantics/conferenceObjectes_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses_ES
dc.identifier.doi10.1007/978-3-642-13033-5_46


Ficheros en el ítem

[PDF]

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 España
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 España