Mostrar el registro sencillo del ítem
Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation
dc.contributor.author | Verbiest, Nele | |
dc.contributor.author | Cornelis, Chris | |
dc.contributor.author | Victor, Patricia | |
dc.contributor.author | Herrera Viedma, Enrique | |
dc.date.accessioned | 2020-12-22T13:04:10Z | |
dc.date.available | 2020-12-22T13:04:10Z | |
dc.date.issued | 2010 | |
dc.identifier.citation | Published version: Verbiest N., Cornelis C., Victor P., Herrera-Viedma E. (2010) Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation. In: García-Pedrajas N., Herrera F., Fyfe C., Benítez J.M., Ali M. (eds) Trends in Applied Intelligent Systems. IEA/AIE 2010. Lecture Notes in Computer Science, vol 6098. Springer, Berlin, Heidelberg. [https://doi.org/10.1007/978-3-642-13033-5_46] | es_ES |
dc.identifier.uri | http://hdl.handle.net/10481/65110 | |
dc.description | Chris Cornelis would like to thank the Research Foundation Flanders for funding his research. Patricia Victor would like to thank the Institute for the Promotion of Innovation through Science and Technology in Flanders (IWT-Vlaanderen) for funding her research. Enrique Herrera-Viedma would like to thank the financing of andalucian excellence project TIC05299, Feder Funds in FUZZYLING project (TIN2007-61079) and PETRI project (PET 2007-0460). | es_ES |
dc.description.abstract | The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation provides this ability by identifying paths that connect users in the network, and by merging trust opinions expressed by users along these paths. However, as individual trust opinions are not always based on perfect knowledge, and since the quality of a trust estimation propagated along a given path may diminish as its length increases, mechanisms are needed to handle these imperfections. In this paper, we propose a set of trust aggregation operators that take into account knowledge defects and path length. We investigate their properties, and discuss how they may be implemented in practice, taking into account characteristics of the network such as the availability of a central authority, or the need to preserve users’ privacy by not publically disclosing their trust information. | es_ES |
dc.description.sponsorship | F-META project, MEC-FEDER, Spain TIN2007-67494 | es_ES |
dc.description.sponsorship | FWO | es_ES |
dc.description.sponsorship | Institute for the Promotion of Innovation by Science and Technology in Flanders (IWT) | es_ES |
dc.description.sponsorship | Andalucian excellence project TIC05299 | es_ES |
dc.description.sponsorship | Feder Fund in FUZZYLING project TIN2007-61079 | es_ES |
dc.description.sponsorship | Feder Fund in PETRI project PET 2007-0460 | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | Springer Nature | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 España | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ | * |
dc.subject | Recommender system | es_ES |
dc.subject | Central Authority | es_ES |
dc.subject | Aggregation operators | es_ES |
dc.subject | Trust Score | es_ES |
dc.subject | Trust Network | es_ES |
dc.title | Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation | es_ES |
dc.title.alternative | Springer | es_ES |
dc.type | info:eu-repo/semantics/conferenceObject | es_ES |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es_ES |
dc.identifier.doi | 10.1007/978-3-642-13033-5_46 |