2009 International Conference on Computational Aspects of Social Networks 2009
DOI: 10.1109/cason.2009.30
|View full text |Cite
|
Sign up to set email alerts
|

Enriching Trust Prediction Model in Social Network with User Rating Similarity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(32 citation statements)
references
References 9 publications
0
32
0
Order By: Relevance
“…Likewise a large body of research which has been devoted to the study of social media [35,17,1,24,2], increasing attention has been paid to the trust prediction problem [3,5,18,26,32]. The recent availability of trust and distrust networks has motivated increasing research on trust/distrust prediction [6,10,20,28].…”
Section: Related Workmentioning
confidence: 99%
“…Likewise a large body of research which has been devoted to the study of social media [35,17,1,24,2], increasing attention has been paid to the trust prediction problem [3,5,18,26,32]. The recent availability of trust and distrust networks has motivated increasing research on trust/distrust prediction [6,10,20,28].…”
Section: Related Workmentioning
confidence: 99%
“…Stemming from Internet auction systems [5], a reputation system is a standard countermeasure. Several interesting variations of reputation systems performing such tasks are discussed in [1,7], and [14]. …”
Section: Studymentioning
confidence: 99%
“…We will refer to this test as identity aggregator test, since the sample of users was obtained by parsing Profilactic 5 , an identity aggregator application which enabled us to know which profiles were owned by the same person.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…Examples are the suggestion of people with similar interests, the recommendation of resources [2] and the support to content annotation by tag suggestion [3]. Personal data are also used for security-related services, such as automatic filtering of unintended friends [4] and trust predictions in social networks [5]. However, technologies for automating the acquisition of user data can be a two-edged sword.…”
Section: Introductionmentioning
confidence: 99%