SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Yu Zhang, Hua-Jun Chen, Xiao-Hong Jiang, Hao Sheng, Zhao-Hui Wu. RCCtrust: A Combined Trust Model for Electronic Community[J]. Journal of Computer Science and Technology, 2009, 24(5): 883-892. |
[1] |
Zhang Y, Chen H, Wu Z, Zheng X. A reputation-chain trust model for the semantic Web. In Proc. the 20th International Conference on Advanced Information Networking and Applications, Vienna, Austria, April 18-20, 2006, pp.719-723.
|
[2] |
Golbeck J, Parsia B, Hendler J. Trust networks on the semantic Web. In Proc. Cooperative Intelligent Agents VII, Helsinki, Finland, August 27-29, 2003, pp.238-249.
|
[3] |
Hill S, Provost F, Volinsky C. Network-based marketing: Identifying likely adopters via consumer networks. Statistical Science, 2006, 21(2): 256-276.
|
[4] |
Epinions. http://www.epinions.com.
|
[5] |
Domingos P, Richardson M. Mining the network value of customers. In Proc. the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, California, USA, August 26-29, 2001, pp.57-66.
|
[6] |
Richardson M, Domingos P. Mining knowledge-sharing sites for viral marketing. In Proc. the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Alberta, Canada, July 23-26, 2002, pp.61-70.
|
[7] |
Massa P, Avesani P. Trust-aware collaborativefiltering for recommender systems. In Proc. Federated International Conference On The Move to Meaningful Internet: CoopIS, DOA, ODBASE, Larnaca, Cyprus, October 25-29, 2004, pp.492- 508.
|
[8] |
Victor P, Cornelis C, Teredesai A M, De Cock M. Whom should I trust? The impact of keyfigures on cold start recommendations. In Proc. the 23rd Annual ACM Symposium on Applied Computing, Ceara, Brazil, March 16-20, 2008, pp.2014-2018.
|
[9] |
Kamvar S D, Schlosser M T, Garcia-Molina H. The Eigentrust algorithm for reputation management in P2P networks. In Proc. the Twelfth International World Wide Web Conference, Budapest, Hungary, May 20-24, 2003, pp.640-651.
|
[10] |
Wang Y, Vassileva J. Bayesian network-based trust model. In Proc. the 2003 IEEE/WIC International Conference on Web Intelligence, Halifax, Canada, October 13-16, 2003, pp.372- 378.
|
[11] |
Yu B, Singh M P. A social mechanism of reputation management in electronic communities. In Proc. the Fourth International Workshop on Cooperative Information Agents, Boston, USA, July 4-7, 2000, pp.154-165.
|
[12] |
Liang Z, Shi W. Pet: A personalized trust model with reputation and risk evaluation for P2P resource sharing. In Proc. the 38th Annual Hawaii International Conference of System Sciences, Big Island, USA, January 3-6, 2005, p.201b.
|
[13] |
Liang Z, Shi W. Enforcing cooperative resource sharing in untrusted P2P computing environments. Mobile Networks and Applications, 2005, 10(6): 971-983.
|
[14] |
Liang Z, Shi W. Analysis of ratings on trust inference in open environments. Performance Evaluation, 2008, 65(2): 99-128.
|
[15] |
Xiong L, Liu L. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 843-857.
|
[16] |
Xiong L, Liu L. A reputation-based trust model for peer-topeer ecommerce communities. In Proc. IEEE International Conference on E-Commerce, Newport Beach, USA, June 24- 27, 2003, pp.275-284.
|
[17] |
Bizer C, Oldakowski R. Using contextand content-based trust policies on the semantic Web. In Proc. the 13th International Conference on World Wide Web, New York, USA, May 17-20, 2004, pp.228-229.
|
[18] |
Hu M, Liu B. Mining opinion features in customer reviews. In Proc. the Nineteenth National Conference on Artificial Intelligence, San Jose, USA, July 25-29, 2004, pp.755-760.
|
[19] |
Edelman trust barometer. November 2007. http://www.edelman.co.uk/trustbarometer/.
|
[20] |
Bellman R, Giertz M. On the analytic formalism of the theory of fuzzy sets. Information Sciences, 1973, 5: 149-156.
|
[21] |
Jean-Sebastien Brunner, Li Ma, Chen Wang et al. Explorations in the use of Semantic Web technologies for product information management. In Proc. the 16th International World Wide Web Conference, Banff, Canada, May 8- 12, 2007, pp.747-756.
|
[22] |
Rdf primer. February 2004, http://www.w3.org/TR/rdfprimer/.
|
[23] |
Chun Zeng, Chun-Xiao Xing, Li-Zhu Zhou, Xiao-Hui Zheng. Similarity measure and instance selection for collaborativefiltering. International Journal of Electronic Commerce, 2003, 8(4): 115-129.
|
[1] | Shui-Guang Deng, Long-Tao Huang, Jian Wu, Zhao-Hui Wu. Trust-Based Personalized Service Recommendation:A Network Perspective[J]. Journal of Computer Science and Technology, 2014, 29(1): 69-80. DOI: 10.1007/s11390-013-1412-7 |
[2] | Fu-Guo Zhang. Preventing Recommendation Attack in Trust-Based Recommender Systems[J]. Journal of Computer Science and Technology, 2011, 26(5): 823-828. DOI: 10.1007/s11390-011-0181-4 |
[3] | Ming-Wei Zhang, Bin Zhang, Ying Liu, Jun Na, Zhi-Liang Zhu. Web Service Composition Based on QoS Rules[J]. Journal of Computer Science and Technology, 2010, 25(6): 1143-1156. DOI: 10.1007/s11390-010-1091-6 |
[4] | Shou-Xin Wang, Li Zhang, Shuai Wang, Xiang Qiu. A Cloud-Based Trust Model for Evaluating Quality of Web Services[J]. Journal of Computer Science and Technology, 2010, 25(6): 1130-1142. DOI: 10.1007/s11390-010-1090-7 |
[5] | Hai-Hua Li, Xiao-Yong Du, Xuan Tian. A Review-Based Reputation Evaluation Approach for Web Services[J]. Journal of Computer Science and Technology, 2009, 24(5): 893-900. |
[6] | Xiao-Yong Li, Xiao-Lin Gui. A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks[J]. Journal of Computer Science and Technology, 2009, 24(5): 868-882. |
[7] | Feng Xu, Jing Pan, Wen Lu. A Trust-Based Approach to Estimating the Confidence of the Software System in Open Environments[J]. Journal of Computer Science and Technology, 2009, 24(2): 373-385. |
[8] | Lei Shi, Ying-Jie Han, Xiao-Guang Ding, Lin Wei, Zhi-Min Gu. An SPN-Based Integrated Model for Web Prefetching and Caching[J]. Journal of Computer Science and Technology, 2006, 21(4): 482-489. |
[9] | Qiang Wang, De-Bin Zhao, Wen Gao. Context-Based 2D-VLC Entropy Coder in AVS Video Coding Standard[J]. Journal of Computer Science and Technology, 2006, 21(3): 315-322. |
[10] | Zhou Jingzhou. A Neural Network Model Based on Logical Operations[J]. Journal of Computer Science and Technology, 1998, 13(5): 464-470. |