{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:09:39Z","timestamp":1750856979382},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030369866"},{"type":"electronic","value":"9783030369873"}],"license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-36987-3_4","type":"book-chapter","created":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T05:34:36Z","timestamp":1577856876000},"page":"50-72","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Trust: Anthropomorphic Algorithmic"],"prefix":"10.1007","author":[{"given":"Hrushikesha","family":"Mohanty","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"issue":"1","key":"4_CR1","first-page":"67","volume":"12","author":"A Zahedi","year":"2009","unstructured":"Zahedi, A., Parma, F.: An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Netw. Appl. 12(1), 67\u2013176 (2009)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"4_CR2","unstructured":"Rao, A.S., Georgeff, M.: Modelling rational agents within BDI architecture. In: Proceedings of Second International Conference on Knowledge Representation and Reasoning, San Mateo, CA (1991)"},{"key":"4_CR3","first-page":"1","volume":"21","author":"M Ashtiani","year":"2018","unstructured":"Ashtiani, M., Azgomi, M.A.: A novel trust evolution algorithm based on a quantum-like model of computational trust. Cogn. Technol. works 21, 1\u201324 (2018)","journal-title":"Cogn. Technol. works"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Castelfranch, C., Falcone, R., Pezzulo, G.: Trust in information sources as a source for trust: a fuzzy approach. In: Proceedings of AAMAS, pp. 89\u201396 (2003)","DOI":"10.1145\/860575.860590"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Kossinets, G., Kleinberg, J., Watts, D.: The structure of information pathways in a social communication network. In: Proceedings of ACM SIGKDD, pp. 435\u2013443 (2008)","DOI":"10.1145\/1401890.1401945"},{"key":"4_CR6","unstructured":"Golbeck, J.A.: Computing and Applying Trust in Web-Based Social Networks. Ph.D. dissertation, College Park, MD, USA, University of Maryland at College Park (2005)"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"201","DOI":"10.2307\/202051","volume":"1","author":"M Granovetter","year":"1983","unstructured":"Granovetter, M.: The strength of weak ties: a network theory revisited. Sociol. Theory 1, 201\u2013233 (1983)","journal-title":"Sociol. Theory"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Mohanty, H., Prasad, K., Shyamasundar, R.K.: Trust assessment in web services: an extension to jUDDI. In: Proceedings IEEE e-Business Engineering, pp. 759\u2013762 (2007)","DOI":"10.1109\/ICEBE.2007.99"},{"key":"4_CR9","unstructured":"An architectural blueprint for autonomic computing, IBM White Paper (2006)"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.future.2012.06.010","volume":"31","author":"W Jiang","year":"2014","unstructured":"Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future Gener. Comput. Syst. 31, 48\u201358 (2014)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"4_CR11","doi-asserted-by":"publisher","first-page":"952","DOI":"10.1109\/TC.2015.2435785","volume":"65","author":"W Jiang","year":"2016","unstructured":"Jiang, W., Wu, J., Li, F., Wang, G., Zheng, H.: Trust evaluation in online social networks using generalized network flow. IEEE Trans. Comput. 65(3), 952\u2013963 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/BFb0031846","volume-title":"Agents Breaking Away","author":"D Kinny","year":"1996","unstructured":"Kinny, D., Georgeff, M., Rao, A.: A methodology and modelling technique for systems of BDI agents. In: Van de Velde, W., Perram, J.W. (eds.) MAAMAW 1996. LNCS, vol. 1038, pp. 56\u201371. Springer, Heidelberg (1996). \nhttps:\/\/doi.org\/10.1007\/BFb0031846"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-030-16692-2_28","volume-title":"Applications of Evolutionary Computation","author":"M Aslan","year":"2019","unstructured":"Aslan, M., Sen, S.: Evolving trust formula to evaluate data trustworthiness in VANETs using genetic programming. In: Kaufmann, P., Castillo, P.A. (eds.) EvoApplications 2019. LNCS, vol. 11454, pp. 413\u2013429. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-16692-2_28"},{"issue":"12","key":"4_CR14","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1109\/TCYB.2016.2595620","volume":"47","author":"M Mao","year":"2017","unstructured":"Mao, M., Zhang, G., Zhang, J.: Multirelational social recommendations via multigraph ranking. IEEE Trans. Cybern. 47(12), 4049\u20134061 (2017)","journal-title":"IEEE Trans. Cybern."},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-49057-4_1","volume-title":"Intelligent Agents V: Agents Theories, Architectures, and Languages","author":"M Georgeff","year":"1999","unstructured":"Georgeff, M., Pell, B., Pollack, M., Tambe, M., Wooldridge, M.: The belief-desire-intention model of agency. In: M\u00fcller, J.P., Rao, A.S., Singh, M.P. (eds.) ATAL 1998. LNCS, vol. 1555, pp. 1\u201310. Springer, Heidelberg (1999). \nhttps:\/\/doi.org\/10.1007\/3-540-49057-4_1"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Taherian, M., Amini, M., Jalili, R.: Trust inference in web-based social networks using resistive networks. In: Proceedings ICIW, pp. 233\u2013238 (2008)","DOI":"10.1109\/ICIW.2008.41"},{"key":"4_CR17","volume-title":"Unified Theories of Cognition","author":"A Newell","year":"1990","unstructured":"Newell, A.: Unified Theories of Cognition. Harvard University Press, Cambridge (1990)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Balakrishnan, R., Kambhampati, S.: SourceRank: relevance and trust assessment for deep web sources based on inter-source agreement. In: Proceedings of WWW, vol. 1, pp. 227\u2013236 (2011)","DOI":"10.1145\/1963405.1963440"},{"key":"4_CR19","unstructured":"Cohen, R., Schaekermann, M., Liu, S., Cormier, M.: Trusted AI and the contribution of trust modeling in multiagent system. In: Proceedings of AAMAS, pp. 1644\u20131648 (2019)"},{"issue":"3","key":"4_CR20","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/2858791","volume":"34","author":"S Hamdi","year":"2016","unstructured":"Hamdi, S., Gancarski, A.L., Bouzeghoub, A., Yahia, A.B.: TISON: trust inference in trust-oriented social networks. ACM Trans. Inf. Syst. 34(3), 17 (2016)","journal-title":"ACM Trans. Inf. Syst."},{"issue":"3","key":"4_CR21","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.socnet.2008.12.004","volume":"31","author":"S Schnettler","year":"2009","unstructured":"Schnettler, S.: A structured overview of 50 years of small-world research. Soc. Netw. 31(3), 165\u2013178 (2009)","journal-title":"Soc. Netw."},{"key":"4_CR22","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.ins.2014.09.058","volume":"318","author":"S Chen","year":"2015","unstructured":"Chen, S., Wang, G., Jia, W.: k-FuzzyTrust: efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph. Inf. Sci. 318, 123\u2013143 (2015)","journal-title":"Inf. Sci."},{"key":"4_CR23","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7688.001.0001","volume-title":"The Soar Cognitive Architecture","author":"JE Laird","year":"2012","unstructured":"Laird, J.E.: The Soar Cognitive Architecture. MIT Press, Cambridge (2012). ISBN 978-0262122962"},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0004-3702(87)90050-6","volume":"33","author":"JE Laird","year":"1987","unstructured":"Laird, J.E., Newell, A., Rosenbloom, P.S.: SOAR: an architecture for general intelligence. Artif. Intell. 33, 1\u201364 (1987)","journal-title":"Artif. Intell."},{"issue":"4","key":"4_CR25","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s004460050050","volume":"11","author":"D Malkhi","year":"1998","unstructured":"Malkhi, D., Reiter, M.K.: Byzantine quorum systems. Distrib. Comput. 11(4), 203\u2013213 (1998)","journal-title":"Distrib. Comput."},{"key":"4_CR26","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/11493402_14","volume-title":"Declarative Agent Languages and Technologies II","author":"VS Alagar","year":"2005","unstructured":"Alagar, V.S., Paquet, J., Wan, K.: Intensional programming for agent communication. In: Leite, J., Omicini, A., Torroni, P., Yolum, I. (eds.) DALT 2004. LNCS (LNAI), vol. 3476, pp. 239\u2013255. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11493402_14"},{"key":"4_CR27","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.knosys.2018.10.027","volume":"164","author":"C Mao","year":"2019","unstructured":"Mao, C., Xu, C., He, Q.: A cost-effective algorithm for inferring the trust between two individuals in social networks. Knowl.-Based Syst. 164, 122\u2013138 (2019)","journal-title":"Knowl.-Based Syst."},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of WWW, pp. 403\u2013412 (2004)","DOI":"10.1145\/988672.988727"},{"key":"4_CR29","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.knosys.2016.05.042","volume":"106","author":"Y Ruan","year":"2016","unstructured":"Ruan, Y., Durresi, A.: A survey of trust management systems for online social communities-trust modelling, trust inference and attacks. Knowl.-Based Syst. 106, 150\u2013163 (2016)","journal-title":"Knowl.-Based Syst."}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36987-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T05:35:00Z","timestamp":1577856900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36987-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"ISBN":["9783030369866","9783030369873"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36987-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"9 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDCIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Distributed Computing and Internet Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bhubaneswar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 January 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 January 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdcit0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icdcit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"110","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, there are 6 invited papers.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}