{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:37:31Z","timestamp":1743143851800,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319015705"},{"type":"electronic","value":"9783319015712"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01571-2_9","type":"book-chapter","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T11:21:05Z","timestamp":1375356065000},"page":"67-76","source":"Crossref","is-referenced-by-count":3,"title":["A Heuristic to Explore Trust Networks Dynamics"],"prefix":"10.1007","author":[{"given":"Vincenza","family":"Carchiolo","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Longheu","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Malgeri","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Mangioni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"9_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M. Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM\u00a053(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"9_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04318-9","volume-title":"Pervasive computing handbook","author":"U. Hansmann","year":"2001","unstructured":"Hansmann, U., Nicklous, M.S., Stober, T.: Pervasive computing handbook. Springer-Verlag New York, Inc., New York (2001)"},{"issue":"2","key":"9_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1279540.1279553","volume":"5","author":"E. Nieuwdorp","year":"2007","unstructured":"Nieuwdorp, E.: The pervasive discourse: an analysis. Comput. Entertain.\u00a05(2), 13 (2007)","journal-title":"Comput. Entertain."},{"key":"9_CR4","unstructured":"Santos, N., Gummadi, K.P., Rodrigues, R.: Towards trusted cloud computing. In: Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud 2009. USENIX Association, Berkeley (2009)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-00587-9_3","volume-title":"Trusted Computing","author":"K. Dietrich","year":"2009","unstructured":"Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol.\u00a05471, pp. 29\u201344. Springer, Heidelberg (2009)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-21599-5_11","volume-title":"Trust and Trustworthy Computing","author":"Y. Wang","year":"2011","unstructured":"Wang, Y., Norice, G., Cranor, L.F.: Who is concerned about what? a study of american, chinese and indian users\u2019 privacy concerns on social network sites. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol.\u00a06740, pp. 146\u2013153. Springer, Heidelberg (2011)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the Twelfth International World Wide Web Conference (2003)","DOI":"10.1145\/775152.775242"},{"issue":"9","key":"9_CR8","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.1109\/TKDE.2008.48","volume":"20","author":"R. Zhou","year":"2008","unstructured":"Zhou, R., Hwang, K., Cai, M.: Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans. on Knowl. and Data Eng.\u00a020(9), 1282\u20131295 (2008)","journal-title":"IEEE Trans. on Knowl. and Data Eng."},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","volume":"18","author":"R. Zhou","year":"2007","unstructured":"Zhou, R., Hwang, K.: Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst.\u00a018(4), 460\u2013473 (2007)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Walter, F.E., Battiston, S., Schweitzer, F.: Personalised and dynamic trust in social networks. In: Bergman, L.D., Tuzhilin, A., Burke, R.D., Felfernig, A., Schmidt-Thieme, L. (eds.) RecSys, pp. 197\u2013204. ACM (2009)","DOI":"10.1145\/1639714.1639747"},{"key":"9_CR11","unstructured":"Marsh, S.: Formalising trust as a computational concept. Technical report, University of Stirling. PhD thesis (1994)"},{"key":"9_CR12","unstructured":"Golbeck, J.A.: Computing and applying trust in web-based social networks. PhD thesis, College Park, MD, USA, Chair-Hendler, James (2005)"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10458-007-9021-x","volume":"16","author":"F.E. Walter","year":"2008","unstructured":"Walter, F.E., Battiston, S., Schweitzer, F.: A model of a trust-based recommendation system on a social network. Journal of Autonomous Agents and Multi-Agent Systems\u00a016, 57 (2008)","journal-title":"Journal of Autonomous Agents and Multi-Agent Systems"},{"issue":"1","key":"9_CR14","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1080\/15427951.2005.10129098","volume":"2","author":"P. Berkhin","year":"2005","unstructured":"Berkhin, P.: A survey on pagerank computing. Internet Mathematics\u00a02(1), 73\u2013120 (2005)","journal-title":"Internet Mathematics"},{"issue":"7","key":"9_CR15","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng.\u00a016(7), 843\u2013857 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-21599-5_10","volume-title":"Trust and Trustworthy Computing","author":"L. Allodi","year":"2011","unstructured":"Allodi, L., Chiodi, L., Cremonini, M.: Modifying trust dynamics through cooperation and defection in evolving social networks. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol.\u00a06740, pp. 131\u2013145. Springer, Heidelberg (2011)"},{"issue":"20","key":"9_CR17","doi-asserted-by":"publisher","first-page":"208701","DOI":"10.1103\/PhysRevLett.89.208701","volume":"89","author":"M.E. Newman","year":"2002","unstructured":"Newman, M.E.: Assortative Mixing in Networks. Physical Review Letters\u00a089(20), 208701 (2002)","journal-title":"Physical Review Letters"},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.socnet.2009.02.002","volume":"31","author":"T. Opsahl","year":"2009","unstructured":"Opsahl, T., Panzarasa, P.: Clustering in weighted networks. Social Networks\u00a031(2), 155\u2013163 (2009)","journal-title":"Social Networks"},{"key":"9_CR19","series-title":"SCI","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-24013-3_21","volume-title":"Intelligent Distributed Computing V","author":"V. Carchiolo","year":"2011","unstructured":"Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Gain the best reputation in trust networks. In: Brazier, F.M.T., Nieuwenhuis, K., Pavlin, G., Warnier, M., Badica, C. (eds.) Intelligent Distributed Computing V. SCI, vol.\u00a0382, pp. 213\u2013218. Springer, Heidelberg (2011)"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing VII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01571-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T21:51:22Z","timestamp":1676670682000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01571-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319015705","9783319015712"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01571-2_9","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014]]}}}