{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:46:27Z","timestamp":1725795987686},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319087856"},{"type":"electronic","value":"9783319087863"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08786-3_29","type":"book-chapter","created":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T06:10:42Z","timestamp":1403158242000},"page":"326-337","source":"Crossref","is-referenced-by-count":1,"title":["Trust-Based Decision-Making for Energy-Aware Device Management"],"prefix":"10.1007","author":[{"given":"Stephan","family":"Hammer","sequence":"first","affiliation":[]},{"given":"Michael","family":"Wi\u00dfner","sequence":"additional","affiliation":[]},{"given":"Elisabeth","family":"Andr\u00e9","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"29_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MPRV.2010.89","volume":"10","author":"M. Hazas","year":"2011","unstructured":"Hazas, M., Friday, A., Scott, J.: Look back before leaping forward: Four decades of domestic energy inquiry. IEEE Pervasive Computing\u00a010(1), 13\u201319 (2011)","journal-title":"IEEE Pervasive Computing"},{"key":"29_CR2","first-page":"1975","volume-title":"Proc. of the SIGCHI Conf. on Human Factors in Computing Systems, CHI 2010","author":"C. DiSalvo","year":"2010","unstructured":"DiSalvo, C., Sengers, P., Brynjarsd\u00f3ttir, H.: Mapping the landscape of sustainable hci. In: Proc. of the SIGCHI Conf. on Human Factors in Computing Systems, CHI 2010, pp. 1975\u20131984. ACM, New York (2010)"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-31037-9_9","volume-title":"Persuasive Technology. Design for Health and Safety","author":"L. Gamberini","year":"2012","unstructured":"Gamberini, L., Spagnolli, A., Corradi, N., Jacucci, G., Tusa, G., Mikkola, T., Zamboni, L., Hoggan, E.: Tailoring feedback to users\u2019 actions in a persuasive game for household electricity conservation. In: Bang, M., Ragnemalm, E.L. (eds.) PERSUASIVE 2012. LNCS, vol.\u00a07284, pp. 100\u2013111. Springer, Heidelberg (2012)"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Simon, J., Jahn, M., Al-Akkad, A.: Saving energy at work: the design of a pervasive game for office spaces. In: Proc. of the 11th Int. Conf. on Mobile and Ubiquitous Multimedia, MUM 2012, pp. 9:1\u20139:4. ACM, New York (2012)","DOI":"10.1145\/2406367.2406379"},{"issue":"3-4","key":"29_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11257-005-1269-8","volume":"15","author":"K. Cheverst","year":"2005","unstructured":"Cheverst, K., Byun, H., Fitton, D., Sas, C., Kray, C., Villar, N.: Exploring issues of user model transparency and proactive behaviour in an office environment control system. User Modeling and User-Adapted Interaction\u00a015(3-4), 235\u2013273 (2005)","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Yan, Z., Holtmanns, S.: Trust Modeling and Management: From Social Trust to Digital Trust. IGI Global (2008)","DOI":"10.4018\/978-1-59904-804-8.ch013"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/3-540-58266-5_6","volume-title":"Artificial Social Systems","author":"S. Marsh","year":"1994","unstructured":"Marsh, S.: Trust in distributed artificial intelligence. In: Castelfranchi, C., Werner, E. (eds.) MAAMAW 1992. LNCS, vol.\u00a0830, pp. 94\u2013112. Springer, Heidelberg (1994)"},{"key":"29_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-540-25840-7_3","volume-title":"Agents and Peer-to-Peer Computing","author":"Y. Wang","year":"2004","unstructured":"Wang, Y., Vassileva, J.: Bayesian network trust model in peer-to-peer networks. In: Moro, G., Sartori, C., Singh, M.P. (eds.) AP2PC 2003. LNCS (LNAI), vol.\u00a02872, pp. 23\u201334. Springer, Heidelberg (2004)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Yu, B., Singh, M.P.: An evidential model of distributed reputation management. In: Proc. of the 1st Int. Joint Conf. on Autonomous Agents and Multiagent Systems: Part 1, AAMAS 2002, pp. 294\u2013301. ACM, New York (2002)","DOI":"10.1145\/544805.544809"},{"key":"29_CR10","first-page":"225","volume-title":"9th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2010)","author":"G. Vogiatzis","year":"2010","unstructured":"Vogiatzis, G., MacGillivray, I., Chli, M.: A probabilistic model for trust and reputation. In: van der Hoek, W., Kaminka, G.A., Lesp\u00e9rance, Y., Luck, M., Sen, S. (eds.) 9th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2010), Toronto, Canada, May 10-14, vol.\u00a01-3, pp. 225\u2013232. IFAAMAS, Richland (2010)"},{"key":"29_CR11","series-title":"CRPIT","first-page":"85","volume-title":"29th Australasian Computer Science Conf. (ACSC2006)","author":"A. J\u00f8sang","year":"2006","unstructured":"J\u00f8sang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Estivill-Castro, V., Dobbie, G. (eds.) 29th Australasian Computer Science Conf (ACSC2006), January 16-19. CRPIT, vol.\u00a048, pp. 85\u201394. Australian Computer Society, Darlinghurst (2006)"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., Falcone, R.: Trust Theory: A Socio-Cognitive and Computational Model. Wiley (2010)","DOI":"10.1002\/9780470519851"},{"key":"29_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-540-74835-9_32","volume-title":"Computer Security \u2013 ESORICS 2007","author":"V. Sankaranarayanan","year":"2007","unstructured":"Sankaranarayanan, V., Chandrasekaran, M., Upadhyaya, S.: Towards modeling trust based decisions: A game theoretic approach. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 485\u2013500. Springer, Heidelberg (2007)"},{"key":"29_CR14","unstructured":"Burnett, C., Norman, T.J., Sycara, K.P.: Trust decision-making in multi-agent systems. In: Walsh, T. (ed.) IJCAI 2011, Proc. of the 22nd Int. Joint Conf. on Artificial Intelligence, IJCAI\/AAAI, pp. 115\u2013120 (2011)"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv.\u00a045(4), 47:1\u201347:33 (2013)","DOI":"10.1145\/2501654.2501661"},{"key":"29_CR16","first-page":"123","volume-title":"Proc. of the 2010 Int. Conf. on Internet Computing, ICOMP 2010","author":"T. Bhuiyan","year":"2010","unstructured":"Bhuiyan, T., Xu, Y., J\u00f8sang, A.: A review of trust in online social networks to explore new research agenda. In: Arabnia, H.R., Clincy, V.A., Lu, J., Marsh, A., Solo, A.M.G. (eds.) Proc. of the 2010 Int. Conf. on Internet Computing, ICOMP 2010, July 12-15, pp. 123\u2013128. CSREA Press, Las Vegas (2010)"},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/ISI.2010.5484757","volume-title":"IEEE Int. Conf. on Intelligence and Security Informatics, ISI 2010, Proc.","author":"S. Adali","year":"2010","unstructured":"Adali, S., Escriva, R., Goldberg, M.K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B.K., Wallace, W.A., Williams, G.T.: Measuring behavioral trust in social networks. In: Yang, C.C., Zeng, D., Wang, K., Sanfilippo, A., Tsang, H.H., Day, M.Y., Gl\u00e4sser, U., Brantingham, P.L., Chen, H. (eds.) IEEE Int. Conf. on Intelligence and Security Informatics, ISI 2010, Proc., pp. 150\u2013152. IEEE, Vancouver (2010)"},{"issue":"6","key":"29_CR18","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/TIFS.2013.2242889","volume":"8","author":"I. Ivanov","year":"2013","unstructured":"Ivanov, I., Vajda, P., Korshunov, P., Ebrahimi, T.: Comparative study of trust modeling for automatic landmark tagging. IEEE Transactions on Information Forensics and Security\u00a08(6), 911\u2013923 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Glass, A., McGuinness, D.L., Wolverton, M.: Toward establishing trust in adaptive agents. In: Proc. of the 13th Int. Conf. on Intelligent User Interfaces (IUI 2008), pp. 227\u2013236. ACM (2008)","DOI":"10.1145\/1378773.1378804"},{"key":"29_CR20","volume-title":"Artificial Intelligence: A modern approach","author":"S.J. Russell","year":"2003","unstructured":"Russell, S.J., Norvig, P.: Artificial Intelligence: A modern approach, 2nd edn. Prentice Hall, Upper Saddle River (2003)","edition":"2"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Kurdyukova, E., Andr\u00e9, E., Leichtenstern, K.: Trust management of ubiquitous multi-display environments. In: Krueger, A., Kuflik, T. (eds.) Ubiquitous Display Environments, pp. 177\u2013193. Springer (2012)","DOI":"10.1007\/978-3-642-27663-7_11"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Lumsden, J.: Triggering trust: To what extent does the question influence the answer when evaluating the perceived importance of trust triggers? In: Proc. of the 2009 British Computer Society Conf. on Human-Computer Interaction (BCS HCI 2009), pp. 214\u2013223. British Computer Society (2009)","DOI":"10.14236\/ewic\/HCI2009.25"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Bee, K., Hammer, S., Pratsch, C., Andre, E.: The Automatic Trust Management of Self-Adaptive Multi-Display Environments. In: Trustworthy Ubiquitous Computing. Atlantis Ambient and Pervasive Intelligence, vol.\u00a06, pp. 3\u201320. Atlantis Press (2012)","DOI":"10.2991\/978-94-91216-71-8_1"},{"key":"29_CR24","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy indexes: A survey of westin\u2019s studies. Technical Report CMU-ISRI-5-138, Technical Report, Institute for Software Research Int (ISRI), Carnegie Mellon University (2005)"},{"issue":"12","key":"29_CR25","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1016\/j.ijhcs.2013.06.003","volume":"71","author":"B.P. Knijnenburg","year":"2013","unstructured":"Knijnenburg, B.P., Kobsa, A., Jin, H.: Dimensionality of information disclosure behavior. Int. J. Hum.-Comput. Stud.\u00a071(12), 1144\u20131162 (2013)","journal-title":"Int. J. Hum.-Comput. Stud."}],"container-title":["Lecture Notes in Computer Science","User Modeling, Adaptation, and Personalization"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08786-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T04:08:25Z","timestamp":1597982905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08786-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319087856","9783319087863"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08786-3_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}