{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:34:19Z","timestamp":1743042859699,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540688211"},{"type":"electronic","value":"9783540688259"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-68825-9_5","type":"book-chapter","created":{"date-parts":[[2008,5,19]],"date-time":"2008-05-19T04:05:55Z","timestamp":1211169955000},"page":"48-59","source":"Crossref","is-referenced-by-count":5,"title":["A Belief-Theoretic Reputation Estimation Model for Multi-context Communities"],"prefix":"10.1007","author":[{"given":"Ebrahim","family":"Bagheri","sequence":"first","affiliation":[]},{"given":"M.","family":"Barouni-Ebrahimi","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Zafarani","sequence":"additional","affiliation":[]},{"given":"Ali A.","family":"Ghorbani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","volume-title":"International Conference on Privacy, Security and Trust (PST 2006)","author":"E. Bagheri","year":"2006","unstructured":"Bagheri, E., Ghorbani, A.A.: Behavior analysis through reputation propagation in a multi-context environment. In: International Conference on Privacy, Security and Trust (PST 2006), ACM, New York (2006)"},{"key":"5_CR2","unstructured":"Bagheri, E., Ghorbani, A.A.: Exploiting trust and suspicion for real-time attack recognition in recommender applications. In: iTrust\/PST (2007)"},{"issue":"363","key":"5_CR3","doi-asserted-by":"publisher","first-page":"677","DOI":"10.2307\/2286624","volume":"73","author":"P. Diaconis","year":"1978","unstructured":"Diaconis, P.: A mathematical theory of evidence (glenn shafer). Journal of the American Statistical Association\u00a073(363), 677\u2013678 (1978)","journal-title":"Journal of the American Statistical Association"},{"key":"5_CR4","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/3-540-48747-6_24","volume-title":"Symbolic and Quantitative Approaches to Reasoning and Uncertainty","author":"N. Lehmann","year":"1999","unstructured":"Lehmann, N., Haenni, R.: An alternative to outward propagation for dempster-shafer belief functions. In: Hunter, A., Parsons, S. (eds.) ECSQARU 1999. LNCS (LNAI), vol.\u00a01638, pp. 256\u2013267. Springer, Heidelberg (1999)"},{"issue":"5-6","key":"5_CR5","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/0888-613X(90)90013-R","volume":"4","author":"J. Pearl","year":"1990","unstructured":"Pearl, J.: Reasoning with belief functions: An analysis of compatibility. Int. J. Approx. Reasoning\u00a04(5-6), 363\u2013389 (1990)","journal-title":"Int. J. Approx. Reasoning"},{"issue":"2","key":"5_CR6","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/S0004-3702(98)00047-2","volume":"102","author":"T. Schmidt","year":"1998","unstructured":"Schmidt, T., Shenoy, P.P.: Some improvements to the shenoy-shafer and hugin architectures for computing marginals. Art. Intel.\u00a0102(2), 323\u2013333 (1998)","journal-title":"Art. Intel."},{"issue":"3","key":"5_CR7","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S0377-2217(99)00055-7","volume":"121","author":"P.P. Shenoy","year":"2000","unstructured":"Shenoy, P.P.: Valuation network representation and solution of asymmetric decision problems. Euro. J. Operation. Res.\u00a0121(3), 579\u2013608 (2000)","journal-title":"Euro. J. Operation. Res."}],"container-title":["Lecture Notes in Computer Science","Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68825-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:31:13Z","timestamp":1558265473000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68825-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540688211","9783540688259"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68825-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}