{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T02:35:28Z","timestamp":1752460528632,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221996"},{"type":"electronic","value":"9783642222009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22200-9_8","type":"book-chapter","created":{"date-parts":[[2011,6,25]],"date-time":"2011-06-25T23:52:53Z","timestamp":1309045973000},"page":"67-81","source":"Crossref","is-referenced-by-count":7,"title":["Identifying Knots of Trust in Virtual Communities"],"prefix":"10.1007","author":[{"given":"Nurit","family":"Gal-Oz","sequence":"first","affiliation":[]},{"given":"Ran","family":"Yahalom","sequence":"additional","affiliation":[]},{"given":"Ehud","family":"Gudes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"eBay, http:\/\/www.ebay.com\/"},{"key":"8_CR2","unstructured":"Experts-exchange, http:\/\/www.experts-exchange.com\/"},{"key":"8_CR3","unstructured":"Grouplens, http:\/\/www.grouplens.org\/"},{"issue":"5","key":"8_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1411509.1411513","volume":"55","author":"N. Ailon","year":"2008","unstructured":"Ailon, N., Charikar, M., Newman, A.: Aggregating inconsistent information: ranking and clustering. Journal of the ACM (JACM)\u00a055(5), 1\u201327 (2008)","journal-title":"Journal of the ACM (JACM)"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1109\/SFCS.2002.1181947","volume-title":"Proceedings of the 43rd Symposium on Foundations of Computer Science (FOCS 2002)","author":"N. Bansal","year":"2002","unstructured":"Bansal, N., Blum, A., Chawla, S.: Correlation clustering. In: Proceedings of the 43rd Symposium on Foundations of Computer Science (FOCS 2002), pp. 238\u2013247. IEEE Computer Society, Washington, DC, USA (2002)"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/1133058.1133067","volume-title":"Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT 2006)","author":"S. Chakraborty","year":"2006","unstructured":"Chakraborty, S., Ray, I.: Trustbac: integrating trust relationships into the rbac model for access control in open systems. In: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT 2006), pp. 49\u201358. ACM, New York (2006)"},{"issue":"3","key":"8_CR7","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.jcss.2004.10.012","volume":"71","author":"M. Charikar","year":"2005","unstructured":"Charikar, M., Guruswami, V., Wirth, A.: Clustering with qualitative information. Journal of Computer and System Sciences\u00a071(3), 360\u2013383 (2005)","journal-title":"Journal of Computer and System Sciences"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Cohen, W.W., Richman, J.: Learning to match and cluster large high-dimensional data sets for data integration. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 475\u2013480 (2002)","DOI":"10.1145\/775047.775116"},{"issue":"2-3","key":"8_CR9","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.tcs.2006.05.008","volume":"361","author":"E.D. Demaine","year":"2006","unstructured":"Demaine, E.D., Emanuel, D., Fiat, A., Immorlica, N.: Correlation clustering in general weighted graphs. Theoretical Computer Science\u00a0361(2-3), 172\u2013187 (2006), Special issue on approximation and online algorithms","journal-title":"Theoretical Computer Science"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Edachery, J., Sen, A., Brandenburg, F.J.: Graph clustering using distance-k cliques. Graph Drawing, 98\u2013106 (1999)","DOI":"10.1007\/3-540-46648-7_10"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Elsner, M., Schudy, W.: Bounding and comparing methods for correlation clustering beyond ilp. In: NAACL-HLT Workshop on Integer Linear Programming for Natural Language Processing (ILPNLP 2009), pp. 19\u201327 (2009)","DOI":"10.3115\/1611638.1611641"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Gal-Oz, N., Gudes, E., Hendler, D.: A robust and knot-aware trust-based reputation model. In: Proceedings of the 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2008), Trondheim, Norway, pp. 167\u2013182 (June 2008)","DOI":"10.1007\/978-0-387-09428-1_11"},{"issue":"1","key":"8_CR13","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1217299.1217303","volume":"1","author":"A. Gionis","year":"2007","unstructured":"Gionis, A., Mannila, H., Tsaparas, P.: Clustering aggregation. ACM Transactions on Knowledge Discovery from Data (TKDD)\u00a01(1), 4 (2007)","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1145\/988672.988727","volume-title":"Proceedings of the 13th International Conference on World Wide Web (WWW 2004)","author":"R. Guha","year":"2004","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International Conference on World Wide Web (WWW 2004), pp. 403\u2013412. ACM, New York (2004)"},{"key":"8_CR15","unstructured":"J\u00f8sang, A., Gray, E., Kinateder, M.: Analysing topologies of transitive trust. In: Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003), pp. 9\u201322 (2003)"},{"key":"8_CR16","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1145\/775152.775242","volume-title":"Proceedings of the 12th International Conference on World Wide Web (WWW 2003)","author":"S.D. Kamvar","year":"2003","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web (WWW 2003), pp. 640\u2013651. ACM, New York (2003)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/11429760_13","volume-title":"Trust Management","author":"M. Kinateder","year":"2005","unstructured":"Kinateder, M., Baschny, E., Rothermel, K.: Towards a generic trust model \u2013 comparison of various trust update algorithms. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 177\u2013192. Springer, Heidelberg (2005)"},{"key":"8_CR18","unstructured":"Massa, P., Avesani, P.: Avesani. Controversial users demand local trust metrics: An experimental study on epinions. com community. In: Proceedings of the National Conference on Artificial Intelligence (AAAI 2005), vol.\u00a020, p. 121 (2005)"},{"issue":"2","key":"8_CR19","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/0005-2795(75)90109-9","volume":"405","author":"B.W. Matthews","year":"1975","unstructured":"Matthews, B.W.: Comparison of the predicted and observed secondary structure of T4 phage lysozyme. Biochimica et Biophysica Acta (BBA)-Protein Structure\u00a0405(2), 442\u2013451 (1975)","journal-title":"Biochimica et Biophysica Acta (BBA)-Protein Structure"},{"issue":"5","key":"8_CR20","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1016\/j.jmva.2006.11.013","volume":"98","author":"M. Meil\u0103","year":"2007","unstructured":"Meil\u0103, M.: Comparing clusterings\u2013an information based distance. Journal of Multivariate Analysis\u00a098(5), 873\u2013895 (2007)","journal-title":"Journal of Multivariate Analysis"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Ng, V., Gardent, C.: Improving machine learning approaches to coreference resolution. In: ACL, pp. 104\u2013111 (2002)","DOI":"10.3115\/1073083.1073102"},{"issue":"4","key":"8_CR22","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1162\/089120101753342653","volume":"27","author":"W.M. Soon","year":"2001","unstructured":"Soon, W.M., Ng, H.T., Lim, D.C.Y.: A machine learning approach to coreference resolution of noun phrases. Computational Linguistics\u00a027(4), 521\u2013544 (2001)","journal-title":"Computational Linguistics"},{"key":"8_CR23","first-page":"526","volume-title":"Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms","author":"C. Swamy","year":"2004","unstructured":"Swamy, C.: Correlation clustering: maximizing agreements via semidefinite programming. In: Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 526\u2013527. Society for Industrial and Applied Mathematics, Philadelphia (2004)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Ward, J.H., Hook, M.E.: Application of an Hierarchical Grouping Procedure to a Problem of Grouping Profiles, vol.\u00a023(1), pp. 69\u201382 (1963)","DOI":"10.1177\/001316446302300107"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22200-9_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T18:17:57Z","timestamp":1741285077000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22200-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221996","9783642222009"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22200-9_8","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}