{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:18:17Z","timestamp":1725729497728},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642388439"},{"type":"electronic","value":"9783642388446"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38844-6_4","type":"book-chapter","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T05:05:15Z","timestamp":1370408715000},"page":"38-50","source":"Crossref","is-referenced-by-count":2,"title":["A Framework for Trust-Based Multidisciplinary Team Recommendation"],"prefix":"10.1007","author":[{"given":"Lorenzo","family":"Bossi","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Braghin","sequence":"additional","affiliation":[]},{"given":"Anwitaman","family":"Datta","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Trombetta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Chhabra, M., Das, S., Szymanski, B.: Team formation in social networks. In: Proceedings of the 27th International Symposium on Computer and Information Sciences (2012)","DOI":"10.1007\/978-1-4471-4594-3_30"},{"key":"4_CR2","unstructured":"Reece, S., Roberts, S., Rogers, A., Jennings, N.R.: A multi-dimensional trust model for heterogeneous contract observations. In: Proceedings of the 22nd National Conference on Artificial Intelligence, AAAI 2007, vol.\u00a01, pp. 128\u2013135. AAAI Press (2007)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Lappas, T., Liu, K., Terzi, E.: Finding a team of experts in social networks. In: Elder IV, J.F., Fogelman-Souli\u00e9, F., Flach, P.A., Zaki, M.J. (eds.) KDD, pp. 467\u2013476. ACM (2009)","DOI":"10.1145\/1557019.1557074"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Braghin, S., Yong, J.T.T., Ventresque, A., Datta, A.: SWAT: Social Web Application for Team Recommendation. In: Proceedings of IEEE International Workshop on Scalable Computing for Big Data Analytics, SC-BDA (2012)","DOI":"10.1109\/ICPADS.2012.138"},{"key":"4_CR5","unstructured":"Kardan, A., Omidvar, A., Farahmandnia, F.: Expert finding on social network with link analysis approach. In: 2011 19th Iranian Conference on Electrical Engineering (ICEE), pp. 1\u20136 (May 2011)"},{"key":"4_CR6","first-page":"85","volume-title":"Proceedings of the 29th Australasian Computer Science Conference, ACSC 2006","author":"A. J\u00f8sang","year":"2006","unstructured":"J\u00f8sang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference, ACSC 2006, vol.\u00a048, pp. 85\u201394. Australian Computer Society, Inc., Darlinghurst (2006)"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1145\/1160633.1160859","volume-title":"Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems. AAMAS 2006","author":"X. Zheng","year":"2006","unstructured":"Zheng, X., Wu, Z., Chen, H., Mao, Y.: Developing a composite trust model for multi-agent systems. In: Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems. AAMAS 2006, pp. 1257\u20131259. ACM, New York (2006)"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1329125.1329326","volume-title":"Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems. AAMAS 2007","author":"S. Reece","year":"2007","unstructured":"Reece, S., Rogers, A., Roberts, S., Jennings, N.R.: Rumours and reputation: evaluating multi-dimensional trust within a decentralised reputation system. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems. AAMAS 2007, pp. 165:1\u2013165:8. ACM, New York (2007)"},{"issue":"4","key":"4_CR9","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TSMCA.2011.2132707","volume":"41","author":"P. Kazienko","year":"2011","unstructured":"Kazienko, P., Musia\u0142, K., Kajdanowicz, T.: Multidimensional Social Network in the Social Recommender System. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans\u00a041(4), 746\u2013759 (2011)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans"},{"key":"4_CR10","unstructured":"Nepal, S., Bista, S.K., Paris, C.: An association based approach to propagate social trust in social networks. In: UMAP Workshops (2012)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Pizzato, L., Rej, T., Akehurst, J., Koprinska, I., Yacef, K., Kay, J.: Recommending people to people: the nature of reciprocal recommenders with a case study in online dating. User Modeling and User-Adapted Interaction, 1\u201342 (2012)","DOI":"10.1007\/s11257-012-9125-0"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/1864708.1864747","volume-title":"Proceedings of the Fourth ACM Conference on Recommender Systems, RecSys 2010","author":"L. Pizzato","year":"2010","unstructured":"Pizzato, L., Rej, T., Chung, T., Koprinska, I., Kay, J.: Recon: a reciprocal recommender for online dating. In: Proceedings of the Fourth ACM Conference on Recommender Systems, RecSys 2010, pp. 207\u2013214. ACM, New York (2010)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-642-22362-4_23","volume-title":"User Modeling, Adaption and Personalization","author":"L.A. Pizzato","year":"2011","unstructured":"Pizzato, L.A., Rej, T., Yacef, K., Koprinska, I., Kay, J.: Finding someone you will like and who won\u2019t reject you. In: Konstan, J.A., Conejo, R., Marzo, J.L., Oliver, N. (eds.) UMAP 2011. LNCS, vol.\u00a06787, pp. 269\u2013280. Springer, Heidelberg (2011)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Masthoff, J.: Group recommender systems: Combining individual models. In: Recommender Systems Handbook, pp. 677\u2013702 (2011)","DOI":"10.1007\/978-0-387-85820-3_21"},{"issue":"4","key":"4_CR15","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T. Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. Commun. Surveys Tuts.\u00a03(4), 2\u201316 (2000)","journal-title":"Commun. Surveys Tuts."},{"key":"4_CR16","first-page":"59","volume-title":"Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling, APCCM 2005","author":"A. J\u00f8sang","year":"2005","unstructured":"J\u00f8sang, A., Pope, S.: Semantic constraints for trust transitivity. In: Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling, APCCM 2005, vol.\u00a043, pp. 59\u201368. Australian Computer Society, Inc., Darlinghurst (2005)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-28509-7_23","volume-title":"Advances in User Modeling","author":"S. Nepal","year":"2012","unstructured":"Nepal, S., Sherchan, W., Paris, C.: Building trust communities using social trust. In: Ardissono, L., Kuflik, T. (eds.) UMAP Workshops 2011. LNCS, vol.\u00a07138, pp. 243\u2013255. Springer, Heidelberg (2012)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-62494-5_16","volume-title":"Security Protocols","author":"B. Christianson","year":"1997","unstructured":"Christianson, B., Harbison, W.S.: Why isn\u2019t trust transitive? In: Crispo, B. (ed.) Security Protocols 1996. LNCS, vol.\u00a01189, pp. 171\u2013176. Springer, Heidelberg (1997)"},{"key":"4_CR19","unstructured":"Noam, N., Roughgarden, T., Tardos, E., Vazirani, V.V.: Algorithmic Game Theory, ch. 27. Cambridge University Press, Cambridge (2007)"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Sarwar, B.M., Karypis, G., Konstan, J.A., Riedl, J.T.: Application of dimensionality reduction in recommender system \u2013 a case study. In: ACM Web KDD Workshop (2000)","DOI":"10.21236\/ADA439541"},{"issue":"5461","key":"4_CR21","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.1126\/science.287.5461.2115a","volume":"287","author":"L.A. Adamic","year":"2000","unstructured":"Adamic, L.A., Huberman, B.A.: Power-Law Distribution of the World Wide Web. Science\u00a0287(5461), 2115 (2000)","journal-title":"Science"},{"issue":"5439","key":"4_CR22","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A.L. Barabasi","year":"1999","unstructured":"Barabasi, A.L., Albert, R.: Emergence of scaling in random networks. Science\u00a0286(5439), 509\u2013512 (1999)","journal-title":"Science"},{"key":"4_CR23","unstructured":"Eppstein, D., Wang, J.: A steady state model for graph power laws. In: International Workshop on Web Dynamics (2002)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Chakrabarti, D., Faloutsos, C.: Graph mining: Laws, generators, and algorithms. ACM Comput. Surv.\u00a038(1) (June 2006)","DOI":"10.1145\/1132952.1132954"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Massa, P., Avesani, P.: Trust-aware bootstrapping of recommender systems. In: Proceedings of ECAI 2006 Workshop on Recommender Systems, pp. 29\u201333 (2006)","DOI":"10.1145\/1297231.1297235"},{"key":"4_CR26","unstructured":"On the Fundamentals of Computer Science: Challenges, N.R.C.U.C., Opportunities: Computer Science: Reflections on the Field, Reflections from the Field. National Academies Press (2004)"}],"container-title":["Lecture Notes in Computer Science","User Modeling, Adaptation, and Personalization"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38844-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,2]],"date-time":"2023-07-02T02:30:13Z","timestamp":1688265013000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38844-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642388439","9783642388446"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38844-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}