{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:25:32Z","timestamp":1747459532560,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811513763"},{"type":"electronic","value":"9789811513770"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-1377-0_21","type":"book-chapter","created":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T07:03:36Z","timestamp":1573628616000},"page":"287-296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Trust-Based Agent Evaluation in Collaborative Systems"],"prefix":"10.1007","author":[{"given":"Yin","family":"Sheng","sequence":"first","affiliation":[]},{"given":"Wenting","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xianjun","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","unstructured":"Zhu, H.: Maximizing group performance while minimizing budget. IEEE Trans. Syst. Man Cybern. Syst. 1\u201313 (2017). \nhttps:\/\/doi.org\/10.1109\/tsmc.2017.2735300","DOI":"10.1109\/tsmc.2017.2735300"},{"issue":"6","key":"21_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.15908\/j.cnki.cist.2017.06.006","volume":"8","author":"GU Haiyan","year":"2017","unstructured":"Haiyan, G.U., Chi, X.U.: Cooperative operational technologies for manned\/unmanned teaming. Command Inf. Syst. Technol. 8(6), 37\u201345 (2017). \nhttps:\/\/doi.org\/10.15908\/j.cnki.cist.2017.06.006","journal-title":"Command Inf. Syst. Technol."},{"issue":"4","key":"21_CR3","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1086\/510223","volume":"33","author":"AD Gershoff","year":"2007","unstructured":"Gershoff, A.D., Mukherjee, A.: Few ways to love, but many ways to hate: attribute ambiguity and the positivity effect in agent evaluation. J. Consum. Res. 33(4), 499\u2013505 (2007). \nhttps:\/\/doi.org\/10.1086\/510223","journal-title":"J. Consum. Res."},{"issue":"4","key":"21_CR4","first-page":"36","volume":"8","author":"J Jensen","year":"1980","unstructured":"Jensen, J.: Employee evaluation: it\u2019s a dirty job, but somebody\u2019s got to do it. Grantsmanship Center News 8(4), 36 (1980)","journal-title":"Grantsmanship Center News"},{"key":"21_CR5","unstructured":"Moore, J.P., Inder, R., Chung, P.W.H., Macintosh, A., Stader, J.: Who does what? Matching agents to tasks in adaptive workflow. In: International Conference on Enterprise Information Systems, pp. 181\u2013185 (2000)"},{"issue":"11","key":"21_CR6","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1108\/01443579710177888","volume":"17","author":"A Neely","year":"1997","unstructured":"Neely, A., Richards, H., Mills, J., Platts, K., Bourne, M.: Designing performance measures: a structured approach. Int. J. Oper. Prod. Manag. 17(11), 1131\u20131152 (1997). \nhttps:\/\/doi.org\/10.1108\/01443579710177888","journal-title":"Int. J. Oper. Prod. Manag."},{"key":"21_CR7","doi-asserted-by":"publisher","unstructured":"Zhu, H., Feng, L., Pickering, R.: Agent evaluation in distributed adaptive systems. In: Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics, pp. 752\u2013757 (2013). \nhttps:\/\/doi.org\/10.1109\/smc.2013.133","DOI":"10.1109\/smc.2013.133"},{"issue":"1","key":"21_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2542182.2542198","volume":"5","author":"N Osman","year":"2013","unstructured":"Osman, N., Sierra, C., Mcneill, F., Pane, J., Debenham, J.: Trust and matching algorithms for selecting suitable agents. ACM Trans. Intell. Syst. Technol. 5(1), 1\u201339 (2013). \nhttps:\/\/doi.org\/10.1145\/2542182.2542198","journal-title":"ACM Trans. Intell. Syst. Technol."},{"issue":"4","key":"21_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1867713.1867715","volume":"5","author":"Y Wang","year":"2010","unstructured":"Wang, Y., Singh, M.P.: Evidence-based trust: a mathematical model geared for multiagent systems. ACM Trans. Auton. Adapt. Syst. 5(4), 1\u201328 (2010). \nhttps:\/\/doi.org\/10.1145\/1867713.1867715","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"issue":"6","key":"21_CR10","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1090\/S0002-9939-2011-10775-5","volume":"31","author":"FL Shi","year":"2011","unstructured":"Shi, F.L., Yang, F., Xu, Y.P.: Power index method for operational capability evaluation of weapon equipment based on ANP and simulation. Syst. Eng.-Theory Pract. 31(6), 1086\u20131094 (2011). \nhttps:\/\/doi.org\/10.1090\/S0002-9939-2011-10775-5","journal-title":"Syst. Eng.-Theory Pract."},{"issue":"1","key":"21_CR11","doi-asserted-by":"publisher","first-page":"68","DOI":"10.15908\/j.cnki.cist.2018.01.012","volume":"9","author":"CM Yao","year":"2018","unstructured":"Yao, C.M., Wang, Q.Y., Xie, R.S.: Multi-target threat assessment method for tank. Command Inf. Syst. Technol. 9(1), 68\u201372 (2018). \nhttps:\/\/doi.org\/10.15908\/j.cnki.cist.2018.01.012","journal-title":"Command Inf. Syst. Technol."},{"issue":"2","key":"21_CR12","first-page":"29","volume":"10","author":"T Xu","year":"2019","unstructured":"Xu, T., Xie, B., Liu, B., Jin, X.: Effectiveness evaluation for collaborative planning pattern across services and arms. Command Inf. Syst. Technol. 10(2), 29\u201333 (2019)","journal-title":"Command Inf. Syst. Technol."},{"issue":"3","key":"21_CR13","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/tsmcc.2008.919168","volume":"38","author":"H Zhu","year":"2008","unstructured":"Zhu, H., Zhou, M.C.: Roles in information systems: a survey. IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev. 38(3), 377\u2013396 (2008). \nhttps:\/\/doi.org\/10.1109\/tsmcc.2008.919168","journal-title":"IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev."},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11755593_3","volume-title":"Trust Management","author":"C Castelfranchi","year":"2006","unstructured":"Castelfranchi, C., Falcone, R., Marzo, F.: Being trusted in a social network: trust as relational capital. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 19\u201332. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11755593_3"}],"container-title":["Communications in Computer and Information Science","Computer Supported Cooperative Work and Social Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-1377-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T15:13:52Z","timestamp":1594739632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-1377-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811513763","9789811513770"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-1377-0_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ChineseCSCW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF Conference on Computer Supported Cooperative Work  and Social Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"chinesecscw2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.scholat.com\/confweb\/CCSCW2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}