{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:42:06Z","timestamp":1742913726767,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642240157"},{"type":"electronic","value":"9783642240164"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24016-4_5","type":"book-chapter","created":{"date-parts":[[2011,8,30]],"date-time":"2011-08-30T20:44:09Z","timestamp":1314737049000},"page":"84-105","source":"Crossref","is-referenced-by-count":4,"title":["A Situation-Aware Computational Trust Model for Selecting Partners"],"prefix":"10.1007","author":[{"given":"Joana","family":"Urbano","sequence":"first","affiliation":[]},{"given":"Ana Paula","family":"Rocha","sequence":"additional","affiliation":[]},{"given":"Eug\u00e9nio","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Sabater, J., Paolucci, M.: On Representation and Aggregation of Social Evaluations, in Computational Trust and Reputation Models. Int. J. Approx. Reasoning (2007)","DOI":"10.1016\/j.ijar.2006.12.013"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Tavakolifard, M.: Situation-aware Trust Management, pp. 413\u2013416 (2009)","DOI":"10.1145\/1639714.1639802"},{"key":"5_CR3","unstructured":"Fabregues, A., Madrenas-Ciurana, J.: SRM: a tool for supplier performance. In: AAMAS 2009, pp. 1375\u20131376 (2009)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/978-3-642-11161-7_45","volume-title":"Principles of Practice in Multi-Agent Systems","author":"R. Hermoso","year":"2009","unstructured":"Hermoso, R., Billhardt, H., Ossowski, S.: Dynamic evolution of role taxonomies through multidimensional clustering in multiagent organizations. In: Yang, J.-J., Yokoo, M., Ito, T., Jin, Z., Scerri, P. (eds.) PRIMA 2009. LNCS, vol.\u00a05925, pp. 587\u2013594. Springer, Heidelberg (2009)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Rehak, M., Gregor, M., Pechoucek, M.: Multidimensional context representations for situational trust. In: DIS 2006: Proceedings of IEEE Workshop on Distributed Intelligent Systems: Collective Intelligence and Its Applications, pp. 315\u2013320, 383\u2013388 (2006)","DOI":"10.1109\/DIS.2006.54"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Nguyen, C., Camp, O.: Using Context Information to Improve Computation of Trust in Ad Hoc Networks. In: 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication (2008)","DOI":"10.1109\/WiMob.2008.43"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1007\/978-3-540-76843-2_47","volume-title":"On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS","author":"R. Neisse","year":"2007","unstructured":"Neisse, R., Wegdam, M., van Sinderen, M., Lenzini, G.: Trust management model and architecture for context-aware service platforms. In: Chung, S. (ed.) OTM 2007, Part II. LNCS, vol.\u00a04804, pp. 1803\u20131820. Springer, Heidelberg (2007)"},{"key":"5_CR8","unstructured":"Stolle, D.: In Trust in Society. In: Cook, K.S. (ed.) Russell Sage Foundation, pp. 202\u2013244 (2001)"},{"issue":"10","key":"5_CR9","doi-asserted-by":"publisher","first-page":"7214","DOI":"10.1073\/pnas.082097399","volume":"99","author":"M.W. Macy","year":"2002","unstructured":"Macy, M.W., Sato, Y.: Trust, Cooperation, and Market Formation in the U.S. and Japan. Proceedings of the National Academy of Sciences of the United States of America\u00a099(10)(suppl. 3) , 7214\u20137220 (2002)","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"key":"5_CR10","unstructured":"Marsh, S.P.: Formalising Trust as a Computational Concept. PhD Thesis, University of Stirling (1994)"},{"key":"5_CR11","unstructured":"Dasgupta, P.: Trust as a Commodity. In: Gambeta, D. (ed.) Making and Breaking Cooperative Relations, Basil Blackwell (1990)"},{"key":"5_CR12","volume-title":"Towards the E-Society: E-Business, E-Commerce, and E-Government","author":"T. Dimitrakos","year":"2001","unstructured":"Dimitrakos, T.: System Models, e-Risk and e-Trust. Towards Bridging the Gap? In: Towards the E-Society: E-Business, E-Commerce, and E-Government, Kluwer, Dordrecht (2001)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Christianson, B., Harbison, W.S.: Why isn\u2019t trust transitive? In: Proceedings of the International Workshop on Security Protocols, London, UK, pp. 171\u2013176 (1997)","DOI":"10.1007\/3-540-62494-5_16"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Tavakolifard, M., Herrmann, P., Ozturk, P.: Analogical trust reasoning. In: Trust Management III, ch. 10, pp. 149\u2013163 (2009)","DOI":"10.1007\/978-3-642-02056-8_10"},{"key":"5_CR15","unstructured":"Toivonen, S., Denker, G.: The Impact of Context on the Trustworthiness of Communication: An Ontological Approach. In: Proceedings of the ISWC Workshop on Trust, Security, and Reputation on the Semantic Web (2004)"},{"key":"5_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-45217-1_18","volume-title":"Cooperative Information Agents VII","author":"J. Golbeck","year":"2003","unstructured":"Golbeck, J., Parsia, B., Hendler, J.: Trust networks on the semantic web. In: Klusch, M., Omicini, A., Ossowski, S., Laamanen, H. (eds.) CIA 2003. LNCS (LNAI), vol.\u00a02782, pp. 238\u2013249. Springer, Heidelberg (2003)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Tavakolifard, M., Knapskog, S.J., Herrmann, P.: Trust transferability among similar contexts. In: 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks, New York, USA, pp. 91\u201397 (2008)","DOI":"10.1145\/1454586.1454603"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-540-40010-3_21","volume-title":"Distributed Applications and Interoperable Systems","author":"T. Strang","year":"2003","unstructured":"Strang, T., Linnhoff-Popien, C., Frank, K.: CoOL: A context ontology language to enable contextual interoperability. In: Stefani, J.-B., Demeure, I., Zhang, J. (eds.) DAIS 2003. LNCS, vol.\u00a02893, pp. 236\u2013247. Springer, Heidelberg (2003)"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1145\/775047.775126","volume-title":"Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"G. Jeh","year":"2002","unstructured":"Jeh, G., Widom, J.: SimRank: a measure of structural-context similarity. In: Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 538\u2013543. ACM Press, New York (2002)"},{"key":"5_CR20","unstructured":"Nakatsuji, M., Fujiwara, Y., Tanaka, A., Uchiyama, T., Ishida, T.: Recommendations Over Domain Specific User Graphs. In: 19th European Conference on Artificial Intelligence (ECAI 2010), Lisbon, Portugal (2010)"},{"issue":"7","key":"5_CR21","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1016\/j.knosys.2008.03.015","volume":"21","author":"J.J. Jung","year":"2008","unstructured":"Jung, J.J.: Ontology-based context synchronization for ad hoc social collaborations. Knowledge-Based Systems\u00a021(7), 573\u2013580 (2008)","journal-title":"Knowledge-Based Systems"},{"key":"5_CR22","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-540-75119-9_21","volume-title":"Cooperative Information Agents XI","author":"M. Reh\u00e1k","year":"2007","unstructured":"Reh\u00e1k, M., P\u011bchou\u010dek, M.: Trust modeling with context representation and generalized identities. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS (LNAI), vol.\u00a04676, pp. 298\u2013312. Springer, Heidelberg (2007)"},{"key":"5_CR23","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-85834-8_11","volume-title":"Cooperative Information Agents XII","author":"M. Reh\u00e1k","year":"2008","unstructured":"Reh\u00e1k, M., P\u011bchou\u010dek, M., Grill, M., Bartos, K.: Trust-based classifier combination for network anomaly detection. In: Klusch, M., P\u011bchou\u010dek, M., Polleres, A. (eds.) CIA 2008. LNCS (LNAI), vol.\u00a05180, pp. 116\u2013130. Springer, Heidelberg (2008)"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/3-540-48437-X_18","volume-title":"Multi-Agent System Engineering","author":"C.M. Jonker","year":"1999","unstructured":"Jonker, C.M., Treur, J.: Formal analysis of models for the dynamics of trust based on experiences. In: Garijo, F.J., Boman, M. (eds.) MAAMAW 1999. LNCS, vol.\u00a01647, pp. 221\u2013231. Springer, Heidelberg (1999)"},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/978-3-642-04686-5_43","volume-title":"Progress in Artificial Intelligence","author":"J. Urbano","year":"2009","unstructured":"Urbano, J., Rocha, A.P., Oliveira, E.: Computing confidence values: Does trust dynamics matter? In: Lopes, L.S., Lau, N., Mariano, P., Rocha, L.M. (eds.) EPIA 2009. LNCS, vol.\u00a05816, pp. 520\u2013531. Springer, Heidelberg (2009)"},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-642-13480-7_4","volume-title":"Agent and Multi-Agent Systems: Technologies and Applications","author":"A. Danek","year":"2010","unstructured":"Danek, A., Urbano, J., Rocha, A.P., Oliveira, E.: Engaging the\u00a0dynamics of trust in computational trust and reputation systems. In: J\u0119drzejowicz, P., Nguyen, N.T., Howlet, R.J., Jain, L.C. (eds.) KES-AMSTA 2010. LNCS, vol.\u00a06070, pp. 22\u201331. Springer, Heidelberg (2010)"},{"key":"5_CR27","unstructured":"Thurman, R.: Purchasing contracts in the textile industry: how can purchasing contracts decrease subcontracting risks and reclamations in a textile industry company?, Tampereen ammattikorkeakoulu, Thesis Report (2007)"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-13480-7_6","volume-title":"Agent and Multi-Agent Systems: Technologies and Applications","author":"J. Urbano","year":"2010","unstructured":"Urbano, J., Rocha, A.P., Oliveira, E.: Trust estimation using contextual fitness. In: J\u0119drzejowicz, P., Nguyen, N.T., Howlet, R.J., Jain, L.C. (eds.) KES-AMSTA 2010. LNCS, vol.\u00a06070, pp. 42\u201351. Springer, Heidelberg (2010)"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Urbano, J., Rocha, A.P., Oliveira, E.: Trustworthiness Tendency Incremental Extraction Using Information Gain. In: IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology, wi-iat 2010, vol.\u00a02, pp. 411\u2013414 (2010)","DOI":"10.1109\/WI-IAT.2010.151"},{"issue":"1","key":"5_CR30","first-page":"81","volume":"1","author":"J.R. Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of Decision Trees. Machine Learning\u00a01(1), 81\u2013106 (1986)","journal-title":"Machine Learning"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA Data Mining Software: An Update. SIGKDD Explorations\u00a011(1) (2009)","DOI":"10.1145\/1656274.1656278"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Collective Intelligence V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24016-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:30:49Z","timestamp":1560515449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24016-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642240157","9783642240164"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24016-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}