{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:17:18Z","timestamp":1725509838678},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949408","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:55:21Z","timestamp":1310558121000},"page":"137-143","source":"Crossref","is-referenced-by-count":6,"title":["Trust optimization in task-oriented social networks"],"prefix":"10.1109","author":[{"given":"Justin","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Xing","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Killion","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1377","article-title":"SUNNY: A New Algorithm for Trust Inference in Social Networks Using Probabilistic Confidence Models","author":"kuter","year":"2007","journal-title":"Proceedings of the 22nd AAAI Conference on Artificial Intelligence"},{"journal-title":"Prosper","year":"0","key":"ref11"},{"key":"ref12","first-page":"351","article-title":"Trust Management for the Semantic Web","author":"richardson","year":"2003","journal-title":"Proceedings of the 2nd International Semantic Web Conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.28"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-007-9021-x"},{"key":"ref15","first-page":"264","article-title":"A Computational Trust Framework for Social Computing","author":"zhan","year":"2010","journal-title":"Proceedings of the Second International Conference on Social Computing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-005-4807-3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2009.278"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2004.12.014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2004.826011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557074"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1183463.1183470"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2307\/259293"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.248"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180427"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WIIAT.2008.209"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949408.pdf?arnumber=5949408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T23:28:47Z","timestamp":1490052527000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949408\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949408","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}