Bayesian Network-Based Trust Model

Size: px
Start display at page:

Download "Bayesian Network-Based Trust Model"

Transcription

1 Bayesian Network-Based Trust Model Yao Wang, Julita Vassileva University of Saskatchewan, Computer Science Department, Saskatoon, Saskatchewan, S7N 5A9, Canada {yaw181, Abstract We review trust and reputation mechanisms applied in centralized and decentralized systems. Then we propose a Bayesian network-based trust model. Since trust is multi-faceted, even in e same context, agents still need to develop differentiated trust in different aspects of oer agents behaviors. The agent s needs are different in different situations. Depending on e situation, an agent may need to consider its trust in a specific aspect of anoer agent s capability or in a combination of multiple aspects. Bayesian networks provide a flexible meod to present differentiated trust and combine different aspects of trust. A Bayesian network-based trust model is presented for a file sharing peer-to-peer application. 1. Introduction Large distributed systems applied in e areas of e- commerce, web-services, distributed computing, and file sharing peer-to-peer (pp) systems, consist of autonomous and heterogeneous agents, which behave on e behalf of users. Usually, agents play two roles, e role of service providers (sellers, servers) and e role of consumers (buyers, clients). Since agents are heterogeneous, some agents might be benevolent and provide high-quality services, oers might be buggy and unable to provide highquality services, and some might be even malicious by providing bad services or harming e consumers. Since ere is no centralized node to serve as an auority to supervise agents behaviors and punish agents at behave badly, malicious agents have an incentive to harm oer agents to get more benefit because ey can get away. Some traditional security techniques, such as service providers requiring access auorization, or consumers requiring server auentication, are used as protection from known malicious agents. However, ey cannot prevent from agents providing variable-quality service, or agents at are unknown. Mechanisms for trust and reputation can be used to help agents distinguish good from bad partners. This paper describes a trust and reputation mechanism at allows agents to discover partners who meet eir individual requirements, rough individual experience and sharing experiences wi oer agents wi similar preferences. The rest of is paper is organized as follows: section discusses some related issues about trust and reputation. Section 3 introduces our approach to developing a Bayesian network-based trust model. The experiment design and results are presented in Sections 4 and 5. Section 6 discusses related work on trust and reputation. In e last section, we present conclusions and directions for future work.. Trust and Reputation Trust and reputation mechanisms have been proposed for large open environments in e-commerce, distributed computing, recommender systems. Agents are often used to manage and reason about trust and reputation. In is situation, trust is defined as an agent s belief in attributes such as reliability, honesty and competence of e trusted agent. The reputation of an agent defines an expectation about its behavior, which is based on oer agents observations or information about e agent s past behavior wiin a specific context at a given time. Suppose ere are two agents, agent A and agent B. When agent A has no direct interaction wi agent B or it is not sure about e trustworiness of B, agent A can make decisions relying on e reputation of agent B (obtained rough asking oer agents). Once agent A has interactions wi agent B, it can develop its trust in agent B according to its degree of satisfaction wi e interactions and use is trust to make decisions for future interactions. Some of e literature on trust and reputation treats e two concepts interchangeably or ambiguously, which sometimes causes confusion [1, 16]. The two concepts are related, but different. Agent A s trust in agent B is e accumulation of evaluations at agent A has of its past interactions wi B. It reflects agent A s subjective viewpoint of B s capability. The reputation of agent B is an objective measure for agent B s capability, resulting from e evaluations of many oer agents. There are two ways for agent A to learn agent B s reputation. One is to ask an auority, like a better business bureau, which is responsible for accumulating evaluations of agents (including B) from oer agents and calculating e reputation of e evaluated agents (e.g. B) based on ese evaluations. In is case, e auority usually does not care who provides an evaluation, an honest agent or dishonest agent, but relies on e amount of data to make e effect of possible biased evaluations in-

2 significant. Centralized systems, such as ebay and onsale, use is way of building reputation. The oer way for A to obtain agent B s reputation is to proactively request and collect oer agents evaluations about B and to combine e evaluations togeer to form its own view of B reputation. This way of computing reputation is adopted in decentralized systems [5]. Trust can be broadly categorized by e relationships between e two involved agents in e following categories [7]. Trust between a user and her agent(s). Alough an agent behaves on its user s behalf, an agent might not act as its user expects. How much a user trusts her agent determines how she delegates her tasks to e agent [18]. Trust in service providers. It measures wheer a service provider can provide trustwory services. Trust in references. References refer to e agents at make recommendations or share eir trust values. It measures wheer an agent can provide reliable recommendations. Trust in groups. It is e trust at one agent has in a group of oer agents. By modeling trust in different groups, an agent can decide to join a group at can bring it most benefit [19]. Hales [8] points at group reputation can be a powerful mechanism for e promotion of beneficent norms under e right condition. This kind of trust is also useful in helping an agent judge e oer agent according to its trust in e group at e oer agent belongs to [6, 8, 1, 19]..1 Centralized vs. Decentralized Trust and reputation mechanisms have been implemented in many systems adopting eier a centralized structure or a decentralized structure. Accordingly, e trust and reputation mechanisms used in e two kinds of systems are also different. In centralized systems, such as in ebay and onsale, which are mainly seen in e area of e-commerce, e trust and reputation mechanisms used are relatively simple. There are some common characteristics in ese systems. A centralized node acts as e system manager responsible for collecting ratings from bo sides involved in an interaction. Agents reputations are public and global. The reputation of an agent is visible to all e oer agents. Agents reputations are built by e system. There is no explicit trust model between agents. Less communication is required between agents. An agent only communicates wi e centralized node to know oer agents reputations. Despite of e simplicity of e centralized reputation, empirical results show ese systems do encourage transactions between sells and buyers. But ere are some problems. Agents are usually reluctant to give negative ratings because ey can see each oer s ratings and are afraid of revenges [15]. Anoer problem is at if an agent has a bad reputation, it can discard its old identity, choose a new one, start as a beginner and get rid of its poor reputation. The ird problem is at agents can increase eir reputations artificially by creating fake identities and having em to give emselves high ratings [4]. The trust and reputation mechanisms used in decentralized systems, for example, peer-to-peer networks, are more complex an ose applied in centralized systems. They have e following characteristics [, 3, 5]: There is no centralized system manager to govern trust and reputation. Subjective trust is explicitly developed by each agent. Each agent is responsible for developing its own trust in oer agents based on eir direct interactions. No global or public reputation exists. If agent A wants to know agent B s reputation, it has to proactively ask oer agents for eir evaluations of B, en synesize e ratings togeer to compute agent B s reputation. The reputation of agent B developed by A is personalized because agent A can choose which agents it will ask for evaluations of B, its trustwory friends or all known agents. Agent A can also decide how to combine e collected evaluations togeer to get agent B s reputation. For example, it can only combine e evaluations coming from trusted agents. Or it can weight differently e evaluations from trusted agents, unknown agents and even untrustwory agents when it combines em togeer. A lot of communication is required between agents to exchange eir evaluations. In decentralized systems, agent A can get agent B s reputation based on its own knowledge of e trufulness of agents at make recommendations for agent B. So it is difficult for agent B to increase its reputation artificially. Since only agent A can see e recommendations, e references can express eir feelings trufully, not worried about potential revenges. But e tradeoff is at agents have to conduct a lot of communication and computation. 3. Bayesian Network-Based Trust Model Most current applications and experiments on trust and reputation only focus on one of em, eier trust or reputation, alough e idea of combining em togeer in one system has been well known in e literature [4, 1,, 3]. An agent broadly builds two kinds of trust in anoer agent. One is e trust in anoer agent s competence in providing services. The oer is e trust in anoer agent s reliability in providing recommendations about oer agents. Here e reliability includes two aspects: wheer e agent is truful in telling its information and wheer e agent is trustwory or not. Since agents are heterogeneous, ey judge oer agent s behaviour by different criteria. If eir criteria are similar, one agent can trust anoer

3 agent. If eir criteria are different, ey cannot trust each oer even if bo of em tell e tru. In e implementation of such a system based on trust and reputation, some issues have to be considered. 1) How does an agent model its user? The user ultimately sets e criteria by which an agent evaluates oer agents. Each user has different preferences and ways of judging e quality of interaction. In order to behave as its user wants, an agent has to keep learning its user s preferences and behaviors. If an agent fails to do as what its user expects, it will be useless. ) How is an interaction to be evaluated? Trust is built based on an agent s direct interactions wi oer agents. For each interaction, an agent s degree of satisfaction of e interaction will directly influence its trust in e oer agent involved in e interaction. Usually, an interaction has multiple aspects and can be judged from different points of view. 3) How does an agent represent and update its trust in anoer agent? 4) When will an agent ask for recommendations about anoer agent at it intends to interact wi? 5) How does an agent combine togeer e recommendations for a given agent coming from different references? Since e recommendations might come from trusted agents, non-trusted agents or strangers, an agent has to decide how to deal wi em. 6) How does an agent decide if anoer agent is trustwory to interact wi or not, according to its direct experiences or from e agent s reputation, or bo? 7) How does an agent develop and update its trust in a reference agent at makes recommendations? 8) How many kinds of trust does an agent need to develop wi anoer agent in a single context? Agents may need to develop multiple trust relationships wi each oer in order to evaluate each oer from different perspectives and take different aspects of e agent s behavior into account. For example, agent A might trust agent B in providing music files wi good quality. But agent A might not trust agent B in offering movie files wi e same quality as music files. Our approach will deal wi all e issues above except e first one, which is beyond our scope, alough it is extremely important. We will use a peer-to-peer file sharing application as an example in e discussion, however e meod is general and can be applied to oer applications, like web-services, e-commerce, recommender systems or peer-to-peer distributed computing. 3.1 Scenario In e area of file sharing in peer-to-peer networks, all e peers are bo providers and users of shared files. Each peer plays two roles, e role of file provider offering files to oer peers and e role of user using files provided by oer peers. In order to distinguish e two roles of each peer, in e rest of paper, when a peer acts as a file provider, we call it file provider; oerwise, we call it simply agent. Agents will develop two kinds of trust, e trust in file providers competence (in providing files) and e trust in oer agents reliability in making recommendations. We assume all e agents are truful in telling eir evaluations. However, e agents may have different ways of evaluating oer agent s performance, which reflect different user preferences. 3. Trust in a File provider s Competence In a peer-to-peer network, file providers capabilities are not uniform. For example, some file providers may be connecting rough a high-speed network, while oers connect rough a slow modem. Some file providers might like music, so ey share a lot of music files. Some may be interested in movies and share more movies. Some may be very picky about file quality, so ey only keep and share files wi high quality. Therefore, e file provider s capability can be presented in various aspects, such as e download speed, file quality and file type (see Figure 1). DS Trust in a FP T FQ FT Download speed File Quality File Type Figure 1. A Bayesian Network Model The agent s needs are also different in different situations. Sometimes, it may want to know e file provider s overall capability. Sometimes it may only be interested in e file provider s capability in some particular aspect. For instance, an agent wants to download a music file from a file provider. At is time, knowing e file provider s capability in providing music files is more valuable for e agent an knowing e file provider s capability in providing movies. Agents also need to develop differentiated trust in file providers capabilities. For example, e agent who wants to download a music file from e file provider cares about wheer e file provider is able to provide a music file wi good quality at a fast speed, which involves e file provider s capabilities in two aspects, quality and speed. How does e agent combine its two separated trusts togeer, e trust in e file provider s capability in providing music files wi good quality and e trust in e file provider s capability in providing a fast download speed, in order to decide if e file provider is trustwory or A not? Bayesian network provides a flexible meod to solve e problem. A Bayesian network is a relationship network at uses statistic meods to represent probability relation-

4 ships between different agents. Its eoretical foundation is e Bayes rule [14]. e h). h) p ( h e) = e) h) is e prior probability of hypoesis h; e) is e prior probability of evidence e; h e) is e probability of h given e; e h) is e probability of e given h. A naïve Bayesian network is a simple Bayesian network. It is composed of a root node and several leaf nodes. We will use a naïve Bayesian network to represent e trust between an agent and a file provider. Every agent develops a naive Bayesian network for each file provider at it has interacted wi. Each Bayesian network has a root node T, which has two values, satisfying and unsatisfying, denoted by 1 and 0, respectively. T=1) represents e value of agent s overall trust in e file provider s competence in providing files. It is e percentage of interactions at are satisfying and measured by e number of satisfying interactions m divided by e total number of interactions n. is e percentage of not satisfying interactions. m p ( = (1) n p ( + = 1 The leaf nodes under e root node represent e file provider s capability in different aspects. Each leaf node is associated wi a conditional probability table (CPT). The node, denoted by FT, represents e set of file types. Suppose it includes five values, Music, Movie, Document, Image and Software. Its CPT is showed in table 1. Each column follows one constraint, which corresponds to one value of e root node. The sum of values of each column is equal to 1. Table 1. The CPT of Node FT T = 1 T = 0 Music p ( FT = " Music" p ( FT = " Music" Movie p ( FT = " Movie" p ( FT = " Movie" Document p ( FT = " Docu" p ( FT = " Docu" Image p ( FT = " Image" p ( FT = " Image" Software p ( FT = " Soft" p ( FT = " Soft" FT = " Music" is e conditional probability wi e condition at an interaction is satisfying. It measures e probability at e file involved in an interaction is a music file, given e interaction is satisfying. It can be computed according to e following formula: FT = " Music", p ( FT = " Music" = p ( FT = " Music", is e probability at interactions are satisfying and files involved are music files. m1 FT = " Music", = n m1 is e number of satisfying interactions when files involved are music files. p ( FT = " Music" denotes e probability at files are music files, given interactions are not satisfying. The probabilities for oer file types in Table 1 are computed in a similar way. Node DS denotes e set of download speeds. It has ree items, Fast, Medium and Slow, each of which covers a range of download speed. Node FQ denotes e set of file qualities. It also has ree items, High, Medium and Low. Its CPT is similar to e one in table 1. Here we only take ree aspects of trust into account. More relevant aspects can be added in e Bayesian network later to account for user preferences wi respect to service. Once getting nodes CPTs in a Bayesian network, an agent can compute e probabilities at e corresponding file provider is trustwory in different aspects by using Bayes rules, such as p ( T = 1 FT = " Music" ) e probability at e file provider is trustwory in providing music files, p ( T = 1 FQ = " High" ) e probability at e file provider is trustwory in providing files wi high quality, p ( T = 1 FT = " Music", FQ = " High" ) e probability at e file provider is trustwory in providing music files wi high quality. Agents can set various conditions according to eir needs. Each probability represents trust in an aspect of e file provider s competence. Wi e Bayesian networks, agents can infer trust in e various aspects at ey need from e corresponding probabilities. That will save agents much effort in building each trust separately, or developing new trust when conditions change. After each interaction, agents update eir corresponding Bayesian networks. 3.3 Evaluation of an Interaction Agents update eir corresponding Bayesian networks after each interaction. If an interaction is satisfying, m and n are bo increased by 1 in formula (1). If it is not satisfying, only n is increased by 1. Two main factors are considered when agents judge an interaction, e degree of eir satisfaction wi e download speed s ds and e degree of eir satisfaction wi e quality of downloaded file s fq. The overall degree of agents satisfaction wi an interaction s is computed as e following: s = w * s + w * s, where w w = 1 () ds ds fq fq ds + fq w ds and w fq denote weights, which indicate e importance of download speed and e importance of file quality to a particular agent (depending on e user s preferences). Each agent has a satisfaction reshold s t. If s < st, e interaction is unsatisfying; oerwise, it is satisfying. 3.4 Handling Oer Agents Recommendations

5 In current file sharing peer-to-peer application, users find files by using e search function. In most of situations, ey get a long list of providers for an identical file. If a user happens to select an unsuitable provider, who provides files wi bad quality or slow download speed, e user will waste time and effort. If is situation happens several times, e users will be frustrated. In order to solve e problem, we use e mechanism of trust and reputation. Once an agent receives a list of file providers for a given search, it can arrange e list according to its trust in ese file providers. Then e agent chooses e most trusted file providers in e top of e list to download files from. If e agent has no experiences wi e file provider, it can ask oer agents to make recommendations for it. The agent can send various recommendation requests according to its needs. For example, if e agent is going to download a movie, it may care about e movie s quality. Anoer agent may care about e speed. So e request can be Does e file provider provide movies wi good qualities? If e agent cares bo about e quality and e download speed, e request will be someing like Does e file provider provide files wi good quality at a fast download speed?. When oer agents receive ese requests, ey will check eir trust-representations, i.e. eir Bayesian networks, to see if ey can answer such questions. If an agent has downloaded movies from e file provider before, it will send recommendation at contains e value p ( T = 1 FT = " Music", FQ = " High") to answer e first request or e value p ( T = 1 FT = " Music", FQ = " High", DS = " Fast") to answer e second request. The agent might receive several such recommendations at e same time, which may come from e trustwory acquaintances, untrustwory acquaintances, or strangers. If e references are untrustwory, e agent can discard eir recommendations immediately. Then e agent needs to combine e recommendations from trustwory references and from unknown references to get e total recommendation for e file provider: r ij k tr * t = w l w z t * = 1 + = 1 k s * g tr l = 1 il il lj g t zj,where w w = 1 (3) t + s rij is e total recommendation value for e j file pro- vider at e i agent gets. k and g are e number of trustwory references and e number of unknown references, respectively. tr il is e trust at e i user has in e l trustwory reference. tlj is e trust at e l trustwory reference has in j file provider. t zj is e trust at e z unknown reference has in j file provider. w t and ws are e weights to indicate how e user values e importance of e recommendation from trustwory references and from unknown references. Since agents often have different preferences and points of view, e agent s trustwory acquaintances are ose agents at share similar preferences and viewpoints wi e agent most of time. The agent should weight e recommendations from its trustwory acquaintances higher an ose recommendations from strangers. Given a reshold θ, if e total recommendation value is greater an θ, e agent will interact wi e file provider; oerwise, not. If e agent interacts wi e file provider, it will not only update its trust in e file provider, i.e. its corresponding Bayesian network, but also update its trust in e agents at provide recommendations by e following reinforcement learning formula: n o trij α * trij + (1 α ) * eα = (4) n tr ij denotes e new trust value at e i agent has in o e j reference after e update; tr denotes e old trust value. α is e learning rate a real number in e interval [0,1]. e α is e new evidence value, which can be -1 or 1. If e value of recommendation is greater an θ and e interaction wi e file provider afterwards is satisfying, e α is equal to 1; in e oer case, since ere is a mismatch between e recommendation and e actual experience wi e file provider, e evidence is negative, so e α is -1. Anoer way to find if an agent is trustwory or not in telling e tru is e comparison between two agents Bayesian networks relevant to an identical file provider. When agents are idle, ey can gossip wi each oer periodically, exchange and compare eir Bayesian networks. This can help em find oer agents who share similar preferences more accurately and faster. After each comparison, e agents will update eir trusts in each oer according e formula: n o tr = β * tr + (1 β ) e (5) ij ij * The result of e comparison e β is a number in e interval [-1, 1]. β is e learning rate a real number in e interval [0,1] which follows e constraint β > α. This is because e Bayesian network collectively reflects an agent s preferences and viewpoints based on all its past interactions wi a specific file provider. Comparing e two agents Bayesian networks is tantamount to comparing all e past interactions of e two agents. The evidence eα in formula (4) is only based on one interaction. The evidence e β should affect e agent s trust in anoer agent more an e α. How do e agents compare eir Bayesian networks and how is e β computed? First, we assume e structures of Bayesian networks of all agents have e same structure. ij β

6 We only compare e values in eir Bayesian networks. Suppose agent 1 will compare its Bayesian network (see Figure 1) wi e corresponding Bayesian network of agent. Agent 1 obtains e degree of similarity between e two Bayesian networks by computing e similarity of each pair of nodes (T, DS, FQ and FT), according to e similarity measure based on Clark s distance [1], and en combining e similarity results of each pair of nodes togeer. 4 eβ = 1 * ( w 1i * ci ), where i= 1 c1 w 11 + w1 + w13 + w14 = 1 (6) ( v111 v11) ( v11 v1 ) + ( v111 + v11) ( v11 + v1 ) = (7) hi ( v1ijl vijl ) ( 1 + ) = 1 = 1 = j v l ijl v ijl c i, where i =, 3, 4 (8) w 1 1, w 1, w 13 and w 14 are e weights of e node T, DS, FQ, and FT, respectively, related to agent 1, which indicate e importance of ese nodes in comparing two Bayesian networks. c 1, c, c 3 and c4 are e results of comparing agent 1 and agent s CPTs about node T, DS, FQ and FT. Since e node T is e root node and it has only one column in its CPT, while oer nodes (DS, FQ, FT) are e leaf nodes and have two columns of values in eirs CPTs, we compute c 1 differently from c, c 3, and c 4. hi denotes e number of values in e corresponding node. h = 3 ; h 3 = 3 ; h 3 = 5. v111 and v11 are e values of and related to agent 1. v11 and v1 are e values of and related to agent. v1 ijl and v ijl are e values in agent 1 s CPTs and agent s CPTs, respectively. The idea of is metric is at agents compute not only eir trust values, eir CPTs, but also take into account eir preferences (encoded as e weights, w 11, w 1, w 13, w 1 4 ). So agents wi similar preferences, such as e importance of file type, quality, download speed, will weight each oer s opinions higher. streng of e agent s interests in e corresponding file type. The files e agent wants to download are generated based on its interest vector. Every agent keeps two lists. One is e agent list at records all e oer agents at e agent has interacted wi and its trust values in ese agents. The oer is e file provider list at records e known file providers and e corresponding Bayesian networks representing e agent s trusts in ese file providers. Each file provider has a capability vector showing its capabilities in different aspects, i.e. providing files wi different types, qualities and download speeds. Our experiments involve 10 different file providers and 40 agents. Each agent will gossip wi oer agents periodically to exchange eir Bayesian networks. The period is 5, which means after each 5 interactions wi oer agents, e agent will gossip once. w ds = w fq = 0.5; α = 0.3; β = 0.5; w 11 = w 1 = w 13 = w 14 = 0.5. The total number of interactions is We run each configuration for 10 times and use e means for e evaluation criteria. 5. Results The goal of e first experiment is to see if a Bayesian network-based trust model helps agents to select file providers at match better eir preferences. Therefore we compare e performance (in terms of percentage of successful recommendations) of a system consisting of agents wi Bayesian network-based trust models and a system consisting of agents (wiout Bayesian networks, BN) at represent general trust, not differentiated to different aspects. Successful recommendations are ose positive recommendations (obtained based on formula 3) when agents are satisfied wi interactions wi recommended file providers. If an agent gets a negative recommendation for a file provider, it will not interact wi e file provider. We have two configurations in is experiment: Trust and reputation system wi BN: e system consists of agents wi Bayesian networks-based trust models at exchange recommendations wi each oer; Trust and reputation system wiout BN: e system consists of agents at exchange recommendations, but don t model differentiated trust in file providers. 4. Experiments In order to evaluate is approach, we developed a simulation of a file sharing system in a peer-to-peer network. The system is developed on e JADE.5. For e sake of simplicity, each node in our system plays only one role at a time, eier e role of file provider or e role of an agent. Every agent only knows oer agents directly connected wi it and a few file providers at e beginning. Every agent has an interest vector. The interest vector is composed of five elements: music, movie, image, document and software. The value of each element indicates e

7 Successful recommendations(%) Trust and reputation system wi BN Trust and reputation System wiout BN The number of Interactions Figure. Trust and Reputation System wi BN vs. Trust and Reputation System wiout BN Figure shows at e system using Bayesian networks performs slightly better an e system wi general trust in terms of e percentage of successful recommendations. Successful interactions(%) Trust and reputation system wi BN Trust and reputation system wiout BN Trust system wi BN Trust system wiout BN The number of interactions Figure 3. The Comparison of Four Systems The goal of e second experiment is to see if exchanging recommendation values wi oer agents helps agents to achieve better performance (defined as e percentage of successful interactions wi file provider). For e reason, we compare four configurations: Trust and reputation system wi BN; Trust and reputation system wiout BN; Trust system wi BN: e system consists of agents wi Bayesian networks-based trust models, which don t exchange recommendations wi each oer; Trust system wiout BN: e system consists of agents at have no differentiated trust models and don t exchange recommendations wi each oer. Figure 3 shows at e two systems, where agents share information wi each oer, outperform e systems, where agents do not share information. The trust system using Bayesian networks is slightly better an e trust system wiout using Bayesian networks. There is an anomaly in e case when agents do not share recommendations, since in e end of e curve, e system wiout BN perform better an e system wi BN. This could be explained wi an imprecise BN due to insufficient experience. In some sense, an agent s Bayesian network can be viewed as e model of a specified file provider from e agent s personal perspective. In our experiments, we use a very simple naïve Bayesian network, which can not represent complex relationships. In e real file-sharing system, e model of file providers might be more complex and required e use of a more complex Bayesian network. Our Bayesian network only involves ree factors. If we build a more complex Bayesian network and add more aspects into it, e system performance might be improved. 6. Discussion and Related work How many Bayesian networks can an agent afford to maintain to represent its trust in oer agents in e networks? It depends on e size of e network and e likelihood at agents have repeated interactions. Resnick [15] empirically shows at 89.0% of all seller-buyer pairs in ebay conducted just one transaction during a five-mon period and 98.9% conducted no more an four. The interactions between e same seller and e same buyer are not repeatable. The buyer s trust in a seller is only based on one direct interaction. The seller s reputation is mostly built on e buyers having a single experience wi e seller. This situation often happens in a very large network or in large e-commence sites. Since ere are a large number of sellers and buyers, e chance at a buyer meets e same seller is rare. But if e kind of goods being transacted is only interesting to a small group of people, for example, collectors of ancient coins, e interactions about is kind of goods happen almost exclusively in a small group. So e probability at sellers and buyers have repeated interactions will be high, and ey will be able to build trust in each oer by our meod. Our approach is useful in situations where two agents can repeatedly interact wi each oer. In a small-size network, ere is no doubt at our approach is applicable. For a large network, our approach is still suitable under e condition at e small-world phenomenon happens. The small-world phenomenon was first discovered in e 1960ies by social scientists. Milgram s experiment showed at people in e U.S. are connected by a short (average leng of 6) chain of intermediate acquaintances. Oer studies have shown at people tend to interact wi oer people in eir small world more frequently an wi people outside. The phenomenon also happens in peer-to-peer networks. Jovanovic s work [9] proves at e smallworld phenomenon occurs in Gnutella. It means at agents are inclined to get files from oer agents from a small sub-

8 community. This small sub-community often consists of agents at have similar preferences and viewpoints. Abdul-Rahman and Hailes [1] capture e most important characteristics of trust and reputation and propose e general structure for developing trust and reputation in a distributed system. Most of e later works in e area follow eir ideas, but in different application domain, such as [3, 5, 11]. Sabater and Sierra s work [16] extends e notion of trust and reputation into social and ontological dimensions. Social dimension means at e reputation of e group at an individual belongs to also influences e reputation of e individual. Ontological dimension means at e reputation of an agent is compositional. The overall reputation is obtained as a result of e combination of e agent s reputation in each aspect. Our approach integrates ese two previous works [1, 16], and applies em to file sharing system in peer-to-peer networks. Anoer difference between our work and Sabater and Sierra s work is at we use Bayesian networks to represent e differentiated trust at different aspects, oer an e structure of ontology. Anoer difference is at we don t treat e differentiated trusts as compositional. Usually e relationship between different aspects of an agent is not just compositional, but complex and correlative. Our approach provides an easy way to present a complex and correlative relationship. Our approach is also flexible in inferring e trust of an agent for different needs. For example, sometimes we care about e overall trust. Sometimes we only need to know e trust in some specific aspect. This bears parallel wi work on distributed user modeling and purpose-based user modeling [13, 0]. Cornelli s work [5], like ours, is in e area of file sharing in peer-to-peer networks. However, it concentrates on how to prevent e attacks to a reputation system and does not discuss how agents model and compute trust and reputation. 7. Conclusions In is paper, we propose a Bayesian network-based trust model. Bayesian networks provide a flexible meod to represent differentiated trust in different aspects of each oer s capability and combine different aspects of trust. We evaluated our approach, in a simulation of a file sharing system in a peer-to-peer network. Our experiments show at e system where agents communicate eir experiences (recommendations) outperforms e system where agents do not communicate wi each oer, and at a differentiated trust adds to e performance. Future work includes adding more aspects in e Bayesian networks, trying to find e key parameters at influence e system performance, and testing e system under oer performance measures, for example, how fast an agent can locate a trustwory service provider. Applying is approach to distributed systems for computational services is particular promising. References [1] Abdul-Rahman A. and Hailes S. Supporting trust in virtual communities. In Proceedings of e Hawai i International Conference on System Sciences, Maui, Jan 000. [] Abdul-Rahman A. and Hailes S. A Distributed Trust Model. In Proceedings of e 1997 New Security Paradigms Workshop, ACM, [3] Azzedin F. and Maheswaran M. Evolving and Managing Trust in Grid Computing Systems. IEEE Canadian Conference on Electrical & Computer Engineering (CCECE '0), May 00. [4] Carter J., Bitting E. and Ghorbani A. Reputation Formalization for An Information-Sharing Multi-Agent System, Computational Intelligence, Volume 18, Number 4, November 00. [5] Cornelli F. and Damiani E. Implementing a Reputation- Aware Gnutella Servent. In Proceedings of e International Workshop on Peer-to-Peer Computing, Pisa, 00. [6] Esfandiari B. and Chandrasekharan S. On how agents make friends: Mechanisms for trust acquisition. In 4 Workshop on Deception, Fraud and Trust in Agent Societies, Montreal, 001. [7] Falcone R. and Shehory O. Trust Delegation and Autonomy: Foundations for Virtual Societies. AAMAS tutorial 1, July 16, 00. [8] Hales, D. Group Reputation Supports Beneficent Norms. The Journal of Artificial Societies and Social Simulation (JASSS) vol. 5, no. 4, 00. [9] Jovanovic M. Modeling Large-scale Peer-to-Peer Networks and a Case study of Gnutella, University of Cinicnnati, master esis, April 001. [10] Milojicic D. S., Kalogeraki V. and Lukose R. Peer-to- Peer Computing, Tech Report: HPL-00-57, [11] Montaner M. and L opez B. Opinion based filtering rough trust. In Proceedings of e 6 International Workshop on Cooperative Information Agents (CIA 0), Madrid (Spain), September [1] Mui L., Halberstadt A. and Mohtashemi M. Notions of reputation in multi-agents systems: A review. In Proceedings of Autonomous Agents & Multiagent Systems (AAMAS 0), 80 87, Bologna, Italy, 00.. [13] Niu X., McCalla G., Vassileva J. (to appear) Purposebased User Modelling in a Multi-agent Portfolio Management System. In Proceedings of User Modeling UM03, Johnstown, PA, June -6, 003. [14] Heckerman, D. A Tutorial on Learning wi Bayesian Networks, Microsoft Research report MSR-TR-95-06, [15] Resnick P. and Zeckhauser R. Trust Among Strangers in Internet Transactions: Empirical Analysis of ebay s Reputation System. NBER Workshop on Empirical Studies of Electronic Commerce, 000.

9 [16] Sabater J. and Sierra C. Regret: a reputation model for gregarious societies. In 4Workshop on Deception, Fraud and Trust in Agent Societies, 001. [17] Schafer B.J. Konstan A, J, and Riedl J. "Recommender Systems in E-Commerce". ACM Conference on Electronic Commerce (EC-99), November 3-5, 1999, Denver, CO. [18] Tang T.Y, Winoto P. and Niu X. Who can i trust? Investigating trust between users and agents in a multi-agent portfolio management system. AAAI-00 Workshop on Autonomy, Delegation, and Control: From Inter-agent to Groups. Edmonton, Canada. [19] Vassileva J., Breban S. and Horsch M. Agent Reasoning Mechanism for Long-Term Coalitions Based on Decision Making and Trust. Computational Intelligence, Vol. 18, no. 4, 00. [0] Vassileva J., McCalla G. and Greer J. (accepted 17 October 001) Multi-Agent Multi-User Modeling, to appear in User Modeling and User-Adapted Interaction. [1] Yolum P. and Singh M. Locating Trustwory Services In Proceedings of e First International Workshop on Agents and Peer-to-Peer Computing (APPC), 00. [] Yu B. and Singh P. M. A social mechanism of reputation management in electronic communities. In Proceedings of Four International Workshop on Cooperative Information Agents, , 000. [3] Yu B. and Singh P. M. An Evidential Model of Distributed Reputation Management. In Autonomous Agents & Multiagent Systems (AAMAS 0), , Bologna, Italy, 00. [4] Zacharia G. Moukas A. and Maes P. Collaborative Reputation Mechanisms in Electronic Marketplaces In 3nd Annual Hawaii International Conference on System Science (HICSS-3), 1999.

Bayesian Network-Based Trust Model

Bayesian Network-Based Trust Model Bayesian Network-Based Trust Model Yao Wang, Julita Vassileva University of Saskatchewan, Computer Science Department, Saskatoon, Saskatchewan, S7N 5A9, Canada {yaw181, jiv}@cs.usask.ca Abstract In this

More information

Bayesian Network-Based Trust Model in Peer-to-Peer Networks

Bayesian Network-Based Trust Model in Peer-to-Peer Networks Bayesian Network-Based Trust Model in Peer-to-Peer Networks Yao Wang, Julita Vassileva University of Saskatchewan, Computer Science Department, Saskatoon, SK, S7N 5A9, Canada {yaw181, jiv}@cs.usask.ca

More information

Bayesian Network Based Trust Model with Time Window for Pure P2P Computing Systems

Bayesian Network Based Trust Model with Time Window for Pure P2P Computing Systems Bayesian Network Based Trust Model with Time Window for Pure P2P Computing Systems Jigyasu Dubey Department of Information Technology Shri Vaishnav Institute of Technology & Science Indore, India jigyasudube@yahoo.co.in

More information

Turnitin Guide for Instructors

Turnitin Guide for Instructors Contents... 1 Creating a Turnitin assignment submission point... 1 Creating a Paper Assignment... 2 Options...3 Creating a Revision Assignment... 4 Submitting papers... 4 Viewing submissions and reports

More information

Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems

Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems E. Latha M.Tech, Dept of Software Engineering (SE), Vinuthna Institute of Technology & Sciences. Abstract: This paper

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

SuperstringRep: Reputation-enhanced Service Discovery

SuperstringRep: Reputation-enhanced Service Discovery SuperstringRep: Reputation-enhanced Service Discovery Ryan Wishart, Ricky Robinson, Jadwiga Indulska School of Information Technology and Electrical Engineering University of Queensland Brisbane, Australia

More information

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS R. K. Prasad and Vipin Sharma 1 Department of Mechanical Engineering ABSTRACT: P A College of Engineering Nadupadavu, Mangalore, India In this implemented

More information

Emerging Social Networks in Peer-to-Peer Systems

Emerging Social Networks in Peer-to-Peer Systems Emerging Social Networks in Peer-to-Peer Systems Yamini Upadrashta Department of Computer Science University of Saskatchewan 57 Campus Drive Saskatoon, SK S7N 5A9 Canada ysu156@mail.usask.ca Supervisors:

More information

Entropy-Based Recommendation Trust Model for Machine to Machine Communications

Entropy-Based Recommendation Trust Model for Machine to Machine Communications Entropy-Based Recommendation Trust Model for Machine to Machine Communications Saneeha Ahmed and Kemal Tepe 1 University of Windsor, Windsor, Ontario, Canada {ahmed13m,ktepe}@uwindsor.ca Abstract. In a

More information

Graph Structure Over Time

Graph Structure Over Time Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines

More information

arxiv: v1 [cs.cr] 30 May 2014

arxiv: v1 [cs.cr] 30 May 2014 ROMEO: ReputatiOn Model Enhancing OpenID Simulator Ginés Dólera Tormo 1, Félix Gómez Mármol 1, and Gregorio Martínez Pérez 2 arxiv:1405.7831v1 [cs.cr] 30 May 2014 1 NEC Europe Ltd., Kurfürsten-Anlage 36,

More information

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS Ramya. S 1 and Prof. B. Sakthivel 2 ramyasiva.jothi@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor & Head, Department

More information

Decision Fusion using Dempster-Schaffer Theory

Decision Fusion using Dempster-Schaffer Theory Decision Fusion using Dempster-Schaffer Theory Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview Introduction

More information

Multi-Agent Programming

Multi-Agent Programming Multi-Agent Programming Brian Logan 1 School of Computer Science University of Nottingham Midlands Graduate School 8th 12th April 2013 1 Slides on Normative Organisations are from an AAMAS 2012 tutorial

More information

Trust is the Foundations for Computer Security

Trust is the Foundations for Computer Security Christian Damsgaard Jensen Department of Applied Mathematics and Computer Science Technical University of Denmark Christian.Jensen@imm.dtu.dk Security and Trust Computer security is sometimes divided into:

More information

A Constrained Spreading Activation Approach to Collaborative Filtering

A Constrained Spreading Activation Approach to Collaborative Filtering A Constrained Spreading Activation Approach to Collaborative Filtering Josephine Griffith 1, Colm O Riordan 1, and Humphrey Sorensen 2 1 Dept. of Information Technology, National University of Ireland,

More information

Collaborative Filtering using a Spreading Activation Approach

Collaborative Filtering using a Spreading Activation Approach Collaborative Filtering using a Spreading Activation Approach Josephine Griffith *, Colm O Riordan *, Humphrey Sorensen ** * Department of Information Technology, NUI, Galway ** Computer Science Department,

More information

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks 5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile

More information

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation Wireless Network Security 18-639: Spring 2011 Arjun Athreya March 3, 2011 Survey: Trust Evaluation A scenario LOBOS Management Co A CMU grad student new to Pittsburgh is looking for housing options in

More information

second_language research_teaching sla vivian_cook language_department idl

second_language research_teaching sla vivian_cook language_department idl Using Implicit Relevance Feedback in a Web Search Assistant Maria Fasli and Udo Kruschwitz Department of Computer Science, University of Essex, Wivenhoe Park, Colchester, CO4 3SQ, United Kingdom fmfasli

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

An Iterative Algorithm for Trust and Reputation Management

An Iterative Algorithm for Trust and Reputation Management An Iterative Algorithm for Trust and Reputation Management Erman Ayday Atlanta, GA 3332, USA Email: erman@ece.gatech.edu Hanseung Lee Atlanta, GA 3332, USA Email: hanseung.lee@ece.gatech.edu Faramarz Fekri

More information

Experimental-based Tool Calibration used for Assessing the Quality of e-commerce Systems

Experimental-based Tool Calibration used for Assessing the Quality of e-commerce Systems Experimental-based Tool Calibration used for Assessing the Quality of e-commerce Systems Antonia Stefani, Dimitris Stavrinoudis, Michalis Xenos School of Sciences & Technology,Hellenic Open University,3

More information

A prototype system for argumentation-based reasoning about trust

A prototype system for argumentation-based reasoning about trust A prototype system for argumentation-based reasoning about trust Yuqing Tang 1, Kai Cai 1, Elizabeth Sklar 1,2, and Simon Parsons 1,2 1 Department of Computer Science, Graduate Center City University of

More information

Chapter 3: Processes. Operating System Concepts 8th Edition, modified by Stewart Weiss

Chapter 3: Processes. Operating System Concepts 8th Edition, modified by Stewart Weiss Chapter 3: Processes Operating System Concepts 8 Edition, Chapter 3: Processes Process Concept Process Scheduling Operations on Processes Interprocess Communication Examples of IPC Systems Communication

More information

Autonomic Software Component QoS Matchmaking Algorithm Based on Fidelity Factor in Agent-Based Autonomic Computing System

Autonomic Software Component QoS Matchmaking Algorithm Based on Fidelity Factor in Agent-Based Autonomic Computing System J. Software Engineering & Applications, 2009, 2: 03-0 doi:0.4236/sea.2009.2205 Published Online July 2009 (www.scirp.org/ournal/sea) Autonomic Software Component QoS Matchmaking Algorithm Based on Fidelity

More information

DARUL ARQAM Scope & Sequence Mathematics Grade 5. Revised 05/31/ st Quarter (43 Days) Resources: 1 : Aug 9-11 (3 days)

DARUL ARQAM Scope & Sequence Mathematics Grade 5. Revised 05/31/ st Quarter (43 Days) Resources: 1 : Aug 9-11 (3 days) Maematics Grade 5 1st Quarter (43 Days) st 1 : Aug 9-11 (3 days) Orientation Topic 1: Place Value Lesson 1 Lesson 5 nd 2 : Aug 14-18 rd 3 : Aug 21-25 4 : Aug 28-30 (3 days) Topic 2: Adding and Subtracting

More information

Trust embedded business model of Online Service Network (OSN)

Trust embedded business model of Online Service Network (OSN) ITU Workshop on Future Trust and Knowledge Infrastructure, Phase 2 Geneva, Switzerland 1 July 2016 Trust embedded business model of Online Service Network (OSN) Minzheong Song Professor, Hansei University

More information

SOFIA: Social Filtering for Niche Markets

SOFIA: Social Filtering for Niche Markets Social Filtering for Niche Markets Matteo Dell'Amico Licia Capra University College London UCL MobiSys Seminar 9 October 2007 : Social Filtering for Niche Markets Outline 1 Social Filtering Competence:

More information

A Peer-to-Peer Normative System to Achieve Social Order

A Peer-to-Peer Normative System to Achieve Social Order A Peer-to-Peer Normative System to Achieve Social Order A. Grizard, Laurent Vercouter, Tiberiu Stratulat, G. Muller To cite this version: A. Grizard, Laurent Vercouter, Tiberiu Stratulat, G. Muller. A

More information

STAR Lab Technical Report

STAR Lab Technical Report VRIJE UNIVERSITEIT BRUSSEL FACULTEIT WETENSCHAPPEN VAKGROEP INFORMATICA EN TOEGEPASTE INFORMATICA SYSTEMS TECHNOLOGY AND APPLICATIONS RESEARCH LAB STAR Lab Technical Report Benefits of explicit profiling

More information

Introduction to Intelligent Agents

Introduction to Intelligent Agents Introduction to Intelligent Agents Pınar Yolum p.yolum@uu.nl Utrecht University Course Information Jointly taught with Mehdi Dastani Topics Work Schedule Grading Resources Academic Integrity Spring 2018

More information

Defense of Trust Management Vulnerabilities in Distributed Networks

Defense of Trust Management Vulnerabilities in Distributed Networks Defense of Trust Management Vulnerabilities in Distributed Networks Yan (Lindsay) Sun, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering University of Rhode Island, RI 02881

More information

Correlation Based Feature Selection with Irrelevant Feature Removal

Correlation Based Feature Selection with Irrelevant Feature Removal Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme

Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme Anurag Garg, Roberto Battiti, and Gianni Costanzi Dipartimento di Informatica e Telecomunicazioni, Università

More information

Complex Networks. Structure and Dynamics

Complex Networks. Structure and Dynamics Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck

More information

A Conceptual Trust Framework for Semantic Web Agents

A Conceptual Trust Framework for Semantic Web Agents Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 A Conceptual Trust Framework for Semantic Web

More information

Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage 1 Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Lan Zhou,Vijay Varadharajan,and Michael Hitchens Abstract Cloud data storage has provided significant benefits by

More information

Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks

Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks Pedro B. Velloso 1, Rafael P. Laufer 2, Otto Carlos M. B. Duarte 3, and Guy Pujolle 1 1 Laboratoire d Informatique de Paris 6 (LIP6) 2 Computer

More information

Do Social Networks Improve e-commerce? A Study on Social Marketplaces

Do Social Networks Improve e-commerce? A Study on Social Marketplaces Do Social Networks Improve e-commerce? A Study on Social Marketplaces 1 GAYATRI SWAMYNATHAN, CHRISTO WILSON, BRYCE BOE, KEVIN ALMEROTH AND BEN Y. ZHAO UC SANTA BARBARA Leveraging Online Social Networks

More information

Scalable Middleware Environment for Agent-Based Internet Applications]

Scalable Middleware Environment for Agent-Based Internet Applications] Scalable Middleware Environment for Agent-Based Internet Applications] Benno J. Overeinder and Frances M.T. Brazier Department of Computer Science, Vrije Universiteit Amsterdam De Boelelaan 1081a, 1081

More information

Verification of Multiple Agent Knowledge-based Systems

Verification of Multiple Agent Knowledge-based Systems Verification of Multiple Agent Knowledge-based Systems From: AAAI Technical Report WS-97-01. Compilation copyright 1997, AAAI (www.aaai.org). All rights reserved. Daniel E. O Leary University of Southern

More information

A Comparative Study of Selected Classification Algorithms of Data Mining

A Comparative Study of Selected Classification Algorithms of Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.220

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks M.Phil Term 3 paper Department of Computer Science and Engineering The Chinese University of Hong Kong written by Edith

More information

Taxonomy Dimensions of Complexity Metrics

Taxonomy Dimensions of Complexity Metrics 96 Int'l Conf. Software Eng. Research and Practice SERP'15 Taxonomy Dimensions of Complexity Metrics Bouchaib Falah 1, Kenneth Magel 2 1 Al Akhawayn University, Ifrane, Morocco, 2 North Dakota State University,

More information

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200?

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? Questions from last time Avg. FB degree is 200 (suppose).

More information

IPMU July 2-7, 2006 Paris, France

IPMU July 2-7, 2006 Paris, France IPMU July 2-7, 2006 Paris, France Information Processing and Management of Uncertainty in Knowledge-Based Systems Conceptual Design and Implementation of the Salem Chakhar 1 and Abelkader Telmoudi 2 1

More information

Samsara: Honor Among Thieves in Peer-to-Peer Storage

Samsara: Honor Among Thieves in Peer-to-Peer Storage Samsara: Honor Among Thieves in Peer-to-Peer Storage Landon P. Cox, Brian D. Noble University of Michigan Presented by: Todd J. Green University of Pennsylvania March 30, 2004 1 Motivation A previous system

More information

Core Membership Computation for Succinct Representations of Coalitional Games

Core Membership Computation for Succinct Representations of Coalitional Games Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity

More information

Michele Gorgoglione Politecnico di Bari Viale Japigia, Bari (Italy)

Michele Gorgoglione Politecnico di Bari Viale Japigia, Bari (Italy) Does the recommendation task affect a CARS performance? Umberto Panniello Politecnico di Bari Viale Japigia, 82 726 Bari (Italy) +3985962765 m.gorgoglione@poliba.it Michele Gorgoglione Politecnico di Bari

More information

Robust Relevance-Based Language Models

Robust Relevance-Based Language Models Robust Relevance-Based Language Models Xiaoyan Li Department of Computer Science, Mount Holyoke College 50 College Street, South Hadley, MA 01075, USA Email: xli@mtholyoke.edu ABSTRACT We propose a new

More information

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. How to implement NIST Cybersecurity Framework using ISO 27001 WHITE PAPER Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

More information

Multi-path based Algorithms for Data Transfer in the Grid Environment

Multi-path based Algorithms for Data Transfer in the Grid Environment New Generation Computing, 28(2010)129-136 Ohmsha, Ltd. and Springer Multi-path based Algorithms for Data Transfer in the Grid Environment Muzhou XIONG 1,2, Dan CHEN 2,3, Hai JIN 1 and Song WU 1 1 School

More information

Confidence Intervals: Estimators

Confidence Intervals: Estimators Confidence Intervals: Estimators Point Estimate: a specific value at estimates a parameter e.g., best estimator of e population mean ( ) is a sample mean problem is at ere is no way to determine how close

More information

Collaborative Filtering using Euclidean Distance in Recommendation Engine

Collaborative Filtering using Euclidean Distance in Recommendation Engine Indian Journal of Science and Technology, Vol 9(37), DOI: 10.17485/ijst/2016/v9i37/102074, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Collaborative Filtering using Euclidean Distance

More information

POSTER: Point Cloud Lossless Compression

POSTER: Point Cloud Lossless Compression POSTER: Point Cloud Lossless Compression Koji Nishio Osaka Institute of Technology 1-79-1, Kitayama Hirakata, Osaka Japan(573-0196) nishio@is.oit.ac.jp Takayuki Kanaya Hiroshima International Univ. 555-36,

More information

International Research Journal of Engineering and Technology (IRJET) e-issn: Volume: 03 Issue: 04 Apr p-issn:

International Research Journal of Engineering and Technology (IRJET) e-issn: Volume: 03 Issue: 04 Apr p-issn: Online rating malicious user identification and calculating original score using detective TATA N.D.Sowmiya 1, S.Santhi 2 1 PG student, Department of computer science and engineering, Valliammai engineering

More information

Security Technologies for Dynamic Collaboration

Security Technologies for Dynamic Collaboration Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi

More information

CPSC 532L Project Development and Axiomatization of a Ranking System

CPSC 532L Project Development and Axiomatization of a Ranking System CPSC 532L Project Development and Axiomatization of a Ranking System Catherine Gamroth cgamroth@cs.ubc.ca Hammad Ali hammada@cs.ubc.ca April 22, 2009 Abstract Ranking systems are central to many internet

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

Towards a Comprehensive Testbed to Evaluate the Robustness of Reputation Systems against Unfair Rating Attacks

Towards a Comprehensive Testbed to Evaluate the Robustness of Reputation Systems against Unfair Rating Attacks Towards a Comprehensive Testbed to Evaluate the Robustness of Reputation Systems against Unfair Rating Attacks Athirai Aravazhi Irissappane, Phd student, IMI & SCE, NTU Supervisor: Assistant Professor

More information

Using semantic causality graphs to validate MAS models

Using semantic causality graphs to validate MAS models Using semantic causality graphs to validate MAS models Guillermo Vigueras 1, Jorge J. Gómez 2, Juan A. Botía 1 and Juan Pavón 2 1 Facultad de Informática Universidad de Murcia Spain 2 Facultad de Informática

More information

Project Report. An Introduction to Collaborative Filtering

Project Report. An Introduction to Collaborative Filtering Project Report An Introduction to Collaborative Filtering Siobhán Grayson 12254530 COMP30030 School of Computer Science and Informatics College of Engineering, Mathematical & Physical Sciences University

More information

Data Mining with Oracle 10g using Clustering and Classification Algorithms Nhamo Mdzingwa September 25, 2005

Data Mining with Oracle 10g using Clustering and Classification Algorithms Nhamo Mdzingwa September 25, 2005 Data Mining with Oracle 10g using Clustering and Classification Algorithms Nhamo Mdzingwa September 25, 2005 Abstract Deciding on which algorithm to use, in terms of which is the most effective and accurate

More information

VisoLink: A User-Centric Social Relationship Mining

VisoLink: A User-Centric Social Relationship Mining VisoLink: A User-Centric Social Relationship Mining Lisa Fan and Botang Li Department of Computer Science, University of Regina Regina, Saskatchewan S4S 0A2 Canada {fan, li269}@cs.uregina.ca Abstract.

More information

A Framework for Securing Databases from Intrusion Threats

A Framework for Securing Databases from Intrusion Threats A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:

More information

How to Navigate Getting IPv4 Addresses in a Post Run-Out World. Amy Potter

How to Navigate Getting IPv4 Addresses in a Post Run-Out World. Amy Potter How to Navigate Getting IPv4 Addresses in a Post Run-Out World Amy Potter Background Traditionally RIRs (and their predecessors) were the primary source of IPv4 addresses. Prior to the introduction of

More information

Second International Barometer of Security in SMBs

Second International Barometer of Security in SMBs 1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.

More information

The Global Cybercrime Industry

The Global Cybercrime Industry Nir Kshetri The Global Cybercrime Industry Economic, Institutional and Strategic Perspectives 4y Springer 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and

More information

Comparison of Recommender System Algorithms focusing on the New-Item and User-Bias Problem

Comparison of Recommender System Algorithms focusing on the New-Item and User-Bias Problem Comparison of Recommender System Algorithms focusing on the New-Item and User-Bias Problem Stefan Hauger 1, Karen H. L. Tso 2, and Lars Schmidt-Thieme 2 1 Department of Computer Science, University of

More information

The Interestingness Tool for Search in the Web

The Interestingness Tool for Search in the Web The Interestingness Tool for Search in the Web e-print, Gilad Amar and Ran Shaltiel Software Engineering Department, The Jerusalem College of Engineering Azrieli POB 3566, Jerusalem, 91035, Israel iaakov@jce.ac.il,

More information

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices*

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Rodrigo Román, M. Carmen Fernández-Gago, Javier López University of Málaga, Spain *(Wireless Sensor Networks) Contents

More information

Modelling User Preferences and Mediating Agents in Electronic Commerce

Modelling User Preferences and Mediating Agents in Electronic Commerce Modelling User Preferences and Mediating Agents in Electronic Commerce Mehdi Dastani *, Nico Jacobs +, Catholijn M. Jonker *, and Jan Treur * Department of Artificial Intelligence, Vrije Universiteit Amsterdam,

More information

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing Ashish Sharma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), 14, 51-55 Prevention of Black Hole Attack in Routing Algorithm of MANET Using Trust Based

More information

The Effect of Diversity Implementation on Precision in Multicriteria Collaborative Filtering

The Effect of Diversity Implementation on Precision in Multicriteria Collaborative Filtering The Effect of Diversity Implementation on Precision in Multicriteria Collaborative Filtering Wiranto Informatics Department Sebelas Maret University Surakarta, Indonesia Edi Winarko Department of Computer

More information

RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala Spandana* 1, Sesha Bhrgavi 2

RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala Spandana* 1, Sesha Bhrgavi 2 ISSN 2277-2685 IJESR/August 2015/ Vol-5/Issue-8/1126-1134 Teegala Spandana et.al.,/ International Journal of Engineering & Science Research RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala

More information

A Time-based Recommender System using Implicit Feedback

A Time-based Recommender System using Implicit Feedback A Time-based Recommender System using Implicit Feedback T. Q. Lee Department of Mobile Internet Dongyang Technical College Seoul, Korea Abstract - Recommender systems provide personalized recommendations

More information

THE EFFECT OF JOIN SELECTIVITIES ON OPTIMAL NESTING ORDER

THE EFFECT OF JOIN SELECTIVITIES ON OPTIMAL NESTING ORDER THE EFFECT OF JOIN SELECTIVITIES ON OPTIMAL NESTING ORDER Akhil Kumar and Michael Stonebraker EECS Department University of California Berkeley, Ca., 94720 Abstract A heuristic query optimizer must choose

More information

Technical Report CS : Incorporating Trust in Network Virtualization

Technical Report CS : Incorporating Trust in Network Virtualization Technical Report CS-2010-04: Incorporating Trust in Network Virtualization Loubna Mekouar University of Waterloo Waterloo, Canada lmekouar@bbcr.uwaterloo.ca Youssef Iraqi Khalifa University Sharjah, UAE

More information

User Contribution Measurement in Online Forum with Fraud Immunity

User Contribution Measurement in Online Forum with Fraud Immunity www.ijcsi.org 457 User Contribution Measurement in Online Forum with Fraud Immunity Guo-Ying WANG 1 and Shen-Ming QU 2 1 Information Engineering College, Zhejiang A&F University Hangzhou, 311300, China

More information

Usability Evaluation as a Component of the OPEN Development Framework

Usability Evaluation as a Component of the OPEN Development Framework Usability Evaluation as a Component of the OPEN Development Framework John Eklund Access Testing Centre and The University of Sydney 112 Alexander Street, Crows Nest NSW 2065 Australia johne@testingcentre.com

More information

Collaborative Filtering using Weighted BiPartite Graph Projection A Recommendation System for Yelp

Collaborative Filtering using Weighted BiPartite Graph Projection A Recommendation System for Yelp Collaborative Filtering using Weighted BiPartite Graph Projection A Recommendation System for Yelp Sumedh Sawant sumedh@stanford.edu Team 38 December 10, 2013 Abstract We implement a personal recommendation

More information

Best Customer Services among the E-Commerce Websites A Predictive Analysis

Best Customer Services among the E-Commerce Websites A Predictive Analysis www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issues 6 June 2016, Page No. 17088-17095 Best Customer Services among the E-Commerce Websites A Predictive

More information

A Constrained Spreading Activation Approach to Collaborative Filtering

A Constrained Spreading Activation Approach to Collaborative Filtering A Constrained Spreading Activation Approach to Collaborative Filtering Josephine Griffith 1, Colm O Riordan 1, and Humphrey Sorensen 2 1 Dept. of Information Technology, National University of Ireland,

More information

Personalized Information Retrieval by Using Adaptive User Profiling and Collaborative Filtering

Personalized Information Retrieval by Using Adaptive User Profiling and Collaborative Filtering Personalized Information Retrieval by Using Adaptive User Profiling and Collaborative Filtering Department of Computer Science & Engineering, Hanyang University {hcjeon,kimth}@cse.hanyang.ac.kr, jmchoi@hanyang.ac.kr

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

Recommender Systems (RSs)

Recommender Systems (RSs) Recommender Systems Recommender Systems (RSs) RSs are software tools providing suggestions for items to be of use to users, such as what items to buy, what music to listen to, or what online news to read

More information

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model Indian Journal of Science and Technology, Vol 8(20), DOI:10.17485/ijst/2015/v8i20/79311, August 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study of Future Internet Applications based on

More information

Norton s My First Device Report. October 2018

Norton s My First Device Report. October 2018 Norton s My First Device Report By October 2018 Methodology Norton s My First Device Report is an online survey of 6,986 parents aged 18+ years old, with children aged 5-16 across 10 markets, commissioned

More information

MAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds

MAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds MAE 298, Lecture 9 April 30, 2007 Web search and decentralized search on small-worlds Search for information Assume some resource of interest is stored at the vertices of a network: Web pages Files in

More information

IMPROVING THE RELEVANCY OF DOCUMENT SEARCH USING THE MULTI-TERM ADJACENCY KEYWORD-ORDER MODEL

IMPROVING THE RELEVANCY OF DOCUMENT SEARCH USING THE MULTI-TERM ADJACENCY KEYWORD-ORDER MODEL IMPROVING THE RELEVANCY OF DOCUMENT SEARCH USING THE MULTI-TERM ADJACENCY KEYWORD-ORDER MODEL Lim Bee Huang 1, Vimala Balakrishnan 2, Ram Gopal Raj 3 1,2 Department of Information System, 3 Department

More information

in Autonomic Communication: Trust and Reputation

in Autonomic Communication: Trust and Reputation Self-management in Autonomic Communication: Trust and Reputation Roberto Battiti University of Trento - Italy battiti@dit.unitn.it With contributions by Massacci,Koshutanski,Garg,, R. Battiti et al., Autonomic

More information

Relating Software Coupling Attribute and Security Vulnerability Attribute

Relating Software Coupling Attribute and Security Vulnerability Attribute Relating Software Coupling Attribute and Security Vulnerability Attribute Varadachari S. Ayanam, Frank Tsui, Sheryl Duggins, Andy Wang Southern Polytechnic State University Marietta, Georgia 30060 Abstract:

More information

Fausto Giunchiglia and Mattia Fumagalli

Fausto Giunchiglia and Mattia Fumagalli DISI - Via Sommarive 5-38123 Povo - Trento (Italy) http://disi.unitn.it FROM ER MODELS TO THE ENTITY MODEL Fausto Giunchiglia and Mattia Fumagalli Date (2014-October) Technical Report # DISI-14-014 From

More information

Math 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search

Math 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search Math 443/543 Graph Theory Notes 0: Small world phenomenon and decentralized search David Glickenstein November 0, 008 Small world phenomenon The small world phenomenon is the principle that all people

More information

Dependency detection with Bayesian Networks

Dependency detection with Bayesian Networks Dependency detection with Bayesian Networks M V Vikhreva Faculty of Computational Mathematics and Cybernetics, Lomonosov Moscow State University, Leninskie Gory, Moscow, 119991 Supervisor: A G Dyakonov

More information

Flight Systems are Cyber-Physical Systems

Flight Systems are Cyber-Physical Systems Flight Systems are Cyber-Physical Systems Dr. Christopher Landauer Software Systems Analysis Department The Aerospace Corporation Computer Science Division / Software Engineering Subdivision 08 November

More information

Using Machine Learning to Optimize Storage Systems

Using Machine Learning to Optimize Storage Systems Using Machine Learning to Optimize Storage Systems Dr. Kiran Gunnam 1 Outline 1. Overview 2. Building Flash Models using Logistic Regression. 3. Storage Object classification 4. Storage Allocation recommendation

More information