• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,730
Next 10 →

The EigenTrust Algorithm for Reputation Management in P2P Networks

by Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-molina - in Proceedings of the 12th International World Wide Web Conference (WWW 2003 , 2003
"... Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self ..."
Abstract - Cited by 997 (23 self) - Add to MetaCart
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self-replicating inauthentic files.

The EigenTrust Algorithm for Reputation Management in

by Networks Sepandar Kamvar, Sepandar D. Kamvar
"... Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of sel ..."
Abstract - Cited by 301 (2 self) - Add to MetaCart
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self-replicating inauthentic files. We describe an algorithm to decrease the number of downloads of inauthentic files in a peer-to-peer file-sharing network that assigns each peer a unique global trust value, based on the peer's history of uploads. We present a distributed and secure method to compute global trust values, based on Power iteration. By having peers use these global trust values to choose the peers from whom they download, the network effectively identifies malicious peers and isolates them from the network.

Detecting Deception in Reputation Management

by Bin Yu, Munindar P. Singh , 2003
"... We previously developed a social mechanism for distributed reputation management, in which an agent combines testimonies from several witnesses to determine its ratings of another agent. However, that approach does not fully protect against spurious ratings generated by malicious agents. This paper ..."
Abstract - Cited by 133 (3 self) - Add to MetaCart
We previously developed a social mechanism for distributed reputation management, in which an agent combines testimonies from several witnesses to determine its ratings of another agent. However, that approach does not fully protect against spurious ratings generated by malicious agents. This paper

Reputation Management

by Supervisor Allen Shaw, Cameron Hepburn , 2002
"... Except where otherwise stated and acknowledged, I certify that thesis is my sole and unaided work. ..."
Abstract - Cited by 13 (0 self) - Add to MetaCart
Except where otherwise stated and acknowledged, I certify that thesis is my sole and unaided work.

An Evidential Model of Distributed Reputation Management

by Bin Yu, Munindar P. Singh - In Proceedings of First International Joint Conference on Autonomous Agents and Multiagent Systems , 2002
"... For agents to function effectively in large and open networks, they must ensure that their correspondents, i.e., the agents they interact with, are trustworthy. Since no central authorities may exist, the only way agents can find trustworthy correspondents is by collaborating with others to identify ..."
Abstract - Cited by 178 (10 self) - Add to MetaCart
to identify those whose past behavior has been untrustworthy. In other words, finding trustworthy correspondents reduces to the problem of distributed reputation management. Our approach adapts the mathematical theory of evidence to represent and propagate the ratings that agents give to their correspondents

A Social Mechanism of Reputation Management in Electronic Communities

by Bin Yu, Munindar P. Singh - In Proceedings of Fourth International Workshop on Cooperative Information Agents , 2000
"... Trust is important wherever agents must interact. We consider the important case of interactions in electronic communities, where the agents assist and represent principal entities, such as people and businesses. We propose a social mechanism of reputation management, which aims at avoiding interact ..."
Abstract - Cited by 186 (5 self) - Add to MetaCart
Trust is important wherever agents must interact. We consider the important case of interactions in electronic communities, where the agents assist and represent principal entities, such as people and businesses. We propose a social mechanism of reputation management, which aims at avoiding

Corporate reputation Reputation management

by Anne Marie Males, The Scarborough Hospital, Grahame Dowling
"... A b s t r A c t ..."
Abstract - Add to MetaCart
A b s t r A c t

Distributed Reputation Management For Electronic Commerce

by Bin Yu, Munindar P. Singh , 2002
"... This paper considers the problem of automatically collecting ratings about a given party from others. Our approach involves a distributed agent architecture and adapts the mathematical theory of evidence to represent and propagate the ratings that participants give to each other. When evaluating ..."
Abstract - Cited by 88 (6 self) - Add to MetaCart
the trustworthiness of a given party, a peer combines its local evidence (based on direct prior interactions with the party) with the testimonies of others regarding the same party. This approach satisfies certain important properties of distributed reputation management and is experimentally evaluated through

Reputation Management Survey

by Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
"... Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the uncertainty and risk inherent in the environment. Reputation systems provide essential input for computational trust as pre ..."
Abstract - Cited by 26 (13 self) - Add to MetaCart
recommendation, 2) the selection and use of recommenders, and 3) the interpretation and reasoning applied to the gathered information. Although we find it possible to form a trusted reputation management network over an open network environment, there are still many regulatory and technical obstacles to address

Costs and Benefits of Reputation Management Systems

by Roberto G. Cascella
"... The specific objective of a reputation management system is to facilitate nodes to decide whom to trust before providing resources and the expected quality of service. In self-organized systems, the use of reputation-based mechanisms has a cost in terms of messages required to disseminate feedbacks ..."
Abstract - Add to MetaCart
The specific objective of a reputation management system is to facilitate nodes to decide whom to trust before providing resources and the expected quality of service. In self-organized systems, the use of reputation-based mechanisms has a cost in terms of messages required to disseminate feedbacks
Next 10 →
Results 1 - 10 of 1,730
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University