Author of the publication

Trusting Evaluation by Social Reputation.

, , , and . IDC, volume 162 of Studies in Computational Intelligence, page 75-84. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effect of Topology on the Attachment Process in Trust Networks., , , and . IDC, volume 570 of Studies in Computational Intelligence, page 377-382. Springer, (2014)Using Twitter Data and Sentiment Analysis to Study Diseases Dynamics., , and . ITBAM, volume 9267 of Lecture Notes in Computer Science, page 16-24. Springer, (2015)Reliable peers and useful resources: Searching for the best personalised learning path in a trust- and recommendation-aware environment., , and . Inf. Sci., 180 (10): 1893-1907 (2010)Direct trust assignment using social reputation and aging., , , , and . J. Ambient Intell. Humaniz. Comput., 8 (2): 167-175 (2017)Hidden Schema Extraction in Web Documents., , and . DNIS, volume 2822 of Lecture Notes in Computer Science, page 42-52. Springer, (2003)Trust assessment: a personalized, distributed, and secure approach., , , and . Concurr. Comput. Pract. Exp., 24 (6): 605-617 (2012)Efficient Node PageRank Improvement via Link-building using Geometric Deep Learning., , , , and . ACM Trans. Knowl. Discov. Data, 17 (3): 38:1-38:22 (April 2023)Virtualization for Effective Risk-Free Network Security Assessment., , , and . Int. J. Online Eng., 10 (5): 21-28 (2014)Pick-up & Deliver in Maintenance Management of Renewable Energy Power Plants., , , , , , and . FedCSIS, volume 21 of Annals of Computer Science and Information Systems, page 579-585. (2020)Courses Modeling in E-learning Context., , , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 19-26. Springer, (2003)