144 research outputs found

    Trust Strategies for the Semantic Web

    Get PDF
    Everyone agrees on the importance of enabling trust on the SemanticWebto ensure more efficient agent interaction. Current research on trust seems to focus on developing computational models, semantic representations, inference techniques, etc. However, little attention has been given to the plausible trust strategies or tactics that an agent can follow when interacting with other agents on the Semantic Web. In this paper we identify five most common strategies of trust and discuss their envisaged costs and benefits. The aim is to provide some guidelines to help system developers appreciate the risks and gains involved with each trust strategy

    TRULLO - local trust bootstrapping for ubiquitous devices

    Get PDF
    Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such content is growing rapidly and, from the perspective of each user, selecting relevant content is key. To this end, each user may run a trust model - a software agent that keeps track of who disseminates content that its user finds relevant. This agent does so by assigning an initial trust value to each producer for a specific category (context); then, whenever it receives new content, the agent rates the content and accordingly updates its trust value for the producer in the content category. However, a problem with such an approach is that, as the number of content categories increases, so does the number of trust values to be initially set. This paper focuses on how to effectively set initial trust values. The most sophisticated of the current solutions employ predefined context ontologies, using which initial trust in a given context is set based on that already held in similar contexts. However, universally accepted (and time invariant) ontologies are rarely found in practice. For this reason, we propose a mechanism called TRULLO (TRUst bootstrapping by Latently Lifting cOntext) that assigns initial trust values based only on local information (on the ratings of its user’s past experiences) and that, as such, does not rely on third-party recommendations. We evaluate the effectiveness of TRULLO by simulating its use in an informal antique market setting. We also evaluate the computational cost of a J2ME implementation of TRULLO on a mobile phone

    Knowledge society arguments revisited in the semantic technologies era

    No full text
    In the light of high profile governmental and international efforts to realise the knowledge society, I review the arguments made for and against it from a technology standpoint. I focus on advanced knowledge technologies with applications on a large scale and in open- ended environments like the World Wide Web and its ambitious extension, the Semantic Web. I argue for a greater role of social networks in a knowledge society and I explore the recent developments in mechanised trust, knowledge certification, and speculate on their blending with traditional societal institutions. These form the basis of a sketched roadmap for enabling technologies for a knowledge society

    Enhanced Internet Access in MANETs: A Robust and Efficient Gateway Detection Approach with Amplified Backing

    Get PDF
    When a certain gateway is connected to a significant number of mobile devices, the quality of service begins to decline. As a result, we propose that the number of mobile devices up to which a specific gateway performs well within expectations be identified, and that this number be referred to as the gateway's capacity. The capacity of each node should then be verified in the optimum gateway discovery protocol before connecting to the gateway for the best results. Trust-based systems might help protect decentralised, self-organized networks like dedicated cellular carriers and dedicated vehicle networks against insider attacks. To guard against external threats, A/V encryption and access control might be utilised. Cryptographic systems, for example, are prevention-focused

    Subjective Quality Assessments in Virtual Environments

    Get PDF
    Being able to make objective Quality of Service (QoS) judgments or assessments is a challenging and crucial activity. The process of making these assessments is compounded when the environment in which the assessments have to be made are virtual; in the sense the interacting parties might not have necessarily metwith each other physically. In a broad sense Quality of Service assessments could be broadly categorized into two areas, namely objective assessments and subjective assessments. In this paper, we propose a suite of metrics to carry out subjective quality assessment in a virtual environment

    State of the art review of the existing soft computing based approaches to trust and reputation computation

    Get PDF
    In this paper we present a state of the art review of PageRanktrade based approaches for trust and reputation computation. We divide the approaches that make use of PageRanktrade method for trust and reputation computation, into six different classes. Each of the six classes is discussed in this paper

    Confianza y reputaciĂłn de agentes en sistemas multiagente para entornos dinĂĄmicos

    Get PDF
    Esta línea de investigación se enfoca en el årea de confianza y reputación de agentes en sistemas multi-agente. Su objetivo general es el anålisis, desarrollo y formalización de la dinåmica de la confianza y reputación de los agentes, a partir de la interacción con sus pares en el marco de un sistema multi-agente (SMA). Esto involucra el desarrollo y formalización de técnicas de representación y actualización del grado de confianza y de reputación de un agente, y también, la integración de estas técnicas con mecanismos de razonamiento automåtico y dinåmica de creencias. En particular, se espera avanzar en el estudio y desarrollo de formalismos para aplicaciones de naturaleza dinåmica y distribuida, que combinen mecanismos de confianza, dinåmica de creencias y argumentación.Eje: Agentes y Sistemas Inteligentes.Red de Universidades con Carreras en Informåtica (RedUNCI
    • 

    corecore