لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
Guille, Adrien. _ Information diffusion in online social networks." Proceedings ...
Jiang, Wenjun, Guojun Wang, and Jie Wu. "Generating trusted graphs ...
De Meo, Pasquale, et al. "Trust and network ...
Golbeck, Jennifer Ann. "Computing and applying trust in web-based social ...
Chow, Wing S., and Lai Sheung Chan. "Social network, social ...
sharing." Information & Matnagement 45.7 (2008): 458-465. ...
Walter, Frank Edward, Stefano Battiston, and Frank Schweitzer. "A model ...
network." Autonomous Agents and Multi- Agent Systems 16.1 (2008): 57-74. ...
Valenzuela, Sebastian, Namsu Park, and Kerk F. Kee. "Is There ...
Mediated C ommunication 14.4 (2009): 875- 901. ...
Golbeck, Jennifer. "Combining provenance with trust in social networks for ...
Paul, Subharthi, Jianli Pan, and Raj Jain. 2 2 Arclhite ...
Zolfaghar, Kiyana, and Abdollal Aghaie. "Evolution of trust networks in ...
learning." Procedia (2011): 833-839 ...
Ma, Nan, et al. "Trust relationship prediction using online product ...
Getoor, Lise, and Christopher P. Diehl. "Link mining: ...
Explorations Newsletter 7.2 (2005): 3-12. ...
Chen, Mao, and Jaswinder Pal Singh. "Computing and using reputations ...
De Meo, Pasquale, et al. 2 _ _ commendation of ...
Scenario." Information Sciences181. (2011): 1285-1305. ...
Kim, Young Ae, and Rasik Phalak "A trust rating-based ...
experience sharing social networks without a web of trust." Information ...
Srinivasan, Avinash, et al. _ Reputati on-and- Ad ...
Networks." Algorithms and protocols for wireless and mobile ad hoc ...
M. Granovetter, The strength of weak ties: a network theory ...
S. Shekarpour, _ Katebi, Modeling and evaluation of trust with ...
Caverlee, James, Ling Liu, and Steve Webb. "The SocialTrust framework ...
algorithms. "Information (2010): 95-112. ...
Basheer, Ghusoon Salim, et al. "Certainty, trust and evidence Towards ...
systems." Computers in Human Behavior 45 (2015): 307-315. ...
Wu, Leanne, et al. "Analysis of social networking privacy policies. ...
Teacy, W. T., et al. "Coping with inaccurate reputation sources: ...
Tang, Qiang. "Towards Privacy-Pres erving C ommuni cation Protocols for ...
نمایش کامل مراجع