T9. Trust and reputation in multi-agent systemsEASSS 2012
The credibility model in ReGreT evaluates the credibility of witnesses in two ways:
1. Direct trust in the witness - The trust that the agent has directly in the witness based on its past interactions. This is calculated using the direct trust model.
2. Reliability of the witness' reputation value - This measures how reliable or volatile the reputation values provided by the witness tend to be. It is calculated based on the number of outcomes the witness has observed and the deviation in its ratings.
The credibility model combines these two factors - direct trust and reliability - to get an overall credibility value for each witness. This credibility value is then used to weight the reputation values provided by each witness. Witnesses with higher credibility will have
This document discusses cyber physical systems (CPS), which integrate computing systems with physical processes. It provides examples of CPS like shipping, healthcare, energy and smart grids. It discusses security issues that are unique to CPS compared to traditional IT systems, including availability, integrity and timeliness. The document outlines two real-world incidents involving CPS - the Stuxnet attack on Iran's nuclear facilities and the kAndyKAn3 worm attacking a toy factory. It also covers CPS components like sensors, PLCs and HMIs. In closing, it discusses design principles and open research questions around CPS security.
This document discusses RFID and the Internet of Things (IoT). It describes RFID as an automatic identification technology that uses radio waves to identify objects. The IoT allows physical objects to be connected to the internet and be remotely monitored and controlled. The architecture of an IoT system generally has three layers - a perception layer to collect data from sensors and RFID tags, a network layer to transmit the information, and a service layer to process and analyze the data. RFID has applications in various fields including healthcare, transportation, and access control. Challenges to the wider adoption of RFID include collision problems, security issues, and high tag costs.
A macro processor allows programmers to define macros, which are single line abbreviations for blocks of code. The macro processor performs macro expansion by replacing macro calls with the corresponding block of instructions defined in the macro. It uses a two pass approach, where the first pass identifies macro definitions and saves them to a table, and the second pass identifies macro calls and replaces them with the defined code, substituting any arguments.
Applications of IOT (internet of things)Vinesh Gowda
Smart homes are a top Internet of Things application, with over $2.5 billion in funding for startups creating connected home devices. Wearable devices are also popular, including smart watches and glasses that can be worn on the wrist or head. Smart cities use Internet of Things sensors to manage infrastructure like traffic and utilities more efficiently. The smart grid uses automated sensors and analytics to deliver power more reliably and reduce costs and emissions. Industrial Internet of Things aims to improve business operations through connected machinery and analytics.
States, state graphs and transition testingABHISHEK KUMAR
The document discusses finite state machines and state graphs. Some key points:
- State graphs can model software behavior using states, inputs that cause transitions between states, and outputs.
- States represent conditions or attributes of what is being modeled. Transitions between states are caused by inputs.
- State graphs can be represented as state tables for clarity, with rows for each state and columns for each input.
- Finite state machines are useful for software testing as they provide models of software structure and behavior to design tests against.
This slides will provide viewers a complete understanding of all the different virtualization techniques.
The main reference for the presentation is taken from Mastering cloud computing By Rajkumar Buyya.
T9. Trust and reputation in multi-agent systemsEASSS 2012
The credibility model in ReGreT evaluates the credibility of witnesses in two ways:
1. Direct trust in the witness - The trust that the agent has directly in the witness based on its past interactions. This is calculated using the direct trust model.
2. Reliability of the witness' reputation value - This measures how reliable or volatile the reputation values provided by the witness tend to be. It is calculated based on the number of outcomes the witness has observed and the deviation in its ratings.
The credibility model combines these two factors - direct trust and reliability - to get an overall credibility value for each witness. This credibility value is then used to weight the reputation values provided by each witness. Witnesses with higher credibility will have
This document discusses cyber physical systems (CPS), which integrate computing systems with physical processes. It provides examples of CPS like shipping, healthcare, energy and smart grids. It discusses security issues that are unique to CPS compared to traditional IT systems, including availability, integrity and timeliness. The document outlines two real-world incidents involving CPS - the Stuxnet attack on Iran's nuclear facilities and the kAndyKAn3 worm attacking a toy factory. It also covers CPS components like sensors, PLCs and HMIs. In closing, it discusses design principles and open research questions around CPS security.
This document discusses RFID and the Internet of Things (IoT). It describes RFID as an automatic identification technology that uses radio waves to identify objects. The IoT allows physical objects to be connected to the internet and be remotely monitored and controlled. The architecture of an IoT system generally has three layers - a perception layer to collect data from sensors and RFID tags, a network layer to transmit the information, and a service layer to process and analyze the data. RFID has applications in various fields including healthcare, transportation, and access control. Challenges to the wider adoption of RFID include collision problems, security issues, and high tag costs.
A macro processor allows programmers to define macros, which are single line abbreviations for blocks of code. The macro processor performs macro expansion by replacing macro calls with the corresponding block of instructions defined in the macro. It uses a two pass approach, where the first pass identifies macro definitions and saves them to a table, and the second pass identifies macro calls and replaces them with the defined code, substituting any arguments.
Applications of IOT (internet of things)Vinesh Gowda
Smart homes are a top Internet of Things application, with over $2.5 billion in funding for startups creating connected home devices. Wearable devices are also popular, including smart watches and glasses that can be worn on the wrist or head. Smart cities use Internet of Things sensors to manage infrastructure like traffic and utilities more efficiently. The smart grid uses automated sensors and analytics to deliver power more reliably and reduce costs and emissions. Industrial Internet of Things aims to improve business operations through connected machinery and analytics.
States, state graphs and transition testingABHISHEK KUMAR
The document discusses finite state machines and state graphs. Some key points:
- State graphs can model software behavior using states, inputs that cause transitions between states, and outputs.
- States represent conditions or attributes of what is being modeled. Transitions between states are caused by inputs.
- State graphs can be represented as state tables for clarity, with rows for each state and columns for each input.
- Finite state machines are useful for software testing as they provide models of software structure and behavior to design tests against.
This slides will provide viewers a complete understanding of all the different virtualization techniques.
The main reference for the presentation is taken from Mastering cloud computing By Rajkumar Buyya.
Fuzzy inference systems use fuzzy logic to map inputs to outputs. There are two main types:
Mamdani systems use fuzzy outputs and are well-suited for problems involving human expert knowledge. Sugeno systems have faster computation using linear or constant outputs.
The fuzzy inference process involves fuzzifying inputs, applying fuzzy logic operators, and using if-then rules. Outputs are determined through implication, aggregation, and defuzzification. Mamdani systems find the centroid of fuzzy outputs while Sugeno uses weighted averages, making it more efficient.
Feng's Classification from 1972 classified computer architectures based on their degree of parallelism. It defined the maximum degree of parallelism P as the maximum number of bits that can be processed within a unit of time. Architectures were classified into four categories based on whether processing occurred at the word and bit level serially or in parallel: word serial/bit serial, word parallel/bit serial, word serial/bit parallel, and word parallel/bit parallel. The degree of parallelism P is calculated as the product of the number of bits in a word and the number of words processed in parallel.
The document discusses digital principles and computer organization topics such as Karnaugh maps, universal gates, don't care conditions, NOR and decoder operations, combinational circuits, priority and binary encoders, modeling techniques in HDL, half and full adders/subtractors, carry propagation delay, ring counters, propagation delay, T and JK flip-flop operations, state assignment, shift register applications, differences between synchronous and asynchronous circuits, and classifications of sequential circuits. Key concepts covered include limitations of K-maps, universal properties of NAND and NOR gates, don't care conditions in logic circuits, truth tables for NOR operation, definitions of combinational circuits and encoders/decoders, modeling approaches in HDL, definitions and differences of
Client/server computing involves separating tasks between client and server machines. The client makes requests that are processed by the server, which returns results to the client. Key elements are the client, server, and network connecting them. Major focus is on the software handling tasks like the user interface, application logic, and data management between client and server. Different types of servers specialize in files, data, computing tasks, databases, and communication between networks.
The document discusses timing and control in basic computers. It describes two types of control organizations: hardwired control and microprogram control. Hardwired control implements control logic with gates and flip-flops, allowing for fast operation. Microprogram control stores control information in a control memory that programs required microoperations. The document also provides details on the components and functioning of a hardwired control unit, including an instruction register, control logic gates, decoders, and sequence counter used to control the timing of registers based on clock pulses.
This document discusses IoT networking and quality of service (QoS) for IoT networks. It begins by describing the characteristics of IoT devices such as low processing power, small size, and energy constraints. It then discusses enabling the classical Internet for IoT devices through standards developed by the IETF, including 6LoWPAN, ROLL, and CoRE. CoRE provides a framework for IoT applications and services discovery. The document concludes by examining policies for QoS in IoT networks to guarantee intended service, covering resource utilization, data timeliness, availability, and delivery.
Translation of a program written in a source language into a semantically equivalent program written in a target language
It also reports to its users the presence of errors in the source program
Part picking robot is an example of an Intelligent Agent. And this presentation is based on Part picking robot. Which is part of Artificial Intelligence.
Description of all types of Loaders from System programming subjects.
eg. Compile-Go Loader
General Loader
Absolute Loader
Relocating Loader
Practical Relocating Loader
Linking Loader
Linker Vs. Loader
general relocatable loader
Integration of Sensors & Actuators With Arduino.pptxNShravani1
Integration of Sensors & Actuators with Arduino discusses the fundamentals of connecting sensors and actuators to an Arduino board for Internet of Things applications. Sensors can detect changes in the environment and send that data to the Arduino, while actuators allow the Arduino to interact with and control the physical world based on sensor readings or external commands. The presentation provides an overview of common sensors and actuators used in IoT and how to interface them with an Arduino.
The document discusses VC dimension in machine learning. It introduces the concept of VC dimension as a measure of the capacity or complexity of a set of functions used in a statistical binary classification algorithm. VC dimension is defined as the largest number of points that can be shattered, or classified correctly, by the algorithm. The document notes that test error is related to both training error and model complexity, which can be measured by VC dimension. A low VC dimension or large training set size can help reduce the gap between training and test error.
The document discusses three types of agents: goal based agents, utility based agents, and learning agents. Goal based agents use goal information to find the right action to reach a desirable situation. Utility based agents choose actions that maximize expected utility by mapping states to numbers representing happiness. Learning agents can learn from their experiences, analyze performance, and improve tasks over time with feedback from a critic and improvements from a learning element.
Knowledge representation and Predicate logicAmey Kerkar
1. The document discusses knowledge representation and predicate logic.
2. It explains that knowledge representation involves representing facts through internal representations that can then be manipulated to derive new knowledge. Predicate logic allows representing objects and relationships between them using predicates, quantifiers, and logical connectives.
3. Several examples are provided to demonstrate representing simple facts about individuals as predicates and using quantifiers like "forall" and "there exists" to represent generalized statements.
The document outlines a syllabus for an Internet of Things Technology course. It includes 5 modules that will be covered over the semester. Evaluation will consist of 3 internal assessments weighted at 30%, 40%, and 30% respectively, covering different portions of the syllabus. Students must attain a minimum of 85% attendance and assignments will be due before each internal assessment. The class website and online testing platform are also indicated.
This document discusses fuzzy rule-based classification systems. There are three types of rules that can be formed: assignment statements, conditional statements, and unconditional statements. A fuzzy inference system uses a rule base of fuzzy rules to perform fuzzy reasoning and mapping of fuzzy inputs to outputs. The key components of a fuzzy inference system are fuzzification of inputs, a rule base, an inference engine, and defuzzification of outputs. Fuzzy rule-based systems find application in decision making problems.
This document describes a pack-rafting trip through Patagonia in Chile in 2011. It provides details about a wilderness adventure organized by DeepDeep Wilderness Adventure. The trip involved hiking and rafting through remote areas of Patagonia over multiple days.
The document lists 8 statements and asks the reader to determine whether each one is true or false. It covers topics such as which animal is more dangerous, the color and healthiness of eggs, the relative temperatures of Earth and Mars, coffee and tea popularity in the UK, swimming abilities of tigers and cats, height variations throughout the day, car safety by color, and usage of the words "yes" and "no". The reader is prompted to consider the accuracy of each statement.
Fuzzy inference systems use fuzzy logic to map inputs to outputs. There are two main types:
Mamdani systems use fuzzy outputs and are well-suited for problems involving human expert knowledge. Sugeno systems have faster computation using linear or constant outputs.
The fuzzy inference process involves fuzzifying inputs, applying fuzzy logic operators, and using if-then rules. Outputs are determined through implication, aggregation, and defuzzification. Mamdani systems find the centroid of fuzzy outputs while Sugeno uses weighted averages, making it more efficient.
Feng's Classification from 1972 classified computer architectures based on their degree of parallelism. It defined the maximum degree of parallelism P as the maximum number of bits that can be processed within a unit of time. Architectures were classified into four categories based on whether processing occurred at the word and bit level serially or in parallel: word serial/bit serial, word parallel/bit serial, word serial/bit parallel, and word parallel/bit parallel. The degree of parallelism P is calculated as the product of the number of bits in a word and the number of words processed in parallel.
The document discusses digital principles and computer organization topics such as Karnaugh maps, universal gates, don't care conditions, NOR and decoder operations, combinational circuits, priority and binary encoders, modeling techniques in HDL, half and full adders/subtractors, carry propagation delay, ring counters, propagation delay, T and JK flip-flop operations, state assignment, shift register applications, differences between synchronous and asynchronous circuits, and classifications of sequential circuits. Key concepts covered include limitations of K-maps, universal properties of NAND and NOR gates, don't care conditions in logic circuits, truth tables for NOR operation, definitions of combinational circuits and encoders/decoders, modeling approaches in HDL, definitions and differences of
Client/server computing involves separating tasks between client and server machines. The client makes requests that are processed by the server, which returns results to the client. Key elements are the client, server, and network connecting them. Major focus is on the software handling tasks like the user interface, application logic, and data management between client and server. Different types of servers specialize in files, data, computing tasks, databases, and communication between networks.
The document discusses timing and control in basic computers. It describes two types of control organizations: hardwired control and microprogram control. Hardwired control implements control logic with gates and flip-flops, allowing for fast operation. Microprogram control stores control information in a control memory that programs required microoperations. The document also provides details on the components and functioning of a hardwired control unit, including an instruction register, control logic gates, decoders, and sequence counter used to control the timing of registers based on clock pulses.
This document discusses IoT networking and quality of service (QoS) for IoT networks. It begins by describing the characteristics of IoT devices such as low processing power, small size, and energy constraints. It then discusses enabling the classical Internet for IoT devices through standards developed by the IETF, including 6LoWPAN, ROLL, and CoRE. CoRE provides a framework for IoT applications and services discovery. The document concludes by examining policies for QoS in IoT networks to guarantee intended service, covering resource utilization, data timeliness, availability, and delivery.
Translation of a program written in a source language into a semantically equivalent program written in a target language
It also reports to its users the presence of errors in the source program
Part picking robot is an example of an Intelligent Agent. And this presentation is based on Part picking robot. Which is part of Artificial Intelligence.
Description of all types of Loaders from System programming subjects.
eg. Compile-Go Loader
General Loader
Absolute Loader
Relocating Loader
Practical Relocating Loader
Linking Loader
Linker Vs. Loader
general relocatable loader
Integration of Sensors & Actuators With Arduino.pptxNShravani1
Integration of Sensors & Actuators with Arduino discusses the fundamentals of connecting sensors and actuators to an Arduino board for Internet of Things applications. Sensors can detect changes in the environment and send that data to the Arduino, while actuators allow the Arduino to interact with and control the physical world based on sensor readings or external commands. The presentation provides an overview of common sensors and actuators used in IoT and how to interface them with an Arduino.
The document discusses VC dimension in machine learning. It introduces the concept of VC dimension as a measure of the capacity or complexity of a set of functions used in a statistical binary classification algorithm. VC dimension is defined as the largest number of points that can be shattered, or classified correctly, by the algorithm. The document notes that test error is related to both training error and model complexity, which can be measured by VC dimension. A low VC dimension or large training set size can help reduce the gap between training and test error.
The document discusses three types of agents: goal based agents, utility based agents, and learning agents. Goal based agents use goal information to find the right action to reach a desirable situation. Utility based agents choose actions that maximize expected utility by mapping states to numbers representing happiness. Learning agents can learn from their experiences, analyze performance, and improve tasks over time with feedback from a critic and improvements from a learning element.
Knowledge representation and Predicate logicAmey Kerkar
1. The document discusses knowledge representation and predicate logic.
2. It explains that knowledge representation involves representing facts through internal representations that can then be manipulated to derive new knowledge. Predicate logic allows representing objects and relationships between them using predicates, quantifiers, and logical connectives.
3. Several examples are provided to demonstrate representing simple facts about individuals as predicates and using quantifiers like "forall" and "there exists" to represent generalized statements.
The document outlines a syllabus for an Internet of Things Technology course. It includes 5 modules that will be covered over the semester. Evaluation will consist of 3 internal assessments weighted at 30%, 40%, and 30% respectively, covering different portions of the syllabus. Students must attain a minimum of 85% attendance and assignments will be due before each internal assessment. The class website and online testing platform are also indicated.
This document discusses fuzzy rule-based classification systems. There are three types of rules that can be formed: assignment statements, conditional statements, and unconditional statements. A fuzzy inference system uses a rule base of fuzzy rules to perform fuzzy reasoning and mapping of fuzzy inputs to outputs. The key components of a fuzzy inference system are fuzzification of inputs, a rule base, an inference engine, and defuzzification of outputs. Fuzzy rule-based systems find application in decision making problems.
This document describes a pack-rafting trip through Patagonia in Chile in 2011. It provides details about a wilderness adventure organized by DeepDeep Wilderness Adventure. The trip involved hiking and rafting through remote areas of Patagonia over multiple days.
The document lists 8 statements and asks the reader to determine whether each one is true or false. It covers topics such as which animal is more dangerous, the color and healthiness of eggs, the relative temperatures of Earth and Mars, coffee and tea popularity in the UK, swimming abilities of tigers and cats, height variations throughout the day, car safety by color, and usage of the words "yes" and "no". The reader is prompted to consider the accuracy of each statement.
The document discusses marketing strategies to broaden the appeal of MBT shoes to fitness enthusiasts. It profiles the "Fitness Fanatic" demographic as highly health-conscious individuals who exercise frequently and are willing to invest in products supporting an active lifestyle. The proposed plan targets this group through magazine, online, mobile and outdoor advertising emphasizing how MBT shoes allow workouts even during daily activities. Calculations show the multi-channel campaign would achieve over 480 adjusted GRPs, exceeding the goal of 432 GRPs.
The document describes Cisco's Collaboration Solutions Mid-Market Package which provides a three-step process for partners to sell, design, and deploy Cisco's Business Edition 6000 collaboration solutions. The process includes learning tools on top ways to sell, preferred architecture guides, and Cisco Validated Design guides. It is intended to deliver an excellent learning tool, build confidence, and potentially help with sales for partners and Cisco generalist systems engineers.
This document provides an overview of a library and information research skills course. It includes the instructor's contact information, office hours, and course objectives and structure. The course will teach students to be information competent by developing skills in critically evaluating information, understanding legal and ethical issues, and identifying and utilizing appropriate resources. Key assignments include weekly tutorials, discussions, and skills assessments that build toward a final research project. Important due dates are noted.
NoodleTools for Students - Works Cited List - Fall 2016mkinneyccclib
NoodleTools is a citation and research organization tool that helps students create bibliographies and stay organized to prevent plagiarism. It allows users to save sources, create a working bibliography, take notes on notecards, and organize notes into piles and tags. Students can create outlines and essays using the organized information. The document provides instructions on setting up a NoodleTools account, adding and citing sources, sharing projects with instructors, copying sources between projects, reading instructor comments, and formatting bibliographies to export into word processing programs.
This newsletter provides information about an upcoming 7th grade language arts unit on comparing versions of Cinderella from different cultures. Students will explore cultures from Africa and China, compare their versions of Cinderella, and work in groups to create their own holiday that incorporates cultural elements. The unit aims to help students understand other cultures and develop collaboration, communication, and critical thinking skills.
This document provides an overview of the deep web and government resources available in the deep web. It defines the deep web as dynamically generated websites that are not found by standard search engines. It then discusses key findings from a 2000 study that estimated the deep web is 400-550 times larger than the surface web. The document then provides an overview of the three branches of government at the federal, state, and local levels and examples of deep web resources within each, such as federal agency websites, state statutes and court records, and local ordinances.
1. Instrument breakage is caused by fatigue from repetitive compression and tension during rotation, and torsion when different parts of the file rotate at different rates.
2. The risk of instrument breakage increases with larger diameter, higher taper, greater curvature, longer time in canal, and more engagement of the file surface in the canal. No more than 6mm of a file should be engaged if in a curvature.
3. More efficient cutting instruments require less torque, pressure, and time to shape canals. Positive cutting angles are more efficient than negative angles. Instrument design, including cutting edges and lands, affects cutting ability and centering.
Muhammad Yunus is a Bangladeshi banker and economist who pioneered microcredit and microfinance. He founded Grameen Bank in 1983, which provides small loans known as microcredit to poor entrepreneurs and small businesses without requiring collateral. Yunus and Grameen Bank were awarded the Nobel Peace Prize in 2006 for their efforts to create economic and social development from below through microcredit.
This document outlines a business plan for a new niche magazine called "Mu-Zu" focused on Japanese culture. It discusses targeting affluent customers interested in worldly topics through rich storytelling and photography. The plan estimates costs of $10.6 million for the first year including printing, staffing a Tokyo bureau, and marketing. It projects breaking even in year one through subscriptions, newsstand sales, advertising, and trend consulting work. Year two projections estimate $7.35 million in customer revenue and $3.61 million in advertising for a 3% ROI without consulting work and 13% ROI including a goal of $1.29 million in trend consulting.
The document discusses ways for the Federal Reserve to improve its relationship with the public through greater transparency, communication and engagement. It proposes creating a consumer outreach program called "Federal Reserve Consumer Outreach" that would develop easily understandable educational content targeted to different life stages and distributed through various media channels, social media, and advertising. The goal is to create a financially well-informed public and support the Fed's mandate of maximum employment, stable prices and moderate long-term interest rates.
The document presents 8 statements and asks the reader to determine whether each one is true or false. Specifically, it considers whether mosquitoes are more dangerous than sharks, brown eggs are healthier than white eggs, the Earth is hotter than Mars, coffee is more popular than tea in the UK, tigers are better swimmers than cats, adults are shorter in the morning than the evening, white cars are safer than yellow cars, and the word "yes" is more common than the word "no."
This document presents a trust model for peer-to-peer networks that aims to mitigate attacks from malicious peers. It defines two contexts to measure trustworthiness: service and recommendation. Peers calculate trust values for other peers based on past interactions and recommendations from acquaintances. The model includes metrics for service trust, reputation, and recommendation trust to enable peers to assess the trustworthiness of others in their network based on local information.
Iaetsd organizing the trust model in peer-to-peer system usingIaetsd Iaetsd
1) The document proposes a Self-Organizing Trust (SORT) model to organize trust relationships in peer-to-peer systems. SORT uses trust metrics like reputation, service trust, and recommendation trust to measure peer trustworthiness based on services provided and recommendations given.
2) Peers in SORT initially know nothing about each other. Interactions build acquaintances, and recommendations from acquaintances are evaluated based on their trustworthiness. Service and recommendation contexts separately track interaction and recommendation histories.
3) Experiments on a file sharing application show SORT can help peers identify and isolate malicious peers based on local trust information, defending against various attacks even without global trust data.
Investment banking reputation market research - restoring trust in the financ...George Tsakraklides
This document discusses building and maintaining trust with various stakeholders. It identifies shareholders, investors, regulators, media, analysts, lobbying groups, and employees as key stakeholders and examines what trust means to each group. The document proposes conducting research including a quantitative survey and qualitative interviews to understand stakeholders' perspectives on trust, what breaks trust, and what can restore it. The goals are to develop a communications strategy to bolster the organization's reputation by leveraging insights about trust from different audiences.
Report shows the interdependence of various source of hires and how organisations should recognise that candidates are usually influenced not by a single source anymore.
Credit ratings are issued by credit rating agencies and represent their opinion on the likelihood that a debtor will default on their debt obligations. The ratings are determined after evaluating factors such as the issuer's financial history and strength of assets. Common credit ratings use letter or number symbols to convey the agency's assessment of default risk, from AAA/Aaa (highest safety) to D (already in default). Credit ratings provide investors with an independent evaluation of risk to help inform their investment decisions.
This document provides information about credit rating agencies (CRAs) in India. It discusses the key CRAs operating in India - CRISIL, ICRA, CARE, and Duff & Phelps. It outlines the credit rating process, including data gathering, management meetings, rating committee assignment, publication, and ongoing surveillance. It also discusses the importance of CRAs in helping investors assess risk and helping companies raise capital, as well as how CRAs are regulated in India by the Securities and Exchange Board of India (SEBI).
This document provides information about credit rating agencies (CRAs) in India. It discusses the key CRAs operating in India - CRISIL, ICRA, CARE, and Duff & Phelps. It outlines the credit rating process, including data gathering, management meetings, rating committee assignment, publication, and ongoing surveillance. It also discusses the importance of CRAs in helping investors assess risk and helping companies access financing. The regulator SEBI lays down governance guidelines for CRAs in India.
BrandsLab Market Intelligence Session 1 | Is your Reputation oin the Line?Ebiquity-NA
The document discusses measuring and analyzing corporate reputation. It provides an overview of Judy Bromley's presentation on reputation measurement and analysis. The presentation covers defining reputation attributes, researching stakeholder perceptions, diagnosing reputation strengths and weaknesses compared to competitors, and developing solutions to improve reputation over time by changing behaviors, messaging, and stakeholder engagement. It also provides examples of reputation analyses conducted for global companies.
Credit ratings are evaluations of an entity's ability to meet financial obligations. They are issued by credit rating agencies and estimate creditworthiness based on factors like financial history, assets, liabilities, management, and industry prospects. Credit ratings use letter symbols like AAA to D, with AAA being the highest rating and D the lowest. They provide guidance to investors and encourage disclosure. Major global credit rating agencies include Moody's, S&P, and Fitch while major Indian agencies are CRISIL, ICRA, and CARE. Credit ratings benefit both investors by informing decisions and companies by potentially lowering borrowing costs. However, ratings also have disadvantages like potential bias, misrepresentation, or not reflecting changing conditions.
The document explores the concept of trust in informal venture capital investment decisions. It finds that business angels primarily rely on calculus-based trust when initially screening opportunities, assessing factors like risk, utility, and entrepreneur competence. While the coordinator plays a role in enabling swift trust, further research is needed on how knowledge-based and identification-based trust become more important later in the investment process as relationships develop. The framework of swift trust appears useful for understanding the interplay between trust and cooperation in informal investment decisions.
This document summarizes the findings of a survey of Canadian investors on fees, advisory services, and disclosure. Key findings include:
- Most investors rely on advisors at least somewhat and advised investors tend to have higher satisfaction with performance and investment options.
- While some investors raised concerns about conflicts of interest and fees, most advised investors gave their advisors high satisfaction ratings.
- Disclosure and reporting has improved according to many investors, though awareness of new requirements is still low.
- Knowledge of fees varies, with many only somewhat familiar, and awareness of trailing commissions is also moderate.
Източници за намиране на работа - проучване на CareeXroads (Sources of hire 2...Nikola Tzokev
Източници за намиране на работа - проучване на CareeXroads (Sources of hire 2013)
Проучването показва, че едва 18% от назначените през 2012 г. американци са намерили работата си чрез сайтове за работа от типа на jobs.bg. От Jobvite добавят, че тенденцията е низходяща, т.е. делът на наетите чрез тях ще продължи да намалява.
Начин за намиране на работа №1 е препоръката от познат, който работи във фирмата, търсеща служител. Той е подействал за 24.5% от наетите през 2012 г. в САЩ.
23.4% от наетите са кандидатствали чрез сайта на компанията, в която са искали да постъпят на работа.
A qualitative reputation system for multiagent systems with protocol-based co...Emilio Serrano
The document proposes a qualitative reputation system for multiagent systems that uses context mining of previous agent interactions. It builds models from interaction data to evaluate agents' behaviors. The reputation system allows agents to query these context models to assess other agents. It was tested in a case study of a car selling domain and showed higher accuracy than quantitative methods. Future work could explore more advanced data mining techniques and comparison to other trust approaches.
The document proposes a computational dynamic trust model for user authorization that is rooted in social science findings. Unlike existing models, it distinguishes between trusting beliefs in integrity and competence in different contexts. It also accounts for subjectivity in trust evaluations. Simulation experiments showed the proposed integrity belief model achieved better performance than other models, especially in predicting behaviors of unstable users. The model separates beliefs in competence and integrity, uses contexts, and builds trust through direct experience and recommendations while accounting for subjectivity.
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONnexgentechnology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...Nexgen Technology
This document proposes a computational dynamic trust model for user authorization. The model distinguishes trusting belief in integrity from competence. Unlike other trust models, it accounts for subjectivity in trust ratings between different entities. The model was tested against other trust models in simulations, showing it better predicts behaviors of unstable users. Key contributions are that the model is rooted in social science findings on trust, separates integrity and competence trust, and addresses subjectivity in reputation aggregation.
The document discusses using 360 degree evaluation methods in employee evaluations. It defines 360 degree feedback as evaluating an employee from multiple sources including peers, direct reports, supervisors, and customers. The document outlines several pros and cons of the 360 degree method, such as obtaining different perspectives, increasing employee accountability, and potential issues with rater bias. It provides guidance on implementing 360 degree evaluations, including developing appropriate questions, ensuring rater anonymity, and giving feedback to raters to maintain trust in the process.
Similar to Trust and reputation models among agents (20)
Carrer goals.pptx and their importance in real lifeartemacademy2
Career goals serve as a roadmap for individuals, guiding them toward achieving long-term professional aspirations and personal fulfillment. Establishing clear career goals enables professionals to focus their efforts on developing specific skills, gaining relevant experience, and making strategic decisions that align with their desired career trajectory. By setting both short-term and long-term objectives, individuals can systematically track their progress, make necessary adjustments, and stay motivated. Short-term goals often include acquiring new qualifications, mastering particular competencies, or securing a specific role, while long-term goals might encompass reaching executive positions, becoming industry experts, or launching entrepreneurial ventures.
Moreover, having well-defined career goals fosters a sense of purpose and direction, enhancing job satisfaction and overall productivity. It encourages continuous learning and adaptation, as professionals remain attuned to industry trends and evolving job market demands. Career goals also facilitate better time management and resource allocation, as individuals prioritize tasks and opportunities that advance their professional growth. In addition, articulating career goals can aid in networking and mentorship, as it allows individuals to communicate their aspirations clearly to potential mentors, colleagues, and employers, thereby opening doors to valuable guidance and support. Ultimately, career goals are integral to personal and professional development, driving individuals toward sustained success and fulfillment in their chosen fields.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
This presentation by Professor Alex Robson, Deputy Chair of Australia’s Productivity Commission, was made during the discussion “Competition and Regulation in Professions and Occupations” held at the 77th meeting of the OECD Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found at oe.cd/crps.
This presentation was uploaded with the author’s consent.
XP 2024 presentation: A New Look to Leadershipsamililja
Presentation slides from XP2024 conference, Bolzano IT. The slides describe a new view to leadership and combines it with anthro-complexity (aka cynefin).
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...SkillCertProExams
• For a full set of 760+ questions. Go to
https://skillcertpro.com/product/databricks-certified-data-engineer-associate-exam-questions/
• SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
• It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
• SkillCertPro updates exam questions every 2 weeks.
• You will get life time access and life time free updates
• SkillCertPro assures 100% pass guarantee in first attempt.
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsRosie Wells
Insight: In a landscape where traditional narrative structures are giving way to fragmented and non-linear forms of storytelling, there lies immense potential for creativity and exploration.
'Collapsing Narratives: Exploring Non-Linearity' is a micro report from Rosie Wells.
Rosie Wells is an Arts & Cultural Strategist uniquely positioned at the intersection of grassroots and mainstream storytelling.
Their work is focused on developing meaningful and lasting connections that can drive social change.
Please download this presentation to enjoy the hyperlinks!
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij
This is a workshop about communication and collaboration. We will experience how we can analyze the reasons for resistance to change (exercise 1) and practice how to improve our conversation style and be more in control and effective in the way we communicate (exercise 2).
This session will use Dave Gray’s Empathy Mapping, Argyris’ Ladder of Inference and The Four Rs from Agile Conversations (Squirrel and Fredrick).
Abstract:
Let’s talk about powerful conversations! We all know how to lead a constructive conversation, right? Then why is it so difficult to have those conversations with people at work, especially those in powerful positions that show resistance to change?
Learning to control and direct conversations takes understanding and practice.
We can combine our innate empathy with our analytical skills to gain a deeper understanding of complex situations at work. Join this session to learn how to prepare for difficult conversations and how to improve our agile conversations in order to be more influential without power. We will use Dave Gray’s Empathy Mapping, Argyris’ Ladder of Inference and The Four Rs from Agile Conversations (Squirrel and Fredrick).
In the session you will experience how preparing and reflecting on your conversation can help you be more influential at work. You will learn how to communicate more effectively with the people needed to achieve positive change. You will leave with a self-revised version of a difficult conversation and a practical model to use when you get back to work.
Come learn more on how to become a real influencer!
This presentation by OECD, OECD Secretariat, was made during the discussion “Competition and Regulation in Professions and Occupations” held at the 77th meeting of the OECD Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Trust and reputation models among agents
1. Nick Bassiliades
Intelligent Systems group,
Software Engineering, Web and Intelligent Systems Lab,
Dept. Informatics, Aristotle University of Thessaloniki, Greece
Invited talk at
6th International Conference on Integrated Information
Sep 19-22, 2016, Athens, Greece
2. Introduction
Review of State-of-the-Art on Trust / Reputation Models
Centralized approaches
Distributed approaches
Hybrid approaches
Presenter’s work on Trust / Reputation Models
T-REX
HARM
DISARM
Summary / Conclusions
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 2
3. Agents are supposed to act in open and risky environments
(e.g. Web) with limited or no human intervention
Making the appropriate decision about who to trust in order to
interact with is necessary but challenging
Trust and reputation are key elements in the design and
implementation of multi-agent systems
Trust is expectation or belief that a party will act benignly and
cooperatively with the trusting party
Reputation is the opinion of the public towards an agent, based
on past experiences of interacting with the agent
Reputation is used to quantify trust
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 3
4. Interaction trust: agent’s own direct experience from past
interactions (aka reliability)
- Requires a long time to reach a satisfying estimation level
When no history of interactions with other agents in a new environment
Witness reputation: reports of witnesses about an agent’s
behavior, provided by other agents
- Does not guarantee reliable estimation
Are self-interested agents willing to share information?
How much can you trust the informer?
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 4
5. Centralized approach:
One or more centralized trust authorities keep agent interaction
references (ratings) and give trust estimations
Convenient for witness reputation models (e.g. eBay, SPORAS, etc.)
+ Simpler to implement; better and faster trust estimations
- Less reliable; Unrealistic: hard to enforce central controlling
authorities in open environments
Decentralized (distributed) approach:
Each agent keeps its own interaction references with other agents
and must estimate on its own the trust upon another agent
Convenient for interaction trust models
+ Robustness: no single point of failure; more realistic
- Need more complex interaction protocols
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 5
6. Hybrid models: Combination of Interaction Trust and Witness
Reputation
Regret / Social Regret
FIRE
RRAF / TRR
CRM
T-REX / HARM / DISARM
Certified reputation: third-party references provided by the agent
itself
Distributed approach for witness reputation
Centralized / Distributed
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 6
7. WITNESS REPUTATION
Agent A wants a service from agent B
Agent A asks agent C if agent B can be
trusted
Agent C trusts agent B and replies yes to
A
Agent A now trusts B and asks B to
perform the service on A’s behalf
A = truster / beneficiary,
C = trustor / broker / consultant,
B = trustee
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 7
A
Truster /
Beneficiary
B
Truste
e
C
Trustor /
Broker /
Consultan
t
8. INTERACTION TRUST
Agent A wants a service from agent B
Agent A judges if B is to be trusted from
personal experience
Agent A trusts B and asks B to perform
the service on A’s behalf
A = trustor / truster / beneficiary,
B = trustee
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 8
A
Trustor /
Truster /
Beneficiary
B
Truste
e
9. REFERENCES
Agent A wants a service from agent B
Agent A asks agent B for proof of trust
Agent B provides some agents R that can
guarantee that B can be trusted
Agent A now trusts B and asks B to
perform the service on A’s behalf
A = trustor / truster / beneficiary,
B = trustee,
R = referee
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 9
A
Truster /
Beneficiary
B
Truste
e
R
Referee
R
Referee
10. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents
10
11. Centralised rating system
After an interaction eBay users rate partner (−1, 0,+1)
positive, neutral, negative
Ratings stored centrally
Reputation value is computed as the sum of ratings over 6
months
Reputation is a global single value
- Too simple for applications in MAS (1-D)
All ratings count equally
- Cannot adapt well to changes in a user’s performance
E.g. a user may cheat in a few interactions after obtaining a high
reputation value, but still retains a positive reputation
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 11
12. Centralized repository and reputation / reliability estimation
Ratings are not kept – reputation updated after each transaction
New agents start with a minimum reputation
value and build up reputation
The reputation value of an agent never falls
below the reputation of a newcomer
Users with very high reputation values experience much smaller rating
changes after each update
Ratings are discounted over time so that the most recent ratings have
more weight in the evaluation of an agent’s reputation
+ More adaptable to changes in behavior over time
Reliability measure = ratings deviation
High deviation:
Agent has not been active enough to have a more accurate reputation prediction
Agent’s behaviour has a high degree of variation.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 12
+ Prevent agents with bad
reputation leaving and
entering with fresh
reputation
- May discourage newcomers
13. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents
13
14. Decentralized reputation model
Εach agent is able to evaluate the reputation of others by itself
Keeps own ratings about other partners in a local database
Direct trust is calculated as the weighed average of all ratings
Each rating is weighed according to its recency
More recent ratings are weighted more
- Time granularity control does not actually reflect a rating’s recency
Reliability
How many ratings are taken into account?
Deviation of ratings
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 14
15. An attempt to locate witnesses’ ratings through a social graph
Agent groups with frequent interactions among them
Each group is a single source of reputation values
Only the most representative agent within each group is asked for
information
Heuristics are used to find groups and to select the best agent to ask
- Social Regret does not reflect the actual social relations among
agents
Attempts to heuristically reduce the number of queries to be asked in
order to locate ratings
- Considers the opinion of only one agent of each group
Most agents are marginalized, distorting reality.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 15
16. Decentralized, witness reputation model
Agents cooperate by giving, pursuing, and evaluating referrals
Each agent maintains a list of acquaintances (other agents it
knows) and their expertise
When looking for certain information, an agent queries its
acquaintances
They will try to answer the query, if possible
If not, they will send back referrals of other agents they believe are
likely to have the desired information
Agent’s expertise is used to determine how likely it is to
have interaction with
know witnesses of the target agent
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 16
17. Agents are incentivized to report truthfully interactions’
results
Broker agents
Buy and aggregate (average) reports from other agents
Sell needed information to agents
+ Mechanism guarantees that agents who report incorrectly will
gradually lose money, while honest agents will not
± Brokers are distributed, but each one collects reputation
values centrally
- Reputation values limited to 0, 1
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 17
18. Decentralized witness reputation model
Each agent keeps references given to it from other agents
After every transaction, each agent asks partners to provide their
certified ratings about its performance
It chooses the best ratings to store in its (local) database
When an agent A contacts B to use service C, it asks B to provide
references about its past performance with respect to C
Agent A receives certified ratings of B from B and calculates CR of B
+ Agents do not have costs involved in locating witness reports
- Ratings might be misquoted
Each agent only provides the best ratings about itself
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 18
19. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents
19
20. Distributed, hybrid model
Integrates 4 types of trust / reputation: interaction trust, role-
based trust, witness reputation and certified reputation
Role-based trust: defined by various role-based relationships between
the agents
Provides means for domain-specific customization of trust, using rules
All values are combined into a single measure by weighted
average
- Weak computation model for the combined reputation estimation
Does not take into consideration the problem of lying and
inaccuracy
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 20
21. Hybrid reputation model
Combines interaction trust and witness reputation into a single value,
using weighted sum
Dynamically computes weights
Previous RRAF model used static weights assigned by the user
Weight depends on:
Number of interactions between two agents
Expertise that an agent has in evaluating other agents capabilities
Reputation is based on the global trust that community has in an
agent
+ More accurate reputation prediction
- Difficult to implement in a distributed environment
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 21
22. Distributed, hybrid, probabilistic-based reputation model
On-line trust estimation:
Direct trust evaluation, using own interaction history
Consulting reports: indirect trust estimation from consulting
agents
trustworthy agents
referee agents (introduced by the trustee agent as recommenders)
Off-line trust estimation:
Off-line interaction inspection: After interaction, trustor assigns a
(useful/useless) flag for each consulting agent
Rating & confidence of provided information
Number and recency of interactions with the trustee agent
Maintenance: update information about consulting agents
Initiated at different intervals of time
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 22
23. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents
23
25. Kravari, K., Malliarakis, C., & Bassiliades, N.: T-REX: A Hybrid Agent
Trust Model Based on Witness Reputation and Personal Experience. Proc.
11th International Conference on Electronic Commerce and Web
Technologies (EC-Web 2010). Springer, LNBIP, Vol. 61, Part 3, pp. 107-
118 (2010)
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents
25
26. Centralized, hybrid reputation model
Combines Witness Reputation (ratings) & Direct Trust
(personal experience)
Weighted average (user-defined weights)
Ratings decay over time
All past ratings are taken into account
Time-stamps are used as weights
Past ratings loose importance over time through a linear
extinguishing function
+ Low bandwidth, computational and storage cost
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 26
27. Central ratings repository: Trustor
A special agent responsible for collecting, storing, retrieving
ratings and calculating trust values
Considered certified/reliable
Interacting agents
Truster / Beneficiary: an agent that wants to interact with another
agent that offers a service
Trustee: the agent that offers the service
Role of Trustor
Before the interaction, Truster asks from Trustor calculation of
Trustees trust value
After the interaction, Truster submits rating for Trustee’s
performance to Trustor
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 27
28. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 28
Truster Trustee
interact?
Trustor
Calculates reputation
from stored ratings
and agent’s weights
Gives personalized weights
for each rating criteria
29. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 29
Truster
Trusteeinteract
Trustor
Evaluation criteria
• Correctness
• Completeness
• Response time
30. Rating Vector
rx ∈ [0.1, 10] | 0.1 = terrible , 10 = perfect
Normalized Ratings
Ratings normalized logarithmically to
cross out extreme values
log(rx) ∈ [-1, 1] | -1 = terrible, 1 = perfect
Weighted Normalized Ratings
Agents customize the importance of
criteria using weights
a: truster
b: trustee
Corr: correctness
Resp: response time
Comp: completeness
t: time stamp
px: weight of rating
rx
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 30
𝑅 𝑎𝑏(𝑡 = 𝐶𝑜𝑟𝑟 𝑎𝑏(𝑡 𝑅𝑒𝑠𝑝 𝑎𝑏(𝑡 𝐶𝑜𝑚𝑝 𝑎𝑏(𝑡 = 𝑟1
𝑎𝑏
𝑡 𝑟2
𝑎𝑏
𝑡 𝑟3
𝑎𝑏
𝑡
rab t = Rab t = x=1
3
px∙ log rx
ab t
x=1
3
px
31. The final reputation value (TR)
Transactions between a and b
(interaction trust)
Transactions of b with
all other agents
(witness report)
social trust weights (πp, πo)
Time is important
more recent ratings “weigh” more
𝑇𝑅 𝑎𝑏 𝑡 =
𝜋 𝑝
𝜋 𝑝 + 𝜋 𝑜
∙
∀𝑡𝑖<𝑡 𝑟𝑎𝑏 𝑡𝑖 ∙ 𝑡𝑖
∀𝑡𝑖<𝑡 𝑡𝑖
+
𝜋 𝑜
𝜋 𝑝 + 𝜋 𝑜
∙
∀𝑗≠𝑎,𝑗≠𝑏
∀𝑡𝑖<𝑡 𝑟𝑗𝑏 𝑡𝑖 ∙ 𝑡𝑖
∀𝑡𝑖<𝑡 𝑡𝑖
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 31
32. Dynamicity
Trust depends on time
Flexibility
Can be customized from completely witness-based to completely
personal-experience-based
Reliability
Centralized repository (Trustor) is assumed honest
Low bandwidth
Trusters report in one communication step
Trustees do not communicate at all
Low storage cost
Trusters and trustees do not store anything
Trustor stores everything
Computational cost?
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 32
36. Kravari, K., & Bassiliades, N. (2012). HARM: A Hybrid Rule-based Agent
Reputation Model Based on Temporal Defeasible Logic. 6th International
Symposium on Rules: Research Based and Industry Focused (RuleML-
2012). Springer, LNCS 7438: 193-207.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents
36
37. Centralized hybrid reputation model
Combine Interaction Trust and Witness Reputation
Rule-based approach
Temporal defeasible logic
Non-monotonic reasoning
Ratings have a time offset
Indicates when ratings become active to be considered for trust
assessment
Intuitive method for assessing trust
Related to traditional human reasoning
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 37
38. Temporal defeasible logic (TDL) is an extension of defeasible
logic (DL).
DL is a kind of non-monotonic reasoning
Why defeasible logic?
Rule-based, deterministic (without disjunction)
Enhanced representational capabilities
Classical negation used in rule heads and bodies
Negation-as-failure can be emulated
Rules may support conflicting conclusions
Skeptical: conflicting rules do not fire
Priorities on rules resolve conflicts among rules
Low computational complexity
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 38
39. Facts: e.g. student(Sofia)
Strict Rules: e.g. student(X) person(X)
Defeasible Rules: e.g. r: person(X) works(X)
r’: student(X) ¬works(X)
Priority Relation between rules, e.g. r’ > r
Proof theory example:
A literal q is defeasibly provable if:
supported by a rule whose premises are all defeasibly provable AND
q is not definitely provable AND
each attacking rule is non-applicable or defeated by a superior counter-
attacking rule
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 39
40. Temporal literals:
Expiring temporal literals l:t
Literal l is valid for t time instances
Persistent temporal literals l@t
Literal l is active after t time instances have passed and is valid thereafter
Temporal rules: a1:t1 ... an:tn d b:tb
d is the delay between the cause and the effect
Example:
(r1) => a@1 Literal a is created due to r1.
(r2) a@1=>7 b:3 It becomes active at time offset 1.
It causes the head of r2 to be fired at time
8.
The result b lasts only until time 10.
Thereafter, only the fact a remains.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 40
41. Validity
An agent is valid if it is both sincere and credible
Sincere: believes what it says
Credible: what it believes is true in the world
Completeness
An agent is complete if it is both cooperative and vigilant
Cooperative: says what it believes
Vigilant: believes what is true in the world
Correctness
An agent is correct if its provided service is correct with respect to
a specification
Response time
Time that an agent needs to complete the transaction
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 41
42. Agent A establishes interaction with agent B:
(A) Truster is the evaluating agent
(B) Trustee is the evaluated agent
Truster’s rating value has 8 coefficients:
2 IDs: Truster, Trustee
4 abilities: Validity, Completeness, Correctness, Response time
2 weights (how much attention agent should pay on each rating?):
Confidence: how confident the agent is for the rating
Ratings of confident trusters are more likely to be right
Transaction value: how important the transaction was for the agent
Trusters are more likely to report truthful ratings on important transactions
Example (defeasible RuleML / d-POSL syntax):
rating(id→1,truster→A,trustee→B,validity→5,completeness→6,
correctness→6,resp_time→8,confidence→0.8,transaction_val→0.9).
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 42
43. Direct Experience (PRAX )
Indirect Experience
reports provided by strangers (SRAX)
reports provided by known agents (e.g. friends) due to previous
interactions (KRAX )
Final reputation value
of an agent X, required by an agent A
RAX = {PRAX , KRAX, SRAX}
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 43
44. One or more rating categories may be missing
E.g. a newcomer has no personal experience
A user is much more likely to believe statements from a trusted
acquaintance than from a stranger.
Personal opinion (AX) is more valuable than strangers’ opinion (SX)
and known partners (KX).
Superiority relationships among rating categories
KX
AX, KX, SX
AX, KX AX, SX KX, SX
AX SX
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 44
45. RAX is a function that combines each available category
personal opinion (AX)
strangers’ opinion (SX)
previously trusted partners (KX)
HARM allows agents to define weights of ratings’ coefficients
Personal preferences
, ,AX AX AXAXR PR KR SR
4 4 4
1 1 1
log log log
, , ,
, , , _
coefficient coefficient coefficient
i AX i AX i AX
AX
i i ii i i
AVG w pr AVG w kr AVG w sr
R
w w w
coefficient validity completeness correctness response time
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 45
46. r1: count_rating(rating→?idx, truster→?a, trustee→ ?x) :=
confidence_threshold(?conf), transaction_value_threshold(?tran),
rating(id→?idx, confidence→?confx, transaction_val→?tranx),
?confx >= ?conf, ?tranx >= ?tran.
r2: count_rating(…) :=
…
?confx >= ?conf.
r3: count_rating(…) :=
…
?tranx >= ?tran.
r1 > r2 > r3
• if both confidence and transaction importance
are high, then rating will be used for estimation
• if transaction value is lower than the threshold,
but confidence is high, then use rating
• if there are only ratings with high transaction
value, then they should be used
• In any other case, omit the rating
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 46
47. All the previous rules are conclude positive literals.
These literals are conflicting each other, for the same pair of
agents (truster and trustee)
We want in the presence e.g. of personal experience to omit strangers’
ratings.
That’s why there is also a superiority relationship between the rules.
The conflict set is formally determined as follows:
C[count_rating(truster→?a, trustee→?x)] =
{ ¬ count_rating(truster→?a, trustee→?x) }
{ count_rating(truster→?a1, trustee→?x1) | ?a ?a1 ∧ ?x ?x1
}
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 47
48. known(agent1→?a, agent2→?y) :-
count_rating(rating → ?id, truster→?a, trustee→?y).
count_pr(agent→?a, truster→?a, trustee→?x, rating→?id) :-
count_rating(rating → ?id, truster→? a, trustee→ ?x).
count_kr(agent→?a, truster→?k, trustee→?x, rating →?id) :-
known(agent1→?a, agent2→?k),
count_rating(rating→?id, truster→?k, trustee→ ?x).
count_sr(agent→?a, truster→?s, trustee→?x, rating→?id) :-
count_rating(rating → ?id, truster →?s, trustee→ ?x),
not(known(agent1→?a, agent2→?s)).
Which agents are considered as
known?
Ratingcategories
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 48
49. Final step is to decide whose experience will “count”: direct, indirect
(witness), or both.
The decision for RAX is based on a relationship theory
e.g. Theory #1: All categories count equally.
r8: participate(agent→?a, trustee→?x, rating→?id_ratingAX) :=
count_pr(agent→?a, trustee→?x, rating→ ?id_ratingAX).
r9: participate(agent→?a, trustee→?x, rating→?id_ratingKX) :=
count_kr(agent→?a, trustee→?x, rating→ ?id_ratingKX).
r10: participate(agent→?a, trustee→?x, rating→?id_ratingSX) :=
count_sr(agent→?a, trustee→?x, rating→ ?id_ratingSX).
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 49
50. KX
AX, KX, SX
AX, KX AX, SX KX, SX
AX SX
ALL CATEGORIES COUNT
EQUALLY
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 50
51. THEORY #2
PERSONAL EXPERIENCE IS
PREFERRED TO FRIENDS’
OPINION TO STRANGERS’
OPINIONr8: participate(agent→?a, trustee→?x, rating→?id_ratingAX) :=
count_pr(agent→?a, trustee→?x, rating→ ?id_ratingAX).
r9: participate(agent→?a, trustee→?x, rating→?id_ratingKX) :=
count_kr(agent→?a, trustee→?x, rating→ ?id_ratingKX).
r10: participate(agent→?a, trustee→?x, rating→?id_ratingSX) :=
count_sr(agent→?a, trustee→?x, rating→ ?id_ratingSX).
r8 > r9 > r10
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 51
52. KX
AX, KX, SX
AX, KX AX, SX KX, SX
AX SX
PERSONAL EXPERIENCE IS
PREFERRED TO FRIENDS’
OPINION TO STRANGERS’
OPINION
>>
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 52
53. THEORY #3
PERSONAL EXPERIENCE AND
FRIENDS’ OPINION IS
PREFERRED TO STRANGERS’
OPINIONr8: participate(agent→?a, trustee→?x, rating→?id_ratingAX) :=
count_pr(agent→?a, trustee→?x, rating→ ?id_ratingAX).
r9: participate(agent→?a, trustee→?x, rating→?id_ratingKX) :=
count_kr(agent→?a, trustee→?x, rating→ ?id_ratingKX).
r10: participate(agent→?a, trustee→?x, rating→?id_ratingSX) :=
count_sr(agent→?a, trustee→?x, rating→ ?id_ratingSX).
r8 > r10, r9 > r10
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 53
54. KX
AX, KX, SX
AX, KX AX, SX KX, SX
AX SX
PERSONAL EXPERIENCE AND
FRIENDS’ OPINION IS
PREFERRED TO STRANGERS’
OPINION
>
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 54
55. Agents may change their behavior / objectives at any time
Evolution of trust over time should be taken into account
Only the latest ratings participate in the reputation estimation
In the temporal extension of HARM:
each rating is a persistent temporal literal of TDL
each rule conclusion is an expiring temporal literal of TDL
Truster’s rating is active after time_offset time instances have
passed and is valid thereafter
rating(id→val1, truster→val2, trustee→ val3, validity→val4,
completeness→val5, correctness→val6, resp_time→val7,
confidence→val8, transaction_val→value9)@time_offset.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 55
56. Rules are modified accordingly:
each rating is active after t time instances have passed
each conclusion has a duration that it holds
each rule has a delay between the cause and the effect
count_rating(rating→?idx, truster→?a, trustee→?x):duration :=delay
confidence_threshold(?conf),
transaction_value_threshold(?tran),
rating(id→?idx, confidence→?confx,transaction_value→?tranx)@t,
?confx >= ?conf, ?tranx >= ?tran.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 56
57. K. Kravari, N. Bassiliades, “DISARM: A Social Distributed Agent
Reputation Model based on Defeasible Logic”, Journal of Systems
and Software, Vol. 117, pp. 130–152, July 2016
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents
57
58. Distributed extension of HARM
Distributed hybrid reputation model
Combines Interaction Trust and Witness Reputation
Ratings are located through agent’s social relationships
Rule-based approach
Defeasible logic
Non-monotonic reasoning
Time is directly used in:
Decision making rules about recency of ratings
Calculation of reputation estimation (similar to T-REX)
Intuitive method for assessing trust
Related to traditional human reasoning
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 58
59. Social relationships of trust among agents
If an agent is satisfied with a partner it is more likely to interact
again in the future
If dissatisfied it will not interact again
Each agent maintains 2 relationship lists:
White-list: Trusted agents
Black-list: Non-trusted agents
All other agents are indifferent (neutral zone)
Each agent decides which agents are added / removed from
each list, using rules
Personal social network
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 59
60. Truster’s rating value has 11 coefficients:
2 IDs: Truster, Trustee
4 abilities: Validity, Completeness, Correctness, Response time
2 weights: Confidence, Transaction value
Timestamp
Cooperation: willingness to do what is asked for
Important in distributed social environments
Outcome feeling: (dis)satisfaction for the transaction outcome
Degree of request fulfillment
Example (defeasible RuleML / d-POSL syntax):
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 60
rating (id→1, truster→A, trustee→X, t→140630105632, resp_time→9,
validity→7, completeness→6, correctness→6, cooperation→8,
outcome_feeling→7, confidence→0.9, transaction_val→0.8)
3 more than
HARM
61. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 61
...
2. Propagating request
Agent A
Truster
WL agents providing ratings
1. Request ratings
3. Receive ratings
Agent X
Trustee
5. Choose agent x
Service request
6. Receive service
4. Evaluate Reputation
(DISARM rules + ratings)
7. Rate agent X
62. good_behavior(time → ?t, truster→ ?a, trustee→ ?x, reason → all) :-
resp_time_thrshld(?resp), valid_thrshld(?val), …, trans_val_thrshld(?trval),
rating(id→?idx, time → ?t, truster→ ?a, trustee→ ?x, resp_time→?respx,
validity→?valx, transaction_val→?trvalx, completeness→?comx,
correctness→?corx, cooperation→?coopx, outcome_feeling→?outfx),
?respx<?resp, ?valx>?val, ?comx>?com, ?corx>?cor, ?coopx>?coop, ?outfx>?outf.
bad_behavior(time → ?t, truster→ ?a, trustee→ ?x, reason → response_time) :-
rating(id→?idx, time → ?t, truster→ ?a, trustee→ ?x, resp_time→?respx),
resp_time_thrshld(?resp), ?respx >?resp.
Any combination of parameters can be used with any defeasible theory.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 62
63. Has been good twice for the same reason
add_whitelist(trustee→ ?x, time → ?t2) :=
good_behavior(time→?t1, truster→?self, trustee→?x, reason→?r),
good_behavior(time→?t2, truster→?self, trustee→?x, reason→?r),
?t2 > ?t1.
Has been bad thrice for the same reason
add_blacklist(trustee→ ?x, time → ?t3) :=
bad_behavior(time→?t1, truster→?self, trustee→?x, reason→?r),
bad_behavior(time→?t2, truster→?self, trustee→?x, reason→?r),
bad_behavior(time→?t3, truster→?self, trustee→?x, reason→?r),
?t2 > ?t1, ?t3 > ?t2.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 63
64. blacklist(trustee→ ?x, time → ?t) :=
¬whitelist(trustee→ ?x, time → ?t1),
add_blacklist(trustee→ ?x, time → ?t2), ?t2 > ?t1.
¬blacklist(trustee→ ?x, time → ?t2) :=
blacklist(trustee→ ?x, time → ?t1),
add_whitelist(trustee→ ?x, time → ?t2),
?t2 > ?t1.
whitelist(trustee→ ?x, time → ?t) :=
¬blacklist(trustee→ ?x, time → ?t1),
add_whitelist(trustee→ ?x, time → ?t2), ?t2 > ?t1.
…
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 64
Add to the blacklist
Remove from the
blacklist
Add to the whitelist
65. Ask for ratings about an agent sending request messages
To whom and how?
To everybody
To direct “neighbors” of the agent’s “social network”
To indirect “neighbors” of the “social network” though message
propagation for a predefined number of hops (Time-to-Live - P2P)
“Neighbors” are the agents in the whitelist
Original request:
send_message(sender→?self, receiver→?r,
msg →request_reputation(about→?x,ttl→?t)) :=
ttl_limit(?t), whitelist(?r), locate_ratings(about→?x).
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 65
66. Upon receiving request, return rating to the sender
send_message(sender→?self, receiver→?s,
msg →rating(id→ idx, truster→ ?self, trustee→ ?x, …)) :=
receive_message(sender→?s, receiver→?self,
msg →request_rating(about→?x)),
rating(id→?idx, truster→ ?self, trustee→ ?x, …).
If time-to-live has not expired propagate request to all friends
send_message(sender→?s, receiver→?r,
msg →request_reputation(about→?x, ttl→?t1)):=
receive_message(sender→?s, receiver→?self,
msg →request_rating(about→?x,ttl→?t)),
?t >0, WL(?r), ?t1 is ?t - 1.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 66
67. Direct Experience (PRX)
Indirect Experience (reports provided by other agents):
“Friends” (WRX) – agents in the whitelist
Known agents from previous interactions (KRX)
Complete strangers (SRX)
Final reputation value
RX = {PRX, WRX, KRX, SRX}
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 67
KR
PR, WR, KR, SR
PR, WR PR, SR KR, SR
PR SR
PR, KR
WR
WR, SRWR, KR
PR, WR, SR WR, KR, SRPR, KR, SRPR, WR, KR
New compared to
HARM
68. According to user’s preferences
eligible_rating(rating→?idx,truster→?a,trustee→?x,reason→cnf_imp) :=
conf_thrshld(?conf), trans_val_thrshld(?tr),
rating(id→?idx,truster→?a,trustee→?x,conf→?confx,trans_val→?trx),
?confx >= ?conf, ?trx >= ?tr.
According to temporal restrictions
count_rating(rating→?idx, truster→?a, trustee→?x) :=
time_from_thrshld(?ftime), time_to_thrshld(?ttime),
rating(id→?idx, t→?tx, truster→?a, trustee→ ?x),
?ftime <=?tx <= ?ttime.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 68
70. When ratings provided by an agent are outside the standard
deviation of all received ratings, the agent might behave dishonestly
bad_assessment (time → ?t, truster→ ?y, trustee→ ?x) :-
standard_deviation_value(?t,?y,?x,?stdevy),
standard_deviation_value (?t,_,?x,?stdev),
?stdevy > ?stdev.
When two bad assessments for the same agent were given in a
certain time window, trust is lost
remove_whitelist(agent→ ?y, time → ?t2) :=
whitelist(truster→ ?y),
time_window(?wtime),
bad_assessment(time → ?t1, truster→ ?y, trustee→ ?x),
bad_assessment(time → ?t2, truster→ ?y, trustee→ ?x),
?t2 <= ?t1 + ?wtime.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 70
71. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents
71
72. Simulation in the EMERALD* multi-agent
system
Service provider agents
All provide the same service
Service consumer agents
Choose provider with the higher reputation value
Performance metric: Utility Gain
*K. Kravari, E. Kontopoulos, N. Bassiliades, “EMERALD:
A Multi-Agent System for Knowledge-based Reasoning
Interoperability in the Semantic Web”, 6th Hellenic
Conference on Artificial Intelligence (SETN 2010),
Springer, LNCS 6040, pp. 173-182, 2010.
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 72
Number of simulations:
500
Number of providers:
100
Good providers 10
Ordinary
providers
40
Intermittent
providers
5
Bad providers 45
73. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 73
74. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 74
HARM T-REX No Trust CR SPORAS
5.73 5.57 0.16 5.48 4.65
75. 0
1
2
3
4
5
6
7
MeanUG
Time
DISARM Social Regret Certified Reputation
CRM FIRE HARM
NONE
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 75
Mean Utility Gain
76. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 76
Better performance when alone,
due to more social relationships
78. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 78
79. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents
79
80. Interaction Trust (personal experience) vs. Witness Reputation
(Experience of others)
Hybrid models
Centralized (easy to locate ratings) vs. Distributed (more robust)
Several State-of-the-Art models have been presented
SPORAS, Regret, Certified Reputation, Referral, FIRE, TRR, CRM, …
Presenter’s and associates trust / reputation models
T-REX (centralized, hybrid, time decay, computationally optimized)
HARM (centralized, hybrid, knowledge-based, temporal defeasible
logic)
DISARM (distributed, hybrid, knowledge-based, defeasible logic, time
decay, social relationships, manages dishonesty)
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 80
81. Centralized models
+ Achieve higher performance because they have access to more information
+ Simple interaction protocols, easy to locate ratings
+ Both interaction trust and witness reputation can be easily implemented
- Single-point-of-failure
- Cannot scale well (bottleneck, storage & computational complexity)
- Central authority hard to enforce in open multiagent systems
Distributed models
- Less accurate trust predictions, due to limited information
- Complex interaction protocols, difficult to locate ratings
- More appropriate for interaction trust
+ Robust – no single-point-of-failure
+ Can scale well (no bottlenecks, less complexity)
+ More realistic in open multiagent systems
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 81
82. Interaction trust
+ More trustful
- Requires a long time to reach a satisfying estimation level
Witness reputation
- Does not guarantee reliable estimation
+ Estimation is available from the beginning of entering a community
Hybrid models
+ Combine interaction trust and witness reputation
- Combined trust metrics are usually only based on arbitrary /
experimentally-optimized weights
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 82
83. Centralized models
- Cannot scale well (bottleneck, storage & computational complexity)
+ T-REX reduces computational complexity at the expense of storage
complexity
+ HARM reduces computational complexity by reducing considered ratings,
through rating selection based on user’s domain-specific knowledge
Distributed models
- Less accurate trust predictions, due to limited information
- Complex interaction protocols, difficult to locate ratings
+ DISARM finds ratings through agent social relationships and increases
accuracy by using only known-to-be-trustful agents
Hybrid models
- Combined trust metrics are usually only based on arbitrary weights
+ HARM & DISARM employ a knowledge-based highly-customizable (both to
user prefs & time) approach, using non-monotonic defeasible reasoning
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 83
84. Aristotle University of Thessaloniki, Greece
Largest University in Greece and South-East Europe
Since 1925, 41 Departments, ~2K faculty, ~80K students
Dept. of Informatics
Since 1992, 28 faculty, 5 research labs, ~1100 undergraduate students,
~200 MSc students, ~80 PhD students, ~120 PhD graduates, >3500
pubs
Software Engineering, Web and Intelligent Systems Lab
7 faculty, 20 PhD students, 9 Post-doctorate affiliates
Intelligent Systems group (http://intelligence.csd.auth.gr)
4 faculty, 9 PhD students, 16 PhD graduates
Research on Artificial Intelligence, Machine Learning / Data Mining,
Knowledge Representation & Reasoning / Semantic Web, Planning,
Multi-Agent Systems
425 publications, 35 projects
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 84
85. The work described in this talk has been performed in
cooperation with Dr. Kalliopi Kravari
Former PhD student, currently postdoctorate affiliate
Occasional contributors:
Dr. Christos Malliarakis (former MSc student, co-author)
Dr. Efstratios Kontopoulos (former PhD student, co-author)
Dr. Antonios Bikakis (Lecturer, University College London, PhD
examiner)
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 85
86. K. Kravari, C. Malliarakis, N. Bassiliades, “T-REX: A hybrid agent trust
model based on witness reputation and personal experience”, Proc. 11th
International Conference on Electronic Commerce and Web Technologies
(EC-Web 2010), Bilbao, Spain, Lecture Notes in Business Information
Processing, Vol. 61, Part 3, Springer, pp. 107-118, 2010.
K. Kravari, E. Kontopoulos, N. Bassiliades, “EMERALD: A Multi-Agent
System for Knowledge-based Reasoning Interoperability in the Semantic
Web”, 6th Hellenic Conference on Artificial Intelligence (SETN 2010),
Springer, LNCS 6040, pp. 173-182, 2010.
K. Kravari, N. Bassiliades, “HARM: A Hybrid Rule-based Agent
Reputation Model based on Temporal Defeasible Logic”, 6th
International Symposium on Rules: Research Based and Industry
Focused (RuleML-2012). Springer Berlin/Heidelberg, LNCS, Vol. 7438,
pp. 193-207, 2012.
K. Kravari, N. Bassiliades, “DISARM: A Social Distributed Agent
Reputation Model based on Defeasible Logic”, Journal of Systems and
Software, Vol. 117, pp. 130–152, July 2016
IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 86
87. IC-ININFO, Sep 19-22, 2016N. Bassiliades - Trust and reputation models among agents 87