The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Social networks are playing an important role in personal as well as corporate environments. However, perceived issues and evolving challenges may hinder further expansion of social networks to meet new opportunities. In this paper, we review inherent concepts and properties of social networks and highlight major analytical evaluation criteria, which are used to identify key findings that reveal degrees...
Interactions between individuals are inherently dependent upon trust, no matter if they occur in the real world or in cyber communities. Over the past years, proposals have been made to model trust relations computationally, either to assist users or for modeling purposes in multi-agent systems. These models rely implicitly on the social networks established by participating entities (be they autonomous...
In this paper we study the problem of network exchange in trust based social networks. Network exchange is of two types: Specialized Exchange and Generalized Exchange, this can be characterized in terms of reciprocity, triads, graph motifs across these networks. Given the lack of standard metrics for Generalized Exchange, we propose a metric to quantify generalized exchange. We observe that the phenomenon...
In peer-to-peer content delivery systems, such as BitTorrent, there may exist nodes that are non-cooperative and do not contribute their upload bandwidth to the system while still downloading content from others. The current widely used countermeasures against this freeriding behavior have been shown to be ineffective. In this paper, we address the problem by leveraging the trust latent in the social...
Ubiquitous connectivity today allows many users to remain connected regardless of location with various kinds of communities. This paper studies challenges in building trusted communities that encompass both new users as well as users already possessing credentials from other well known connectivity providers, federations, content providers and social networks. We postulate that trusted communities...
This paper proposes a model based on both direct reciprocity and the use of social network structures to incentive cooperation in human societies. The absence of third-party reputation assures that very few opportunities are left for lying and misreporting of information by the members of the community. Social relationships are built according to the criterion that nodes seek to interact with others...
To make the Internet today more connective with better performance, we developed the SoftInternet system, which consists of application layer proxies operated in P2P structure. To keep malicious peers out of the system in the beginning, we propose the model for admission control policy based on trust friend recommendations in social networks. We simulate the model to analyze the parameters and its...
Induced by computing of more general networks, such as social networks, trust has been shown to have fundamental effects on the dynamics of evolution. Inspired this, we derive the dynamics governing the evolution of such a system, P2P network, starting from fundamental individual level of trust. We show that how computing is modeled based on game theory and how the ideas of evolutionary theory apply...
Social institutions and ecosystems are growing across the web and social trust networks formed within these systems create an extraordinary test-bed to study relation dependant notions such as trust, reputation and belief. In order to capture, model and represent the semantics of trust relationships forming the trust networks, main components of relationships are represented and described using ontologies...
People generate information or get it from the others. When one gets information from the others it is important to get it from trusted ones. Each individual in a society can get the information he needs form his trusted friends but there are also many other people in the society that he or she indirectly trusts and can benefit from their information. The idea of benefiting from the indirectly trusted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.