LBRY Block Explorer

LBRY Claims • 57711

8415a95d8a536b6297d8ad263bc205cfc04f67ed

Published By
Anonymous
Created On
15 Jan 2021 13:04:02 UTC
Transaction ID
Cost
Safe for Work
Free
Yes
Computing With Social Trust
Author: Jennifer Golbeck<br />File Type: pdf<br />This book has evolved out of roughly ve years of working on computing with social trust. In the beginning, getting people to accept that social networks and the relationships in them could be the basis for interesting, relevant, and exciting c- puter science was a struggle. Today, social networking and social computing have become hot topics, and those of us doing research in this space are nally nding a wealth of opportunities to share our work and to collaborate with others. This book is a collection of chapters that cover all the major areas of research in this space. I hope it will serve as a guide to students and researchers who want a strong introduction to work in the eld, and as encouragement and direction for those who are considering bringing their own techniques to bear on some of these problems. It has been an honor and privilege to work with these authors for whom I have so much respect and admiration. Thanks to all of them for their outstanding work, which speaks for itself, and for patiently enduringall my emails. Thanks, as always, to Jim Hendler for his constant support. Cai Ziegler has been particularly helpful, both as a collaborator, and in the early stages of development for this book. My appreciation also goes to Beverley Ford, Rebecca Mowat and everyone at Springer who helped with publication of this work.Review From the reviews Social trust is becoming fundamental in computer science (CS), distributed systems, multiagent systems, e-commerce, and communication. This book provides a survey of the computational trust field. This is a commendable effort by the editor to consolidate the growing literature on computational trust in a single volume. it is a useful reference for both theorists and practitioners in the field of computational trust. (Haris Aziz, ACM Computing Reviews, May, 2009) From the Back Cover As open, distributed systems like the Web continue to grow, and more and more content created by users becomes available, the question of whom and what can be trusted becomes increasingly important. This book looks at one solution social trust relationships and examines the challenging research problems raised by computing with social trust. In bringing together important research in computing social trust from both computer science and related disciplines, this book provides an invaluable overview of the area. Divided into three parts, the first Models of Social Trust addresses theory, behaviour and trust management, analysing how trust is developed, the dynamics of trust relationships, and systems for trust management. Part Two Propagation of Trust describes algorithms and methods for computing trust in social contexts. Social networks, profile similarity, and participation in online communities are all sources from which trust can be computed. The final part Applications of Trust contains applications such as recommender systems, website access control, and email filtering, where trust can improve functionality. With contributions from leading researchers in the area of social trust, this book will be welcomed by researchers and graduate students in computer science and information systems, as well as those working in related disciplines where trust may be an issue (such as communications and psychology).
Author
Content Type
Unspecified
application/pdf
Language
English
Open in LBRY