Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications
ISSN: 2320-7248 Impact Factor:1.8 Volume:2 Issue:1 Year: 25 April,2015 Pages:149-153
In command to collaborate in the sweepingthinsituation, crediblemediatorswant to be alerthonesty of executornegotiators for selecting suitable interaction partners. Most of the current computational faithmockupskindusage of the trusteesthemselfknowledge or reputation from public on executors to total the beliefmorals. However, in some circumstances, a trustedmanagermight have no involvement with a newdoer or might not find the gen about the reputation of the new trustee agent. And then the truster agent could not utilize the outmodedinstrumentsgrounded on skill or standing to infer some trust value for the new trustee. In this paper, we introduce a novel mechanism for estimating trustworthiness in such a condition. Our plannedmachine is built on the parallel in contours of the new trustee and ones of well known agents. A weighted combination model is used for participatingpracticebelief, standing and comparablehope.
Reliance · Status · Dependence propagation · Trust similarity · Multi-agents system.
[1]. Burnett, C., Norman, T.J., Sycara, K.: Bootstrapping trust evaluations through stereotypes. In: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: AAMAS ’10, vol. 1, pp. 241–248. International Foundation for Autonomous Agents and Multiagent Systems, Richland (2010). [2]Abdul-Rahman and Hailes, 2000] Alfarez Abdul-Rahman and Stephen Hailes. Supporting trust in virtual communities. In Proceedings of the 33rd Hawaii International Conference on Systems Science, 2000. [3]. Carter, J., Bitting, E., Ghorbani, A.: Reputation formalization for an informationsharing multi-agent system. Comput. Intell. 18(2), 515–534 (2002) . [4].[Jøsang, 1998] AudunJøsang. A subjective metric of authentication. In Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS), volume 1485 of LNCS, pages 329–344. Springer-Verlag, 1998. [5]. Grandison, T., Sloman, M.: Specifying and analysing trust for internet applications. In: Monteiro, J.L., Swatman, P.M.C., Tavares, L.V. (eds.) Towards the Knowledge Society. IFIP, vol. 105, pp. 145–157. Springer, Heidelberg (2003). [6].[Sentz and Ferson, 2002] Karl Sentz and Scott Ferson. Combination of evidence in Dempster Shafer theory. TR 0835, Sandia National Laboratories, Albuquerque, New Mexico, 2002. [7].Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International Conference on World Wide Web, WWW ’04, pp. 403–412. ACM, New York (2004). [8].[Wang and Singh, 2006a] Yonghong Wang and Munindar P. Singh. Trust representation and aggregation in a distributed agent system. In Proceedings of the 21st National Conference on Artificial Intelligence (AAAI), pages 1425– 1430, 2006a. [9].[Huynh et al., 2006] Trung Dong Huynh, Nicholas R. Jennings, and Nigel R. Shadbolt. An integrated trust and reputation model for open multi-agent systems. Journal of Autonomous Agents and MultiAgent Systems, 13(2):119– 154, September 2006.