首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
An integrated trust and reputation model for open multi-agent systems   总被引:12,自引:1,他引:12  
Trust and reputation are central to effective interactions in open multi-agent systems (MAS) in which agents, that are owned by a variety of stakeholders, continuously enter and leave the system. This openness means existing trust and reputation models cannot readily be used since their performance suffers when there are various (unforseen) changes in the environment. To this end, this paper presents FIRE, a trust and reputation model that integrates a number of information sources to produce a comprehensive assessment of an agent’s likely performance in open systems. Specifically, FIRE incorporates interaction trust, role-based trust, witness reputation, and certified reputation to provide trust metrics in most circumstances. FIRE is empirically evaluated and is shown to help agents gain better utility (by effectively selecting appropriate interaction partners) than our benchmarks in a variety of agent populations. It is also shown that FIRE is able to effectively respond to changes that occur in an agent’s environment.  相似文献   

2.
Two artificial agents (a humanoid robot and a virtual human) are enriched with various similar intelligence, autonomy, functionalities and interaction modalities. The agents are integrated in the form of a cyber-physical-social system (CPSS) through a shared communication platform to create a social ecology. In the ecology, the agents collaborate (assist each other) to perform a real-world task (search for a hidden object) for the benefits of humans. A robot-virtual human bilateral trust model is derived and a real-time trust measurement method is developed. The role of taking initiative in the collaboration is switched between the agents following a finite state machine model triggered by bilateral trust, which results in a mixedinitiative collaboration. A scheme is developed to evaluate the performance of the agents in the ecology through the CPSS. The results show that the robot and the virtual human perform satisfactorily in the collaboration through the CPSS. The results thus prove the effectiveness of the real-world ecology between artificial agents of heterogeneous realities through a shared platform based on trust-triggered mixed-initiatives. The results can help develop adaptive social ecology comprising intelligent agents of heterogeneous realities to assist humans in various tasks through collaboration between the agents in the form of a CPSS.   相似文献   

3.
This paper applies the social capital theory to construct a model for investigating the factors that influence online civic engagement behaviour on Facebook. While there is promising evidence that people are making concerted efforts to adopt Facebook to address social issues, research on their civic behaviour from a social capital viewpoint in the social media context remains limited. This study introduces new insights into how Facebook is shaping the landscape of civic engagement by examining three dimensions of social capital – social interaction ties (structural), trust (relational), and shared languages and vision (cognitive). The study contends that these dimensions will influence individuals’ online civic engagement behaviour on Facebook. We also argue that social interaction ties can engender trust, and shared languages and vision among its members, and that shared languages and vision can increase trust among Facebook members. Empirical data collected from 1233 Facebook users provide support for the proposed model. The results help in identifying the motivation underlying the online civic engagement behaviour of individuals in a public virtual community. The implications for theory and practice and future research directions are discussed.  相似文献   

4.
The FIRE trust and reputation model is a de-centralized trust model that can be applied for trust management in unstructured Peer-to-Peer (P2P) overlays. The FIRE model does not, however, consider malicious activity and possible collusive behavior in nodes of network and it is therefore susceptible to collusion attacks. This investigation reveals that FIRE is vulnerable to lying and cheating attacks and presents a trust management approach to detect collusion in direct and witness interactions among nodes based on colluding node’s history of interactions. A witness ratings based graph building approach is utilized to determine possibly collusive behavior among nodes. Furthermore, various interaction policies are defined to detect and prevent collaborative behavior in colluding nodes. Finally a multidimensional trust model FIRE+ is devised for avoiding collusion attacks in direct and witness based interactions. The credibility of the proposed trust management scheme as an enhancement of the FIRE trust model is verified by extensive simulation experiments.  相似文献   

5.
见证人信誉是目前信任和信誉模型的一个重要组成部分,它使agent利用很小的开销就可以跟合作伙伴建立起信任关系.然而,由于在评价的计算过程中忽略了agent的忠诚度这个重要因素,使得见证人信誉不能够很好的处理虚假信息所造成的影响.因此,提出了基于忠诚度的见证人信誉模型来解决这个问题.实验表明,基于忠诚度的见证人信誉模型能够帮助agent选择更合适的交易伙伴.  相似文献   

6.
A wireless mobile ad hoc network is an autonomous system of mobile nodes, which have to cooperate in packet relaying in order to provide the necessary network functionality. Packet relaying based on reciprocity generates strong cooperation incentives even among purely self-regarding nodes. The necessary distinction between selfish and cooperative participants is provided to a node by its trust system. In this article we analyse the particular case where a reputation system is not present in the network, i.e. nodes use solely their local trust systems. In such a case, whether the cooperation is based on direct or on indirect reciprocity, depends on the information type used by trust systems of the network participants. The influence of two factors on the development of cooperation—the network size and the type of participating nodes—is analysed using evolutionary game theory. Computational experiments demonstrate that, in a small network or in a network with many non-cooperative nodes, the cooperation is more likely to be developed on the basis of both reciprocity mechanisms. On the other hand, a large network and the existence of many unconditionally cooperative nodes favour the development of cooperation on the basis of direct reciprocity.  相似文献   

7.
Our everyday interactions increasingly involve both embodied face-to-face communication and various forms of mediated and distributed communication such as email, skype, and facebook. In daily face-to-face communications, we are connected in rhythm and synchrony at multiple levels ranging from the moment-by-moment continuity of timed syllables to emergent body and vocal rhythms of pragmatic sense-making. Our human capacity to synchronize with each other may be essential for our survival as social beings. Moving our bodies and voices together in time embodies a potent pragmatic purpose that of being together. In this synchrony of self with other, witnessing and being present become part of each other. There is growing research into how rhythm and synchrony operate in embodied face-to-face interaction and this provides parameters for investigating the relations and differences in how we connect and are socially present in the embodied and distributed settings, and understanding the effect of one setting upon the other. This paper explores the arena of research into rhythm in human interaction, musical and linguistic, with a focus on the movements of body and voice. It draws together salient issues and ideas that would form the basis for a framework of rhythm in embodied interaction.  相似文献   

8.
The aim of the present paper is to study users' perception of computers and human beings as advice givers in problem-solving situations. It will be asked if people's self-confidence and their perception of the advice vary depending on the origin of advice.Two studies showed somewhat different results. In the first study, people were given advice either by a (putative) computer or by a human being. Their self-confidence did not vary with the origin of the advice, but with the correctness of their own answer as well as of the advice. The perception of this advice did not differ for the two situations. Their general trust in computers was, however, much less than their trust in human beings. In the second study, the subjects had to attribute advice to a computer or a human being, without being told from whom the advice emanated. For Swedish subjects, the ratings showed consistently higher attributions to human beings regarding knowledge and explanation value of advice and higher attributions to computers regarding trust and understanding. For Indian subjects, humans always received the higher attributions.It was concluded that people's perception of computers seems to be related both to existing attitudes and to their experience of the advice given. Knowledge in the domain seems to be an important factor influencing the perception of the computer as trustworthy.  相似文献   

9.
Autonomous synthetic characters have the potential to promote the social engagement of users in virtual environments, enhancing their interaction experience. In computer games, for example, poor interaction with game characters can drastically detract from the gaming experience, making the design of autonomous synthetic characters an important issue. In particular, in Role Playing Games (RPGs), for example, users and autonomous characters often perform in a group. Usually, the role of such characters is very limited since they lack the social skills to perform coherently in group scenarios.The goal of the work presented here is to endow autonomous synthetic characters with social skills that allow them to perform in groups with human members. However, to successfully achieve this, it is not enough to assure that the characters behave in a coherent manner from an individual perspective or that they are able to perform the group task optimally. It is also necessary that the autonomous characters exhibit behaviours that are coherent with the group's composition, context and structure.For this reason, we have developed a model to support group dynamics of autonomous synthetic characters (SGD model) inspired by theories developed in human social psychological sciences. This model defines the knowledge that each individual should build about the others and the group, and how this knowledge drives their interactions. The model was used in a collaborative computer game that was tested with users. The results showed that the model had a positive effect on the users' social engagement, namely, on their trust and identification with the group.  相似文献   

10.
研究建立虚拟战场攻防对抗环境,为提高协作任务分配机制的鲁棒性、可扩展性和动态适应性,在经典合同网协议的基础上,通过引入交互信任度、熟人信任度和阈值等策略,提出了一种适合于基于多Agent系统(MAS)的计算机生成兵力(CGF)协作的集成合同网协议。为了保证协议的完整性、正确性和可靠性,利用赋色Petri网进行了形式化建模,分析和验证协议的灵活性、可达性和有界性等特性。对集成合同网协议,应用基于MAS的弹道导弹攻防对抗CGF系统进行协作仿真。仿真结果表明,集成合同网协议有效地降低了协作的通信代价,提高了系统的完成任务指标。  相似文献   

11.
本文首先分析了物联网中不同物体的对信任的需要和要求,随后提出解决这个问题的方法,即分开来看机构的信誉和阅读器的信任。阅读器自然会有一些基本属性,我们以此为基础,提出论据,对路由信任进行四个假设,结果证明,只有在相隔很远时才能通信。于是,在文章中提出了另一个方法:物体将摘要保存,下次交互时,机构将其验证,从而授以阅读器的信任权限。  相似文献   

12.
Web服务中基于信任的访问控制   总被引:2,自引:0,他引:2       下载免费PDF全文
将安全断言标记语言和可扩展的访问控制高标识语言相结合,设计一种Web服务下的基于信任的访问控制模型。在信任域内,服务提供方利用与请求方的直接交互经验和域内其他证人的推荐信任信息,进行信任评估和授权,该模型包括认证模块和访问控制模块。认证模块实现单点登录的功能,访问控制模型实现基于信任的访问控制和授权功能。  相似文献   

13.
Knowledge sharing is an important component of knowledge management systems. Security knowledge sharing substantially reduces risk and investment in information security. Despite the importance of information security, little research based on knowledge sharing has focused on the security profession. Therefore, this study analyses key factors, containing attitude, self-efficacy, trust, norm of reciprocity, and shared language, in respect of the information security workers intention to share knowledge. Information security professionals in virtual communities, including the Information Security Professional Association (ISPA), Information Systems Security Association (ISSA), Society of Information Risk Analysts (SIRA), and LinkedIn security groups, were surveyed to test the proposed research model. Confirmatory factor analysis (CFA) and the structural equation modelling (SEM) technique were used to analyse the data and evaluate the research model. The results showed that the research model fit the data well and the structural model suggests a strong relationship between attitude, trust, and norms of reciprocity to knowledge sharing intention. Hypotheses regarding the influence of self-efficacy and reciprocity, to knowledge sharing attitude were upheld. Shared language did not influence either the attitude or intention to share knowledge.  相似文献   

14.
This study investigates factors that affect consumer continuous use intention toward online group buying and the degree that reciprocity and reputation of social exchange, trust, and vendor creativity affect consumer satisfaction and intention toward online purchasing. Data from 215 valid samples was obtained using an online survey. The research model is assessed using partial least squares (PLS) analysis. The results show that the intention to engage in online group buying is predicted collectively by consumer satisfaction, trust, and seller creativity. Consumer satisfaction with online group buying is predicted primarily by trust, followed by consumer reciprocity. The proposed research model explains 67.7% of variance for satisfaction and 39.7% of variance for intention to engage in online group buying. The results suggest that reciprocity, trust, satisfaction, and seller creativity provide considerable explanatory power for intention to engage in online group buying behavior.  相似文献   

15.
2005年Science杂志指出"合作行为如何进化"是21世纪最关键的25个科学问题之一.间接互惠如何促进合作演化的研究已吸引了包括经济学家、社会学家和演化生物学家等众多学者的关注.这是由于:人类社会道德的形成、社会化分工、语言的出现、人类大脑的进化等都和间接互惠密不可分;随着经济全球化和网络时代的到来,依赖声望和信誉的陌生个体间的交易日益频繁,局部信息条件下个体的信任被利用的"道德风险"逐渐增大.本文所关注的间接互惠是以声望为核心的"下游互惠",具体而言,个体通过帮助他人建立自己在群体中的好声望,从而期待未来获得他人的帮助.可见,声望是"下游互惠"发挥作用的关键.声望的建立引发了两方面的研究:1)如何评价个体声望的好与坏,焦点是何种声望评估准则能够促进合作的演化;2)个体的声望如何在群体中快速、准确、广泛地传播,使得陌生个体间能够获得彼此的声望信息,其中八卦这种声望传播方式成为间接互惠的研究热点之一.基于声望的间接互惠研究前景广阔,未来可能的研究方向主要有复杂网络上的间接互惠、声望传播系统的鲁棒性、声望共享系统的建立和间接互惠在P2P网络中的应用.  相似文献   

16.
This study developed a theoretical model to explore the antecedents of interpersonal trust and the impact of interpersonal trust and uncertainty on intra‐organisational knowledge sharing in highly information‐technology‐mediated work environments. The proposed model was tested empirically using survey data collected from five telecommunication companies. The findings reveal that interpersonal trust has a positive effect on knowledge sharing, while uncertainty has a negative effect upon knowledge sharing. The results also show that social interaction ties and shared knowledge‐sharing vision are the antecedent factors of interpersonal trust, and that uncertainty regarding knowledge sharing is increased by seeker absorptive capability concerns, reciprocity concerns and fear of losing knowledge power. Some important implications for theory and practice as well as directions for future study are discussed.  相似文献   

17.
Along with the development of artificial intelligence (AI), more IT applications based on AI are being created. A personal intelligent assistant is an AI application that provides information, education, consulting, or entertainment to users. Due to their high levels of cognitive and emotional capabilities, we assume that users can form humanlike relationships with intelligent assistants, therefore, we develop a research model based on the theory of love. Data were collected from users of intelligent assistants through a survey. The results indicate that users can develop intimacy and passion for an AI application similar to that experienced with human beings. These feelings are related to users’ commitment, promoting the usage of an intelligent assistant, influenced by AI factors (performance efficacy and emotional capability), and moderated by human trust disposition.  相似文献   

18.
Artificial societies—distributed systems of autonomous agents—are becoming increasingly important in open distributed environments, especially in e‐commerce. Agents require trust and reputation concepts to identify communities of agents with which to interact reliably. We have noted in real environments that adversaries tend to focus on exploitation of the trust and reputation model. These vulnerabilities reinforce the need for new evaluation criteria for trust and reputation models called exploitation resistance which reflects the ability of a trust model to be unaffected by agents who try to manipulate the trust model. To examine whether a given trust and reputation model is exploitation‐resistant, the researchers require a flexible, easy‐to‐use, and general framework. This framework should provide the facility to specify heterogeneous agents with different trust models and behaviors. This paper introduces a Distributed Analysis of Reputation and Trust (DART) framework. The environment of DART is decentralized and game‐theoretic. Not only is the proposed environment model compatible with the characteristics of open distributed systems, but it also allows agents to have different types of interactions in this environment model. Besides direct, witness, and introduction interactions, agents in our environment model can have a type of interaction called a reporting interaction, which represents a decentralized reporting mechanism in distributed environments. The proposed environment model provides various metrics at both micro and macro levels for analyzing the implemented trust and reputation models. Using DART, researchers have empirically demonstrated the vulnerability of well‐known trust models against both individual and group attacks.  相似文献   

19.
In the 21st century the networked production systems (NPS) are typical in the globalised world. These systems are based on the integration of ICT and new organisational structures. In spite of the abilities of high-tech systems and devices human beings play an important role during the co-operation of the different production units. The cultural differences, the application of computer systems put trust into focus as an important factor of their efficiency and reliable operation. The paper gives an overview how a sufficient level of trust can develop with security mechanism during the different life cycle phases of networked production systems.  相似文献   

20.
Ambient Intelligence is considered as the composition of three emergent technologies: Ubiquitous Computing, Ubiquitous Communication and Intelligent User Interfaces. The aim of integration of aforesaid technologies is to make wider the interaction between human beings and information technology equipment through the usage of an invisible network of ubiquitous computing devices composing dynamic computational-ecosystems capable of satisfy the users requirements. Many works focus the attention on the interaction from users to devices in order to allow an universal and immediate access to available content and services provided by the environment. This paper, vice versa, focuses on the reverse interactions, from devices to users, in order to realize a collection of autonomous control services able to minimize the human effort. In particular, by merging computational intelligence methodologies with standard Web technologies we show how ubiquitous devices will be able to find the suitable set of intelligent services in a transparent way.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号