期刊文献+

基于文本语义和社会结构的可信度研究 被引量:1

Research on reliability based on text semantic and social structure
下载PDF
导出
摘要 提出了一个基于文本上下文信息和用户社会结构的组合信任模型TCtrust,给出了置信模型,分别从显式和隐式信任对置信值进行了度量,设计出根据置信度排序的算法。通过对新浪微博热门话题"美国总统大选"进行实验,该算法在可信度上优于新浪微博的默认搜索算法,且能充分兼顾用户喜好、用户自身的影响力等因素,优于传统的LDA算法。 This paper proposed trust model based on the combination of text context information and the user social structure TCtrust, and gave confidence model, the confidence value from explicit and implicit trust measure, designed according to the confidence sort algorithms. By Sina microblogging hot topic" U. S. presidential election" experiment, the algorithm was superi- or in credibility the Sina microblogging default search algorithm, and could take into account user preferences, the user' s own influence factors such as superior to the traditional LDA algorithm.
作者 陈珂 卞先华
出处 《计算机应用研究》 CSCD 北大核心 2013年第8期2334-2336,2356,共4页 Application Research of Computers
基金 广东省科技计划项目(2012B0101100037) 国家自然科学基金资助项目(61272382 61001016 61102136)
关键词 文本 TCtrust模型 社会结构 置信度 text TCtrust model communication structure reliability
  • 相关文献

参考文献9

  • 1Weibo. corn[ EB/OL]. (2012-10-31 ).
  • 2ZHANG J, ACKERMAN M S, ADAMIC L. Expertise networks in on- line communities : structure and algorithms [ C ]//Proc of the 16th In- ternational World Wide Web Conference. 2007.
  • 3BLEI D M, NG A Y, JORDAN M I. Latent Dirichlet allocation[J]. Journal of Machine Learning Research,2003,3:993-1022.
  • 4鲍捷,程久军.基于社交网络的群体信任算法[J].计算机科学,2012,39(2):38-41. 被引量:11
  • 5胡军,李志昂.Agent组织中的政策导向型协作模型[J].计算机研究与发展,2012,49(7):1474-1493. 被引量:2
  • 6KAMVAR S D, SCHLOSSER M T, GARCIA-MOLINA H. The eigentmst algorithm for reputation management in P2P networks [ C ]//Proc of the 12th International World Wide Web Conference. 2003:640- 651.
  • 7ALONSO O, CARSON C, GERSTER D, et al. Detecting uninteres- ting content in text streams [ C ]//Proc of SIGIR Crowdsourcing for Search Evaluation Workshop. 2010.
  • 8GIRVAN M, NEWMAN M. Community structure in social and biologi- cal networks [ J ] Proceedings of the National Academic of Science ,2002,99(12) :7821-7826.
  • 9李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115

二级参考文献47

  • 1高济,吕何新,郭航,张凡,程昱,傅朝阳,王存浩.可信的自治式服务协同模型和应用开发构架[J].中国科学(F辑:信息科学),2009,39(11):1146-1175. 被引量:10
  • 2吕建,陶先平,马晓星,胡昊,徐锋,曹春.基于Agent的网构软件模型研究[J].中国科学(E辑),2005,35(12):1233-1253. 被引量:43
  • 3吕建,马晓星,陶先平,徐锋,胡昊.网构软件的研究与进展[J].中国科学(E辑),2006,36(10):1037-1080. 被引量:101
  • 4李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:137
  • 5Beth T,Borcherding M,Klein B.Valuation of trust in open net-work[C]∥Proceedings of the European Symposium on Re-search in Security.Brighton:Springer-Verlag,1994:3-18.
  • 6Almenarez F,Matin A,Diaz D,et al.Developing a model fortrust management in pervasive devices[C]∥Proceedings of the4th annual IEEE International Conference on Pervasive Compu-ting and Communication Workshop.Washington:IEEE Compu-ter Society Press,2006:267-272.
  • 7Theodorakopoulos G,Baras J S.Trust evaluation in ad-hoc net-works[C]∥Proceedings of the 3rd ACM Workshop on WirelessSecurity.Philadelphia,Pennsylvania,USA,2004:1-10.
  • 8Liang Zheng-qiang,Shi Wei-song.PET:A PErsonalized trustmodel with reputation and risk evaluation for P2Presource sha-ring[C]∥Proceedings of the 38th Hawaii International Confe-rence on System Sciences.Washington:IEEE Computer Society,2005:287-295.
  • 9Liu Xiong,Liu Ling.PeerTrust:Supporting reputation-basedtrust for Peer-to-Peer electronic communities[J].IEEE Tran-sactions on Knowledge Data Engineering,2004,16(7):843-857.
  • 10Bhuiyan T,Xu Y,Jsang A.Integrating trust with public repu-tation in location-based social networks for recommendationmaking[C]∥Proceedings of IEEE/WIC/ACM InternationalConference on Web Intelligence and Intelligent Agent Technolo-gy.Sydney,NSW,2008:107-110.

共引文献125

同被引文献13

  • 1互动百科:僵尸粉[EB/OL].[2012-02-10].http://www.hudong.eom/wiki/%E5%83%B5%E5%B0%B8%E7%B2%89.
  • 2王鹏.新浪虚假微博用户多达上亿多为内部人员培植以牟利[EB/OL].[2013-02-22].http://teeh.ifeng.com/internet/detail-2013-02/22/22375816_0.shtml.
  • 3Zi Chu, Gianvecchio S, Wang Haining, et al. Detecting auto- mation of twitter accounts: Are you a human, hot, or cyborg?[J]. Dependable and Secure Computing, 2012, 9 (6): 811-824.
  • 4Musa A B. Comparative study on classification performance be- tween support vector machine and logistic regression [J]. In- ternational Journal of Machine Learning and Cybernetics, 2013, 4 (1) :13-24.
  • 5Dou Huili, Wang Guohua, Guo Min. Algorithm of traffic state probability forecast based on logistic regression [C] //In- ternational Conference on Electronics, Information and Commu- nication Engineering. New York: ASME, 2012: 99-104.
  • 6Gupta A, Kumaraguru P. Credibility ranking of tweets during high impact events [C] //Proceedings of the 1st Workshop on Privacy and Security in Online Social Media. New York: ACM, 2012.
  • 7Gupta M, Zhao Peixiang, Han Jiawei. Evaluativ_g event credi- bility on twitter [C] //Proceeddngs of the Twelfth SIAM Interna- tional Conference on Data Minkn4g. Anaheim: Omni Press, 2012: 153-164.
  • 8奉国和.文本分类性能评价研究[J].情报杂志,2011,30(8):66-70. 被引量:38
  • 9原福永,冯静,符茜茜,曹旭峰.一种降低微博僵尸粉影响的方法[J].现代图书情报技术,2012(5):70-75. 被引量:9
  • 10方明,方意.一种新型智能僵尸粉甄别方法[J].计算机工程,2013,39(4):190-193. 被引量:11

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部