期刊文献+

一种支持用户风险偏好的服务评估方法

A service evaluation method based on risk preferences
下载PDF
导出
摘要 针对服务质量波动所造成的选择风险性,提出一种支持用户风险偏好的服务评估方法.首先,根据区间数理论处理缺失信息,对用户评分进行完整描述.然后,根据用户面对不确定信息的风险倾向性不同,引入风险偏好对用户进行细分,并确定用户的服务感知风险.最后,根据服务收益最大化原则,将服务属性进行划分并结合用户属性偏好度得到服务收益,权衡服务收益与用户感知风险得到综合评估结果.仿真实验表明:与其他服务评估方法相比,本方法在表达用户属性偏好的同时也清晰表达了用户的风险偏好特征,更好地体现用户个性化差异,具有更高的用户满意度. We propose a service evaluation method based on risk preferences (SEM-RP) for the risk caused by quality volatility. First, complete description rating information according to the interval number theory is made. Then we use risk preference to identify user' s perceived risk in order to express different user' s risk propensity. After that, service revenue is obtained by calculate service attributes and users' preferences according to the principle of revenue maximization, and finally we get service evaluation rating by calculate service revenue and user' s perceived risk. Simulation experiments and results demonstrate that the proposed method can clearly express the characteristics of user' s risk preference while expressing user preferences attributes and which have the performance of higher user satisfaction.
出处 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2016年第5期110-116,共7页 Journal of Harbin Institute of Technology
基金 国家自然科学基金(61201163)
关键词 服务评估 风险偏好 风险效用 服务收益 service evaluation risk preference risk utility service revenue
  • 相关文献

参考文献21

  • 1KONDRATYEVA1 O, CAVALLI A, KUSHIK N, et al.Evaluating quality of web services: a short survey[C] //Proceedings of IEEE 20th International Conference on Web Services.Santa Clara:IEEE, 2013: 587-594.
  • 2BENOUARET K,BENSLIMANE D,HADJALI A.WS-Sky: an efficient and flexible framework for qos-aware web service selection[C] // Proceedings of IEEE Ninth International Conference on Services Computing.Honolulu:IEEE, 2012:146-153.
  • 3MALIK Z, BOUGUETTAYA A.RATEWeb: m [J].The VLDB Journal, 9,8(4): 885-911.
  • 4吴青林,周天宏.不确定QoS信息下的web服务选择方法研究[J].湖北大学学报(自然科学版),2015,37(2):179-184. 被引量:3
  • 5CUI Yuehui, CHEN Chang, ZHAO Zhengde.Web service selection based on credible user recommended and QoS[C] // Proceedings of IEEE/ACIS 11th International Conference on Computer and Information Science.Shanghai,:IEEE, 2012:637-642.
  • 6LIU TAO, XU FENG, YAO Yuan, et al.A group recommendation approach for service selection[C] //Proceedings of the Fourth Asia-Pacific Symposium on Internetware.Qingdao: ACM, 2012.
  • 7ARNES A, VALEUR F, VIGNA G, et al.Using hidden Markov models to evaluate the risk of intrusions[C]//Proceedings of the RAID06.Hamburg:Springer, 2006: 145-164.
  • 8SIMON D.Kalman filtering with state constriants:a survey of linear and nonlinear algorithms[J].IET Control Theory and Applications,0,4(8):1303-1318.
  • 9BOULKROUNE B,DAROUACH M,ZASADZINSKI M.Moving horizon state estimation for linear discrete-time singular systems[J].IET Control Theory and Applications,0,4(3):339-350.
  • 10李伟明,雷杰,董静,李之棠.一种优化的实时网络安全风险量化方法[J].计算机学报,2009,32(4):793-804. 被引量:48

二级参考文献116

共引文献133

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部