Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 391720, 11 pages
http://dx.doi.org/10.1155/2013/391720
Research Article

The Reputation Evaluation Based on Optimized Hidden Markov Model in E-Commerce

1DISP Laboratory, University Lumiere of Lyon 2, France College of Information Science and Technology, Chengdu University, Chengdu, China
2College of Information Science and Technology, Chengdu University, Chengdu 610106, China
3Key Laboratory of Pattern Recognition and Intelligent Information Processing in Sichuan, Chengdu 610106, China

Received 24 March 2013; Accepted 21 June 2013

Academic Editor: Yi-Chung Hu

Copyright © 2013 Liu Chang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Morzy, A. Wierzbicki, and A. N. Papadopoulos, “Mining online auction social networks for reputation and recommendation,” Control and Cybernetics, vol. 38, no. 1, pp. 87–106, 2009. View at Google Scholar · View at Scopus
  2. A. Jøsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision,” Decision Support Systems, vol. 43, no. 2, pp. 618–644, 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. V. P. Rindova, I. O. Williamson, and A. P. Petkova, “Reputation as an intangible asset: reflections on theory and methods in two empirical studies of business school reputations,” Journal of Management, vol. 36, no. 3, pp. 610–619, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Thiranarayan, P. Anantharam, C. A. Henson, and A. P. Sheth, “Some trust issues in social networks and sensor networks,” in Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS '10), pp. 573–580, Chicago, Ill, USA, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Sabater and C. Sierra, “Review on computational trust and reputation models,” Artificial Intelligence Review, vol. 24, no. 1, pp. 33–60, 2005. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Ye, G. Gao, and S. Viswanathan, Revoking and Strategic Behavior in Online Reputation Systems: Evidence from EBay, University of Maryland, 2011.
  7. K. Walsh and E. G. Sirer, “Experience with an object reputation system for peer-to-peer filesharing,” in Proceedings of the 3rd Conference on Networked Systems Design and Implementation, vol. 3, pp. 1–1, 2006.
  8. D. H. Henard and P. A. Dacin, “Reputation for product innovation: its impact on consumers,” Journal of Product Innovation Management, vol. 27, no. 3, pp. 321–335, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Jsang and R. Ismail, “The beta reputation system,” in Proceedings of the 15th Bled Conference on Electronic Commerce, pp. 41–55, 2002.
  10. A. Jøsang and J. Haller, “Dirichlet reputation systems,” in Proceedings of the 2nd International Conference on Availability, Reliability and Security (ARES '07), pp. 112–119, Vienna, Austria, April 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. W. T. L. Teacy, J. Patel, N. R. Jennings, and M. Luck, “TRAVOS: trust and reputation in the context of inaccurate information sources,” Autonomous Agents and Multi-Agent Systems, vol. 12, no. 2, pp. 183–198, 2006. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Whitby, A. J. Sang, and J. Indulska, “Filtering out unfair ratings in bayesian reputation systems,” The Icfain Journal of Management Research, vol. 4, no. 2, pp. 48–64, 2005. View at Google Scholar
  13. L. Mui, M. Mohtashemi, and A. Halberstadt, “A computational model of trust and reputation,” in Proceedings of the 35th Hawaii International Conference on System Sciences, pp. 2431–2439, 2002.
  14. M. Nielsen, K. Krukow, and V. Sassone, “A Bayesian model for event-based trust,” in Computation, Meaning, and Logic: Articles Dedicated to Gordon Plotkin, vol. 172 of Electronic Notes in Theoretical Computer Science, pp. 499–521, Elsevier, Amsterdam, The Netherlands, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  15. K. Krukow, M. Nielsen, and V. Sassone, “Trust models in ubiquitous computing,” Philosophical Transactions of the Royal Society of London A, vol. 366, no. 1881, pp. 3781–3793, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  16. V. Sassone, K. Krukow, and M. Nielsen, “Towards a formal framework for computational trust,” in Proceedings of the 5th International Conference on Formal Methods for Components and Objects, pp. 175–184, 2006.
  17. J. Sabater and C. Sierra, “Regret: reputation in gregarious societies,” in Proceedings of the 5th International Conference on Autonomous Agents, pp. 194–195, June 2001. View at Scopus
  18. Z. Lin, D. Li, B. Janamanchi, and W. Huang, “Reputation distribution and consumer-to-consumer online auction market structure: an exploratory study,” Decision Support Systems, vol. 41, no. 2, pp. 435–448, 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Buchegger and J. Y. Le Boudec, “A robust reputation system for mobile ad-hoc networks,” in Proceedings of ACM SIGCOMM Workshop on the Economics of Peer-to-Peer Systems, pp. 1–11, 2003.
  20. B. E. Helvik, S. J. Knapskog, and M. E. G. Moe, “Comparison of the beta and the hidden Markov models of trust in dynamic environments,” in IFIP Advances in Information and Communication Technology, vol. 300, pp. 283–297, 2011. View at Google Scholar
  21. E. ElSalamouny, V. Sassone, and M. Nielsen, “HMM-based trust model,” Journal of Formal Aspects in Security and Trust, pp. 21–35, 2010. View at Google Scholar
  22. E. ElSalamouny, K. T. Krukow, and V. Sassone, “An analysis of the exponential decay principle in probabilistic trust models,” Theoretical Computer Science, vol. 410, no. 41, pp. 4067–4084, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  23. Z. Malik, I. Akbar, and A. Bouguettaya, “Web services reputation assessment using a hidden markov model,” Journal of Service-Oriented Computing, vol. 5900, pp. 576–591, 2009. View at Google Scholar
  24. M. E. G. Moe, M. Tavakolifard, and S. J. Knapskog, “Learning Trust in Dynamic Multiagent Environments using HMMs,” in Proceedings of the 13th Nordic Workshop on Secure IT Systems, Copenhagen, Denmark, 2008.
  25. T.-Y. Chen, X.-D. Mei, J.-S. Pan, and S.-H. Sun, “Optimization of HMM by the tabu search algorithm,” Journal of Information Science and Engineering, vol. 20, no. 5, pp. 949–957, 2004. View at Google Scholar · View at Scopus
  26. K.-J. Won, A. Prügel-Bennett, and A. Krogh, “Training HMM structure with genetic algorithm for biological sequence analysis,” Bioinformatics, vol. 20, no. 18, pp. 3613–3619, 2004. View at Publisher · View at Google Scholar · View at Scopus
  27. K.-E. Ko, S.-M. Park, J. Park, and K.-B. Sim, “Training HMM structure and parameters with genetic algorithm and harmony search algorithm,” Journal of Electrical Engineering and Technology, vol. 7, no. 1, pp. 109–114, 2012. View at Publisher · View at Google Scholar · View at Scopus
  28. S. Aupetit, N. Monmarché, and M. Slimane, “Hidden Markov models training by a particle swarm optimization algorithm,” Journal of Mathematical Modelling and Algorithms, vol. 6, no. 2, pp. 175–193, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  29. F. Yang, C. Zhang, and T. Sun, “Comparison of particle swarm optimization and genetic algorithm for HMM training,” in Proceedings of the 19th International Conference on Pattern Recognition (ICPR '08), pp. 1–4, Tampa, Fla, USA, December 2008. View at Scopus
  30. S. Panda and N. P. Padhy, “Comparison of particle swarm optimization and genetic algorithm for FACTS-based controller design,” Applied Soft Computing Journal, vol. 8, no. 4, pp. 1418–1427, 2008. View at Publisher · View at Google Scholar · View at Scopus
  31. L. R. Rabiner, “Tutorial on hidden Markov models and selected applications in speech recognition,” Proceedings of the IEEE, vol. 77, no. 2, pp. 257–286, 1989. View at Publisher · View at Google Scholar · View at Scopus
  32. J. Kennedy and R. Eberhart, “Particle swarm optimization,” in Proceedings of the IEEE International Conference on Neural Networks, pp. 1942–1948, December 1995. View at Scopus
  33. M. R. AlRashidi and M. E. El-Hawary, “A survey of particle swarm optimization applications in electric power systems,” IEEE Transactions on Evolutionary Computation, vol. 13, no. 4, pp. 913–918, 2009. View at Publisher · View at Google Scholar · View at Scopus
  34. M. A. Abido, “Multiobjective particle swarm optimization for environmental/economic dispatch problem,” Electric Power Systems Research, vol. 79, no. 7, pp. 1105–1113, 2009. View at Publisher · View at Google Scholar · View at Scopus
  35. C. W. Yeung, F. H. F. Leung, K. Y. Chan, and S. H. Ling, “An integrated approach of particle swarm optimization and support vector machine for gene signature selection and cancer prediction,” in Proceedings of the International Joint Conference on Neural Networks (IJCNN '09), pp. 3450–3456, Atlanta, Ga, USA, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  36. Z. Zhu, J. Zhou, Z. Ji, and Y.-H. Shi, “DNA sequence compression using adaptive particle swarm optimization-based memetic algorithm,” IEEE Transactions on Evolutionary Computation, vol. 15, no. 5, pp. 643–658, 2011. View at Publisher · View at Google Scholar · View at Scopus
  37. S. Cheng, Y. Shi, and Q. Qin, “Experimental study on boundary constraints handling in particle swarm optimization: from population diversity perspective,” International Journal of Swarm Intelligence Research, vol. 2, no. 3, pp. 43–69, 2011. View at Google Scholar
  38. D. Houser and J. Wooders, “Reputation in auctions: theory, and evidence from eBay,” Journal of Economics and Management Strategy, vol. 15, no. 2, pp. 353–369, 2006. View at Publisher · View at Google Scholar · View at Scopus