Skip to main content

Agents Selecting Trustworthy Recommendations in Mobile Virtual Communities

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5396))

Abstract

We propose a trust model for recommender systems in mobile virtual communities that improves the quality of recommendations. High-quality recommendations come from trustworthy recommenders and are supported by convincing (from a user’s viewpoint) arguments. Such recommendations match better a user’s profile and his/her way of reasoning. We also propose a mobile open multi-agent framework for our model of trust. In this framework each member is represented by an embedded agent, which resides in the user’s mobile, and by a delegate agent, which runs in a meeting infrastructure (called Virtual Agora) where it interacts with other delegates. Each delegate builds and maintains two weighted and subjective networks of trust: a register of recommenders of proven (un)trustworthiness and a register of rated items. In our setting, delegates generally prefer opinions that come from their network of recommenders; moreover delegates are able to play argumentation games. The implemented system is also privacy preserving. Agents receive different ratings depending on their trustworthy recommenders and these ratings are not necessarily public. Since we address mobile communities of users, the Virtual Agora is designed to reduce communication traffic between agents. Finally, we illustrate these concepts in a recommender system for restaurants.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Balabanović, M., Shoham, Y.: Fab: content-based, collaborative recommendation. Commun. ACM 40(3), 66–72 (1997)

    Article  Google Scholar 

  2. Barber, K.S., Kim, J.: Soft security: Isolating unreliable agents from society. In: Proc. of the 5th Workshop on Deception, Fraud and Trust in Agent Societies, AAMAS 2002, Bologna, Italy, July 15-19, pp. 8–17. ACM, New York (2002)

    Google Scholar 

  3. Bentahar, J., Maamar, Z., Benslimane, D., Thiran, P.: Using argumentative agents to manage communities of web services. In: Proc. of the Workshop on Web and Mobile Information Services (WAMIS 2007), the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Canada, May 21-23, 2007, vol. 2, pp. 588–593. IEEE Computer Society, Los Alamitos (2007)

    Google Scholar 

  4. Bentahar, J., Meyer, J.J.C.: A new quantitative trust model for negotiating agents using argumentation. Int. Journal of Computer Science & Applications 4(2), 39–50 (2007)

    Google Scholar 

  5. Berners-Lee, T., Hendler, J., Lassila, O.: The semantic web. Scientific American (May 2001)

    Google Scholar 

  6. Bryl, V., Fante, S., Giorgini, P.: ToothAgent: A multi-agent system for virtual communities support. In: Kolp, M., Henderson-Sellers, B., Mouratidis, H., Garcia, A., Ghose, A.K., Bresciani, P. (eds.) AOIS 2006. LNCS, vol. 4898, pp. 46–56. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Castelfranchi, C.: Representation and integration of multiple knowledge sources: Issues and questions, pp. 235–254. Plenum Press (1997)

    Google Scholar 

  8. Castelfranchi, C.: Reasons to believe: cognitive models of beliefs change. In: Proc. of the Int. Workshop on Cognitive, computational and logical approaches to belief change, Amsterdam, The Netherlands (2004)

    Google Scholar 

  9. Deriaz, M.: Trusting Virtual Tags, pp. 17–31. Université de Geneve, CUI (2007)

    Google Scholar 

  10. ElMessiry, A.: Advanced expectation enhanced trust model for e-commerce. In: Proc. of the 11th Int. Workshop on Trust in Agent Societies (TRUST 2008), AAMAS 2008, pp. 215–224 (2008)

    Google Scholar 

  11. Foner, L.: Yenta: A multi-agent, referral based matchmaking system. In: Proc. of the 1st Int. Conf. on Autonomous Agents, pp. 301–307. ACM, New York (1997)

    Google Scholar 

  12. Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: Enabling scalable virtual organizations. International J. Supercomputer Applications 15(3), 200–222 (Fall 2001)

    Google Scholar 

  13. Fuentes, R., Gómez-Sanz, J.J., Pavón, J.: A Sociological Framework for Multi-agent Systems Validation and Verification. In: Wang, S., Tanaka, K., Zhou, S., Ling, T.-W., Guan, J., Yang, D.-q., Grandi, F., Mangina, E.E., Song, I.-Y., Mayr, H.C. (eds.) ER Workshops 2004. LNCS, vol. 3289, pp. 458–469. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Horling, B., Lesser, V.: A survey of multi-agent organizational paradigms. The Knowledge Engineering Review 19(4), 281–316 (2005)

    Article  Google Scholar 

  15. JADEX (2008), http://vsis-www.informatik.uni-hamburg.de/projects/jadex/

  16. Jennings, N.R., Sycara, K., Wooldridge, M.: A roadmap of agent research and development. Autonomous Agents and Multi-Agent Systems 1(1), 7–38 (1998)

    Article  Google Scholar 

  17. Jøsang, A.: A subjective metric of authentication. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 329–344. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  18. Jøsang, A., Gray, L., Kinateder, M.: Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems Journal 4(2), 139–161 (2006)

    Google Scholar 

  19. Jøsang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proc. of the 29th Australasian Computer Science Conference (ACSC 2006), Australia, January 16-19. ACM International Conference Proceeding Series, vol. 48, pp. 85–94. Australian Computer Society (2006)

    Google Scholar 

  20. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)

    Article  Google Scholar 

  21. Koolwaaij, J., Tarlano, A., Luther, M., Nurmi, P., Mrohs, B., Battestini, A., Vaidya, R.: Contextwatcher - sharing context information in everyday life. In: Proc. of the IASTED Int. Conf. on Web Technologies, Applications, and Services (WTAS 2006), Calgary, CA, pp. 39–60. ACTA Press (2006)

    Google Scholar 

  22. Lenzini, G., Sahli, N.: Argumentation-based trust in recommender systems. In: Proc. of the Special session: Trust in Pervasive Systems and Networks, at SECRYPT part of the ICETE - The Int. Joint Conf. on e-Business and Telecommunications, Porto, Portugal (to appear, 2008)

    Google Scholar 

  23. Lenzini, G., Tokmakoff, A., Muskens, J.: Managing trustworthiness in component-based embedded systems. In: Etalle, S., Samarati, P. (eds.) Proc. of the 2nd Security and Trust Management Workshop (STM 2006), held in conjunction with the 11th European Symposium on Research In Computer Security (ESORICS 2006), Hamburg, Germany, September 20-21, 2006. Electronic Notes in Theoretical Computer Science, vol. 176, pp. 143–155. Elsevier, Science Direct (2006)

    Google Scholar 

  24. Maamar, Z., Sahli, N., Moulin, B., Labbe, P.: A software agent-based collaborative approach for humanitarian-assistance scenarios. Information and Security: An Int. Journal 8(2), 135–155 (2002)

    Google Scholar 

  25. Maher, M.J.: Propositional defeasible logic has linear complexity. Theory Pract. Log. Program 1(6), 691–711 (2001)

    Google Scholar 

  26. McBurney, P., Parsons, S.: Games that agents play: A formal framework for dialogues between autonomous agents. Journal of Logic, Language, and Information 11(3), 315–334 (2002)

    Google Scholar 

  27. Miller, B., Konstan, J., Riedl, J.: Toward a personal recommender system. ACM Transactions on Information Systems 22(3), 437–476 (2004)

    Google Scholar 

  28. El Morr, C., Kawash, J.: Mobile virtual communities: Current trends and future perspectives. Int. Journal of Web Based Communities 3(4), 386–403 (2007)

    Google Scholar 

  29. Nute, D.: Defeasible logic. In: Gabbay, D., Hogger, C.J., Robinson, J.A. (eds.) Handbook of Logic in Artificial Intelligence and Logic Programming. Nonmonotonic Reasoning and Uncertain Reasoning, vol. 3, pp. 353–395. Oxford University Press, Oxford (1994)

    Google Scholar 

  30. Olsson, T.: Bootstrapping and Decentralizing Recommender Systems. PhD thesis, Uppsala University and SICS (2006)

    Google Scholar 

  31. Preece, J.: Online Communities: Designing Usability, Supporting Sociability. John Wiley and Sons, Chichester (2000)

    Google Scholar 

  32. Rao, A.S., Georgeff, M.: Bdi agents: from theory to practice. In: Proc. of the 1st Int. Conference on Multi-Agent Systems (ICMAS 1995), San Francisco, USA, June 12-14, pp. 312–319. AAAI Press, Menlo Park (1995)

    Google Scholar 

  33. Resnick, P., Zeckhauser, R.: Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System. In: The Economics of the Internet and E-Commerce, vol. 11, pp. 127–157. Elsevier Science, Amsterdam (2002)

    Chapter  Google Scholar 

  34. Ruohomaa, S., Kutvonen, L.: Trust management survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  35. Sabater, J., Sierra, C.: Social regret, a reputation model based on social relations. SIGecom Exchanges 3(1), 44–56 (2002)

    Article  Google Scholar 

  36. Teacy, W., Patel, J., Jennings, N., Luck, M.: Coping with inaccurate reputation sources: Experimental analysis of a probabilistic trust model. In: Proc. of the 4th Int. Joint Conf. AAMAS, pp. 997–1004 (2005)

    Google Scholar 

  37. Toivonen, S., Lenzini, G., Uusitalo, I.: Context-aware trustworthiness evaluation with indirect knowledge. In: Proc. of the 2nd Semantics Web Policy Workshop (SWPW 2006), CEUR Workshop Proceedings, CEUR-WS.org (2006)

    Google Scholar 

  38. Tveit, A.: Peer-to-peer based recommendations for mobile commerce. In: Proc. of the 1st int. workshop on Mobile commerce (WMC 2001), Rome, Italy, pp. 26–29. ACM, New York (2001)

    Google Scholar 

  39. van Setten, M., Veenstra, M., Nijholt, A.: Rediction strategies: Combining prediction techniques to optimize personalization. In: Proc. of the workshop Personalization in Future TV 2002, pp. 23–32 (2002)

    Google Scholar 

  40. van Setten, M., Veenstra, M., Nijholt, A., van Dijk, B.: Case-based reasoning as a prediction strategy for hybrid recommender systems. In: Proc. of the Atlantic Web Intelligence Conference, pp. 13–22 (2004)

    Google Scholar 

  41. Yu, B., Singh, M.P.: An evidential model of distributed reputation management. In: Proc. of 1st Int. Joint Conference on Autonomous Agents and Multi-Agent Systems, AAMAS 2002, Bologna, Italy, July 15-19, pp. 294–301 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lenzini, G., Sahli, N., Eertink, H. (2008). Agents Selecting Trustworthy Recommendations in Mobile Virtual Communities. In: Falcone, R., Barber, S.K., Sabater-Mir, J., Singh, M.P. (eds) Trust in Agent Societies. TRUST 2008. Lecture Notes in Computer Science(), vol 5396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92803-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-92803-4_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-92802-7

  • Online ISBN: 978-3-540-92803-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics