{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T18:00:04Z","timestamp":1709834404096},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,2,17]],"date-time":"2011-02-17T00:00:00Z","timestamp":1297900800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1007\/s10489-011-0280-5","type":"journal-article","created":{"date-parts":[[2011,2,16]],"date-time":"2011-02-16T11:18:58Z","timestamp":1297855138000},"page":"617-637","source":"Crossref","is-referenced-by-count":37,"title":["Service selection in stochastic environments: a\u00a0learning-automaton based solution"],"prefix":"10.1007","volume":"36","author":[{"given":"Anis","family":"Yazidi","sequence":"first","affiliation":[]},{"given":"Ole-Christoffer","family":"Granmo","sequence":"additional","affiliation":[]},{"given":"B. John","family":"Oommen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,17]]},"reference":[{"issue":"6","key":"280_CR1","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1109\/TSMCB.2002.1049608","volume":"32","author":"M Agache","year":"2002","unstructured":"Agache M, Oommen BJ (2002) Generalized pursuit learning schemes: new families of continuous and discretized learning automata. IEEE Trans Syst Man Cybern, Part B, Cybern 32(6):738\u2013749","journal-title":"IEEE Trans Syst Man Cybern, Part B, Cybern"},{"key":"280_CR2","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/s10489-006-8867-y","volume":"25","author":"H Altincay","year":"2006","unstructured":"Altincay H (2006) On the independence requirement in Dempster-Shafer theory for combining classifiers providing statistical evidence. Appl Intell 25:73\u201390. doi: 10.1007\/s10489-006-8867-y","journal-title":"Appl Intell"},{"key":"280_CR3","volume-title":"Proceedings of the second workshop on the economics of peer-to-peer systems","author":"S Buchegger","year":"2004","unstructured":"Buchegger S, Le Boudec J (2004) A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of the second workshop on the economics of peer-to-peer systems"},{"key":"280_CR4","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1145\/501158.501175","volume-title":"Proceedings of the 3rd ACM conference on electronic commerce","author":"M Chen","year":"2001","unstructured":"Chen M, Singh JP (2001) Computing and using reputations for internet ratings. In: Proceedings of the 3rd ACM conference on electronic commerce, Tampa, FL, USA. ACM, New York, pp 154\u2013162"},{"key":"280_CR5","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1145\/352871.352889","volume-title":"Proceedings of the 2nd ACM conference on electronic commerce","author":"C Dellarocas","year":"2000","unstructured":"Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proceedings of the 2nd ACM conference on electronic commerce, Minneapolis, Minnesota, USA. ACM, New York, pp 150\u2013157"},{"key":"280_CR6","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-30104-2_6","volume-title":"Cooperative information agents VIII","author":"Z Despotovic","year":"2004","unstructured":"Despotovic Z, Aberer K (2004) A probabilistic approach to predict peers performance in P2P networks. In: Cooperative information agents VIII, pp 62\u201376"},{"key":"280_CR7","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1023\/B:APIN.0000021413.05467.20","volume":"20","author":"K Faceli","year":"2004","unstructured":"Faceli K, de Carvalho A, Rezende S (2004) Combining intelligent techniques for sensor fusion. Appl Intell 20:199\u2013213. doi: 10.1023\/B:APIN.0000021413.05467.20","journal-title":"Appl Intell"},{"issue":"5","key":"280_CR8","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1109\/12.53585","volume":"39","author":"W Gale","year":"1990","unstructured":"Gale W, Das S, Yu C (1990) Improvements to an algorithm for equipartitioning. IEEE Trans Comput 39(5):706\u2013710","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"280_CR9","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618\u2013644","journal-title":"Decis Support Syst"},{"key":"280_CR10","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/s10489-009-0170-2","volume":"33","author":"X Li","year":"2010","unstructured":"Li X, Dai X, Dezert J, Smarandache F (2010) Fusion of imprecise qualitative information. Appl Intell 33:340\u2013351. doi: 10.1007\/s10489-009-0170-2","journal-title":"Appl Intell"},{"issue":"2","key":"280_CR11","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1006\/inco.1994.1009","volume":"108","author":"N Littlestone","year":"1994","unstructured":"Littlestone N, Warmuth MK (1994) The weighted majority algorithm. Inf Comput 108(2):212\u2013261","journal-title":"Inf Comput"},{"issue":"6","key":"280_CR12","doi-asserted-by":"crossref","first-page":"1794","DOI":"10.1137\/S0097539701398363","volume":"31","author":"M Mayur Datar","year":"2002","unstructured":"Mayur Datar M, Gionis A, Indyk P, Motwani R (2002) Maintaining stream statistics over sliding windows. SIAM J Comput 31(6):1794\u20131813","journal-title":"SIAM J Comput"},{"issue":"3\u20134","key":"280_CR13","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.peva.2007.05.004","volume":"65","author":"J Mundinger","year":"2008","unstructured":"Mundinger J, Le Boudec J-Y (2008) Analysis of a reputation system for mobile ad-hoc networks with liars. Perform Eval 65(3\u20134):212\u2013226","journal-title":"Perform Eval"},{"key":"280_CR14","volume-title":"Learning automata: an introduction","author":"KS Narendra","year":"1989","unstructured":"Narendra KS, Thathachar MAL (1989) Learning automata: an introduction. Prentice-Hall, New Jersey"},{"key":"280_CR15","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/s10489-007-0102-y","volume":"30","author":"A Obied","year":"2009","unstructured":"Obied A, Alhajj R (2009) Fraudulent and malicious sites on the web. Appl Intell 30:112\u2013120. doi: 10.1007\/s10489-007-0102-y","journal-title":"Appl Intell"},{"issue":"1","key":"280_CR16","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/12.75146","volume":"37","author":"B Oommen","year":"1988","unstructured":"Oommen B, Ma D (1988) Deterministic learning automata solutions to the equipartitioning problem. IEEE Trans Comput 37(1):2\u201313","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"280_CR17","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/12.485372","volume":"45","author":"BJ Oommen","year":"1996","unstructured":"Oommen BJ, de St Croix EV (1996) Graph partitioning using learning automata. IEEE Trans Comput 45(2):195\u2013208","journal-title":"IEEE Trans Comput"},{"issue":"6","key":"280_CR18","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1093\/comjnl\/36.6.542","volume":"36","author":"BJ Oommen","year":"1993","unstructured":"Oommen BJ, Fothergill C (1993) Fast learning automaton-based image examination and retrieval. Comput J 36(6):542\u2013553","journal-title":"Comput J"},{"issue":"1","key":"280_CR19","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/12.75146","volume":"37","author":"BJ Oommen","year":"1988","unstructured":"Oommen BJ, Ma DCY (1988) Deterministic learning automata solutions to the equipartitioning problem. IEEE Trans Comput 37(1):2\u201313","journal-title":"IEEE Trans Comput"},{"issue":"6","key":"280_CR20","first-page":"A105","volume":"34","author":"BJ Oommen","year":"1992","unstructured":"Oommen BJ, Ma DCY (1992) Stochastic automata solutions to the object partitioning problem. Comput J 34(6):A105\u2013A120","journal-title":"Comput J"},{"key":"280_CR21","volume-title":"Learning automata and stochastic optimization","author":"AS Poznyak","year":"1997","unstructured":"Poznyak AS, Najim K (1997) Learning automata and stochastic optimization. Springer, Berlin"},{"key":"280_CR22","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1145\/544741.544808","volume-title":"Proceedings of the first international joint conference on autonomous agents and multiagent systems: part 1","author":"S Sen","year":"2002","unstructured":"Sen S, Sajja N (2002) Robustness of reputation-based trust: boolean case. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part 1, Bologna, Italy. ACM, New York, pp 288\u2013293"},{"issue":"1","key":"280_CR23","doi-asserted-by":"crossref","first-page":"20","DOI":"10.2307\/3003427","volume":"13","author":"C Shapiro","year":"1982","unstructured":"Shapiro C (1982) Consumer information, product quality, and seller reputation. Bell J Econ 13(1):20\u201335","journal-title":"Bell J Econ"},{"issue":"6","key":"280_CR24","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TSMCB.2002.1049606","volume":"32","author":"MAL Thathachar","year":"2002","unstructured":"Thathachar MAL, Sastry PS (2002) Varieties of learning automata: an overview. IEEE Trans Syst Man Cybern, Part B, Cybern 32(6):711\u2013722","journal-title":"IEEE Trans Syst Man Cybern, Part B, Cybern"},{"key":"280_CR25","volume-title":"Networks of learning automata: techniques for online stochastic optimization","author":"MAL Thathachar","year":"2003","unstructured":"Thathachar MAL, Sastry PS (2003) Networks of learning automata: techniques for online stochastic optimization. Kluwer Academic, Boston"},{"key":"280_CR26","volume-title":"Automaton theory and the modeling of biological systems","author":"ML Tsetlin","year":"1973","unstructured":"Tsetlin ML (1973) Automaton theory and the modeling of biological systems. Academic Press, New York"},{"issue":"2","key":"280_CR27","first-page":"48","volume":"4","author":"A Whitby","year":"2005","unstructured":"Whitby A, J\u00f8sang A, Indulska J (2005) Filtering out unfair ratings in bayesian reputation systems. J Manag Res 4(2):48\u201364","journal-title":"J Manag Res"},{"key":"280_CR28","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/860575.860588","volume-title":"Proceedings of the second international joint conference on autonomous agents and multiagent systems","author":"B Yu","year":"2003","unstructured":"Yu B, Singh MP (2003) Detecting deception in reputation management. In: Proceedings of the second international joint conference on autonomous agents and multiagent systems, Melbourne, Australia. ACM, New York, pp 73\u201380"},{"key":"280_CR29","doi-asserted-by":"crossref","unstructured":"Yuan W, Guan D, Lee Y-K, Lee S (2010) The small-world trust network. Appl Intell 1\u201312. doi: 10.1007\/s10489-010-0230-7","DOI":"10.1007\/s10489-010-0230-7"},{"issue":"9","key":"280_CR30","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1080\/08839510050144868","volume":"14","author":"G Zacharia","year":"2000","unstructured":"Zacharia G, Maes P (2000) Trust management through reputation mechanisms. Appl Artif Intell 14(9):881\u2013907","journal-title":"Appl Artif Intell"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s10489-011-0280-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/article\/10.1007\/s10489-011-0280-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s10489-011-0280-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T15:40:18Z","timestamp":1560008418000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/10.1007\/s10489-011-0280-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,17]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,4]]}},"alternative-id":["280"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s10489-011-0280-5","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,17]]}}}