# Authors Title Details Date Pdf/Links/Bibtex Keywords
13Rizzo L., Longo L.Comparing and extending the use of defeasible argumentation with quantitative data in real-world contexts Information fusion 2023 Defeasible Argumentation Knowledge-based Systems Non-monotonic Reasoning Fuzzy Logic Expert Systems Computational Trust
10.1016/j.inffus.2022.08.025
12Rizzo L. Dondio P., Longo L.Exploring the potential of defeasible argumentation for quantitative inferences in real-world contexts: An assessment of computational trust Proceedings for the 28th AIAI Irish Conference on Artificial Intelligence and Cognitive Science, Dublin, Ireland, December 7-8, 2020 2020 Defeasible Argumentation Argumentation Theory Explainable Artificial Intelligence Non-monotonic Reasoning Computational Trust
11Yashkina E., Pinigin A., Lee JY, Mazzara M., Adekotujo A.S., Zubair A., Longo L.Expressing Trust with Temporal Frequency of User Interaction in Online Communities 33rd International Conference on Advanced Information Networking and Applications 2019 Reputation Management Computational Trust Online Communities Social Media Social Networks Modeling
10.1007/978-3-030-15032-7_95
10Melnikov A., Mazzara M., Rivera V., Lee J., Longo L.Towards Dynamic Interaction-Based Reputation Models IEEE 32nd International Conference on Advanced Information Networking and Applications 2018 Computational Trust Reputation Interaction Modeling
10.1109/AINA.2018.00070
9Dondio P., Longo L.Computing Trust as a form of Presumptive Reasoning IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) 2014 Computational Trust Online communities fuzzy logics Presumptive Reasoning Modeling Artificial Intelligence
10.1109/WI-IAT.2014.108
8Dondio P., Longo L.Trust-Based Techniques for Collective Intelligence in Social Search Systems Next generation data technologies for collective computational intelligence 2011 Computational Trust Collective Intelligence Social Search Modeling
7Longo L., Dondio P., Barrett S.Enhancing social search: a computational collective intelligence model of behavioural traits, trust and time Transactions on computational collective intelligence II 2010 Social Search Computational Trust, Collective Intelligence Modeling Human-Computer Interaction
6Longo L., Barrett S.A context-aware approach based on self-organizing maps to study web-users' tendencies from their behaviour International Workshop on Context-Aware Middleware and Services: affiliated with the 4th International Conference on Communication System Software and Middleware 2009 Context-awareness Computational Trust Distributed Systems Social Search Self-Organizing maps Human-Computer Interaction Modeling
10.1145/1554233.1554237
5Longo L., Dondio P., Riccardo B., Butterfield A., Barrett S.Enabling Adaptation in Trust Computations Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns 2009 Computational Trust Adaptation Multi-agent Systems Web 2.0 Non-monotonic Reasoning Modeling
10.1109/ComputationWorld.2009.70
4Longo L., Barrett S., Dondio P.Information foraging theory as a form of collective intelligence for social search International Conference on Computational Collective Intelligence 2009 Collective Intelligence Social Search Computational Trust Human-Computer Interaction
3Longo L., Barrett S., Dondio P.Toward Social Search-From Explicit to Implicit Collaboration to Predict Users' Interests 5th International Conference on Web Information Systems and Technologies 2009 Social Search User Behavior Computational Trust Web Site Classification Human-Computer Interaction
2Dondio P., Longo L., Barrett S.A translation mechanism for recommendations Trust Management II - Joint iTrust and PST Conferences on Privacy, Trust Management and Security. 2008 Computational Trust Recommendation Modeling
1Longo L., Dondio P., Barrett S.Temporal Factors to evaluate trustworthiness of virtual identities Third International Conference on Security and Privacy in Communications Networks and the Workshops. SecureComm. 2007 Computational Trust Temporal Factors Virtual Identities Modeling
# Authors Title Details Date Pdf/Links/Bibtex Keywords