International Journal of Business Information Systems Strategies (IJBISS) Volume 3, Number 1,February 2014
19
[10]A. Caballero, J. Botia, and A. Gomez-Skarmeta, “A new model for trust and reputation management
with an ontology based approach for similarity between tasks,” Multiagent System Technologies, pp.
172–183, 2006.
[11]A. Caballero, J. Botía, and A. Gómez-Skarmeta, “On the Behaviour of the TRSIM Model for Trust
and Reputation,” Multiagent System Technologies, pp. 182–193, 2007.
[12]G. Jeh and J. Widom, “SimRank: a measure of structural-context similarity,” in Proceedings of the
eighth ACM SIGKDD international conference on Knowledge discovery and data mining, 2002, pp.
538–543.
[13]D. B. Lenat, “CYC: A large-scale investment in knowledge infrastructure,” Communications of the
ACM, vol. 38, no. 11, pp. 33–38, 1995.
[14]G. A. Miller and others, “WordNet: a lexical database for English,” Communications of the ACM,
vol. 38, no.11, pp. 39–41, 1995.
[15]R. L. Cilibrasi and P. M. B. Vitanyi, “The google similarity distance,” Knowledge and Data
Engineering, IEEE Transactions on, vol. 19, no. 3, pp. 370–383, 2007.
[16]V. D. Veksler, R. Z. Govostes, and W. D. Gray, “Defining the dimensions of the human semantic
space,” in 30th Annual Meeting of the Cognitive Science Society, 2008, pp. 1282–1287.
[17]J. Partyka, P. Parveen, L. Khan, B. Thuraisingham, and S. Shekhar, “Enhanced geographically typed
semantic schema matching,” Web Semantics: Science, Services and Agents on the World Wide Web,
vol. 9, no. 1, pp. 52–70, 2011.
[18]M. Grcar, E. Klien, and B. Novak, “Using Term-matching Algorithms for the Annotation of Geo-
services,” Knowledge Discovery Enhanced with Semantic and SocialInformation, pp. 127–143,
2009.
[19]G. A. Miller, R. Beckwith, C. Fellbaum, D. Gross, and K. J. Miller, “Introduction to wordnet: An on-
line lexical database*,” International journal of lexicography, vol. 3, no. 4, pp. 235–244, 1990.
[20]G. Miller and C.Fellbaum, Wordnet: An electronic lexical database. MIT Press, 1998.
[21]E. Tapia, T. Choudhury, and M. Philipose, “Building reliable activity models using hierarchical
shrinkage and mined ontology,” Pervasive Computing, pp. 17–32, 2006.
[22]Y. Cho, I.Im, R. Hiltz, and J. Fjermestad, “An analysis of online customer complaints: implications
for web complaint management,” in System Sciences, 2002. HICSS. Proceedings of the 35th Annual
Hawaii International Conference on, 2002, pp. 2308–2317.
[23]J. Y. Hsu, K. J. Lin, T. H. Chang, C. Ho, H. S. Huang, and W. Jih, “Parameter learning of
personalized trust models in broker-based distributed trust management,” Information Systems
Frontiers, vol. 8, no. 4, pp. 321–333, 2006.
[24]D. Saucez, B. Donnet, and O. Bonaventure, “A reputation-based approach for securing vivaldi
embedding system,” Dependable and Adaptable Networks and Services, pp. 78–85, 2007.
[25]M. Tavakolifard, P. Herrmann, and P. Öztürk, “Analogical trust reasoning,” Trust Management III,
pp. 149–163, 2009.