<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The utility of categories through their recommendation in an agents world with local or not local communication</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Alessandro Sapienza</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute for cognitive Science and Technology, ISTC-CNR</institution>
          ,
          <addr-line>Rome</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Rino Falcone</institution>
        </aff>
      </contrib-group>
      <fpage>72</fpage>
      <lpage>77</lpage>
      <abstract>
        <p>In this paper we focus on the importance of generalized knowledge: agents' categories. The cognitive advantage of generalized knowledge can be synthesized in this claim: "It allows us to know a lot about something/somebody we do not directly know". At a social level this means that I can know a lot of things on people that I never met; it is social "prejudice" with its good side and fundamental contribution to social exchange. In this study we experimentally inquire the role played by categories' reputation with respect to the reputation and opinion on single agents: when it is better to rely on the first ones and when are more reliable the second ones. We will consider two different scenarios: one strongly influenced by the spatial distance between agents (localized world); the other totally independent by the spatial distances (non-localized world), quite similar to the modern web society, in which the communicative distance follows different routs with respect to the spatial distance. We want to investigate how the parameters defining the specific environment (number of agents, their interactions, transfer of reputation, and so on) influence the importance of categories' reputation in these two different worlds.</p>
      </abstract>
      <kwd-group>
        <kwd>trust</kwd>
        <kwd>cognitive analysis</kwd>
        <kwd>social simulations</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <sec id="sec-1-1">
        <title>Knowing without knowing</title>
        <p>
          Knowledge generalization and its organization around
"classes" of entities and events
          <xref ref-type="bibr" rid="ref6">(Falcone and Castelfranchi,
2008)</xref>
          is a foundational need of human cognition.
        </p>
        <p>According to us a category is a homogeneous group of
things (agents in this case) identified or inferred by a set of
visible and non-misleading signs. This is why coats, uniforms,
titles, badges, diplomas, etc. are so important in social life and
it is crucial their exhibition and the assurance of their
authenticity (and, on the other side, the ability to falsify and
deceive). Examples of categories are: dogs, cat, doctors, sellers,
thieves etc.</p>
        <p>In this work we assume that the membership to a given class
or category is true and transparent: the category of a given
agent is public, common knowledge. We are just interested in
the fact that an agent belongs to a category.</p>
        <p>The advantage of such a hierarchic structure of knowledge is
not only economical: we do not reproduce beside and for each
"instance” in our memory. We just write that around the
category and then - when needed - instantiate it on a specific
object.</p>
        <p>The greatest advantage is not just in memory space and
costs, but in the fact that we know a lot of thing about
something that we never met; just by inference, prediction,
inheritance. We have a lot of knowledge about a given entity
without any direct experience on it. This crucial power of our
cognitive organization is obviously exploited also in social life,
in order to have information and expectations about people that
we never met.</p>
        <p>This fundamental device for "knowing without knowing" is
surely crucial also for trust evaluations. Society works also on
the basis of trust between strangers; this trust is based on
several inferential and social tricks (like evoked feelings,
analogy, recommendations, etc.) but is also strongly relying on
categories of people and their "signaling" and recognition. If
we (dis-)trust a given class of people and we understand that Y
belongs to that class we can (dis-)trust Y.</p>
        <p>The problems about categories are:
• How do we build our trust in a category? From our direct
experience or trust in its members? How many of them are
necessary in order to generalize?
• How much risky is the instantiation from the class to that
member Y? How much reliable are "signals" about Y
membership? How much Y is representative, typical, of
that class? And how much variance of trustworthiness
there is in that class?
• When and how much it is advantageous to exploit trust on
the categories and not just direct trust in the individual?
In this study we intend to explain and experimentally show
the advantage of trust evaluation based on classes' reputation
with respect to the reputation and opinion on single potential
agents (partners). In an open world or in a broad population
how can we have sufficient direct or reported experience on
everybody? The quantity of potential agents in that population
or net that might be excellent partners but that nobody knows
enough can be high.</p>
        <p>Our claim is that: the larger the population and the ignorance
about the trustworthiness of each individual the more precious
the role of trust in categories. If I know (through signals, marks,
declaration, ...) the class of a given guy/agent I can have a
reliable opinion of its trustworthiness derived from its
classmembership.</p>
        <p>It is clear that the advantages of such cognitive power
provided by categories and prejudices do not only depend on
recommendation and reputation about categories. We can
personally build - by generalization - our evaluation of a given
category from our direct experience with its members (this fact
happens in our experiments for the agents that later have to
propagate their recommendation about). However, in this
simulation we have in the trustor (which has to decide whom
rely on) only a prejudice based on recommendations about that
category and not its personal experience.</p>
        <p>Under a certain degree on direct experiences and circulation
of recommendations, the performance of the evaluation based
on classes will perform better; and in certain cases there will be
no alternative at all: we do not have any evaluation on that
individual, a part from its category; either we work on
inferential instantiation of trustworthiness or we loose a lot of
potential partners. This powerful inferential device has to be
strongly present in WEB societies supported by MAS. We
simplify here the problem of the generalization process, of how
to form judgment about groups, classes, etc. by putting aside
for example inference from other classes (higher or sub); we
build opinion (and then its transmission) about classes on the
bases of experience with a number of subjects of a given class.</p>
        <p>In this work we are also interested in showing the difference
between localized and non-localized knowledge. A localized
world is a world strongly influenced by the spatial distance
between agents; a non-localized world is independent by the
spatial distances, in which the communicative distance follows
different routs with respect to the spatial distance. The first
approach reflects the traditional social way to exchange
information, before the advent of virtual communities, where
communication is constrained by spatial distance.</p>
        <p>However, nowadays we also use another way to exchange
information: the Web. Here we have access to a more complex
net of users; our choice follows (and is influenced) by different
communicative links to the information sources.</p>
        <p>We are interested in analyzing the utility of categories in this
two different contexts, trying to understand if and how they
affect its performance.</p>
      </sec>
      <sec id="sec-1-2">
        <title>Related works</title>
        <p>
          Differently from
          <xref ref-type="bibr" rid="ref14 ref2 ref3 ref8">(Burnett et al, 2010; Fang et al, 2012;
Sensoy et al, 2014)</xref>
          , in this work we do not address the problem
of learning categorical knowledge and we assume that the
categorization process is objective. Similarly to
          <xref ref-type="bibr" rid="ref3">(Burnett et al,
2013)</xref>
          , we give agents the possibility to recommend categories.
        </p>
        <p>
          In the majority of the cases available in the literature, the
concept of recommendation is used concerning recommender
systems (Adomavicious et al, 2015). These ones can be
realized using both past experience (content-based RS)
          <xref ref-type="bibr" rid="ref11">(Lops et
al, 2011)</xref>
          or collaborative filtering, in which the contribute of
single agents/users is used to provide group recommendations
to other agents/users.
        </p>
        <p>
          A classical decentralized approach is referral systems
          <xref ref-type="bibr" rid="ref13 ref16">(Yolum and Singh, 2003)</xref>
          , where agents adaptively give
referrals to one another.
        </p>
        <p>
          Information sources come into play in FIRE
          <xref ref-type="bibr" rid="ref10">(Huynh et al,
2006)</xref>
          , a trust and reputation model that use them to produce a
comprehensive assessment of an agent’s likely performance.
        </p>
        <p>The described solutions are quite similar to our work,
although we contextualized this problem to information
sources. However we do not investigate recommendations with
just the aim of suggesting a particular trustee, but also for
inquiring categories’ recommendations.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Recommendation and reputation: definitions</title>
      <p>Let us consider a set of agents Ag1, ..., Agn in a given world.
We consider that each agent in this world could have trust
relationships with anyone else. On the basis of these
interactions the agents can evaluate the trust degree of their
partners, so building their judgments about the trustworthiness
of the agents with whom they interacted in the past.</p>
      <p>
        The possibility to access to these judgements, through
recommendations, is one of the main sources for trusting agents
outside the circle of closer friends. Exactly for this reason
recommendation and reputation are the more studied and
diffused tools in the trust domain
        <xref ref-type="bibr" rid="ref12">(Ramchurn et al, 2004)</xref>
        .
      </p>
      <p>
        We introduce
Re cx,y,z (τ )
where x, y, z ∈ {Ag1, Ag2,...., Agn } , we call D the specific set
(1)
of agents: D ≡ {Ag1, Ag2,...., Agn }
and 0 ≤ Re cx,y,z (τ ) ≤ 1
τ, as established in the trust model of
        <xref ref-type="bibr" rid="ref4">(Castelfranchi and
Falcone, 2010)</xref>
        , is the task on which the recommender x
expresses the evaluation about y.
      </p>
      <p>In words: Re cx,y,z (τ ) is the value of x’s recommendation about
y performing the task τ, where z is the agent receiving this
recommendation. In this paper, for sake of simplicity, we do
not introduce any correlation/influence between the value of
the recommendations and the kind of the agent receiving it: the
value of the recommendation does not depend from the agent
to whom it is communicated.</p>
      <p>So (1) represents the basic expression for recommendation.</p>
      <p>We can also define a more complex expression of
recommendation, a sort of average recommendation:
Agn (2)
∑ Re cx,y,z (τ ) / n
x=Ag1
in which all the agents in the defined set of agents express
their individual recommendation on the agent y with respect the
task τ and the total value is divided by the number of agents.</p>
      <p>We consider the expression (2) as the reputation of the agent
y with respect to the task τ in the set D.</p>
      <p>
        Of course the reputation concept is more complex than the
simplified version here introduced
        <xref ref-type="bibr" rid="ref13 ref5">(Conte and Paolucci, 2002;
Sabater-Mir, 2003)</xref>
        .
      </p>
      <p>It is in fact the value that would emerge in the case in which
we receive from each agent in the world its recommendation
about y (considering each agent as equally reliable).</p>
      <p>In the case in which an agent has to be recommended not
only on one task but on a set of tasks (τ1 , ..., τk), we could
define instead of (1) and (2) the following expressions:
(3)
k
∑Recx,y,z(τ i ) / k
i=1
that represents the x’s recommendation about y performing
the set of tasks (τ1,..., τk), where z is the agent receiving this
recommendation.</p>
      <p>Imagine having to assign a meta-task (composed of a set of
tasks) to just one of several agents. In this case the information
given from the formula (3) could be useful for selecting (given
the x's point of view) on average (with respect to the tasks) the
more performative agent y.</p>
      <p>Agn k (4)
∑ ∑Recx,y,z(τ i ) / nk
x=Ag1 i=1
that represents a sort of average recommendation from the
set of agents in D, about y performing the set of tasks (τ1 , ...,
τk). We consider the expression (4) as the reputation of the
agent y with respect the set of tasks (τ1 , ..., τk), in the set D.</p>
      <p>Having to assign the meta-task proposed above, the
information given from the formula (4) could be useful for
selecting on average (with respect to both the tasks and the
agents) the more performative agent y.</p>
      <sec id="sec-2-1">
        <title>Using Categories</title>
        <p>Re cx,Cy,z (τ )</p>
        <p>As described above, an interesting approach for evaluating
agents is to classify them in specific categories already
prejudged/rated and as a consequence to do inherit to the agents
the properties of their own categories.</p>
        <p>So we can introduce also the recommendations about
categories, not just about agents (we discuss elsewhere how
these recommendations are formed). In this sense we define:
(5)
where x ∈ {Ag1, Ag2,...., Agn } as usual, and we characterize
the categories {C1,...., Cl } through a set of features { fy1,..., fym } :
∀y ∈ {Ag1,..., Agn}∃cy ∈ {C1,..., Cl } | (Cy ≡ { fy1,..., fym})∧({ fy1,..., fym} ∈ y)
it is clear that there is a relationship between task τ, and the
features { fy1,..., fym } of the Cy category. In words we can say that
each agent in D is classified in one of the categories {C1,...., Cl }
that are characterized from a set of features { f1,..., fm } ; as a
consequence each agent belonging to a category owns the
features of that category. 0 ≤ Re cx,Cy,z (τ ) ≤ 1</p>
        <p>In words:   Re cx,Cy,z (τ )   is the value of x’s recommendation
about the agents included in category Cy when they perform the
task τ, (as usual z is the agent receiving this recommendation).  </p>
        <p>We again define a more complex expression of
recommendation, a sort of average recommendation:
Agn (6)
∑ Re cx,Cy,z (τ ) / n
x=Ag1
in which all the agents in the domain express their individual
recommendation on the category Cy with respect the task  τ  and
the total value is divided by the number of the recommenders.  </p>
        <p>We consider the expression (6) as the reputation of the
category Cy with respect the task τ  in the set D.  </p>
        <p>Now we extend to the categories, in particular to Cy, the
recommendations on a set of tasks  (τ1, ...,τk):  
k (7)
∑Re cx,Cy,z (τ i ) / k
i=1
that represents the recommendation value of the x's agent
about the agents belonging to the category Cy when they
perform the set of tasks (τ1,...,τk).</p>
        <p>Finally, we define:
Agn k
∑ ∑Recx,Cy,z(τ i ) / nk
x=Ag1 i=1
that represents the value of the reputation of the category Cy
(of all the agents y included in Cy) with respect the set of tasks
(τ1,...,τk), in the set D.
asks for reputation), and selects the best one on the basis of the
value given from the formula:
maxx∈Dz (maxy∈Dx (Re cx,y,z (τ )))</p>
        <p>Dz ⊆ D , z could ask to all the agents in the world or to a
defined subset of it (see later).</p>
        <p>We are also interested to the case in which z ask for
recommendations to x about a specific agents’ category for
performing the task τ.   x has to select the best evaluated Cy  
among the different Cy ∈ {C1,...., Cl } x has interacted with (we
are supposing that each agent in the world D, belongs to a
category in the set{C1,...., Cl } ).</p>
        <p>In this case we have the following formulas:
maxCy∈Dx (Re cx,Cy,z (τ )) (11)
that returns the category best evaluated from the point of
view of an agent (x). And
maxx∈Dz (maxCy∈Dx (Re cx,Cy,z (τ )))
(9)  
(10)
(12)
that returns the category best evaluated from the point of
view of all the agents included in Dz .</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Computational Model</title>
      <p>
        In order to realize our simulations, we exploited the software
NetLogo
        <xref ref-type="bibr" rid="ref15">(Wilensky, 1999)</xref>
        .
      </p>
      <p>In every scenario there are four general categories, called
Cat1, Cat2, Cat3 and Cat4, composed by 100 agents per
category. Each category is characterized by:</p>
      <sec id="sec-3-1">
        <title>1. an average value of trustworthiness, in range</title>
        <p>[0,100];
2. an uncertainty value, in range [0,100]; this value
represents the interval of trustworthiness in which the
agents can be considered as belonging to that category.</p>
        <p>These two values are exploited to generate the objective
trustworthiness of each agent, defined as the probability that,
concerning a specific kind of required information, the agent
will communicate the right information.</p>
        <p>Of course the trustworthiness of categories and agents is
strongly related to the kind of requested information/task.
Nevertheless, for the purpose of our it is enough to use just one
kind of information (defined by τ) in the simulations. The
categories’ trustworthiness of Cat1, Cat2, Cat3 and Cat4 are
fixed respectively to 80, 60, 40 and 20% for τ. What changes
through scenarios is the uncertainty value of the categories: 1,
20, 50, and 80%.</p>
        <p>We want to present a series of scenarios with different
settings and referred to localized and non-localized worlds, to
show when it is more convenient to exploit recommendations
about categories rather than recommendations about
individuals, and vice versa.</p>
        <p>Both the simulations are composed by two main steps that are
repeated continuously. In the first step, called exploration
phase, agents without any knowledge about the world start
experiencing other agents, asking to a subset of the population
for the information P. Then they memorize the performance of
each queried agent both as individual element and as a member
of its own category.</p>
        <p>The performance of a agent can assume just the two values 1
or 0, with 1 meaning that the agent is supporting the
information P and 0 meaning that it is opposing to P. For sake
of simplicity, we assume that P is always true.</p>
        <p>The exploration phase has a variable duration, going from
100 ticks to 1 tick. Depending on this value, agents will have a
better or worse knowledge of the other agents.</p>
        <p>Then, in a second step (querying phase) we introduce in the
world a trustor (a new agent with no knowlegde about the
trustworthiness of other agents and categories, and that has the
necessity to trust someone reliable for a given informative task:
in our case τ ). It will select a given subset of the population
and it will query them. In particular, the trustor will ask them
for the best category and the best trustee they have experienced.</p>
        <p>In this way, the trustor is able to collect information about
both the best recommended category and agent.</p>
        <p>It is worth underling that the trustor collects information
from the agents considering them as equally trustworthy with
respect to the task of "providing recommendations". Otherwise
it should weigh differently these recommendations. In practice
our agents are sincere.</p>
        <p>Then it will select an agent belonging to the best
recommended category and it will compare it, in terms of
objective trustworthiness, with the best recommended
individual agent (trustee).</p>
        <p>The possible outcomes are:
• trustee wins (t_win): the trustee selected with
individual recommendation is better than the one
selected by the means of category; then this method
gets one point;
•
•
category wins (c_win): the trustee selected by the
means of category is better than the one selected with
individual recommendation; then this method gets
one point;
equivalent result: if the difference between the two
trustworthiness values is not enough (it is under a
threshold), we consider it as indistinguishable result.
In particular, we considered the threshold of 3% as,
on the basis of previous test simulations, it has
resulted a resonable value.</p>
        <p>These two phases are repeated 500 times for each setting.
In particular, we will represent this value:</p>
        <p>c _ win (13)
c _ win + t _ win</p>
        <p>This ratio shows how much categories’ recommendation is
useful if compared to individual recommendation.</p>
        <p>Simulations’ results are presented in a graphical way,
exploiting 3D shapes to represent all the outcomes. These
shapes are divided into two area and represented with two
different colors:
• the part over 0.5, represented in light gray, in which
prevails the category recommendation;
•
the one below 0.5, represented in dark gray, in which
prevails the individual recommendation.</p>
        <p>These graphs represent a useful view about the utility of the
categorial role in the different interactional and social contexts.</p>
        <p>For each value of uncertainty, we explored 40 different
settings, considering all the possible couple of exploration
phase and queried trustee percentage, where:
• exploration phase ∈ {all-in,1,3,5,10,25,50,100};
•</p>
        <p>queried trustees’ percentage ∈ {5,10,25,50,100}.</p>
        <p>When the exploration phase assume the value “all-in” the
exploration lasts just 1 tick and in that tick every agent
experiences all the others. Although this is a limit case, very
unlikely in the real world, it is really interesting as each agent
has not a good knowledge of the other agent as individual
elements (it has experienced them just one time), but it is able
to get a really good knowledge of their categories, as it has
experienced them as many times as the number of agents for
each category. So this is an explicit case in which the
recommendations of the agents about categories are surely
more informative than the ones about individuals.</p>
      </sec>
      <sec id="sec-3-2">
        <title>First simulation: non-localized world</title>
        <p>As previously said, in the first simulation we explore the case
in which the communication in the world is not limited by the
phisical distance, like in the web context.</p>
        <p>Here we will have that:
1. concerning the exploration phase, agents will ask for
information P to a random 3% of the poputalion;
2. concerning the querying phase, the trustor will select
(again in a random way) a given subset of the population,
going from 100% to 5%;
3. in the end, the trustor will select a random member of the
most recommended category, to compare it with the most
recommended agent.</p>
      </sec>
      <sec id="sec-3-3">
        <title>Second simulation: localized world</title>
        <p>Conversely from the previous one, in this simulation
everything is ruled by phisical distance:
1. in the exploration phase, on each tick agents move into the
world with a probability of 10%; this has the purpose of
creating a localization phenomena; then agents will ask for
information P to the other trustees which distance in less
than 3 NetLogo patches; empirically, we saw that on
average they select the 3% of the population, like in the
first simulation;
2. in the querying phase, given a percentage of population
going from 100% to 5%, the trustor will select the first
neighbors until it reachs the requested percentage;
3. in the end, the trustor will select the nearest member of the
most recommended category, to compare it with the most
recommended agent.</p>
      </sec>
      <sec id="sec-3-4">
        <title>Results’ discussion</title>
      </sec>
      <sec id="sec-3-5">
        <title>Effects in each simulation</title>
        <p>Starting the analysis from the common features in the
outcome of the two different worlds, we identified three effects.
The first effect is due to categories' uncertainty: the less it is, the
more is the utility of using categories; the more it is, the less
categories will be useful. It is possible to notice it looking at the
overal picture: the curves of the graphs lower, going from a
maximal value in Figure 1.a and 2.a to a minimal value in
Figure 1.d and 2.d. Concretely, one could deal with classes
whose members perform accordingly to it, or classes where
there is a very high variance: our evaluation on a member of a
that category becomes more inaccurate. Because of that, the
category’s utility decreases.</p>
        <p>The second effect is due to the exploration phase. The longer
this phase is the more individual recommendations are useful;
the less it lasts the more category recommendations are useful.
This second effect can be described with the fact that each
agent, reducing the number of interactions in the explorative
phase, will have relevantly less information with respect to the
individual agents. At the same time its knowledge with respect
to categories does not undergo a significant decline given that
categories' performances derive from several different agents.</p>
        <p>The third effect is introduced by the queried trustee
percentage, that acts exactly as the exploration phase: the
higher the percentage of queried agents, the more individual's
recommendations are useful; the less it is, the more categories'
recommendations are useful. In words, reducing the number of
queried trustees, the trustor will receive with decreasing
probability information about the more trustworthy individuals
in the domain, while information on categories maintains a
good level of stability, showing a greater robustness.</p>
        <p>The exploration phase length and the queried agents
percentage cooperate in determining respectively the degree of
knowledge (or ignorance) in the world and the level of inquire
about this knowledge. In particular, with "the knowledge in the
world" we intend how the agents can witness the
trustworthiness of the other agents or their aggregate, given the
constraints defined by the external circumstances (number and
kind of interactions, kind of categories, and so on).</p>
        <p>In practice, both these elements seem to suggest that the role
of categories becomes relevant when the knowledge within the
analyzed system either decreases or degrades (before the
interaction with the trustor) or the transferred knowledge (to the
trustor) is reduced. In these cases it is better to rely on the
categorial recommendations rather than individual ones.</p>
        <p>This result reaches the point of highest criticality in the
“allin” case in which, as expected, the relevance of categories
reaches its maximal value.</p>
      </sec>
      <sec id="sec-3-6">
        <title>Localized World versus Non-localized World</title>
        <p>Let’s then discuss the main point of this paper, i.e. the
difference between these two main settings: the localized world
(L) and non-localized world (NL).</p>
        <p>The first difference resides in the behavior. While the NL
tends to have a convex behavior, the L one tends to be concave:
the descent of the categories’ utility in the first case is less steep
than in the second. The second effect is easier to notice: the
curves of NL case are quite always higher than the L case.</p>
        <p>Both these effects are symptoms of the fact that the utility of
categories is higher in the NL case. In fact, in the NL world the
agents can have access to more other agents, as they are not
constrained by physical distance. In this way, they know more
agents, but their knowledge about each single one is limited.</p>
        <p>Conversely in the L world, each agent can just query its
neighbors. Although they move into the world, their knowledge
is strictly related to their physical position. As a consequence,
they will know better their neighbors and their knowledge of
categories strongly depends on the individuals they have met.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>
        Other works
        <xref ref-type="bibr" rid="ref2 ref3 ref7">(Falcone et al, 2013; Burnett et al, 2010)</xref>
        show
the advantages of using reasoning about categorization to select
trustworthy agents. In particular, how it were possible to
attribute to a certain unknown agent, a value of trustworthiness
with respect to a specific task, on the basis of its classification
in, and membership to, one (/or more) category/ies. In practice,
the role of generalized knowledge has proven to determine the
possibility to anticipate the value of unknown agents.
      </p>
      <p>In this paper we investigated the different roles that
recommendations about individual agents and about categories
of agents can play, in L and NL worlds.</p>
      <p>We showed cases in which categories information is more
useful that information towards individual agents, inquiring and
matching different dimensions and parameters. Our results
show that the information on categories is more robust to
knowledge degradation, losing its value more slowly with
respect to information about individuals. Moreover we showed
that categorial knowledge is considerably more important in
NL context, such us the web one, rather than L context.</p>
      <p>This analysis can be particularly relevant to decide how to
built the cognitive approach of agents searching information
among multiple sources. Before choosing between direct or
generalized information, we have to evaluate how information
is distributed among the agents in the specific domain.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgment</title>
      <p>This work is partially supported by the project CLARA—
CLoud plAtform and smart underground imaging for natural
Risk Assessment, funded by the Italian Ministry of Education,
University and Research (MIUR-PON).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Adomavicius</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tuzhilin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2005</year>
          )
          <article-title>Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering (TKDE) 17</source>
          ,
          <fpage>734</fpage>
          -
          <lpage>749</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Burnett</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Sycara</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <year>2010</year>
          .
          <article-title>Bootstrapping trust evaluations through stereotypes</article-title>
          .
          <source>In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'10)</source>
          .
          <fpage>241248</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Burnett</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Sycara</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <year>2010</year>
          .
          <article-title>(2013) Stereotypical trust and bias in dynamic multiagent systems</article-title>
          .
          <source>ACM Transactions on Intelligent Systems and Technology (TIST)</source>
          ,
          <volume>4</volume>
          (
          <issue>2</issue>
          ):
          <fpage>26</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Castelfranchi C.</given-names>
            ,
            <surname>Falcone</surname>
          </string-name>
          <string-name>
            <surname>R.</surname>
          </string-name>
          , (
          <year>2010</year>
          )
          <article-title>Trust Theory: A Socio-Cognitive and Computational Model</article-title>
          , John Wiley and Sons,
          <year>April 2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>Conte R.</given-names>
            , and
            <surname>Paolucci</surname>
          </string-name>
          <string-name>
            <surname>M.</surname>
          </string-name>
          ,
          <year>2002</year>
          ,
          <article-title>Reputation in artificial societies. Social beliefs for social order</article-title>
          . Boston: Kluwer Academic Publishers.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Falcone</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Castelfranchi</surname>
            <given-names>C</given-names>
          </string-name>
          , (
          <year>2008</year>
          )
          <article-title>Generalizing Trust: Inferencing Trustworthiness from Categories</article-title>
          .
          <source>In Proceedings</source>
          , pp.
          <fpage>65</fpage>
          -
          <lpage>80</lpage>
          . R. Falcone,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Barber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sabater-Mir</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. P.</surname>
          </string-name>
          Singh (eds.).
          <source>Lecture Notes in Artificial Intelligence</source>
          , vol.
          <volume>5396</volume>
          . Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>Falcone R.</given-names>
            ,
            <surname>Piunti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Venanzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Castelfranchi</surname>
          </string-name>
          <string-name>
            <surname>C.</surname>
          </string-name>
          , (
          <year>2013</year>
          ),
          <article-title>From Manifesta to Krypta: The Relevance of Categories for Trusting Others</article-title>
          , in R. Falcone and
          <string-name>
            <given-names>M.</given-names>
            <surname>Singh</surname>
          </string-name>
          (Eds.),
          <source>ACM Transaction on Intelligent Systems and Technology</source>
          , Volume
          <volume>4</volume>
          Issue 2,
          <string-name>
            <surname>March</surname>
            <given-names>2013</given-names>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>Fang H.</given-names>
            , Zhang J.,
            <surname>Sensoy</surname>
          </string-name>
          <string-name>
            <surname>M.</surname>
          </string-name>
          ,
          <string-name>
            <surname>and Thalmann N. M.</surname>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>A generalized stereotypical trust model</article-title>
          .
          <source>In Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)</source>
          , pages
          <fpage>698</fpage>
          -
          <lpage>705</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>Guo G.</given-names>
            , Zhang J. and
            <surname>Yorke-Smith N</surname>
          </string-name>
          .,
          <year>2014</year>
          ,
          <article-title>Leveraging Multiviews of Trust and Similarity to Enhance Clustering-based Recommender Systems, Knowledge-Based Systems</article-title>
          , accepted,
          <year>2014</year>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Huynh</surname>
            ,
            <given-names>T.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jennings</surname>
            ,
            <given-names>N. R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Shadbolt</surname>
            ,
            <given-names>N.R.</given-names>
          </string-name>
          ,
          <year>2006</year>
          ,
          <article-title>An integrated trust and reputation model for open multi-agent systems</article-title>
          .
          <source>Journal of Autonomous Agents and Multi-Agent Systems</source>
          ,
          <volume>13</volume>
          , (
          <issue>2</issue>
          ),
          <fpage>119</fpage>
          -
          <lpage>154</lpage>
          .,
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>Lops P.</given-names>
            ,
            <surname>Gemmis</surname>
          </string-name>
          <string-name>
            <surname>M.</surname>
          </string-name>
          ,
          <string-name>
            <surname>and Semeraro G.</surname>
          </string-name>
          , (
          <year>2011</year>
          ), “
          <article-title>Content-based recommender systems: State of the art and trends,” in Recommender Systems Handbook</article-title>
          . Springer, pp.
          <fpage>73</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>Ramchurn S.</given-names>
            ,
            <surname>Jennings</surname>
          </string-name>
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Sierra</surname>
          </string-name>
          <string-name>
            <given-names>C.</given-names>
            , and
            <surname>Godo</surname>
          </string-name>
          <string-name>
            <surname>L.</surname>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>Devising a trust model for multi-agent interactions using confidence and reputation</article-title>
          .
          <source>Applied Artificial Intelligence</source>
          ,
          <volume>18</volume>
          (
          <fpage>9</fpage>
          -10):
          <fpage>833</fpage>
          -
          <lpage>852</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Sabater-Mir</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <year>2003</year>
          .
          <article-title>Trust and reputation for agent societies</article-title>
          .
          <source>Ph.D. thesis</source>
          , Universitat Autonoma de Barcelona.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Sensoy</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yilmaz</surname>
            <given-names>B.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Norman</surname>
            <given-names>T. J.</given-names>
          </string-name>
          <year>2014</year>
          ,
          <article-title>STAGE: Stereotypical trust assessment through graph extraction</article-title>
          .
          <source>Computational Intelligence.</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Wilensky</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          (
          <year>1999</year>
          ). NetLogo. http://ccl.northwestern.edu/netlogo/.
          <article-title>Center for Connected Learning</article-title>
          and
          <string-name>
            <surname>Computer-Based</surname>
            <given-names>Modeling</given-names>
          </string-name>
          , Northwestern University, Evanston, IL.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Yolum</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>M. P.</given-names>
          </string-name>
          <year>2003</year>
          .
          <article-title>Emergent properties of referral systems</article-title>
          .
          <source>In Proceedings of the 2nd International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS'03).</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>