<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Improving Agent Group Homogeneity Over Time</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Pasquale</forename><surname>De Meo</surname></persName>
							<email>pdemeo@unime.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Messina</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Fabrizio</forename><surname>Messina</surname></persName>
							<email>messina@dmi.unict.it</email>
							<affiliation key="aff1">
								<orgName type="institution">University of Catania</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Domenico</forename><surname>Rosaci</surname></persName>
							<email>domenico.rosaci@unirc.it</email>
							<affiliation key="aff2">
								<orgName type="institution">University of Reggio Calabria</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Giuseppe</forename><forename type="middle">M L</forename><surname>Sarné</surname></persName>
							<email>sarne@unirc.it</email>
							<affiliation key="aff2">
								<orgName type="institution">University of Reggio Calabria</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Improving Agent Group Homogeneity Over Time</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">389216884BF1664075C9885AE01869CB</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T00:09+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Homogeneity</term>
					<term>Similarity</term>
					<term>Social Communities</term>
					<term>Trust</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In social communities the composition of thematic groups varies over time due to changes occurring in users' behaviors. To study the time evolution of such a process, we design a conceptual framework exploiting a distributed algorithm driving group formation. The results of tests carried out on real data extracted by the social network CIAO, show as groups formed by combining similarity and trust measures are i) more time-stable, independently by the weight of the trust component, and ii) more time-homogeneous, independently by the presence of uncorrelated random agents' behaviors affecting the similarity component.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>I. INTRODUCTION</head><p>Many online communities include thematic groups <ref type="bibr" target="#b0">[1]</ref> and many studies investigated on the users motivations to join with groups <ref type="bibr" target="#b1">[2]</ref>, as well as the impact of their growth <ref type="bibr" target="#b2">[3]</ref>, <ref type="bibr" target="#b3">[4]</ref> and failure <ref type="bibr" target="#b0">[1]</ref>. Important issues in forming groups require to an agent of selecting those groups able to satisfy its expectation <ref type="bibr" target="#b4">[5]</ref>- <ref type="bibr" target="#b7">[8]</ref> and, in a complementary way, the members of a group search to accept only new agents able to improve their utility. Many studies present algorithms effective in driving such group formation processes (e.g., by using diffusion processes <ref type="bibr" target="#b2">[3]</ref>, <ref type="bibr" target="#b3">[4]</ref>) by analyzing i) the group evolution in terms of surviving or failure and ii) the reasons for which an agent will join with/left a group. Many of such studies assume that groups should be formed by like-minded members. To this aim, many measures exist to evaluate the similarity degree among the groups members (e.g., based on the number of affiliations to groups <ref type="bibr" target="#b6">[7]</ref>, member/group interests <ref type="bibr" target="#b4">[5]</ref>, individual preferences <ref type="bibr" target="#b5">[6]</ref> and so on).</p><p>In such a context, the aptitude of a group to retain its members (i.e., time stability) <ref type="bibr" target="#b8">[9]</ref>, <ref type="bibr" target="#b9">[10]</ref> is a major factor for its survival or extinction. The evolution of these groups is, in the most part of the cases, driven only by the mutual similarity criterion <ref type="bibr" target="#b10">[11]</ref>, although it has evident limitations. Indeed, the problem of recommending groups to a potential member usually relies only on the mutual similarity between the profile features of a candidate at the time t and the interests of a group. When such interests vary in a relatively short time frame then groups selected at the time t could not be the best choice at the time t + ∆t.</p><p>Based on data of the social network CIAO <ref type="bibr" target="#b11">[12]</ref>, we verified as the mutual similarity alone does not ensure the group homogeneity over time. In particular, when uncorrelated (e.g., random) users' behavior aspects assume a relevant weight. Consequently, we investigated on improving the time-stability of the group homogeneity in terms of similarity. In this respect, recent studies on group formation processes consider trust <ref type="bibr" target="#b12">[13]</ref>- <ref type="bibr" target="#b14">[15]</ref> to increase the level of the group member's engagement over time and avoiding the group failure <ref type="bibr" target="#b15">[16]</ref>. However, all the approaches reviewed in <ref type="bibr" target="#b15">[16]</ref> do not face the problem of combining similarity with trust.</p><p>In <ref type="bibr" target="#b16">[17]</ref>- <ref type="bibr" target="#b19">[20]</ref> we proposed to integrate similarity and trust in a unique measure to form groups and finding those most suitable for joining with. In this paper, we extended this work to study how changes occurring in the similarity and trust measures impact on the groups formation over time. To test this approach, we used a new conceptual framework by means of which we verified, always by using the data of the social network CIAO, that groups formed by considering both similarity and trust have higher time-stable homogeneity, in terms of similarity, than groups formed by adopting the only similarity criterion. This result is valid also when both the weight assigned to the trust component is low or random (i.e., "uncorrelated") behavior components considered in computing the similarity have a relevant weight. We assume that this behavior is mainly due to the effect of trust in balancing potential incongruence of the similarity measures. Besides, we found as the function used to aggregate similarity and trust measures is not fundamental. Therefore, for a good trade-off between the need of producing accurate results and that of having an easy interpretation model, we aggregated similarity and trust by simply computing their weighted sum, as in <ref type="bibr" target="#b16">[17]</ref>.</p><p>The remaining of the paper is structured as follows: in Section II we present the related literature, in Section III the adopted reference scenario is introduced, while in Section IV deal with the similarity and trust measures computation. Sections V and VI illustrate the A2G algorithm and our conceptual framework. Section VII describes the experimental campaign, discuss its results and, finally, conclusions ends the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>II. RELATED WORK</head><p>In the group formation the common identity and bond theory <ref type="bibr" target="#b20">[21]</ref> identifies as main mechanisms to join with a group (i) the strong personal ties and (ii)) the shared interests with other group members. Differently, in <ref type="bibr" target="#b1">[2]</ref> the authors applied the community detection algorithms to identify clusters into OSNs and comparing their structural features with user-defined communities. A study on the group affiliation mechanisms is presented in <ref type="bibr" target="#b2">[3]</ref>, where in two different kind of networks the authors noted as the act to join with a group can be modeled in terms of new ideas spreading for both the networks. <ref type="bibr">Kairam et al. [4]</ref> compared the growth processes in which groups attract new members in presence/absence of social ties with existing/any group members. Their main finding is that more a group is highly clustered and more likely it grows for a diffusion process. It is in accord with <ref type="bibr" target="#b0">[1]</ref>, where 500,000 Facebook groups created in an 8-day period were monitored for 3 months after which the most part of groups were inactive. The analysis of <ref type="bibr" target="#b0">[1]</ref> highlighted that group survival depends on the social capital brought by group founders and of their behavior. Differently from us, any of the papers above explored the homogeneity of such groups to verify if they result timestable homogeneous in terms of similarity.</p><p>Homogeneous processes are defined as those whose parameters are time-stable with respect to some measure. Usual group formation processes do not assure that properties like to similarity, social identity and so on, will be time-stable. Conversely, some affiliation recommendation <ref type="bibr" target="#b6">[7]</ref> processes suggest to an OSN user only time-stable groups. From a wide experimentation involving Social Identity and Cohesion theories on more Twitter datasets, the authors of <ref type="bibr" target="#b21">[22]</ref> verified that groups based on the users' social identity and formed by users interested in a great variety of topics are less cohesive over time in presence of transient events.</p><p>A flexible framework in which group affiliation is treated as an event impacting on user's preferences is proposed and validated in <ref type="bibr" target="#b5">[6]</ref>, where a probabilistic framework provides to model the individual preferences when he/she joins with a group. In other words, it affiliates to a group those users maintaining a high similarity level into the group over time and keeping homogeneous the group under this point of view. In this scenario, we note as friendships and time-homogeneity of their relationships strictly depend by the mutual trust among individuals. Differently, in the literature the most part of the proposals to form time-stable groups consider it as a problem essentially involving some form of similarity among users.</p><p>Among the cited contributions, only <ref type="bibr" target="#b8">[9]</ref> indirectly refers to trust, in the mean derived by the social theories <ref type="bibr" target="#b22">[23]</ref>, while the other consider some form of similarity as the unique criteria to form possible time-stable homogeneous groups.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>III. THE REFERENCE FRAMEWORK SCENARIO</head><p>Our framework involves a community C = A, G , where A and G are the sets of agents and groups active in C. Let I a set of available items, each one belonging to a specific category x, belonging to the set of categories X<ref type="foot" target="#foot_0">1</ref> , that in C can be reviewed by each agent a ∈ A with an integer in the range [0, 5]. Moreover, let r a,i be the generic review of an item i ∈ I released by a, which consists of: (i) a rating assigned to i by a; (ii) a category x ∈ X associated with i; (iii) a numerical score specifying the helpfulness<ref type="foot" target="#foot_1">2</ref> of r a,i ; (iv) a timestamp. Finally, we denote by r a the set of reviews associated with a, called review history, and by R the set of all the review history in C. In such a scenario, we assume to adopt a multi-agent platform where, each agent a u assists a user u, whereas an administrator agent a g assists a group g. The agents knowledge representation, the agent tasks and our definitions of similarity and trust will be introduced below.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. The agents' knowledge representation</head><p>Interests and preferences of each owner (i.e., u, g) are taken into account by the associated agent a ∈ A and stored into its profile p a consisting of (i) interests, (ii) behaviors, (iii) access modes and (iv) trust levels, as follows:</p><p>Interests: The interest of the agent a in a category x is a function I a (x) : A × X → [0, 1] ∈ R computed as the overall ratio of reviews for items belonging to x. More formally, I a (x) is expressed by I a (x) = |{r a,i : i ∈ x}|/|r a |, where r a is the review history of a, and we denote by r a,i each review contained in r a and referred to an item i.</p><p>Behaviors: The behavior field informs us about the activities admitted or not within a group. It is assumed to be a statement of the form "The average rating of items is greater than 3.0" and so on. Targets (e.g., average rating, frequency of posts, etc.) and goals (e.g., discriminating thresholds) of the statements depend on the specific considered community. Therefore, let b be a behavior (e.g., performed by a user, admitted into a group) and let B = {b 1 , b 2 , . . . , b p } be a given a set of behaviors. We assume to dispose of a function ζ a (b) : A × B → {True, False} which takes an agent a ∈ A and a behavior b ∈ B and checks whether the behavior b matches with the a's past behaviors. The set of behaviors associated with an agent a will be defined as B a , i.e., we set</p><formula xml:id="formula_0">B a = {ζ a (b)| b ∈ B}.</formula><p>Access modes: An access mode identifies a modality for accessing/allowing the access to a group, arbitrarily set by the agent owner, like to open, closed or secret, and let L be a list specifying such accessing modes. More in general, we supposed that a function M : A → L is available to associate an agent a ∈ A with a mode l ∈ L for accessing to a group. This components of the user profiles can be considered as fully random, and not correlated with the other components.</p><p>Trust levels: We suppose that an asymmetric trust function returning how much an agent j perceives another agent k as trustworthy is available (i.e., in general if j trusts k it does not mean that k trusts h too, t j→k = t k→j ). Trust levels are assigned during the agent interactions and mostly depend on the specific community. For instance, in CIAO everyone can explicitly declare the own trust about each other member. Similarly, the trust perceived by an agent a u with respect to a group g of agents can be defined as t au→g = v∈g t au→av /|g|.</p><p>Note that for a group g: (i) its administrator sets the admitted behaviors access modalities (denoted as M g ); (ii) the interest for a category x ∈ X is computed as the average of the interests of its agent members for x that are stored in their profiles; (iii) how the members of g perceive as trustworthy an agent a u is computed as t g→au = av∈g t av→au /|g|.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. The agents' tasks</head><p>An agent updates its profile when an action involving information stored therein is performed. More precisely:</p><p>• After each performed action, an agent a u updates in its profile the interests and the boolean values of the involved behavioral variables. Similarly, an agent a g in its profile updates the behavioral variables every time the administrator of g changes the associated rules. Besides, each time that the preferred access modes change then the associated agent updates its profile.</p><p>• When u expresses his/her evaluation about another user v then a u updates the trust measure. We also assume that a Distributed Directory Facilitator agent (DDF) supports the other agents in C with an Agent Indexing Service and a Communication Layer enabling the agent message exchange.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IV. SIMILARITY AND TRUST</head><p>To investigate the time-stability of groups in terms of similarity, by means of the model previously presented, we consider agents' similarities and trust relationships, as follows.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Similarity measure</head><p>Let s u,v be the measure of similarity between the profiles of agents a u and a v computed as a weighted mean of the contributions of interests (c I ), behaviors (c B ) and access modes (c M ) normalized in [0, 1]. More formally,</p><formula xml:id="formula_1">s au,av = (w I • c I + w B • c B + w M • c M )/(w I + w B + w M )</formula><p>where w I , w B , w M ∈ [0, 1] ∈ R are system weights for the contributes c I , c B and c M , in turn, are computed as follows:</p><p>• c I is based on the average difference between the interest values of a u and a v for each category x ∈ X :</p><formula xml:id="formula_2">c I = 1 − c∈C |I au (x) − I av (x)|/|X |</formula><p>• c B is computed on the average difference between the boolean variables contained in B au and B av . This difference is 0/1 if the two corresponding variables are equal/different.</p><formula xml:id="formula_3">• c A is set to 1/0 if M au is equal/different to M au .</formula><p>The similarity s u,g between an agent and a group is computed in the same manner described above, simply by substituting a v with a g .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Trust and compactness measures</head><p>We view trust as two terms specifying how much an agent trusts another agent, and how much the community perceives an agent as trustworthy. A feedback mechanism usually allows each agent to record its satisfaction for its interactions with other agents in order to compute/update its trust measures <ref type="bibr" target="#b23">[24]</ref>- <ref type="bibr" target="#b25">[26]</ref> based on the concept of social capital <ref type="bibr" target="#b26">[27]</ref>. In fact, a high rate of positive interactions means that an agent can receive an advantage to interact with another agent and, therefore, trust should increase/decrease in presence of positive/negative interactions. The first component, known in the trust theory as reliability, represents the satisfaction of a u about a v , i.e. rel au→av , and can specify several types of trust relationships (e.g., the honesty, the dependability or, as in this work, how much a u is satisfied by the services provided by a v ). Usually, reliability can assume values ranging in [0..1] ∈ R and the higher rel au→av , the higher the perception of the reliability of a v by a u . Note that reliability is an asymmetric measure. The second trust component, named reputation and denoted it by rep a in the interval [0..1] ∈ R, is a global measure of the trust perceived by the whole community about each other agent. The reputation is computed by averaging all the reliability values rel au→av for each a v ∈ A.</p><p>The two trust components are joined in a unique value to compute the trust a u about a v as t au→av = α au • rel au→av + (1−α au )•rep av , where α au ∈ [0..1] ∈ R is set by a u to weight the relevance it assigns to the first trust term with respect to the second one. Note that trust is an asymmetric measure because in the formulation it takes into account the reliability. Besides, each time a reliability value is updated by a u , it sends the new value to the DF that, in turn, returns a reputation value to a u when it needs to compute a trust measure.</p><p>As defined in <ref type="bibr" target="#b16">[17]</ref>, compactness is a measure combining trust and similarity, say γ au→av , able to exploit importance given to the mutual similarity with respect to the mutual trust. We model this level of importance by the coefficient W s, ranging in [0..1] ∈ R and, consequently, we define γ au→av as γ au→av = W s • s au,av + (1 − W s) • t au→av . Remember that trust is an asymmetric measure γ u→v = γ v→u .</p><p>In Table <ref type="table" target="#tab_0">I</ref> the meaning of the symbols is reported. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>V. A2G: MATCHING AGENTS WITH GROUPS</head><p>In this section the algorithm (A2G), enabling user agents to select the groups to join with, is presented.</p><p>Let G = {g 1 , g 2 , . . . , g n } be the groups of C, with |G| = n. Moreover, let k au MAX be the upper bound ranging in [0, n] which specifies the number of groups a u desires to join with and reasonably it will be k MAX au &lt;&lt; n. In the following, for convenience, the notation k MAX will be used instead of k au MAX . Algorithm A2G selects k MAX groups having the largest value of compactness of a u vs the joined groups. We assume that a u continues to receive the whole benefit from all the K ⊆ G groups which it is joined with, so that the overall received benefit in joining with all the K groups, in term of compactness, is given by gi∈K γ u→gi . Finding the subset K ⊆ G producing the best benefit for a u under the constraint |K | = k MAX is equivalent to solve an optimization problem. In this work, we assume that each user agent a u is unable to know, in advance, the compactness of all groups in G. Furthermore, we assume that: (i) a u is able to sample m random groups from G; (ii) a u will record into an internal cache, denoted as H the profiles of the groups a u joined with in the past; (iii) m is the number of the group agents that at each epoch must be contacted by a u . Algorithm 1 describes the steps a u performs to find the k MAX groups it can join with, while the Algorithm 2 runs on the group agent. In particular, it is assumed that (i) the size of each group g ∈ G is ≤ than a threshold n MAX ; (ii) n MAX is fixed by the group administrator; (iii) each agent a g stores into an internal cache the profiles of the agents who joined with g;</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>VI. THE PROPOSED COMPUTATIONAL FRAMEWORK</head><p>In our framework, a community is associated with a temporal dataset of events consisting of a matrix EM , where each row represents an event containing a timestamp, an agent identifiers and the event attributes. An events can be an action performed by an agent or an external event changing the state of the community. Furthermore, we assume that a (non timevarying) matrix T M of trust relationships is available, where each row is a pair of agent IDs (a u , a v ) representing a trust relationship among agent a u and agent a v . Moreover, A2G-Comp and A2G-Sim are two versions of the algorithm A2G. In the former the compactness γ is computed by setting W s &lt; 1 (i.e., it is driven by similarity and trust) and for the latter W s = 1 (i.e., it is driven only by similarity).</p><p>The framework provides the weights w I and W s in the range [0, 1] ∈ R influencing the A2G algorithm results. w I represents the weight assigned to the agent interest, while 1 − w I is divided between w B , representing the weight assigned to the agents behavior (see Section IV), and w M . c M is set as random not being into the original dataset. The lower the value of w I , the higher the incidence of the component c M in computing the similarity, in other words c M is an "uncorrelated component". Furthermore, the higher the value of W s, the lower the impact of the trust relationship in computing the compactness γ.</p><p>In this perspective, the M AC (Mean Average Compactness) and M AS (Mean Average Similarity) measures have been used to perform experiments, in dependence of w I and W s.</p><p>Data: au: an agent, H the current set of groups of au, m: an integer in [0, n], kMAX: the number of groups au can join with Result: The new set S of groups of au Y = a set of m random groups extracted from DF; Z = H Y ; for (g ∈ Z) {au sends a message to ag and let pg be the profile of g}; S = the set of kMAX groups of Z with the highest compactness values; for (g ∈ S) do if (g / ∈ H) then {au sends a join request with its profile to ag}; else {au left g}; end return S Algorithm 1: The User Agent Task Data: r: an agent which has asked to join with the group, K, the set of agents in g for (au ∈ K) do {ag sends a message to au}; for (au ∈ K {r}) do {Compute γg→u}; More in detail, AC g (resp., AS g ) is defined as the Average Compactness (resp., Average Similarity), similarly to the average dissimilarity commonly exploited in Clustering Analysis <ref type="bibr" target="#b27">[28]</ref>, since a group g can be viewed as a cluster of agents. Note that M AC is computed in the training phase of the A2G-Comp algorithm (i.e. it only drives group formation), while M AS is computed in the test phase. Therefore measuring the variation of M AS can be useful to verify the homogeneity, in terms of similarity, of the groups formed in the training phase.</p><formula xml:id="formula_4">Let π = u i ∈g u j ∈g γu i →u j |g| 2 ∀ u i , u j ∈</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Experimental approach and main parameters</head><p>We considered the time-variation of the average similarity of the groups in two different cases: (i) (Comp) Groups formed by the A2G-Comp algorithm are driven by compactness (W s &lt; 1). (ii) (Sim) Groups formed by the A2G-Sim algorithm are driven by the similarity criterion (W s = 1).</p><p>The computation of the measures are performed by following the steps described below: (i) Rows of the matrix EM are arranged in an increasing order, basing on the database timestamp. (ii) The matrix EM is divided into a number of time-windows of equal size. The first time-window is for the training set and the remaining for the tests. (iii) The trust network is built by loading the matrix T M and for all. (iv)</p><p>The training is performed by executing the algorithm A2G-Comp (resp. A2G-Sim) on the first time-window, in order to form groups of agents. (v) The training is stopped when "stable" values of M AC for A2G-Comp (M AS for A2G-Sim) are reach, i.e. the difference between two steps is less than a given threshold (in our case it was 5%). (vi) Data of the remaining time-windows is loaded in sequence for each of them and M AS is computed without executing the algorithm A2G, such that group composition remains the same as in the end of the training phase. This technique allows us to study the variation of M AS due to the addition of events representing the execution of some further actions by the agents. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>VII. EXPERIMENTS</head><p>Experiments exploited the described framework on a dataset extracted from the social network CIAO <ref type="bibr" target="#b11">[12]</ref> <ref type="foot" target="#foot_2">3</ref> referred to 12, 375 users and consisting of two matrices (i.e., EM, T M ). Rows of matrix EM have the form {userID, productID, categoryID, rating, helpfulness, timestamp}, where categoryID is the commercial category of the item identified by productID which received the rating by the reviewer identified by userID, and helpfulness represents the level of satisfaction of the other member for that rating (it has not been used in our experiments).  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Results</head><p>Experiments were performed by varying weights w I and W s in the range [0.1 − 0.9]. Figures <ref type="figure">1 and 2</ref> report the execution of A2G-Comp for w I = 0.1 and w I = 0.5 and W s in the range [0.1 − 0.9]. In Figure <ref type="figure">1</ref> the values of the M AS are relevant also when the weight of the trust component is low (i.e., W s &gt; 0.5). In particular, values of MAS are larger than 0.8 (e.g., median is 0.82 for W s = 0.8), giving a good time-stability with a visible bias around the median value, if compared to the results shown in Figure <ref type="figure">2</ref>, on which the uncorrelated component starts to assume a less significant weight. Figures <ref type="figure" target="#fig_0">3-4</ref> show the results for the 1st, 2nd, and 3rd quartile, minimum and maximum values of M AS computed after the training for the remaining time windows. Figure <ref type="figure">3</ref> shows the behavior of A2G-Sim for different values of w I , while Figure <ref type="figure" target="#fig_0">4</ref> represents the different values of M AS for A2G-Comp with W s = 0.5. From these Figures we note that the lower the value of w I , the lower the value of overall similarity at the end of the test for A2G-Sim (Figure <ref type="figure">3</ref>), while for A2G-Comp the values of M AS are higher of about 10%. This first set of results say us of driving groups formation by compactness when the weight w M is of at least 25% to obtain homogeneous time-stable groups in terms of average similarity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>VIII. CONCLUSIONS</head><p>The experimental study has been conducted with a distributed algorithm for groups formation, named A2G, which exploits the compactness measure, i.e. a combination of similarity and trust. The experimental approach of the conceptual framework permits to employ different combination of similarity and trust.</p><p>Obtained results have shown that forming groups on the basis of users' similarity will lead to form time-stable homogeneous groups if the weight of the uncorrelated behavioral components is marginal. Nevertheless, when group formation is driven by compactness (i.e., by combining similarity and trust) then groups result time-stable homogeneous even if the uncorrelated components included in the computation of similarity are relevant. Therefore, trust relationships will help to improve the level of resilience, in terms of similarity, also in presence of behavioral components which are not strongly linked with the others. Interestingly, even when the weight assigned to the trust relationship in the computation of compactness is very low, group formation driven by compactness will lead to a number of groups having a higher level of timestability with respect the similarity measure.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. MAS vs. parameter w I achieved by the A2G-Comp (W s = 0.5).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>TABLE I MAIN</head><label>I</label><figDesc>SYMBOLS USED IN THE PAPER AND THEIR MEANING.</figDesc><table><row><cell>Symbol tu→v tu→g tg→u su,v su,g relu→v repu αu γu→v W su W I W B W M</cell><cell>Meaning level of trust perceived by the user u w.r.t. the user v level of trust perceived by user u w.r.t. the group g level of trust perceived by the group g w.r.t. the user u similarity between users u and v similarity between the user u and the group g reliability perceived by the user u w.r.t. av reputation of the user u weight that au assigns to the reliability w.r.t. the reputation compactness perceived by au w.r.t. av weight that au assigns to the similarity w.r.t. the trust weights the interest in computing su,v weights the behavior in computing su,v weights the access mode in computing su,v</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>g and let S = ∅; for (u ∈ K {r}) do {if (γg→u ≥ π) {S = S {u}}}; Let Top S be the set of top-nMAX users in S; if (r ∈ S) {ag accepts the join request of r}; for (u ∈ K ∧ u ∈ S) do {ag deletes u from g};</figDesc><table><row><cell cols="4">Algorithm 2: The Group Agent Task</cell></row><row><cell>M AC(w I , W s) =</cell><cell>g∈G AC g |G|</cell><cell>AC g =</cell><cell>x,y∈g,x =y γ x→y |g| (1) .</cell></row><row><cell>M AS(w I , W s) =</cell><cell>g∈G AS g |G|</cell><cell>AS g =</cell><cell>x,y∈g,x =y s x→y |g| (2) .</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>TABLE II PARAMETERS</head><label>II</label><figDesc>USED IN EXPERIMENTS ON THE CIAO DATASET.</figDesc><table><row><cell>Parameter Number of Groups kMIN kMAX nMIN</cell><cell>Value 50 0 50 0</cell><cell>Parameter kMAX N REQ Size of the Training Set 10, 000 Value 10 5 Size of the Test Set 26, 065</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head></head><label></label><figDesc>Table VII contains the parameters used to carry out the experiments. The training set is made by the first 10, 000 events. The software used for the experiments can be downloaded at https://github.com/fmes/simU2G.</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>1</cell><cell>Quartiles</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Median</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.95</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.9</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>MAS</cell><cell>0.85</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.8</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.75</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.7</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.1</cell><cell>0.2</cell><cell>0.3</cell><cell>0.4</cell><cell>0.5</cell><cell>0.6</cell><cell>0.7</cell><cell>0.8</cell><cell>0.9</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>WI</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="3">Fig. 3. MAS vs parameter w I achieved by the A2G-Sim (Ws = 0.1).</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.98</cell><cell>Quartiles</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.96</cell><cell>Median</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.94</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.92</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>MAS</cell><cell>0.88 0.9</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.86</cell></row><row><cell></cell><cell>0.94</cell><cell></cell><cell></cell><cell cols="2">Quartiles Median</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.84</cell></row><row><cell></cell><cell>0.92</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.82</cell></row><row><cell></cell><cell>0.9</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>0.8</cell><cell>0.1</cell><cell>0.2</cell><cell>0.3</cell><cell>0.4</cell><cell>0.5</cell><cell>0.6</cell><cell>0.7</cell><cell>0.8</cell><cell>0.9</cell></row><row><cell>MAS</cell><cell>0.88</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>WI</cell></row><row><cell></cell><cell>0.86</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.84</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.82</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.8</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.1</cell><cell>0.2</cell><cell>0.3</cell><cell>0.4</cell><cell>0.5</cell><cell>0.6</cell><cell>0.7</cell><cell>0.8</cell><cell>0.9</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Ws</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.94</cell><cell></cell><cell></cell><cell cols="2">Quartiles</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">Median</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.92</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.9</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>MAS</cell><cell>0.88</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.86</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.84</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.82</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.8</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.1</cell><cell>0.2</cell><cell>0.3</cell><cell>0.4</cell><cell>0.5</cell><cell>0.6</cell><cell>0.7</cell><cell>0.8</cell><cell>0.9</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Ws</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table><note>Fig. 1. MAS vs parameter W s achieved by the A2G-Comp (w I = 0.1).Fig. 2. MAS vs parameter W s achieved by the A2G-Comp (w I = 0.5).</note></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">The set of categories associated with C only depends by the goals of C</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">The helpfulness is a measures of the utility of the rating of a review is useful in making a decision and it is computed as the average of the scores.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">Data used in our experiments are publicly available at http://www.public. asu.edu/ ∼ jtang20/datasetcode/truststudy.htm</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The role of founders in building online groups</title>
		<author>
			<persName><forename type="first">R</forename><surname>Kraut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Fiore</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 17th ACM Conf. CSCW 2014</title>
				<meeting>17th ACM Conf. CSCW 2014</meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="722" to="732" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Distinguishing topical and social groups based on common identity and bond theory</title>
		<author>
			<persName><forename type="first">P</forename><surname>Grabowicz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Aiello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Eguiluz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Jaimes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the ACM Int. Conf. WSDM 2013</title>
				<meeting>of the ACM Int. Conf. WSDM 2013</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="627" to="636" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Group Formation in Large Social Networks: Membership, Growth, and Evolution</title>
		<author>
			<persName><forename type="first">L</forename><surname>Backstrom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Huttenlocher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kleinberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Lan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 12th ACM SIGKDD Int. Conf. ACM Press</title>
				<meeting>12th ACM SIGKDD Int. Conf. ACM Press</meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="44" to="54" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The life and death of online groups: Predicting group growth and longevity</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kairam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Leskovec</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 5th ACM int. conf. WSDM 2012</title>
				<meeting>5th ACM int. conf. WSDM 2012</meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="673" to="682" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Combinational collaborative filtering for personalized community rrecommendation</title>
		<author>
			<persName><forename type="first">W</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Chang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the ACM Int. Conf. SIGKDD&apos;08</title>
				<meeting>of the ACM Int. Conf. SIGKDD&apos;08</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Probabilistic group recommendation via information iatching</title>
		<author>
			<persName><forename type="first">J</forename><surname>Gorla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lathia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Robertson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the Int. Conf. WWW&apos;13</title>
				<meeting>of the Int. Conf. WWW&apos;13</meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="495" to="504" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Scalable affiliation recommendation using auxiliary networks</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vasuki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Natarajan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Savas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dhillon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. on Intelligent Systems and Technology</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Supporting knowledge sharing in heterogeneous social network thematic groups</title>
		<author>
			<persName><forename type="first">A</forename><surname>Comi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Fotia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Messina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pappalardo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rosaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M L</forename><surname>Sarné</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Complex, Intelligent, and Software Intensive Systems (CISIS), 2015 Ninth International Conference on. IEEE</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="480" to="485" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Group formation in large social networks: membership, growth, and evolution</title>
		<author>
			<persName><forename type="first">L</forename><surname>Backstrom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Huttenlocher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kleinberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Lan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 12th ACM Int. Conf. SIGKDD&apos;06. ACM</title>
				<meeting>12th ACM Int. Conf. SIGKDD&apos;06. ACM</meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="44" to="54" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Measurement and analysis of online social networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mislove</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Marcon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">P</forename><surname>Gummadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Druschel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Bhattacharjee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 7th ACM Conf. SIGCOMM&apos;07</title>
				<meeting>7th ACM Conf. SIGCOMM&apos;07</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="29" to="42" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Looking similar promotes group stability in a game-based virtual community</title>
		<author>
			<persName><forename type="first">C</forename><surname>Lortie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Guitton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">GAMES FOR HEALTH: Research, Development, and Clinical Appl</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="274" to="278" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Exploiting local and global social context for recommendation</title>
		<author>
			<persName><forename type="first">J</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the Int. Joint Conf. IJCAI&apos;13</title>
				<meeting>of the Int. Joint Conf. IJCAI&apos;13</meeting>
		<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="2712" to="2718" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Trust measures for competitive agents</title>
		<author>
			<persName><forename type="first">D</forename><surname>Rosaci</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge-based Systems (KBS)</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">46</biblScope>
			<biblScope unit="page" from="38" to="46" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Matching users with groups in social networks</title>
		<author>
			<persName><forename type="first">D</forename><surname>Rosaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M L</forename><surname>Sarné</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Intelligent Distributed Computing VII</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="45" to="54" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Grouptrust: Finding trust-based group structures in social communities</title>
		<author>
			<persName><forename type="first">A</forename><surname>Comi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Fotia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Messina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rosaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>Sarné</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Symposium on Intelligent and Distributed Computing</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="143" to="152" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">A survey of trust in social networks</title>
		<author>
			<persName><forename type="first">W</forename><surname>Sherchan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nepal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Paris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">47</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Trust and compactness in social network groups</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">De</forename><surname>Meo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Ferrara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rosaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M L</forename><surname>Sarné</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics, IEEE Transactions on</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2015-02">Feb 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Forming homogeneous classes for e-learning in a social network scenario</title>
		<author>
			<persName><forename type="first">A</forename><surname>Comi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Fotia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Messina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pappalardo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rosaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M L</forename><surname>Sarné</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Intelligent Distributed Computing IX</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="131" to="141" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">How to improve group homogeneity in online social networks</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">De</forename><surname>Meo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Ferrara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rosaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M L</forename><surname>Sarné</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 14th Workshop from &quot;Objects to Agents</title>
				<meeting>the 14th Workshop from &quot;Objects to Agents</meeting>
		<imprint>
			<publisher>CEUR-WS</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">1099</biblScope>
			<biblScope unit="page" from="73" to="77" />
		</imprint>
	</monogr>
	<note>WOA 2013, ser. CEUR Workshop Proceedings</note>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Improving the compactness in social network thematic groups by exploiting a multidimensional user-to-group matching algorithm</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">De</forename><surname>Meo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Messina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rosaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M L</forename><surname>Sarné</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Intelligent Networking and Collaborative Systems (INCoS), 2014 International Conference on. IEEE</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="57" to="64" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Asymmetries in attachments to groups and to their members: Distinguishing between common-identity and common-bond groups</title>
		<author>
			<persName><forename type="first">D</forename><surname>Prentice</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lightdale</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Personality and Social Psychology Bulletin</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="484" to="493" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">On the role of social identity and cohesion in characterizing online social communities</title>
		<author>
			<persName><forename type="first">H</forename><surname>Purohit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ruan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fuhry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Parthasarathy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sheth</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1212.0141</idno>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Social capital, intellectual capital, and the organizational advantage</title>
		<author>
			<persName><forename type="first">J</forename><surname>Nahapiet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Academy management review</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="242" to="266" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Predicting trust and distrust in social networks</title>
		<author>
			<persName><forename type="first">T</forename><surname>Dubois</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Golbeck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Srinivasan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">PASSAT&apos;11 IEEE 3rd Int. Conf. on and Social-Com&apos;11 IEEE 3rd Int. Conf. IEEE</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="418" to="424" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Predicting trusts among users of online communities: an epinions case study</title>
		<author>
			<persName><forename type="first">H</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Lim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">W</forename><surname>Lauw</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Le</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Srivastava</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 9th ACM conf. on E. com. ACM</title>
				<meeting>9th ACM conf. on E. com. ACM</meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="310" to="319" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Recommending users in social networks by integrating local and global reputation</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">De</forename><surname>Meo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Messina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rosaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M L</forename><surname>Sarné</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Internet and Distributed Computing Systems</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="437" to="446" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Social capital: Prospects for a new concept</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Adler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S.-W</forename><surname>Kwon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Academy management review</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="17" to="40" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Quantitative evaluation of clustering results using computational negative controls</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Pearson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Zylkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Schwaber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">E</forename><surname>Gonye</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 2004 SIAM International Conference on Data Mining</title>
				<meeting>of the 2004 SIAM International Conference on Data Mining</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="188" to="199" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
