<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">REPUTATION IN USER PROFILING FOR A CONTEXT-AWARE MULTIAGENT SYSTEM</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Virginia</forename><surname>Fuentes</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Computer Science Dept</orgName>
								<orgName type="laboratory">Group of Applied Artificial Intelligence (GIAA)</orgName>
								<orgName type="institution">Carlos III University of Madrid</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nayat</forename><surname>Sanchez</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Computer Science Dept</orgName>
								<orgName type="laboratory">Group of Applied Artificial Intelligence (GIAA)</orgName>
								<orgName type="institution">Carlos III University of Madrid</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Javier</forename><surname>Carbo</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Computer Science Dept</orgName>
								<orgName type="laboratory">Group of Applied Artificial Intelligence (GIAA)</orgName>
								<orgName type="institution">Carlos III University of Madrid</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jose</forename><forename type="middle">M</forename><surname>Molina</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Computer Science Dept</orgName>
								<orgName type="laboratory">Group of Applied Artificial Intelligence (GIAA)</orgName>
								<orgName type="institution">Carlos III University of Madrid</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">REPUTATION IN USER PROFILING FOR A CONTEXT-AWARE MULTIAGENT SYSTEM</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DF9F5A8709F5E0713140D7486806B9E5</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T14:53+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper aims at advancing one of the key elements in context-aware services that will make feasible the development of advanced applications of personalized agents: user profiles. These applications should be here understood as ones where mobile services, whichever they are, are provided to the final user in a distributed (agent-based) and personalized way. We examine how to provide this personalization through user profiles inferred mostly from unobtrusively monitored behavior, reducing as much as it is possible the human feedback required. Profiles will contain preferences about services, products, but also about agents representing providers and clients. This last type of preferences take the form of reputations. This part of the profile is then managed by a complex reputation model developped and tested by some of the authors in previous works. Finally, an ontological approach is applied to integrate reasoning about the three types of preferences of the user profile in the messages exchanged by agents.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The widespread use of new mobile technology implementing wireless communications such as personal digital assistants (PDAs) and smart phones enables a new type of advanced applications. In the past years, the main focus of mobile services researches has been aimed at the anytime-anywhere principle. However, there is more to it. In fact, in several cases, the design and development of effective services should take into account the characteristics of the context from which a service is requested. The mobile computing paradigm in which applications can discover and take advantage of contextual information is the so called context-aware computing. Contextual information can be either the type of the device exploited to access a service, or the location of the user, or its personal preferences, etc. Applications using location are known as location-aware applications. When these applications need to make use of services which provide information according to a given location or approximate location, the term used is location-based services. One example of a location-based service might be to allow the subscriber or user to find the nearest business of a certain type, such as a hotel stand in an exhibition area.</p><p>The new mobile technology with wireless communications has similar performance than computers of 10 years ago, and mobiles and PDAs are little enough to carry around you all the time. Additionally numerous types of sensor surveillance our steps in daily life. Both, the permanent availability of this small computers and the possibility of being aware of the context of users in the real world make possible to offer online service to people on the move, wherever they are, this the so called 'ubiquitous computing'. This term denotes a promising environment that it is still premature, and has some weakness.</p><p>One of these problems is about coordination among services, since a lot of services can be simultaneously provided to a user (even in the same location), a choosing decision is required. So computerized devices should manage not only explicit information about user's interests but also physical information from sensors. They aim to provide services belonging to a particular domain of interest to the user and can be of use while the user remains in the area where he currently is located. So taking into account the user profile and other contextual data it is a key requirement to provide elaborated personalized services.</p><p>Since user profiles contain personal data, and user's preferences or interests, privacy may become a major concern in location-based services. So focusing on a view from users perspective, a centralized entity with complete knowledge should be avoided. In this line, a central server fuses data from all the sensors and provides location information in order to simplify and offer infrastructural support towards generic location retrieval and notification services. Other computational entities would represent providers and users, and would interact directly among them. These personalized autonomous programs that assist users in order to find the desired services would be 'agents' running inside user's mobile handheld devices. An agent-based approach supports adaptive context-aware services by exploiting the capabilities of these autonomous software agents, moving across a network, interacting and negotiating with each other.</p><p>So we are interested in the design and implementation of an infrastrure based on agent technology that may provide personalized location-aware services. First steps involved a general definition of an ontology <ref type="bibr" target="#b20">[21]</ref>, but in this paper we will focus on the link between the location-specific information with the construction and use of user profiles.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related work</head><p>There is an increasing need to create context-aware multiagents systems because of the growing interest in mobile devices using different scenarios. At the moment, there are a lot of researches focused on ubiquitous computing and several approaches to previous platforms and applications based only in location-information and using specific domains ontologies.</p><p>CONSORT <ref type="bibr" target="#b2">[3]</ref> is a multiagent architecture including a middle agent that translate sensor based raw representation of the locations into a conceptual one using a location ontology in two application domains that model the geographical space in a cognitive way: an intelligent assistant at a museum and a wireless-LAN based location system. Another application of location-aware services to museum visitors was proposed by <ref type="bibr" target="#b15">[16]</ref>. A similar one is IrReal <ref type="bibr" target="#b3">[4]</ref>, an information and navigation system based on Palm Pilot PDAs and a set of powerful infrared emitters located throughout a building. Anotherone is Cyberguide <ref type="bibr" target="#b1">[2]</ref> project provides user with context-aware information about the projects performed at GVU center in Atlanta. With TV remote controllers throughout the building to detect users locations and provide them with a map that highlights the project demos available in the neighbouring area of the user. Another location-aware application was designed for visitors of 'Filoli', georgian revival house. it highlights the interesting objects of the current room of the house with red borders, when the user clicks in the handheld device over an object, an audio and video becomes activated.</p><p>Impulse <ref type="bibr" target="#b26">[27]</ref>, addresses the problem of location-specific resource brokering, offering locationsensitive restaurant recommendations to mobile individuals. The Hippie system of the HIPS project locates users inside a building using an infrared grid that detects the nearest artwork to the user, and provides information about it.</p><p>By other hand,KORE architecture <ref type="bibr" target="#b10">[11]</ref> allows recognizing user position by a mobile device in a specific domain and provides the user, according to user location and profile, with the services needed inside the domain. Digital Docent from Newbury Networks, also provides unique location-based content provisioning or push capabilities in an easy-to-deploy application management package. Suited for museums, exhibitions, education campuses and public hotspot operators. An infrastructure for location based services using WiFi is Herecast system <ref type="bibr" target="#b9">[10]</ref>. It has applications that may allow the user to bring up a map of their location with a single click, access web sites relevant to their location, publish presence information to their friends. LEAP agent system <ref type="bibr" target="#b7">[8]</ref> and SOMA multi-agent platform for mobile devices <ref type="bibr" target="#b8">[9]</ref>, supports of ubiquitous provisioning of context-aware services to mobile devices.</p><p>Although there is an approach to context aware services in all of these systems, personalization of services is only based in location-information, while user-profile-based personalization is often studied from the general view of recommender systems <ref type="bibr" target="#b23">[24]</ref>. Examples of recommender systems are Entree <ref type="bibr" target="#b6">[7]</ref> which uses a knowledge base and case-based reasoning to recommend restaurant data, and RAAP <ref type="bibr" target="#b17">[18]</ref> that uses simple categories to represent user profiles with individual training sets for each user. Like many E-commerce sites, Amazon.comTM (www.amazon.com) is structured with an information page for each book, giving details of the text and purchase information. The Customers Who Bought feature is found on the information page for each book in their catalog. It is in fact two separate recommendation lists. The first recommends books frequently purchased by customers who purchased the selected book. The second recommends authors whose books are frequently purchased by customers who purchased works by the author of the selected book.. Another similar e-commerce recommendation application is seen at the Feedback Profile feature at eBay.comTM (www.ebay.com) that allows both buyers and sellers to contribute to feedback profiles of other customers with whom they have done business. The feedback consists of a satisfaction rating (satisfied/neutral/dissatisfied) as well as a specific comment about the other customer. Feedback is used to provide a recommender system for purchasers, who are able to view the profile of sellers. This profile consists of a table of the number of each rating in the past 7 days, past month, and past 6 months, as well as an overall summary (e.g., 867 positives from 776 unique customers). Upon further request, customers can browse the individual ratings and comments for the sellers.</p><p>None of them integrate the user profile into an ontology jointly with a reputation model that would represent user's preferences and interests. On one hand, Quickstep <ref type="bibr" target="#b23">[24]</ref> recommender system applies inference to improve user profiling and recommendation accuracy where user profiles were integrated in an external ontology. And on the other hand several proposals of reputation models have been developped in the last decade. From them, one of the pioneers was AFRAS which represents reputation as a fuzzy concept <ref type="bibr" target="#b11">[12]</ref>, makes the most from recommendations <ref type="bibr">[13] [9]</ref>. This reputation model was designed and tested by some of the authors of this contribution and it recently participated in the ART testbed competition hold in the AAMAS 2006 conference.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Context-Aware MultiAgent System</head><p>Multiagent systems are adequate for developing applications in dynamic, flexible environments. The context of our multiagent location-based context-aware system ( Figure <ref type="figure" target="#fig_0">1</ref>) is an exhibition area where several stands act as providers of services, and visitors act as service consumers. The locationaware system could be different domains of services like books, clothes, loans, univ. degrees, laptops, etc. which may be provided and stands may host booksellers, shops, banks, universities, computer manufacturers, etc. A mobile device should locally run a user agent in charge of interfacing with the user and as a repository of local contextual information. It is also in charge of interfacing via FIPA messages with the central agent. The user agents and the central agent exchange information relating to the contextual information the user hold, like his location, his profile, his preferences, etc. So, additionally to the agents representing permanent static providers (they last as long as the system is running) and agents representing temporal mobile users (they last as long as the visitor is inside the exhibition area) there will be a central agent in charge of registering new users, computing the fusion of sensor data and warning provider agents about the closed presence of users.</p><p>The role played by this central agent is very relevant, since this agent makes the decision of choosing whether to warn or not the closed providers to the user. It accomplish the next tasks:</p><p>• Register and ask a brief questionnaire to build an initial profile of the user • Locate and identify each user moving inside the exhibition area • Improve the user profile using the sequence (and time-spent) of visited stands of each user</p><p>• Match user profiles with features of services provided by closed providers, and if matchmaking succeed, warn providers about the presence of an interested user.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Deregister users</head><p>The role of the other two types of agents is less close to user profile issue:</p><p>• Dialogue of users with providers: User agents make decisions, communicate, bargain and possibly make agreements with provider agents according to its internal user profile. Since this profile is just private, it can be assumed to be a complete and accurate model of the user, statically acquired even before this agent join the agent system of the exhibition area. • Dialogue between users: User agents may cooperate with other users, typically asking for recommendations. In order to decide how to trust the other user agent to share opinions about providers, they could compute a private matchmaking of its internal user profiles using secure computations such as <ref type="bibr" target="#b10">[11]</ref>.</p><p>So the role of users, providers and central agents has been briefly described, and now we will explain how they will use the same terms and meanings in these dialogues.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Ontology Definition for Contex-Aware MultiAgent System</head><p>The main aim of ontologies is to define common vocabulary to share information in the exchanged messages between agents <ref type="bibr" target="#b21">[22]</ref>. Ontology application to a multi-agent system describes agents knowledge in communication process, and this communication is achieved by FIPA-ACL and uses ontological concepts for messages <ref type="bibr" target="#b7">[8]</ref>. FIPA deals with ACL (Agent Communication Language) in communication process for heterogeneous and interacting agents and agent-based systems. This is the the case of most context aware applications, because visitors and users of airports, universities, exhibition areas, etc. would join the system with agents that may be implemented in whatever adhoc language/platform, which should perfectly be able to communicate with context-aware service providers.</p><p>The model of agent communication in FIPA is based on the assumption that two agents share a common ontology for the domain of discourse in conversation process. It ensures that the agents describe the same meaning to the symbols used in the message. <ref type="bibr" target="#b19">[20]</ref>. To satisfy FIPA-ACL messages content, ontology should define a set of schemas of different types: predicates, concepts and actions.</p><p>This approach focuses in predicates and agent actions, related to user preferences and actions developed by agents to operate with these user profiles. Predicates represent a base of facts or expressions that can be true or false, like located, preferred etc. Agent action represents special concepts that indicate some action developed by agents like recommend some product according to user profile, make decisions, communicate etc. In FIPA-ACL messages, the content is a predicate (proposition) or an agent action. Predicates and agent actions are complex elements which are composed by concepts <ref type="bibr" target="#b24">[25]</ref>. This relationship between these three aspects defined by ontology is shown in figure <ref type="figure" target="#fig_1">2</ref>. Normally, ontology represents a conceptualization of particular domains, but in this case, the context of use is not limited to a specific environment (each exhibition areas may belong to very different business sector). So, ontology for proposed multi-agent system is a meta-ontology focuses mainly on all concepts definition in order to be applied to a set of heterogeneous domains. The methodology for building the ontology includes four main steps: fix ontology goal, consider the integration of existing ontologies, ontological acquisition, and codification process. For the ontological acquisition step we have combined a Top-Down strategy with Bottom-Up strategy. Top-Down starts with a general vision of the problem, and go down to instantiate the specific concepts of the domain and Bottom-Up strategy obtains a high level abstract conceptualization from different specific domain applications. This combination is needed to define high level conceptualization ontology <ref type="bibr" target="#b20">[21]</ref>.</p><p>In order to develop this ontology for multiple, heterogeneous and dynamical domains in contextaware applications, is necessary to bear some important aspects in mind: indentify the suitable ontology concepts, develop mechanism for security, guarantee accesibility to context information, and integrate context-awareness <ref type="bibr" target="#b18">[19]</ref>:</p><p>• Identifying the suitable ontology concepts: global created ontology identifies the next high level concepts: "Framework" is the general application concept which includes high level system concepts and it defines the different system domains with two properties: "sector" can be technology, commercial, entertainment etc. and "event" can be fairground, congress, conference, shopping centre etc. "Location" concept is the (x, y) coordinates of any place, participant or object. "Spatial region" and "temporal region", defines the area or map composed by segments according to a range of coordinates, and temporal system information about users in any localization in spatial region, respectively; "Interest points or place" concepts can be stands, departments, conference room, exhibition area etc. and they are defined in one segment or a group of segments, or in a specific coordinates. "Participant" concept can be people, companies with their correspondent role in the system. "Se rvi ce" concept can be any kind of system provision offered to users referred to products in places or interest points like notifications about publicity information, products information etc. "Product" concepts can be offers, solutions, applications, objects etc. that users want to be informed. And finally, "device" concept gathers information about different user's devices profiles and hardware (see Figure <ref type="figure" target="#fig_2">3</ref>). <ref type="bibr" target="#b20">[21]</ref> • Develope mechanisms for security: context information exchanged by agents is only available to authorized agents <ref type="bibr" target="#b18">[19]</ref>. Central agent is able to specify what information agents should know, and which ones are authorized to receive this information. User profile information is filtered by central agent and sent to provider agents according to the level of authorization of each one. For these reasons, there is a need to establish security mechanisms in central and provider agents. Another kind of security is secure compuntations used in recommendation process between user agents <ref type="bibr" target="#b10">[11]</ref> • Allowing accesibility to context information: users access information anytime and anyware, due to their mobility in different environments <ref type="bibr" target="#b20">[21]</ref>. So context information have to be accesible in user mobile devices according to device profiles described in our ontology definition.</p><p>Central agent is able to recognize what kind of device is, and provide information in the most suitable format that this device can accept.</p><p>• Integration context-awareness with user information: mobile devices as PDAs are opening us towards new environments where users can interact between them <ref type="bibr" target="#b14">[15]</ref>. User profile and location is combined with context-aware information by means of the use of this kind of mobile devices.</p><p>To show how the proposed ontology for context-aware multi-agent system covers different heterogeneous domains, some example scenarios have been tested <ref type="bibr" target="#b20">[21]</ref>. One proposed example framework to demonstrate how the system works, is a mobile fairground domain, where users obtain context-aware information according to their specific profile and location, as it is shown in Figure <ref type="figure" target="#fig_3">4</ref>.</p><p>In this example, users walk freely across the environment, so, while they are in movement, they receive context-aware information according to their profiles and locations. For instance, one user come in a mobile phone fairground, and he registers in the fairground and asks a questionnarie about his profile (preferences information) using his mobile device. In this case, user preferences </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Predicate Predicate</head><p>AgentAction AgentAction are about the newest mobile phones in market. Central agent receives user profile from user agent, and it identifies user location. With this two parameters (profile and location), central agent matches user profile with information in the most nearby provider agents, and it warns to the appropiated provider agent. There are some stands in the example from different companies (Nokia and Siemens) that match with user profile, but provider agent in Nokia expositor is the most nearby agent. So it can provide context-aware service according to user profile. It sends to user agent a notification service about the last innovations in Nokia mobile phones. Finally, user receives in his mobile device information according to his preferences, so multi-agent system goal of providing context-aware information to users accoding to their profile and location is reached (see Figure <ref type="figure" target="#fig_4">5</ref>).  On the other hand, there are some aspects about the ontology concepts and profiles that it are necessary to comment. Only services and products are directly linked to a user profile, from all the ontology defined concepts. The model of interests and preferences of users will be expressions about both concepts. Of course both are linked in the ontology, since the services usually of f ers products. But preferences about products are not enough, since the characteristics of the service rather than the product may define best the interests of the user. These characteristics express the nature and quality of the provided service. It is not just a separation between the attributes of the provider and the attributes of the service, "intangibles" attributes form an integral component of the holistic product offering. In many domains which the service may be not easily subjected to objective evaluation, the ability to be able to ontologically segregate and prioritize various underlying factors related to the services gains relevance.</p><p>But they are just concepts; there is a need to express preferences about them using predicates. First of all, the simplest way to build a user profile is using white and black lists, using sets of two predicates: hasInterest and hasDisinterest. But this view is very limited, and first we could distinguish between hard and soft interests (noted as requires and pref ers in CommonKads <ref type="bibr" target="#b28">[29]</ref>).</p><p>Furthermore, simple pair wise comparisons should be also possible using a binary predicate such as pref ers than. Such comparison may be enriched with linguistic terms that show how much is preferred one feature of product/service rather than other one. So then this predicate would have three arguments, where the third one could be for instance terms such as a f ew, somewhat, much more, very much more. And the other arguments are the user (belongs to participant class) and the object of the preference belongs to services or product class. When the object of the preference is another participant (user or provider) then, we will talk about reputation rather than preference. Predicates can be defined in a formal way, as a ternary relation: P (participant, object, relevance) Some examples of this kind of predicates can be:</p><p>• PreferredService(Person(John),Service(Notification),Relevance(somewhat))</p><p>• PreferredProduct(Person(John),Product(Phone),Relevance(much more)) Finally the most expressive way to represent preferences is assigning weights (relevance predicate) to features but this requires an exhaustive and precise evaluation of the features of services/products, which could be too time-consuming for users while registering into the system. One possible heuristic to facilitate knowledge acquisition from users is to use fuzzy values rather than numeric ones. The use of these human-like expressions probably would make users easier to provide its preferences.</p><p>All this kind of predicates would be included in our ontology. Additionally numeric features allow the possibility of expressing preferred ranges rather than preferred values.</p><p>Finally, in order to facilitate induced knowledge about user profiles, the ontology has to make possible the specification of certain level of metrics between features. By metrics, we understand statements that may possibly show if a given feature is similar/close to another, incompatibilities between them, counter-productivity, complementarities, etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Reputation and User Profiles</head><p>User profiles are typically either knowledge-based or behaviour based. Knowledge based user profiles are static, and built using knowledge acquisition techniques (such as questionaries) before they are applied. On the other hand, behaviour-based user profiles use the users behaviour itself to build and improve the profile dynamically. The problem of the knowledge-based approach is that it is intrusive and time-consuming, while the behaviour-based approach requires much behaviour-data to build an accurate enough user model.</p><p>So the usual trade-off consists of a hybrid system, with a low number of questions applied when user agents join the system, combined with an unobtrusive monitoring the behaviour of the user. The limitations of this approach are that initially the user profile is not very accurate (since it is based in a few number of questions), and that often user's positions alone are not enough to indicate interest in the closest neighbourhood. This hybrid approach is followed by the system agent. First this central agent will ask some questions about preferences when user agents register in the system. The answers will form an initial model of the user transforming any kind of the preference expressions mentioned before to a numerical rating (relevance predicate). Additionally, since the central agent monitors the physical movements of the user, it can induce from its decisions a more accurate user profile. The profiling algorithm performs correlation between time spent in particular stands and its interests. On the other hand, a time decay function will reduce the numerical valuation of relevance of features that did not succeed. We consider failure if the central agent observes that the user rejected to come to a stand after a suggestion from a provider agent. This suggestion was caused by a warning from the system agent because current user profile showed that this provider would be interesting for the user. Since the central agent only knows the path of the users (not what particular services/products they bought/rejected), the value of interest achieved from the observation of the physical path followed by the user, is linked to the provider, not to the services/products (in the case of providers with several services/products).</p><p>Finally, another key element of the system is the use of reputation of users to infer trust, and then promote cooperation between users acting as a social filter of cheating/deceptive experiences. Although there are different definitions of trust <ref type="bibr" target="#b16">[17]</ref>, we can state that trust is an abstract property applied to others that helps to reduce the complexity of decisions. Trust is a universal concept that plays a very important role in social organizations as a mechanism of social control. Unfortunately, when a set of universal objective evaluation criteria is not available, subjective and local trust should be asserted in some way. Although there are several ways to infer such trust, numerous studies have shown that in real life one of the most effective channels to avoid deceptions is through reputation-based mechanisms <ref type="bibr" target="#b4">[5]</ref>. Usually, the group of people with good reputation (collaborators, colleagues and friends) that cooperates with a particular person to improve the quality of decisions forms an informal social network <ref type="bibr" target="#b27">[28]</ref>. Therefore, modelling reputation in open distributed systems such as agent systems becomes a critical issue since their offline and large-scale nature weaken the social control of direct interactions. Several rust models have been proposed ( <ref type="bibr" target="#b0">[1]</ref>, <ref type="bibr" target="#b22">[23]</ref>, <ref type="bibr" target="#b30">[31]</ref>, <ref type="bibr" target="#b25">[26]</ref>, <ref type="bibr" target="#b29">[30]</ref>, <ref type="bibr" target="#b13">[14]</ref>, <ref type="bibr" target="#b5">[6]</ref>, <ref type="bibr" target="#b11">[12]</ref>).</p><p>According to this socio-cognitive point of view of reputation, in our context-aware application a reputation value of the user is achieved as a result of the matchmaking computed by the central agent between the user profile and the services of the provider. This represents the value that the central agent assigns to that user for the provider, so the provider may decide to offer different services (or no-service at all) due to this reputation value.</p><p>Furthermore, as we said before, dialogues between users would also take place. In them, user agents ask other users for recommendations. In order to decide how to trust in the other user agent to share opinions about providers, they could compute a private matchmaking of its internal user profiles using secure computations such as <ref type="bibr" target="#b10">[11]</ref>. Again the result of this private matchmaking would become a reputation value of user agent A (which was requested for recommendations) for another user agent B (which was requesting for recommendations). Depending on the specific value of this reputation of agent A for agent B, agent B would give more or less relevance (weight) to the recommendation from agent A. In fact the recommendations from agent A would also take the form of a reputation value. In this case, the reputation of the provider for agent A.</p><p>So finally agent B (which was requesting for recommendations) would aggregate both values weighting the reputation of the provider for agent A with the reputation of agent A for agent B. This is one of the basic computations that form a reputation model, jointly with how reputation values from different sources are aggregated.</p><p>So our location-based agent system relyes upon a reputation model to provide a better filtering services. Since some of the authors of this paper have several previous contributions on this issue <ref type="bibr" target="#b11">[12]</ref> [10], we plan to integrate such reputation model into this location-based agent system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusions and future work</head><p>In this paper we have proposed the general design of a context sensitive agent system. The goal is to provide support for mobile users who are visiting an exhibition area or a fair trade. There, agents that represent users, providers, and the central system, cooperate to avoid time-wasting of users and providers. The cooperation consists of filtering interactions according to the location of users and their interests and preferences (profile). Due to this final aim, we explained how to acquire user profiles reducing as much as it is possible the human feedback required. Since this is a preliminary work, we do not have completed the implementation of such agents, and therefore there is a lack of experimental results. However this paper provides an innovative approach to location-based services that combines the use of a generic ontology, unobtrusive privacyprotected user profiles based on very different expressions of preferences, and a complex alreadytested reputation model. In fact the use of a reputation model integrated in an ontology, and in a more general user profile may make Context-aware services gain relevance in the very next future.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Overview of the architecture of our multiagent location-aware system</figDesc><graphic coords="4,85.68,104.71,425.48,254.64" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :FIPA</head><label>2</label><figDesc>Figure 2: Relation between ontology predicates, actions and concepts</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: High level conceptualization ontology for context-aware multi-agent system Framework Location Location</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Example domain application Framework</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Example framework: fairground domain</figDesc><graphic coords="7,85.40,549.19,424.63,212.20" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgements This work has been supported in part by by projects CICYT TSI2005-07344, CICYT TEC2005-07 186 and CAM MADRINET S-0505/TIC/0255.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Supporting trust in virtual communities</title>
		<author>
			<persName><forename type="first">A</forename><surname>Abdul-Rahman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Hailes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Procs. of 33 th IEEE International Conference on Systems Sciences</title>
				<meeting>s. of 33 th IEEE International Conference on Systems Sciences<address><addrLine>Maui, U.S.</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Cyberguide: A mobile context-aware tour guide</title>
		<author>
			<persName><forename type="first">G</forename><surname>Abowd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Atkeson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Long</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kooper</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pinkerton</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Location-mediated web services coordination in ubiquitous computing</title>
		<author>
			<persName><forename type="first">Koichi</forename><surname>Kurumatani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Akio</forename><surname>Sashima</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Noriaki</forename><surname>Izumi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Int. Conf. on Web Services (ICWS 2004)</title>
				<imprint>
			<date type="published" when="2004">2004. 2004</date>
			<biblScope unit="page" from="822" to="823" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Different views on location awareness</title>
		<author>
			<persName><forename type="first">B</forename><surname>Andreas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Jrg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Antonio</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Building trust in online auction markets through an economic incentive mechanism</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Whinston</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support System</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="273" to="286" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Trust revelation in multiagent interaction</title>
		<author>
			<persName><forename type="first">S</forename><surname>Braynov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sandholm</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Knowledge-based navigation of complex information spaces</title>
		<author>
			<persName><forename type="first">R</forename><surname>Burke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Hammond</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Young</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">JADE Tutorial. Application-Defined Content Languages and Ontologies</title>
		<author>
			<persName><forename type="first">Giovanni</forename><surname>Caire</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
	<note>FIPA web page</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Agent-based collaborative filtering based on fuzzy recommendations</title>
		<author>
			<persName><forename type="first">J</forename><surname>Carbo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Molina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Web Engineering and Technology, Special Issue on Web Agents</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A fuzzy model of reputation in agent-mediated electronic commerce</title>
		<author>
			<persName><forename type="first">J</forename><surname>Carbo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Molina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Davila</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Procs. of 5 th International Conference on Autonomous Agents</title>
				<meeting>s. of 5 th International Conference on Autonomous Agents<address><addrLine>Montreal, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2001-06">June 2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Secure matchmaking of fuzzy criteria between agents</title>
		<author>
			<persName><forename type="first">J</forename><surname>Carbo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Molina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Davila</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Invited Session on Artificial Intelligence Applications to Information Security, 7th International Conference on Knowledge-based Intelligent Information and Engineering Systems. Lecture Notes in Artificial Intelligence 2773</title>
				<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="1185" to="1192" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Trust management through fuzzy reputation</title>
		<author>
			<persName><forename type="first">J</forename><surname>Carbo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Molina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Davila</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Cooperative Information Systems</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="135" to="155" />
			<date type="published" when="2003-03">March 2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Fuzzy referal based cooperation in social networks of agents</title>
		<author>
			<persName><forename type="first">J</forename><surname>Carbo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Molina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Davila</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence Communications</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Principles of trust for multiagent systems: Cognitive anatomy, social importance and quantification</title>
		<author>
			<persName><forename type="first">C</forename><surname>Castellfranchi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Falcone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Procs. of the 3 rd International Conference on Multi-Agent Systems</title>
				<meeting>s. of the 3 rd International Conference on Multi-Agent Systems</meeting>
		<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="72" to="79" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Design criteria for location-aware, indoor, pda applications</title>
		<author>
			<persName><forename type="first">C</forename><surname>Ciavarella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Patern</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings Mobile HCI 2003</title>
				<meeting>Mobile HCI 2003</meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="volume">2795</biblScope>
			<biblScope unit="page" from="131" to="144" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Design criteria for location-aware, indoor, pda applications</title>
		<author>
			<persName><forename type="first">Carmine</forename><surname>Ciavarella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fabio</forename><surname>Paterno</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">5 th International Conference on Human Computer Interaction with Mobile Devices and Services</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="volume">2795</biblScope>
			<biblScope unit="page" from="131" to="144" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Reputation in Artificial Societies</title>
		<author>
			<persName><forename type="first">R</forename><surname>Conte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Paolucci</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>Kluwer Academic Publishers</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Intelligent collaborative information retrieval</title>
		<author>
			<persName><forename type="first">Joaquin</forename><surname>Delgado</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Naohiro</forename><surname>Ishii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tomoki</forename><surname>Ura</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IBERAMIA</title>
				<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="170" to="182" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">A context framework for ambient intelligence</title>
		<author>
			<persName><forename type="first">A</forename><surname>Dogac</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">B</forename><surname>Laleci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kabak</surname></persName>
		</author>
		<idno>NO: EEEAG 102E035</idno>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
		<respStmt>
			<orgName>Middle East Technical University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<author>
			<persName><surname>Fipa</surname></persName>
		</author>
		<title level="m">Fipa ontology service specification</title>
				<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Heterogeneous domain ontology for location based information system in a multi-agent framework</title>
		<author>
			<persName><forename type="first">Virginia</forename><surname>Fuentes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Javier</forename><surname>Carbo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jose-Manuel</forename><surname>Molina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">7 th International Conference on Intelligent Data Engineering and Automated Learning</title>
				<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A translation approach to portable ontologies</title>
		<author>
			<persName><forename type="first">T</forename><surname>Gruger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge Acquisition</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="199" to="220" />
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Trust in distributed artificial intelligence</title>
		<author>
			<persName><forename type="first">S</forename><surname>Marsh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Artificial Intelligence</title>
		<editor>Castelfranchi and Werner</editor>
		<imprint>
			<biblScope unit="volume">830</biblScope>
			<biblScope unit="page" from="94" to="112" />
			<date type="published" when="1994">1994</date>
			<publisher>Springer Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Ontological user profiling in recommender systems</title>
		<author>
			<persName><forename type="first">Stuart</forename><forename type="middle">E</forename><surname>Middleton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nigel</forename><forename type="middle">R</forename><surname>Shadbolt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><forename type="middle">C</forename><surname>De Roure</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="54" to="88" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Building a multi-agent system for automatic negotiation in web service applications</title>
		<author>
			<persName><forename type="first">Ambroise</forename><surname>Ncho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Esma</forename><surname>Aimeur</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Procs. of 3 rd International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS)</title>
				<meeting>s. of 3 rd International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS)</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="1466" to="1467" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Regret: a reputation model for gregarious societies</title>
		<author>
			<persName><forename type="first">J</forename><surname>Sabater</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Sierra</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Procs. of the 4 th Workshop on Deception, Fraud and Trust in Agent Societies</title>
				<meeting>s. of the 4 th Workshop on Deception, Fraud and Trust in Agent Societies<address><addrLine>Montreal, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="61" to="69" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Personalized location-based brokering using an agent-based intermediary architecture</title>
		<author>
			<persName><forename type="first">Gaurav</forename><surname>Tewari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jim</forename><surname>Youll</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pattie</forename><surname>Maes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="127" to="137" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Wasserman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Galaskiewicz</surname></persName>
		</author>
		<title level="m">Advances in Social Network Analysis</title>
				<meeting><address><addrLine>Thousand Oaks, U.S.</addrLine></address></meeting>
		<imprint>
			<publisher>Sage Publications</publisher>
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Kads: a modelling approach to knowledge engineering</title>
		<author>
			<persName><forename type="first">B</forename><surname>Wielinga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">T H</forename><surname>Schreiber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">W</forename><surname>Breuker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge Acquisition</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="5" to="23" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">A social mechanism for reputation management in electronic communities</title>
		<author>
			<persName><forename type="first">B</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">1860</biblScope>
			<biblScope unit="page" from="154" to="165" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Trust management through reputation mechanisms</title>
		<author>
			<persName><forename type="first">G</forename><surname>Zacharia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Maes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="881" to="907" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
