<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Workshop “From Objects to Agents”, September</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Applying inferential processes to partner selection in large agents communities</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Pasquale De Meo</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rino Falcone</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alessandro Sapienza</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Ancient and Modern Civilizations (University of Messina)</institution>
          ,
          <addr-line>Messina, 98122</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>1</volume>
      <fpage>4</fpage>
      <lpage>16</lpage>
      <abstract>
        <p>The current literature clearly highlighted the need to define a fast and eficient tool for trust assessment, even in lack of direct information, as much as possessing mechanisms allowing a matching between a selected task and a reliable agent able to carry it out. Direct experience plays a big part, yet it requires a long time to ofer a stable and accurate performance and this characteristics may represents a strong drawback especially within huge agents' communities. We support the idea that category-based evaluations and inferential processes represent a useful resource for trust assessment. Within this work, we exploit simulations to investigate how eficient this inferential strategy is, with respect to direct experience, focusing on when and to what extent the first prevails on the latter. Our results suggest that in some situations categories represent a valuable asset, providing even better results.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;trust</kwd>
        <kwd>inference</kwd>
        <kwd>multi-agent systems</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction and Background</title>
      <p>the goal  by executing a task  , which afects the world. The most interesting case occurs if
the agent  want/must delegate the execution of  .</p>
      <p>At an abstract level, each agent possesses some skills and resources, defined here as features
which determine its ability in carrying out the tasks it has to face. Nevertheless, not all the
features associated with an agent are crucial for the execution of  and the majority of these
will not even be necessary. If I were to ask someone to cook for me, it would be interesting to
know how fast she/he is, how good is her/his culinary imagination or if she/he knows how to
cook specific dishes; however, knowing that she/he loves reading astrophysics books would not
be of any help.</p>
      <p>It is therefore a fundamental precondition that an agent  identifies which features are
necessary to carry out  . Then,  needs a mental representation of any other  , which
comprises, at least, the subset of the features which are relevant to execute  . It is also important
to underline that just the possession of these features is not enough, it is also very relevant  ’s
willingness (following its motivations) to actually realize  . Of course, two diferent tasks, say
 1 and  2, require diferent features to be eficiently addressed.</p>
      <p>
        Thanks to its mental model,  is able to estimate the likelihood (, ) that  will positively
bring to completion that specific agreed task, for each agent  ∈ . The function (, )
measures the degree of trust [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] that  (hereafter, the trustor) puts in  (hereafter the trustee),
i.e., quantifies to what extent  is confident that  is capable of successfully executing  .
      </p>
      <p>It is crucial to point out that the assessment of trust is not only task-dependent but also
context-dependent, because external causes may amplify or downsize the trust between the
trustor and trustee. For instance, assume that  wants to get to the airport one hour before
the departure of her/his flight and suppose that  is confident that  is able to safely drive
and she/he is knowledgeable of obstacles to trafic flow (e.g., limited access roads), and thus, 
puts a high degree of trust in  . However, unforeseen circumstances (e.g.,  stucks in a trafic
jam) may prevent  from being at the airport at the scheduled time: such an event negatively
influence the trust from  to  , even if, of course, the liability of  is limited.</p>
      <p>The procedure to select the agent to which the task  has to be delegated is thus entirely driven
from the calculation of the function (, ): the trustor should select the agent ⋆ for which
(, ) achieves its largest value, i.e., ⋆ = arg max (, ). Such a protocol is, unfortunately,
infeasible in real-life applications: in fact,  is capable of estimating the trust of those agents –
in short  – with which it interacted in the past and of which it knows features. In real-life
applications, we expect that the size of  is much larger than that of  and, thus, the search of
a successful partner is likely to end up in a failure.</p>
      <p>
        An elegant solution to the problem of selecting partners in large agent communities is
described in [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ] and it relies on the concept of agent category or, in short, category.
      </p>
      <p>Broadly speaking, a category is a subset of agents in  such that each category member
possesses homogeneous features. Their unique nature makes categories very interesting and
particularly useful. Since the members of a category possess similar features, even their
performance concerning the same task will be similar. For sure, we have to consider a certain degree
of uncertainty, due to the specific peculiarities of the individuals.</p>
      <p>The specific categories to take into consideration change with the context and with the task
of interest. For instance, suppose that  correspond to a community of people working in food
service with diferent roles; chefs, waiters, and sommeliers are possible examples of categories
in this context.</p>
      <p>Because of the existence of categories, the set of agents that the trustor can evaluate
significantly expands in size and it consists of the following type of agents:
1. The aforementioned set , which consists of the agents with which  has had a direct
experience.
2. The set  of agents, such that each agent  ∈  belongs to at least one of the categories
 = {1, 2, . . . , }; here we suppose that  has had a direct experience with at
least one agent in each of the categories in .
3. The set of agents  with which  had no direct experience but which have been
recommended to  by other agents in  (for instance, on the basis of their reputation).
4. The set of agents , such that each agent in  belongs to a category which contain
at least one agent in .</p>
      <p>
        Advantages arising from the introduction of categories have been extensively studied in past
literature [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">9, 8, 7</xref>
        ]: the trustor, in fact, could be able to estimate the performance of any other
agent  , even if it has never met this agent (and, as observed in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] without even suspecting its
existence), through an inferential mechanism.
      </p>
      <p>
        As the authors of [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] say, it is possible to take advantage of categories just if a few conditions
are met. First of all,  must be partitioned into the categories  = {1, 2, . . . }, classifying
the agents according to their features. We assume that this classification is given and accepted
by all the agents in . It must be possible to clearly and unequivocally link  to a category .
Finally, we must somehow identify the average performance of the category  with respect
to the task  : we will discuss in detail in Section 3 a procedure to estimate the performance –
called true quality –  ( ) of the category  for task  .
      </p>
      <p>When all three of these conditions are met, then the category ’s evaluation can be used for
the agent  , concerning the task  since, by definition of category, all agents in  will share
the same features of  and, thus, if the other agents in  are able to successfully execute the
task  (or not), we can reasonably assume that even  can do it (or not).</p>
      <p>Of course, only some of the categories 1, . . . ,  possess the qualities to successfully
execute the task  while others do not. As a consequence, the first step to perform is to match
the task  with a set of categories capable of executing  .</p>
      <p>At a basic level, such a matching could be implemented through a a function  (,  ) which
takes a category  and a task  and returns True if agents in  are capable of executing
 , False vice versa. The computation of the function  requires an analytical and explicit
specification of: (a) the chain of actions to perform to execute  and (b) for each action mentioned
in (a), the features an agent should possess to perform such an action.</p>
      <p>The protocol above easily generalizes to the case in which the trustor has a limited experience
(or, in the worst case it has no previous experience): in this case, in fact, the trustor  could
leverage the sets of agents  and .</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        The growing need to deal with bigger and bigger agents’ networks makes it dificult to find
reliable partners to delegate tasks. It becomes clear that, in such situations, direct experience
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] is not enough to allow us facing this problem. Going beyond this dimension becomes
essential, on the light of the knowledge we already have, identifying models and methodologies
able to evaluate our interlocutors and possibly to select adequate partners for the collaborative
goals we want to pursue.
      </p>
      <p>
        Several authors proposed trust propagation as a solution to this topic. Trust propagation
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ][
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] starts from the assumption that if  trusts  and  trusts , then it is reasonable
to assume that  can trust  to some extent. Exploiting this and other assumptions, this
technique allows propagating a trust value from an agent to another one, without requiring a
direct interaction. The confusion in the reasoning process here is due to the consideration of a
generic trust value for an individual, leaving aside the reason why we trust it: the task we want
to delegate to it.
      </p>
      <p>
        Many articles have discussed the use of categories/stereotypes in trust evaluations [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ][
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
This is a very useful instrument, allowing to generalize an individual’s evaluation, concerning
a specific task to other agents owning similar characteristics. It represents a useful proxy
for individuating knowledge about specific trustees [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], elicited in particular in all those
circumstances precluding the development of person-based trust [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Here the intuition is that,
given a specific task  , the performance of the agent we are evaluating are related to the values
of the features it needs to carry out the task itself. Along these lines, it is natural to assume
that other individual owning similar values, i.e. belonging to the same category, have the same
potential to solve  .
      </p>
      <p>Pursuant to these considerations, our contribution within this work concerns the investigation
of how eficient this inferential strategy is, with respect to direct experience, focusing on when
and to what extent the first prevails on the latter.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Inferring the quality of categories</title>
      <p>In this section we illustrate our procedure to estimate the performance (in short called the true
quality)  ( ) of agents in the category  to successfully execute a particular task  .</p>
      <p>Because of the assumptions of our model (illustrated in Section 1), agents belonging to the
same category share the same features and, thus, their performances in executing  are roughly
similar; this implies that if an agent  ∈  is able (resp., not able) to execute  , then we expect
that any other agent  ∈  is also able (resp., not able) to execute  .</p>
      <p>In the following, we suppose that agents in  are able to execute  , i.e. in compliance with
notation introduced in Section 1, we assume that  (,  ) = True. In contrast, if  (,  ) =
False, it does not make sense to estimate  ( ).</p>
      <p>
        The next step of our protocol consists of selecting one of the agents, i.e., the trustee, in 
to which delegate  ; to this purpose, we could select, uniformly at random, one of the agents
in , as illustrated in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. However, agents are individual entities and, thus, slight diferences
in their features exist. Because of these diferences, an agent (say  ) may have better (resp.,
worse) performance than another agent (say, ) in executing  .
      </p>
      <p>In the light of the reasoning above, the true quality  ( ) quantifies the expected performance
of an arbitrary trustee in  in the execution of  .</p>
      <p>We assume that  ( ) ranges in (−∞ , +∞): positive (resp., negative) values of  ( ) are an
indicator of good (resp., bad) performances.</p>
      <p>The first step to compute  ( ) consists of modelling the performance  ( ) of an arbitrary
agent  ∈  in executing  . To capture uncertainty in the performance of  , we represent
 ( ) as a Gaussian random variable with mean   and variance  2 .</p>
      <p>The assumption that all of the agents in the same category should reach the same performance
implies that   =  ( ) for each agent  ∈ .</p>
      <p>The variance  2 controls the amount of variability in the performances of the agent  : large
(resp., small) values in  2 generate significant (resp., irrelevant) deviations from  ( ). In this
paper we considered two options for  2 , namely:
1. Fixed Variance Model: we suppose that  2 =  2 for each  ∈ .
2. Random Variance Model: we suppose that  2 is a uniform random variable in the interval
[,  ].</p>
      <p>Based on these premises, the procedure to estimate  ( ) is iterative and, at the -th iteration
it works as follows:
a) We select, uniformly at random, an agent, say  from 
b) We sample the performance ^  () ∼  ( ) of</p>
      <p>Steps a) and b) are repeated  times, being  the number of agents we need to sample
before making a decision. In addition, in Step a), agents are sampled with replacement, i.e., an
agent could be selected more than once. The algorithm outputs the average value of sampled
performances, i.e.:</p>
      <p>E() = E(E( |  ))
Var( ) = E(Var( | )) + Var(E( | ))
Our algorithm actually converges to the true value  ( ) as stated in the following theorem:
Let  be the number of agents queried by our algorithm and let ^( ) be the estimation of
the true quality  ( ) the algorithm returns after  rounds. We have that in both the fixed
variance and random variance models ^( ) converges to  ( ) at a rate of convergence of √1 .</p>
      <p>
        Let us first analyze the individual agent performances  ( ) and we are interested in
computing the mean and variance of  ( ). If we opt for the Fixed Variance Model, then  ( ) is a
Gaussian random variable with mean  ( ) and the variance is equal to a constant value  2.
In contrast, if we are in the Random Variance Model, then the estimation of the mean and the
variance of  ( ) can be obtained by law of total mean and the law of total variance [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], which
state that for two arbitrary random variables  and  , the following identities hold true:
(1)
(2)
(3)
      </p>
      <p>We apply Equations 2 and 3 to  =  ( ) and  =  ; if we condition on  =  , then  ( )
is a Gaussian random variable with mean equal to  ( ) and variance equal to  and therefore:</p>
      <p>E( ( )) = E(E( ( ) |  =  )) = E( ( )) =  ( )
In addition,
and
which jointly imply</p>
      <p>E(Var( ( ) |  =  )) = E( ) =
 +</p>
      <p>2
Var(E( ( ) |  =  )) = Var(E( ( ))) = Var( ( )) = 0</p>
      <p>+ 
Var( ( )) =
2</p>
      <p>As a consequence, independently of the agent  , we have that the agent performances  ( )
have the same distribution which we denote as  ( ). Therefore, in both the Fixed Variance Model
and Random Variance Model, the algorithm selects a random sample of agents 1, 2, . . . , 
of size  in which, for each  such that 1 ≤  ≤  ,  is the average performance of the agent
selected at the -th iteration and it is distributed as  ( ). The algorithm calculates:
 = 1 + 2 + . . . +  (4)</p>
      <p>
        Because of the Central Limit Theorem [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], the distribution of  gets closer and closer to a
Gaussian distribution with mean  ( ) as  → +∞ with a rate of convergence in the order of
√1 and this end the proof.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental Analysis</title>
      <p>We designed our experiments to answer two main research questions, namely:
RQ1 What are the benefits arising from the introduction of categories in the selection of a
trustee against, for instance, a pure random search or a direct-experience based strategy?
RQ2 How quickly our algorithm to estimate  ( ) converges?</p>
      <p>In what follows, we first describe a reference scenario in which our task consists of recruiting
a chef from a database of applicants (see Section 4.1). Then, in Sections 4.2 and 4.3, we provide
an answer to RQ1 and RQ2.</p>
      <sec id="sec-4-1">
        <title>4.1. The reference scenario</title>
        <p>We assume that features associated with our task are as follows: (i) Culinary Education, measured
as the (overall) number of hours spent in training courses with qualified chef trainers, (ii)
Expertise, i.e., the number of years of professional experience, (iii) Language Skills, defined as
the number of foreign languages in which the applicant is proficient, (iv) Culture, measured on
Task
 1
 2
 3
1
2
3
4
5
a scale from 0 (worse) to 10 (best) and which is understood as the ability of preparing diferent
kind dishes (e.g. fish, meat, vegetarian and so on) in diferent styles (e.g. Indian, Thai or Italian)
and (v) Creativity, measured on a scale from 0 (worse) to 10 (best). The list of features is, of
course, non-exhaustive. We suppose that each feature is associated with a plausible range: for
instance, in Table 1, we consider three potential tasks and the corresponding requirements.</p>
        <p>In the following, due to space limitations, we concentrate only on the task  1 and we suppose
that five categories exist, namely: Professional Chefs - 1, who are trained to master culinary art.
Members in 1 are able to provide creative innovation in menu, preparation and presentation,
Vegan Chefs - 2, specialized in the preparation of plant-based dishes, Pastry Chefs - 3, who are
capable of creating chocolates and pastries, Roast Chefs - 4, who have expertise in preparing
roasted/braised meats and Fish Chefs - 5, who are mainly specialized in the preparation of dish
ifshes. Each category consists of 100 agents and, thus, the overall number of agents involved in
our experiments is 500. Features associated with categories 1-5 are reported in Table 2.</p>
        <p>In our scenario, only agents in 1 are able to fulfill  1; agents in other categories are, for
diferent reasons, unable to execute  1: for instance, the expertise of agents in categories 2, 3
and 5 is not suficient while agents forming categories 3-5 correspond to applicants with a
high level of specialization in the preparation of some specific kind of dishes (e.g., fish-based
dishes) but they are not suficiently skilled in the preparation of other type of foods and, thus,
agents in these categories showcase an insuficient level of culture.</p>
        <p>To simplify discussion we suppose that, through a proper normalization, the performance
 ( 1) (see Section 3) of an individual agent as well as the true quality  ( 1) of a category 
(for l = 1 . . . 5) range from 0 to 1. Here, the best performance of an agent can provide (resp., the
highest true quality of a category) is 1.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. A comparison of category-based search with random-based search and direct-experience search</title>
        <p>
          In our first experiment, we compare three strategies to search for a trustee, namely: a)
RandomBased Search: here, the trustor selects, uniformly at random, a trustee to execute  1. The trustor
measures the performance  ( 1) provided by the trustee in the execution of  1 . b)
CategoryBased Search: here, the trustor considers only agents in the most appropriate category (which
in our reference scenario coincides with 1); as suggested in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], the trustor selects, uniformly
at random, one of the agents in 1 to act as trustee. Once again, the trustor measures the
performance  ( 1) provided by the trustee in the execution of  1. (c) Direct-Experience Search:
we suppose that the trustor consults up to  agents in the community, being  a fixed integer
called budget. The trustor records the performance of each consulted agent but it does not
memorize its category (it may be that the trustor is unable to perceive/understand the trustee’s
category). At the end of this procedure, the trustor selects as trustee the agent providing the
highest performance  ( 1) among all consulted agents. The Direct-Experience Search strategy
can be regarded as an evolution of the Random-Based Search strategy in which the trustor
learns from its past interactions it uses its knowledge to spot the trustee. Here, the budget 
regulates the duration of the learning activity the trustor pursues.
        </p>
        <p>In our experimental setting, we considered two values of , namely  = 10 and  = 30 and
we discuss only results in the Fixed Variance Model with  = 0.05 and  = 0.15. We applied
the Random-Based, the Category-Based and the Direct-Experience Search strategies 20 times; a
sketch of the probability density function (pdf) of  ( 1) for each strategy is shown in Figure 1
and 2.</p>
        <p>As expected, Category-Based Search performs consistently better than the Random-Search
one. In addition, the standard deviation of  ( 1) in Category-Based Search is much smaller than
that observed in the Random-Based strategy and such a behaviour depends on the diferent
degree of matching of categories 1-5 with the task  1: in other words, if the trustee is in 1,
the performances it provides are constantly very good; in contrast, in Random-Based Search
strategy, the measured performance may significantly fluctuate on the basis of the category to
which the trustee belongs to and this explains oscillations in  ( 1).</p>
        <p>The analysis of the Direct-Experience Search strategy ofers many interesting insights which
are valid for both  = 0.05 and  = 0.15. Firstly, notice that if  = 10, then the
DirectExperience Search strategy achieves significantly better performances than the Random-Based
strategy, which indicates that an even short learning phase yields tangible benefits. If  increases,
the trustor is able to see a larger number of agents before making its decision and, in particular,
if  is suficiently large, then the trustor might encounter the best performing agent ⋆ in the
whole community. In this case, the Direct-Experience strategy would outperform the
CategoryBased Search strategy: in fact, in the Category-Based strategy, the trustor chooses, uniformly at
random, one of the agents in 1 which provides a performance worse than (or equal to) ⋆. In
short, for large values of , the Direct-Experience strategy achieves performances which are
comparable and, in some cases, even better than those we would obtain in the Category-Based
strategy, as shown in Figure 1 and 2. However, the budget  has the meaning of a cost, i.e., it is
associated with the time the trustor has to wait before it chooses the trustee and, thus, in many
practical scenarios, the trustor has to make its decisions as quick as possible.</p>
        <p>It is also instructive to consider a further strategy, called Mixed-Based Search, which combines
the Random-Based Search strategy with the Category-Based Search strategy.</p>
        <p>In Mixed-Based Search, we assume the existence of a warm-up phase in which the trustor
selects the trustee by means of the Random-Based Search strategy; unlike the Direct-Experience
Search strategy, the trustor collects not only  ( 1) but it also records the category of the
trustee. In this way, the trustor is able to identify (after, hopefully, a small number of steps) the
category with the highest true quality, i.e., 1. From that point onward, the trustor switches to
a Category-Based strategy and it selects only agents from 1. From a practical standpoint, we
suppose that a performance  ( 1) ≥ 0.6 is classified as an indicator of good performance (in
short, positive signal); as soon as the trustor has collected 2 positive signals, it makes a decision
on the best performing category and it switches to the Category-Based Search strategy.</p>
        <p>We are interested at estimating, through simulations, the length ℓ of the warm-up phase, i.e.,
the number of agents that the trustor has to contact before switching to the Category-Based
search strategy. In Figure 3 and 4 we plot the pdf of ℓ.</p>
        <p>Here, the variance  has a minor impact and we notice that, the pdf achieves its largest value
at ℓ ≃ 10, i.e., 10 iterations are generally suficient to identify the best performing category.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. The rate of convergence of our algorithm</title>
        <p>We conclude our study by investigating how the Fixed Variance Model and the Random Variance
model influence the rate at which our algorithm estimates the true quality  ( ) of a category.</p>
        <p>To make exposition of experimental outcomes simple, we suppose that   = 1 (which models
a scenario in which agents in 1 showcase an exceptionally high ability in executing  1).</p>
        <p>We considered the Fixed Variance Model with  ∈ {0.05, 0.1, 0.15} and the Random Variance
Model in which  is uniformly distributed in [0.01, 0.3].</p>
        <p>We investigated how ^( ) varied as function of the number  of queried agents; obtained
results are reported in Figure 5.</p>
        <p>The main conclusions we can draw from our experiment are as follows:</p>
        <p>1. Individual agent variability (modelled through the parameter  ) greatly afects the rate at
which ^( ) converges to  ( ). Specifically, Figure 5 suggests that less than 5 iterations
are enough to guarantee that |^( ) −  ( )| &lt; 10− 2 if  = 0.05. In addition, as 
gets larger and larger, we highlight more and more fluctuations in ^( ): as an example,
if  = 0.15 (green line), we highlight the largest fluctuation in ^( ) and, at a visual
inspection, at least  = 30 queries are needed to achieve a significant reduction in
|^( ) −  ( )|.
2. An interesting case occurs in the Random Variance Model: in some iterations of the
algorithm, agents with a small variability are selected (i.e., we would sample agents with
 ≃ 0.01) while in other cases agent with a larger variability are selected (here  ≃ 0.3).
Overall, agents with small variability fully balance agents with high variability and, thus,
the algorithm converges to  ( ) (red line) generally faster than the case  = 0.1 (orange
line) and  = 0.15 (green line).</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>
        Although highly populated networks are a particularly useful environment for agents’
collaboration, the very nature of these networks may represent a drawback for trust formation, given
the lack of data for evaluating the huge number of possible partners. Many contributions in the
literature [
        <xref ref-type="bibr" rid="ref18 ref8">8, 18</xref>
        ] showed that category-based evaluations and inferential processes represent a
remarkable solution for trust assessment, since they allow agents to generalize from trust in
individuals to trust in their category and vice versa, basing on their observable features. On that
note, we cared about stressing the tight relationship between trust and the specific task, target
of the trust itself. With the purpose of investigating the role of agents’ categories, we considered
a simulated scenario, testing in particular the performance of a category-based evaluation, with
respect to a random-based search - which it is easily outperformed - and a direct-experience
one, showing that, in case of little direct experience, categories grant a better result. Moreover,
we proved that, if not available, it is possible to estimate the category’s true quality  ( ) in a
reasonably short amount of time. Future research will attempt to test these findings on a real
data set.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sanyal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Trust-oriented partner selection in d2d cooperative communications</article-title>
          ,
          <source>IEEE Access 5</source>
          (
          <year>2017</year>
          )
          <fpage>3444</fpage>
          -
          <lpage>3453</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>F.</given-names>
            <surname>Messina</surname>
          </string-name>
          , G. Pappalardo,
          <string-name>
            <given-names>C.</given-names>
            <surname>Santoro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Sarné</surname>
          </string-name>
          ,
          <article-title>A multi-agent protocol for service level agreement negotiation in cloud federations</article-title>
          ,
          <source>International Journal of Grid and Utility Computing</source>
          <volume>7</volume>
          (
          <year>2016</year>
          )
          <fpage>101</fpage>
          -
          <lpage>112</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.</given-names>
            <surname>Messina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pappalardo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Sarné</surname>
          </string-name>
          ,
          <article-title>A trust-based, multi-agent architecture supporting inter-cloud vm migration in iaas federations</article-title>
          ,
          <source>in: International Conference on Internet and Distributed Computing Systems</source>
          , Springer,
          <year>2014</year>
          , pp.
          <fpage>74</fpage>
          -
          <lpage>83</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sapienza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Falcone</surname>
          </string-name>
          ,
          <article-title>Evaluating agents' trustworthiness within virtual societies in case of no direct experience</article-title>
          ,
          <source>Cognitive Systems Research</source>
          <volume>64</volume>
          (
          <year>2020</year>
          )
          <fpage>164</fpage>
          -
          <lpage>173</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Abar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. K.</given-names>
            <surname>Theodoropoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Lemarinier</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. M. O'Hare</surname>
          </string-name>
          ,
          <article-title>Agent based modelling and simulation tools: A review of the state-of-art software</article-title>
          ,
          <source>Computer Science Review</source>
          <volume>24</volume>
          (
          <year>2017</year>
          )
          <fpage>13</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>C.</given-names>
            <surname>Castelfranchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Falcone</surname>
          </string-name>
          ,
          <article-title>Trust theory: A socio-cognitive and computational model</article-title>
          , volume
          <volume>18</volume>
          , John Wiley &amp; Sons,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Falcone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sapienza</surname>
          </string-name>
          ,
          <article-title>Selecting trustworthy partners by the means of untrustworthy recommenders in digitally empowered societies</article-title>
          ,
          <source>in: Proc. of the International Conference on Practical Applications of Agents and Multi-Agent Systems</source>
          , Springer, Avila, Spain,
          <year>2019</year>
          , pp.
          <fpage>55</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Falcone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sapienza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Castelfranchi</surname>
          </string-name>
          ,
          <article-title>The relevance of categories for trusting information sources</article-title>
          ,
          <source>ACM Transactions on Internet Technology (TOIT) 15</source>
          (
          <year>2015</year>
          )
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Falcone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Piunti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Venanzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Castelfranchi</surname>
          </string-name>
          ,
          <article-title>From manifesta to krypta: The relevance of categories for trusting others</article-title>
          ,
          <source>ACM Transactions on Intelligent Systems and Technology (TIST) 4</source>
          (
          <year>2013</year>
          )
          <fpage>27</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>C.-W. Hang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>M. P.</given-names>
          </string-name>
          <string-name>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Operators for propagating trust and their evaluation in social networks</article-title>
          ,
          <source>Technical Report</source>
          , North Carolina State University. Dept. of Computer Science,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Guha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Raghavan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tomkins</surname>
          </string-name>
          ,
          <article-title>Propagation of trust and distrust</article-title>
          ,
          <source>in: Proceedings of the 13th international conference on World Wide Web</source>
          ,
          <year>2004</year>
          , pp.
          <fpage>403</fpage>
          -
          <lpage>412</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Jamali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ester</surname>
          </string-name>
          ,
          <article-title>A matrix factorization technique with trust propagation for recommendation in social networks</article-title>
          ,
          <source>in: Proceedings of the fourth ACM conference on Recommender systems</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>135</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>W. L.</given-names>
            <surname>Teacy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Luck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rogers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. R.</given-names>
            <surname>Jennings</surname>
          </string-name>
          ,
          <article-title>An eficient and versatile approach to trust and reputation using hierarchical bayesian modelling</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>193</volume>
          (
          <year>2012</year>
          )
          <fpage>149</fpage>
          -
          <lpage>185</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H.</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sensoy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. M.</given-names>
            <surname>Thalmann</surname>
          </string-name>
          ,
          <article-title>A generalized stereotypical trust model</article-title>
          ,
          <source>in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications</source>
          , IEEE,
          <year>2012</year>
          , pp.
          <fpage>698</fpage>
          -
          <lpage>705</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>R. M. Kramer</surname>
          </string-name>
          ,
          <article-title>Collective trust within organizations: Conceptual foundations and empirical insights</article-title>
          ,
          <source>Corporate Reputation Review</source>
          <volume>13</volume>
          (
          <year>2010</year>
          )
          <fpage>82</fpage>
          -
          <lpage>97</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>B. D.</given-names>
            <surname>Adams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. D.</given-names>
            <surname>Webb</surname>
          </string-name>
          ,
          <article-title>Trust in small military teams</article-title>
          ,
          <source>in: 7th international command and control technology symposium</source>
          ,
          <year>2002</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bertsekas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tsitsiklis</surname>
          </string-name>
          , Introduction to probability, Athena Scientific,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>R.</given-names>
            <surname>Falcone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sapienza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Castelfranchi</surname>
          </string-name>
          ,
          <article-title>Trusting information sources through their categories</article-title>
          ,
          <source>in: International Conference on Practical Applications of Agents and MultiAgent Systems</source>
          , Springer,
          <year>2015</year>
          , pp.
          <fpage>80</fpage>
          -
          <lpage>92</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>