<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Applying inferential processes to partner selection in large agents communities</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Pasquale</forename><surname>De Meo</surname></persName>
							<email>pdemeo@unime.it</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Ancient and Modern Civilizations (</orgName>
								<orgName type="institution">University of Messina)</orgName>
								<address>
									<postCode>98122</postCode>
									<settlement>Messina</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rino</forename><surname>Falcone</surname></persName>
							<email>rino.falcone@istc.cnr.it</email>
							<affiliation key="aff1">
								<orgName type="department">Institute of cognitive sciences and technologies (ISTC-CNR)</orgName>
								<address>
									<postCode>00185</postCode>
									<settlement>Rome</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alessandro</forename><surname>Sapienza</surname></persName>
							<email>alessandro.sapienza@istc.cnr.it</email>
							<affiliation key="aff1">
								<orgName type="department">Institute of cognitive sciences and technologies (ISTC-CNR)</orgName>
								<address>
									<postCode>00185</postCode>
									<settlement>Rome</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Applying inferential processes to partner selection in large agents communities</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">104FB1F70768F2084451C5B2FBF40459</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T16:33+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>trust, inference, multi-agent systems (A. Sapienza) 0000-0001-7421-216X (P. D. Meo)</term>
					<term>0000-0002-0300-458X (R. Falcone)</term>
					<term>0000-0001-9360-779X (A. Sapienza)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The current literature clearly highlighted the need to define a fast and efficient tool for trust assessment, even in lack of direct information, as much as possessing mechanisms allowing a matching between a selected task and a reliable agent able to carry it out. Direct experience plays a big part, yet it requires a long time to offer a stable and accurate performance and this characteristics may represents a strong drawback especially within huge agents' communities. We support the idea that category-based evaluations and inferential processes represent a useful resource for trust assessment. Within this work, we exploit simulations to investigate how efficient this inferential strategy is, with respect to direct experience, focusing on when and to what extent the first prevails on the latter. Our results suggest that in some situations categories represent a valuable asset, providing even better results.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction and Background</head><p>A great deal of effort has been made to assess trust within agents' societies <ref type="bibr" target="#b0">[1]</ref>[2][3] <ref type="bibr" target="#b3">[4]</ref>. The great majority of the approaches makes extensive use of direct experience as the main source of information, considering recommendation/reputation and inferential processes just later, as a secondary mechanism to refine trust assessment. Unfortunately, direct experience might not always represent the best solution to assess trustworthiness. For instance, using direct experience within huge networks may become unfeasible, because of their very nature: it is hard and extremely costly to possess enough experience to judge a sufficient number of agents. It is therefore fundamental to find an effective approach for trust assessment even in lack of direct experience <ref type="bibr" target="#b4">[5]</ref>. In particular, we argue that category-based evaluations and inferential processes may represent an effective solution. Let us then introduce the formal framework within which we will work.</p><p>We consider a population of agents 𝒜 = {𝑎 1 , . . . , 𝑎 𝑛 } which can collaborate by reciprocally delegating the execution of some tasks.</p><p>We suppose that any agent 𝑎 𝑖 ∈ 𝒜 needs to achieve a goal 𝑔, which identifies a state of the environment (in short, the world) which the agent 𝑎 𝑖 plans to achieve. The agent 𝑎 𝑖 can reach Pasquale De Meo et al. <ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr">[19]</ref><ref type="bibr">[20]</ref><ref type="bibr">[21]</ref><ref type="bibr">[22]</ref><ref type="bibr">[23]</ref><ref type="bibr">[24]</ref><ref type="bibr">[25]</ref><ref type="bibr">[26]</ref><ref type="bibr">[27]</ref> the goal 𝑔 by executing a task 𝜏 , which affects the world. The most interesting case occurs if the agent 𝑎 𝑖 want/must delegate the execution of 𝜏 .</p><p>At an abstract level, each agent possesses some skills and resources, defined here as features which determine its ability in carrying out the tasks it has to face. Nevertheless, not all the features associated with an agent are crucial for the execution of 𝜏 and the majority of these will not even be necessary. If I were to ask someone to cook for me, it would be interesting to know how fast she/he is, how good is her/his culinary imagination or if she/he knows how to cook specific dishes; however, knowing that she/he loves reading astrophysics books would not be of any help.</p><p>It is therefore a fundamental precondition that an agent 𝑎 𝑖 identifies which features are necessary to carry out 𝜏 . Then, 𝑎 𝑖 needs a mental representation of any other 𝑎 𝑗 , which comprises, at least, the subset of the features which are relevant to execute 𝜏 . It is also important to underline that just the possession of these features is not enough, it is also very relevant 𝑎 𝑗 's willingness (following its motivations) to actually realize 𝜏 . Of course, two different tasks, say 𝜏 1 and 𝜏 2 , require different features to be efficiently addressed.</p><p>Thanks to its mental model, 𝑎 𝑖 is able to estimate the likelihood 𝜑(𝑖, 𝑗) that 𝑎 𝑗 will positively bring to completion that specific agreed task, for each agent 𝑎 𝑗 ∈ 𝒜. The function 𝜑(𝑖, 𝑗) measures the degree of trust <ref type="bibr" target="#b5">[6]</ref> that 𝑎 𝑖 (hereafter, the trustor) puts in 𝑎 𝑗 (hereafter the trustee), i.e., quantifies to what extent 𝑎 𝑖 is confident that 𝑎 𝑗 is capable of successfully executing 𝜏 .</p><p>It is crucial to point out that the assessment of trust is not only task-dependent but also context-dependent, because external causes may amplify or downsize the trust between the trustor and trustee. For instance, assume that 𝑎 𝑖 wants to get to the airport one hour before the departure of her/his flight and suppose that 𝑎 𝑖 is confident that 𝑎 𝑗 is able to safely drive and she/he is knowledgeable of obstacles to traffic flow (e.g., limited access roads), and thus, 𝑎 𝑖 puts a high degree of trust in 𝑎 𝑗 . However, unforeseen circumstances (e.g., 𝑎 𝑗 stucks in a traffic jam) may prevent 𝑎 𝑖 from being at the airport at the scheduled time: such an event negatively influence the trust from 𝑎 𝑖 to 𝑎 𝑗 , even if, of course, the liability of 𝑎 𝑗 is limited.</p><p>The procedure to select the agent to which the task 𝜏 has to be delegated is thus entirely driven from the calculation of the function 𝜑(𝑖, 𝑗): the trustor should select the agent 𝑎 ⋆ 𝑗 for which 𝜑(𝑖, 𝑗) achieves its largest value, i.e., 𝑗 ⋆ = arg max 𝑗 𝜑(𝑖, 𝑗). Such a protocol is, unfortunately, infeasible in real-life applications: in fact, 𝑎 𝑖 is capable of estimating the trust of those agentsin short 𝐸 𝑖 -with which it interacted in the past and of which it knows features. In real-life applications, we expect that the size of 𝒜 is much larger than that of 𝐸 𝑖 and, thus, the search of a successful partner is likely to end up in a failure.</p><p>An elegant solution to the problem of selecting partners in large agent communities is described in <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref> and it relies on the concept of agent category or, in short, category.</p><p>Broadly speaking, a category is a subset of agents in 𝒜 such that each category member possesses homogeneous features. Their unique nature makes categories very interesting and particularly useful. Since the members of a category possess similar features, even their performance concerning the same task will be similar. For sure, we have to consider a certain degree of uncertainty, due to the specific peculiarities of the individuals.</p><p>The specific categories to take into consideration change with the context and with the task of interest. For instance, suppose that 𝒜 correspond to a community of people working in food service with different roles; chefs, waiters, and sommeliers are possible examples of categories in this context.</p><p>Because of the existence of categories, the set of agents that the trustor can evaluate significantly expands in size and it consists of the following type of agents:</p><p>1. The aforementioned set 𝐸 𝑖 , which consists of the agents with which 𝑎 𝑖 has had a direct experience. 2. The set 𝐶 𝑖 of agents, such that each agent 𝑎 𝑗 ∈ 𝐶 𝑖 belongs to at least one of the categories 𝐶𝑆 = {𝐶 1 , 𝐶 2 , . . . , 𝐶 𝑝 }; here we suppose that 𝑎 𝑖 has had a direct experience with at least one agent in each of the categories in 𝐶𝑆. 3. The set of agents 𝑅 𝑖 with which 𝑎 𝑖 had no direct experience but which have been recommended to 𝑎 𝑖 by other agents in 𝒜 (for instance, on the basis of their reputation). 4. The set of agents 𝑅𝐶 𝑖 , such that each agent in 𝑅𝐶 𝑖 belongs to a category which contain at least one agent in 𝑅 𝑖 .</p><p>Advantages arising from the introduction of categories have been extensively studied in past literature <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b6">7]</ref>: the trustor, in fact, could be able to estimate the performance of any other agent 𝑎 𝑗 , even if it has never met this agent (and, as observed in <ref type="bibr" target="#b6">[7]</ref> without even suspecting its existence), through an inferential mechanism.</p><p>As the authors of <ref type="bibr" target="#b8">[9]</ref> say, it is possible to take advantage of categories just if a few conditions are met. First of all, 𝒜 must be partitioned into the categories 𝒞 = {𝐶 1 , 𝐶 2 , . . . 𝐶 𝑚 }, classifying the agents according to their features. We assume that this classification is given and accepted by all the agents in 𝒜. It must be possible to clearly and unequivocally link 𝑎 𝑗 to a category 𝑐 𝑙 . Finally, we must somehow identify the average performance of the category 𝐶 𝑙 with respect to the task 𝜏 : we will discuss in detail in Section 3 a procedure to estimate the performancecalled true quality -𝜃 𝑙 (𝜏 ) of the category 𝐶 𝑙 for task 𝜏 .</p><p>When all three of these conditions are met, then the category 𝐶 𝑙 's evaluation can be used for the agent 𝑎 𝑗 , concerning the task 𝜏 since, by definition of category, all agents in 𝐶 𝑙 will share the same features of 𝑎 𝑗 and, thus, if the other agents in 𝐶 𝑙 are able to successfully execute the task 𝜏 (or not), we can reasonably assume that even 𝑎 𝑗 can do it (or not).</p><p>Of course, only some of the categories 𝐶 1 , . . . , 𝐶 𝑚 possess the qualities to successfully execute the task 𝜏 while others do not. As a consequence, the first step to perform is to match the task 𝜏 with a set of categories capable of executing 𝜏 .</p><p>At a basic level, such a matching could be implemented through a a function 𝜓(𝐶 𝑙 , 𝜏 ) which takes a category 𝐶 𝑙 and a task 𝜏 and returns True if agents in 𝐶 𝑙 are capable of executing 𝜏 , False vice versa. The computation of the function 𝜓 requires an analytical and explicit specification of: (a) the chain of actions to perform to execute 𝜏 and (b) for each action mentioned in (a), the features an agent should possess to perform such an action.</p><p>The protocol above easily generalizes to the case in which the trustor has a limited experience (or, in the worst case it has no previous experience): in this case, in fact, the trustor 𝑎 𝑖 could leverage the sets of agents 𝑅 𝑖 and 𝑅𝐶 𝑖 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>The growing need to deal with bigger and bigger agents' networks makes it difficult to find reliable partners to delegate tasks. It becomes clear that, in such situations, direct experience 15-27 <ref type="bibr" target="#b9">[10]</ref> is not enough to allow us facing this problem. Going beyond this dimension becomes essential, on the light of the knowledge we already have, identifying models and methodologies able to evaluate our interlocutors and possibly to select adequate partners for the collaborative goals we want to pursue.</p><p>Several authors proposed trust propagation as a solution to this topic. Trust propagation <ref type="bibr">[11][12]</ref> starts from the assumption that if 𝑎 𝑖 trusts 𝑎 𝑗 and 𝑎 𝑗 trusts 𝑎 𝑘 , then it is reasonable to assume that 𝑎 𝑖 can trust 𝑎 𝑘 to some extent. Exploiting this and other assumptions, this technique allows propagating a trust value from an agent to another one, without requiring a direct interaction. The confusion in the reasoning process here is due to the consideration of a generic trust value for an individual, leaving aside the reason why we trust it: the task we want to delegate to it.</p><p>Many articles have discussed the use of categories/stereotypes in trust evaluations <ref type="bibr">[13][14]</ref>. This is a very useful instrument, allowing to generalize an individual's evaluation, concerning a specific task to other agents owning similar characteristics. It represents a useful proxy for individuating knowledge about specific trustees <ref type="bibr" target="#b14">[15]</ref>, elicited in particular in all those circumstances precluding the development of person-based trust <ref type="bibr" target="#b15">[16]</ref>. Here the intuition is that, given a specific task 𝜏 , the performance of the agent we are evaluating are related to the values of the features it needs to carry out the task itself. Along these lines, it is natural to assume that other individual owning similar values, i.e. belonging to the same category, have the same potential to solve 𝜏 .</p><p>Pursuant to these considerations, our contribution within this work concerns the investigation of how efficient this inferential strategy is, with respect to direct experience, focusing on when and to what extent the first prevails on the latter.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Inferring the quality of categories</head><p>In this section we illustrate our procedure to estimate the performance (in short called the true quality) 𝜃 𝑙 (𝜏 ) of agents in the category 𝐶 𝑙 to successfully execute a particular task 𝜏 .</p><p>Because of the assumptions of our model (illustrated in Section 1), agents belonging to the same category share the same features and, thus, their performances in executing 𝜏 are roughly similar; this implies that if an agent 𝑎 𝑗 ∈ 𝐶 𝑙 is able (resp., not able) to execute 𝜏 , then we expect that any other agent 𝑎 𝑞 ∈ 𝐶 𝑙 is also able (resp., not able) to execute 𝜏 .</p><p>In the following, we suppose that agents in 𝐶 𝑙 are able to execute 𝜏 , i.e. in compliance with notation introduced in Section 1, we assume that 𝜓(𝐶 𝑙 , 𝜏 ) = True. In contrast, if 𝜓(𝐶 𝑙 , 𝜏 ) = False, it does not make sense to estimate 𝜃 𝑙 (𝜏 ).</p><p>The next step of our protocol consists of selecting one of the agents, i.e., the trustee, in 𝐶 𝑙 to which delegate 𝜏 ; to this purpose, we could select, uniformly at random, one of the agents in 𝐶 𝑙 , as illustrated in <ref type="bibr" target="#b6">[7]</ref>. However, agents are individual entities and, thus, slight differences in their features exist. Because of these differences, an agent (say 𝑎 𝑗 ) may have better (resp., worse) performance than another agent (say, 𝑎 𝑞 ) in executing 𝜏 .</p><p>In the light of the reasoning above, the true quality 𝜃 𝑙 (𝜏 ) quantifies the expected performance of an arbitrary trustee in 𝐶 𝑙 in the execution of 𝜏 .</p><p>We assume that 𝜃 𝑙 (𝜏 ) ranges in (−∞, +∞): positive (resp., negative) values of 𝜃 𝑙 (𝜏 ) are an indicator of good (resp., bad) performances. The first step to compute 𝜃 𝑙 (𝜏 ) consists of modelling the performance 𝑓 𝑗 (𝜏 ) of an arbitrary agent 𝑎 𝑗 ∈ 𝐶 𝑙 in executing 𝜏 . To capture uncertainty in the performance of 𝑎 𝑗 , we represent 𝑓 𝑗 (𝜏 ) as a Gaussian random variable with mean 𝜇 𝑗 and variance 𝜎 2 𝑗 .</p><p>The assumption that all of the agents in the same category should reach the same performance implies that 𝜇 𝑗 = 𝜃 𝑙 (𝜏 ) for each agent 𝑎 𝑗 ∈ 𝐶 𝑙 .</p><p>The variance 𝜎 2 𝑗 controls the amount of variability in the performances of the agent 𝑎 𝑗 : large (resp., small) values in 𝜎 2  𝑗 generate significant (resp., irrelevant) deviations from 𝜃 𝑙 (𝜏 ). In this paper we considered two options for 𝜎 2 𝑗 , namely:</p><p>1. Fixed Variance Model: we suppose that 𝜎 Based on these premises, the procedure to estimate 𝜃 𝑙 (𝜏 ) is iterative and, at the 𝑘-th iteration it works as follows: a) We select, uniformly at random, an agent, say 𝑎 𝑗 from 𝐶 𝑙 b) We sample the performance 𝑓 ^𝑗(𝑘) ∼ 𝑓 𝑗 (𝜏 ) of 𝑎 𝑗 Steps a) and b) are repeated 𝑁 times, being 𝑁 the number of agents we need to sample before making a decision. In addition, in Step a), agents are sampled with replacement, i.e., an agent could be selected more than once. The algorithm outputs the average value of sampled performances, i.e.:</p><formula xml:id="formula_0">𝜃 ^𝑙(𝜏 ) = 1 𝑁 𝑁 ∑︁ 𝑘=1 𝑓 ^𝑗(𝑘)<label>(1)</label></formula><p>Our algorithm actually converges to the true value 𝜃 𝑙 (𝜏 ) as stated in the following theorem:</p><p>Let 𝑁 be the number of agents queried by our algorithm and let 𝜃 ^𝑙(𝜏 ) be the estimation of the true quality 𝜃 𝑙 (𝜏 ) the algorithm returns after 𝑁 rounds. We have that in both the fixed variance and random variance models 𝜃 ^𝑙(𝜏 ) converges to 𝜃 𝑙 (𝜏 ) at a rate of convergence of 1</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>√</head><p>𝑁 .</p><p>Let us first analyze the individual agent performances 𝑓 𝑗 (𝜏 ) and we are interested in computing the mean and variance of 𝑓 𝑗 (𝜏 ). If we opt for the Fixed Variance Model, then 𝑓 𝑗 (𝜏 ) is a Gaussian random variable with mean 𝜃 𝑙 (𝜏 ) and the variance is equal to a constant value 𝜎 2 . In contrast, if we are in the Random Variance Model, then the estimation of the mean and the variance of 𝑓 𝑗 (𝜏 ) can be obtained by law of total mean and the law of total variance <ref type="bibr" target="#b16">[17]</ref>, which state that for two arbitrary random variables 𝑋 and 𝑌 , the following identities hold true:</p><formula xml:id="formula_1">E(𝑋) = E(E(𝑋 | 𝑌 ))<label>(2)</label></formula><formula xml:id="formula_2">Var(𝑌 ) = E(Var(𝑌 | 𝑋)) + Var(E(𝑌 | 𝑋))<label>(3)</label></formula><p>We apply Equations 2 and 3 to 𝑋 = 𝑓 𝑗 (𝜏 ) and 𝑌 = 𝜎; if we condition on 𝜎 = 𝜎, then 𝑓 𝑗 (𝜏 ) is a Gaussian random variable with mean equal to 𝜃 𝑙 (𝜏 ) and variance equal to 𝜎 and therefore:</p><formula xml:id="formula_3">E(𝑓 𝑗 (𝜏 )) = E(E(𝑓 𝑗 (𝜏 ) | 𝜎 = 𝜎)) = E(𝜃 𝑙 (𝜏 )) = 𝜃 𝑙 (𝜏 )</formula><p>In addition,</p><formula xml:id="formula_4">E(Var(𝑓 𝑗 (𝜏 ) | 𝜎 = 𝜎)) = E(𝜎) = 𝛼 + 𝛽 2 and</formula><p>Var(E(𝑓 𝑗 (𝜏 )</p><formula xml:id="formula_5">| 𝜎 = 𝜎)) = Var(E(𝜃 𝑙 (𝜏 ))) = Var(𝜃 𝑙 (𝜏 )) = 0</formula><p>which jointly imply Var(𝑓 𝑗 (𝜏 )) = 𝛼 + 𝛽 2 As a consequence, independently of the agent 𝑎 𝑗 , we have that the agent performances 𝑓 𝑗 (𝜏 ) have the same distribution which we denote as 𝑓 (𝜏 ). Therefore, in both the Fixed Variance Model and Random Variance Model, the algorithm selects a random sample of agents 𝑍 1 , 𝑍 2 , . . . , 𝑍 𝑁 of size 𝑁 in which, for each 𝑘 such that 1 ≤ 𝑘 ≤ 𝑁 , 𝑍 𝑘 is the average performance of the agent selected at the 𝑘-th iteration and it is distributed as 𝑓 (𝜏 ). The algorithm calculates:</p><formula xml:id="formula_6">𝑆 𝑁 = 𝑍 1 + 𝑍 2 + . . . + 𝑍 𝑛 𝑁<label>(4)</label></formula><p>Because of the Central Limit Theorem <ref type="bibr" target="#b16">[17]</ref>, the distribution of 𝑆 𝑁 gets closer and closer to a Gaussian distribution with mean 𝜃 𝑙 (𝜏 ) as 𝑁 → +∞ with a rate of convergence in the order of 1 √ 𝑁 and this end the proof.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experimental Analysis</head><p>We designed our experiments to answer two main research questions, namely: RQ 1 What are the benefits arising from the introduction of categories in the selection of a trustee against, for instance, a pure random search or a direct-experience based strategy? RQ 2 How quickly our algorithm to estimate 𝜃 𝑙 (𝜏 ) converges?</p><p>In what follows, we first describe a reference scenario in which our task consists of recruiting a chef from a database of applicants (see Section 4.1). Then, in Sections 4.2 and 4.3, we provide an answer to RQ 1 and RQ 2 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">The reference scenario</head><p>We assume that features associated with our task are as follows: (i) Culinary Education, measured as the (overall) number of hours spent in training courses with qualified chef trainers, (ii) Expertise, i.e., the number of years of professional experience, (iii) Language Skills, defined as the number of foreign languages in which the applicant is proficient, (iv) Culture, measured on a scale from 0 (worse) to 10 (best) and which is understood as the ability of preparing different kind dishes (e.g. fish, meat, vegetarian and so on) in different styles (e.g. Indian, Thai or Italian) and (v) Creativity, measured on a scale from 0 (worse) to 10 (best). The list of features is, of course, non-exhaustive. We suppose that each feature is associated with a plausible range: for instance, in Table <ref type="table" target="#tab_1">1</ref>, we consider three potential tasks and the corresponding requirements.</p><p>In the following, due to space limitations, we concentrate only on the task 𝜏 1 and we suppose that five categories exist, namely: Professional Chefs -𝐶 1 , who are trained to master culinary art. Members in 𝐶 1 are able to provide creative innovation in menu, preparation and presentation, Vegan Chefs -𝐶 2 , specialized in the preparation of plant-based dishes, Pastry Chefs -𝐶 3 , who are capable of creating chocolates and pastries, Roast Chefs -𝐶 4 , who have expertise in preparing roasted/braised meats and Fish Chefs -𝐶 5 , who are mainly specialized in the preparation of dish fishes. Each category consists of 100 agents and, thus, the overall number of agents involved in our experiments is 500. Features associated with categories 𝐶 1 -𝐶 5 are reported in Table <ref type="table" target="#tab_2">2</ref>.</p><p>In our scenario, only agents in 𝐶 1 are able to fulfill 𝜏 1 ; agents in other categories are, for different reasons, unable to execute 𝜏 1 : for instance, the expertise of agents in categories 𝐶 2 , 𝐶 3 and 𝐶 5 is not sufficient while agents forming categories 𝐶 3 -𝐶 5 correspond to applicants with a high level of specialization in the preparation of some specific kind of dishes (e.g., fish-based dishes) but they are not sufficiently skilled in the preparation of other type of foods and, thus, agents in these categories showcase an insufficient level of culture.</p><p>To simplify discussion we suppose that, through a proper normalization, the performance 𝑓 (𝜏 1 ) (see Section 3) of an individual agent as well as the true quality 𝜃 𝑙 (𝜏 1 ) of a category 𝐶 𝑙 (for l = 1 . . . 5) range from 0 to 1. Here, the best performance of an agent can provide (resp., the highest true quality of a category) is 1. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">A comparison of category-based search with random-based search and direct-experience search</head><p>In our first experiment, we compare three strategies to search for a trustee, namely: a) Random-Based Search: here, the trustor selects, uniformly at random, a trustee to execute 𝜏 1 . The trustor measures the performance 𝑓 (𝜏 1 ) provided by the trustee in the execution of 𝜏 1 . b) Category-Based Search: here, the trustor considers only agents in the most appropriate category (which in our reference scenario coincides with 𝐶 1 ); as suggested in <ref type="bibr" target="#b6">[7]</ref>, the trustor selects, uniformly at random, one of the agents in 𝐶 1 to act as trustee. Once again, the trustor measures the performance 𝑓 (𝜏 1 ) provided by the trustee in the execution of 𝜏 1 . (c) Direct-Experience Search: we suppose that the trustor consults up to 𝐵 agents in the community, being 𝐵 a fixed integer called budget. The trustor records the performance of each consulted agent but it does not memorize its category (it may be that the trustor is unable to perceive/understand the trustee's category). At the end of this procedure, the trustor selects as trustee the agent providing the highest performance 𝑓 (𝜏 1 ) among all consulted agents. The Direct-Experience Search strategy can be regarded as an evolution of the Random-Based Search strategy in which the trustor learns from its past interactions it uses its knowledge to spot the trustee. Here, the budget 𝐵 regulates the duration of the learning activity the trustor pursues. In our experimental setting, we considered two values of 𝐵, namely 𝐵 = 10 and 𝐵 = 30 and we discuss only results in the Fixed Variance Model with 𝜎 = 0.05 and 𝜎 = 0.15. We applied the Random-Based, the Category-Based and the Direct-Experience Search strategies 20 times; a sketch of the probability density function (pdf) of 𝑓 (𝜏 1 ) for each strategy is shown in Figure <ref type="figure" target="#fig_1">1  and 2</ref>.</p><p>As expected, Category-Based Search performs consistently better than the Random-Search one. In addition, the standard deviation of 𝑓 (𝜏 1 ) in Category-Based Search is much smaller than that observed in the Random-Based strategy and such a behaviour depends on the different degree of matching of categories 𝐶 1 -𝐶 5 with the task 𝜏 1 : in other words, if the trustee is in 𝐶 1 , the performances it provides are constantly very good; in contrast, in Random-Based Search strategy, the measured performance may significantly fluctuate on the basis of the category to The analysis of the Direct-Experience Search strategy offers many interesting insights which are valid for both 𝜎 = 0.05 and 𝜎 = 0.15. Firstly, notice that if 𝐵 = 10, then the Direct-Experience Search strategy achieves significantly better performances than the Random-Based strategy, which indicates that an even short learning phase yields tangible benefits. If 𝐵 increases, the trustor is able to see a larger number of agents before making its decision and, in particular, if 𝐵 is sufficiently large, then the trustor might encounter the best performing agent 𝑎 ⋆ in the whole community. In this case, the Direct-Experience strategy would outperform the Category-Based Search strategy: in fact, in the Category-Based strategy, the trustor chooses, uniformly at random, one of the agents in 𝐶 1 which provides a performance worse than (or equal to) 𝑎 ⋆ . In short, for large values of 𝐵, the Direct-Experience strategy achieves performances which are comparable and, in some cases, even better than those we would obtain in the Category-Based strategy, as shown in Figure <ref type="figure" target="#fig_1">1 and 2</ref>. However, the budget 𝐵 has the meaning of a cost, i.e., it is associated with the time the trustor has to wait before it chooses the trustee and, thus, in many practical scenarios, the trustor has to make its decisions as quick as possible.</p><p>It is also instructive to consider a further strategy, called Mixed-Based Search, which combines the Random-Based Search strategy with the Category-Based Search strategy.</p><p>In Mixed-Based Search, we assume the existence of a warm-up phase in which the trustor selects the trustee by means of the Random-Based Search strategy; unlike the Direct-Experience Search strategy, the trustor collects not only 𝑓 (𝜏 1 ) but it also records the category of the trustee. In this way, the trustor is able to identify (after, hopefully, a small number of steps) the category with the highest true quality, i.e., 𝐶 1 . From that point onward, the trustor switches to a Category-Based strategy and it selects only agents from 𝐶 1 . From a practical standpoint, we suppose that a performance 𝑓 (𝜏 1 ) ≥ 0.6 is classified as an indicator of good performance (in short, positive signal); as soon as the trustor has collected 2 positive signals, it makes a decision on the best performing category and it switches to the Category-Based Search strategy.</p><p>We are interested at estimating, through simulations, the length ℓ of the warm-up phase, i.e., the number of agents that the trustor has to contact before switching to the Category-Based search strategy. In Figure <ref type="figure">3 and 4</ref> we plot the pdf of ℓ. Here, the variance 𝜎 has a minor impact and we notice that, the pdf achieves its largest value at ℓ ≃ 10, i.e., 10 iterations are generally sufficient to identify the best performing category.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">The rate of convergence of our algorithm</head><p>We conclude our study by investigating how the Fixed Variance Model and the Random Variance model influence the rate at which our algorithm estimates the true quality 𝜃 𝑙 (𝜏 ) of a category.</p><p>To make exposition of experimental outcomes simple, we suppose that 𝜃 𝑙 = 1 (which models a scenario in which agents in 𝐶 1 showcase an exceptionally high ability in executing 𝜏 1 ).</p><p>We considered the Fixed Variance Model with 𝜎 ∈ {0.05, 0.1, 0.15} and the Random Variance Model in which 𝜎 is uniformly distributed in [0.01, 0.3].</p><p>We investigated how 𝜃 ^𝑙(𝜏 ) varied as function of the number 𝑁 of queried agents; obtained results are reported in Figure <ref type="figure" target="#fig_3">5</ref>.</p><p>The main conclusions we can draw from our experiment are as follows: 2. An interesting case occurs in the Random Variance Model: in some iterations of the algorithm, agents with a small variability are selected (i.e., we would sample agents with 𝜎 ≃ 0.01) while in other cases agent with a larger variability are selected (here 𝜎 ≃ 0.3).</p><p>Overall, agents with small variability fully balance agents with high variability and, thus, the algorithm converges to 𝜃 𝑙 (𝜏 ) (red line) generally faster than the case 𝜎 = 0.1 (orange line) and 𝜎 = 0.15 (green line).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>Although highly populated networks are a particularly useful environment for agents' collaboration, the very nature of these networks may represent a drawback for trust formation, given the lack of data for evaluating the huge number of possible partners. Many contributions in the literature <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b17">18]</ref> showed that category-based evaluations and inferential processes represent a remarkable solution for trust assessment, since they allow agents to generalize from trust in individuals to trust in their category and vice versa, basing on their observable features. On that note, we cared about stressing the tight relationship between trust and the specific task, target of the trust itself. With the purpose of investigating the role of agents' categories, we considered a simulated scenario, testing in particular the performance of a category-based evaluation, with respect to a random-based search -which it is easily outperformed -and a direct-experience one, showing that, in case of little direct experience, categories grant a better result. Moreover, we proved that, if not available, it is possible to estimate the category's true quality 𝜃 𝑙 (𝜏 ) in a</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Feedback 𝑓 (𝜏 ) provided by the trustee. Fixed Variance Model with 𝜎 = 0.05</figDesc><graphic coords="8,197.63,84.19,200.01,150.01" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Feedback 𝑓 (𝜏 ) provided by the trustee. Fixed Variance Model with 𝜎 = 0.15</figDesc><graphic coords="9,197.63,84.19,200.01,150.01" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :Figure 4 :</head><label>34</label><figDesc>Figure 3: Probability Density Function of the Warm-up length (ℓ) in the Mixed-Search strategy. Fixed Variance Model with 𝜎 = 0.05</figDesc><graphic coords="10,197.63,84.19,200.01,150.01" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Variation of 𝜃 ^𝑙(𝜏 ) as function of 𝑁 .</figDesc><graphic coords="11,193.47,84.19,208.35,156.26" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>2 𝑗 = 𝜎 2 for each 𝑎 𝑗 ∈ 𝐶 𝑙 . 2. Random Variance Model: we suppose that 𝜎 2 𝑗 is a uniform random variable in the interval [𝛼, 𝛽].</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1</head><label>1</label><figDesc>Some tasks associated with the recruitment of a professional chef and their requirements</figDesc><table><row><cell cols="6">Task Culinary Expertise Language Culture Creativity</cell></row><row><cell></cell><cell>Education</cell><cell></cell><cell>Skills</cell><cell></cell><cell></cell></row><row><cell>𝜏 1</cell><cell>150</cell><cell>5</cell><cell>2</cell><cell>6</cell><cell>7</cell></row><row><cell>𝜏 2</cell><cell>200</cell><cell>4</cell><cell>2</cell><cell>6</cell><cell>6</cell></row><row><cell>𝜏 3</cell><cell>300</cell><cell>4</cell><cell>2</cell><cell>7</cell><cell>6</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2</head><label>2</label><figDesc>Some features associated with categories 𝐶 1 -𝐶 5</figDesc><table><row><cell cols="6">Category ID. Culinary Expertise Language Culture Creativity</cell></row><row><cell></cell><cell>Education</cell><cell></cell><cell>Skills</cell><cell></cell><cell></cell></row><row><cell>𝐶 1</cell><cell>250</cell><cell>5</cell><cell>2</cell><cell>8</cell><cell>7</cell></row><row><cell>𝐶 2</cell><cell>250</cell><cell>3</cell><cell>2</cell><cell>6</cell><cell>5</cell></row><row><cell>𝐶 3</cell><cell>300</cell><cell>3</cell><cell>1</cell><cell>4</cell><cell>5</cell></row><row><cell>𝐶 4</cell><cell>100</cell><cell>6</cell><cell>1</cell><cell>4</cell><cell>5</cell></row><row><cell>𝐶 5</cell><cell>400</cell><cell>3</cell><cell>1</cell><cell>4</cell><cell>5</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>15-27 reasonably short amount of time. Future research will attempt to test these findings on a real data set.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Trust-oriented partner selection in d2d cooperative communications</title>
		<author>
			<persName><forename type="first">J</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sanyal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="3444" to="3453" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A multi-agent protocol for service level agreement negotiation in cloud federations</title>
		<author>
			<persName><forename type="first">F</forename><surname>Messina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pappalardo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Santoro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rosaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>Sarné</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Grid and Utility Computing</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="101" to="112" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A trust-based, multi-agent architecture supporting inter-cloud vm migration in iaas federations</title>
		<author>
			<persName><forename type="first">F</forename><surname>Messina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pappalardo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rosaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>Sarné</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Internet and Distributed Computing Systems</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="74" to="83" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Evaluating agents&apos; trustworthiness within virtual societies in case of no direct experience</title>
		<author>
			<persName><forename type="first">A</forename><surname>Sapienza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Falcone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cognitive Systems Research</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="page" from="164" to="173" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Agent based modelling and simulation tools: A review of the state-of-art software</title>
		<author>
			<persName><forename type="first">S</forename><surname>Abar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">K</forename><surname>Theodoropoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Lemarinier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>O'hare</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Science Review</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="13" to="33" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Castelfranchi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Falcone</surname></persName>
		</author>
		<title level="m">Trust theory: A socio-cognitive and computational model</title>
				<imprint>
			<publisher>John Wiley &amp; Sons</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">18</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Selecting trustworthy partners by the means of untrustworthy recommenders in digitally empowered societies</title>
		<author>
			<persName><forename type="first">R</forename><surname>Falcone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sapienza</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the International Conference on Practical Applications of Agents and Multi-Agent Systems</title>
				<meeting>of the International Conference on Practical Applications of Agents and Multi-Agent Systems<address><addrLine>Avila, Spain</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="55" to="65" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">The relevance of categories for trusting information sources</title>
		<author>
			<persName><forename type="first">R</forename><surname>Falcone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sapienza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Castelfranchi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Internet Technology (TOIT)</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page">13</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">From manifesta to krypta: The relevance of categories for trusting others</title>
		<author>
			<persName><forename type="first">R</forename><surname>Falcone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Piunti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Venanzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Castelfranchi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Intelligent Systems and Technology (TIST)</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page">27</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Operators for propagating trust and their evaluation in social networks</title>
		<author>
			<persName><forename type="first">C.-W</forename><surname>Hang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Singh</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
		<respStmt>
			<orgName>North Carolina State University. Dept. of Computer Science</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Propagation of trust and distrust</title>
		<author>
			<persName><forename type="first">R</forename><surname>Guha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Raghavan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Tomkins</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 13th international conference on World Wide Web</title>
				<meeting>the 13th international conference on World Wide Web</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="403" to="412" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A matrix factorization technique with trust propagation for recommendation in social networks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Jamali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ester</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the fourth ACM conference on Recommender systems</title>
				<meeting>the fourth ACM conference on Recommender systems</meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="135" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">An efficient and versatile approach to trust and reputation using hierarchical bayesian modelling</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">L</forename><surname>Teacy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Luck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rogers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">R</forename><surname>Jennings</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">193</biblScope>
			<biblScope unit="page" from="149" to="185" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A generalized stereotypical trust model</title>
		<author>
			<persName><forename type="first">H</forename><surname>Fang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sensoy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">M</forename><surname>Thalmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="698" to="705" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Collective trust within organizations: Conceptual foundations and empirical insights</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Kramer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Corporate Reputation Review</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="82" to="97" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Trust in small military teams</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">D</forename><surname>Adams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">D</forename><surname>Webb</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">7th international command and control technology symposium</title>
				<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="1" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Introduction to probability</title>
		<author>
			<persName><forename type="first">D</forename><surname>Bertsekas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Tsitsiklis</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>Athena Scientific</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Trusting information sources through their categories</title>
		<author>
			<persName><forename type="first">R</forename><surname>Falcone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sapienza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Castelfranchi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Practical Applications of Agents and Multi-Agent Systems</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="80" to="92" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
