Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Point-Level Label-Free Segmentation Framework for 3D Point Cloud Semantic Mining

    3D point cloud data semantic mining plays a key role in 3D scene understanding. Although recent point cloud semantic mining methods have achieved great success, they require large amounts of expensive manual a...

    Anan Du, Shuchao Pang, Mehmet Orgun in Advanced Data Mining and Applications (2023)

  2. No Access

    Chapter and Conference Paper

    TAP: A Two-Level Trust and Personality-Aware Recommender System

    Recommender systems (RSs) have been adopted in a variety set of web services to provide a list of items which a user may interact with in near future. Collaborative filtering (CF) is one of the most widely use...

    Shahpar Yakhchi, Seyed Mohssen Ghafari in Service-Oriented Computing – ICSOC 2020 W… (2021)

  3. No Access

    Chapter and Conference Paper

    Modelling Local and Global Dependencies for Next-Item Recommendations

    Session-based recommender systems (SBRSs) aim at predicting the next item by modelling the complex dependencies within and across sessions. Most of the existing SBRSs make recommendations only based on local depe...

    Nan Wang, Shou** Wang, Yan Wang in Web Information Systems Engineering – WISE… (2020)

  4. No Access

    Chapter and Conference Paper

    N2TM: A New Node to Trust Matrix Method for Spam Worker Defense in Crowdsourcing Environments

    To defend against spam workers in crowdsourcing environments, the existing solutions overlook the fact that a spam worker with guises can easily bypass the defense. To alleviate this problem, in this paper, we...

    Bin Ye, Yan Wang, Mehmet Orgun, Quan Z. Sheng in Service-Oriented Computing (2019)

  5. No Access

    Chapter and Conference Paper

    SETTRUST: Social Exchange Theory Based Context-Aware Trust Prediction in Online Social Networks

    Trust is context-dependent. In real-world scenarios, people trust each other only in certain contexts. However, this concept has not been seriously taken into account in most of the existing trust prediction a...

    Seyed Mohssen Ghafari, Shahpar Yakhchi, Amin Beheshti in Data Quality and Trust in Big Data (2019)

  6. No Access

    Chapter and Conference Paper

    Social Context-Aware Trust Prediction: Methods for Identifying Fake News

    Fake news, a type of yellow journalism or propaganda, consist of false or incorrect information and have the potential to spread very fast on online social networks. This false information is mainly distribute...

    Seyed Mohssen Ghafari, Shahpar Yakhchi in Web Information Systems Engineering – WISE… (2018)

  7. No Access

    Article

    A Survey of Authentication Schemes in Telecare Medicine Information Systems

    E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by t...

    Muhammad Umair Aslam, Abdelouahid Derhab, Kashif Saleem in Journal of Medical Systems (2016)

  8. Chapter and Conference Paper

    An Uncertain Assessment Compatible Incentive Mechanism for Eliciting Continual and Truthful Assessments of Cloud Services

    The evaluation of dynamic performance of cloud services relies on continual assessments from cloud users, e.g., ordinary consumers and testing parties. In order to elicit continual and truthful assessments, an...

    Lie Qu, Yan Wang, Mehmet Orgun in Service-Oriented Computing (2016)

  9. Chapter and Conference Paper

    Evaluating Cloud Users’ Credibility of Providing Subjective Assessment or Objective Assessment for Cloud Services

    This paper proposes a novel model for evaluating cloud users’ credibility of providing subjective assessment or objective assessment for cloud services. In contrast to prior studies, cloud users in our model a...

    Lie Qu, Yan Wang, Mehmet Orgun, Duncan S. Wong in Service-Oriented Computing (2014)

  10. No Access

    Chapter and Conference Paper

    Towards Context Sensitive Defeasible Rules

    Defeasible argumentation systems are used to model commonsense and defeasible reasoning. Current argumentation systems assume that an argument that appears to be justified also satisfies our expectation in rel...

    Armin Hezart, Abhaya Nayak, Mehmet Orgun in Computational Logic in Multi-Agent Systems (2008)

  11. No Access

    Chapter and Conference Paper

    Taking Levi Identity Seriously: A Plea for Iterated Belief Contraction

    Most work on iterated belief change has focused on iterated belief revision, namely how to compute (K $^{\rm *...

    Abhaya Nayak, Randy Goebel, Mehmet Orgun in Knowledge Science, Engineering and Managem… (2006)

  12. No Access

    Chapter and Conference Paper

    Managing Theories of Trust in Agent Based Systems

    A theory of trust for a given system is a set of rules that describes trust of agents in the system. In a certain logical framework, the theory is generally established based on the initial trust of agents in ...

    Ji Ma, Mehmet Orgun in Computer and Information Sciences - ISCIS 2005 (2005)

  13. No Access

    Chapter and Conference Paper

    A Temporalised Belief Logic for Specifying the Dynamics of Trust for Multi-agent Systems

    Temporalisation is a methodology for combining logics whereby a given logic system can be enriched with temporal features to create a new logic system. TML (Typed Modal Logic) extends classical first-order log...

    Chuchang Liu, Maris A. Ozols, Mehmet Orgun in Advances in Computer Science - ASIAN 2004.… (2005)

  14. No Access

    Chapter and Conference Paper

    A User-Centred Consistency Model in Real-Time Collaborative Editing Systems

    Consistency maintenance is an important issue in groupware systems. The existing consistency models are system-oriented and focus on objective and static aspects of consistency without sufficiently taking into...

    Liyin Xue, Mehmet Orgun, Kang Zhang in Distributed Communities on the Web (2002)

  15. No Access

    Chapter and Conference Paper

    A Group-Based Time-Stam** Scheme for the Preservation of Group Intentions

    Real-time negotiation support is an important issue in collaborative editing systems. The existing multi-versioning techniques provide support for negotiation by preserving individual users’ concurrent conflic...

    Liyin Xue, Mehmet Orgun, Kang Zhang in Distributed Communities on the Web (2002)

  16. No Access

    Chapter and Conference Paper

    Intention Preservation by Multi-versioning in Distributed Real-Time Group Editors

    There are multi-versioning schemes that can preserve individual users’ concurrent conflicting intentions in a consistent way. However, they are proposed for intention preservation in collaborative editing envi...

    Liyin Xue, Mehmet Orgun, Kang Zhang in Engineering and Deployment of Cooperative … (2002)