[1] HOWE J. Crowdsourcing: why the power of the crowd is driving the future of business [J]. Journal of Consumer Marketing, 2009, 26(4): 305-306. [2] SHI W, ZHOU B, XU L. Pervasive computing: human-centered computing [J]. Journal of Computer Applications, 2005, 25(7): 1479-1484. (石为人,周彬,许磊.普适计算:人本计算[J].计算机应用,2005,25(7):1479-1484.) [3] von AHN L, MAURER B, McMILLEN C, et al. reCAPTCHA: human-based character recognition via Web security measures [J]. Science, 2008, 321(5895): 1465-1468. [4] IPEIROTIS P G. Analyzing the Amazon mechanical Turk market-place [J]. XRDS: Crossroads, The ACM Magazine for Students, 2010, 17(2): 16-21. [5] E-commerce platform. Online website of Zhubajie [EB/OL]. [2014-12-20]. http://zhubajie.com. [6] ALLAHBAKHSH M, BENATALLAH B, IGNJATOVIC A, et al. Quality control in crowdsourcing systems [J]. IEEE Internet Computing, 2013, 17(2): 76-81. [7] SOROKIN A, FORSYTH D. Utility data annotation with Amazon mechanical Turk [C]//CVPRW'08: Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. Washington, DC: IEEE Computer Society, 2008: 1-8. [8] KITTUR A, SMUS B, KHAMKAR S, et al. CrowdForge: crowdsourcing complex work [C]//Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology. New York: ACM, 2011: 43-52. [9] PARAMESWARAN A G, GARCI-MOLINA H, PARK H, et al. CrowdScreen: algorithms for filtering data with humans [C]//Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2012: 361-372. [10] BOURDAILLET J, ROY S, JUNG G, et al. Crowdsourcing trans-lation by leveraging tournament selection and lattice-based string alignment [C]//Proceedings of the First AAAI Conference on Human Computation and Crowdsourcing. Menlo Park, California: AAAI Press, 2013: 10-11. [11] DOAN A, RAMAKRISHNAN R, HALEVY A Y. Crowdsourcing systems on the World-Wide Web [J]. Communications of the ACM, 2011, 54(4): 86-96. [12] HUANG C. The study of dynamic trust relationship modeling and managing [D]. Changsha: National University of Defense Technology, 2005: 14-18. (黄辰林.动态信任关系建模和管理技术研究[D].长沙:国防科学技术大学,2005:14-18.) [13] ZHANG Y, CHEN J, CHEN S. DrTrust: a trust model in unstructured P2P network [J]. Journal of Computer Applications, 2009, 29(2): 503-506. (张云昌,陈建新,陈珊珊.DrTrust:一种非结构化P2P网络信任模型[J].计算机应用,2009,29(2):503-506.) [14] RAO S, WANG Y. Dynamic fuzzy comprehensive trust model based on P2P network [J]. Journal of Computer Applications, 2011, 31(1): 139-142. (饶屾,王勇.基于P2P网络的动态模糊综合信任模型[J].计算机应用,2011,31(1):139-142.) [15] CAI H, DU R, TIAN J. Research of trust model based on multidimensional trust cloud [J]. Journal of Computer Applications, 2012, 32(1): 5-7. (蔡红云,杜瑞忠,田俊峰.基于多维信任云的信任模型研究[J].计算机应用,2012,32(1):5-7.) [16] SONG K. Research of trust models based on D-S evidence theory for P2P networks [D]. Harbin: Harbin Engineering University, 2011: 22-30. (宋康超.P2P网络中基于D-S证据理论的信任模型的研究[D].哈尔滨:哈尔滨工程大学,2011:22-30.) [17] WANG Y, LIU Y, ZHAO R, et al. Situation assessment method based on improved evidence theory [J]. Journal of Computer Applications, 2014, 34(2): 491-495. (汪永伟,刘育楠,赵荣彩,等.基于改进证据理论的态势评估方法[J].计算机应用,2014,34(2):491-495.) [18] ZHAO Q, ZUO W, TIAN Z, et al. A method for assessment of trust relational strength based on the improved D-S evidence theory [J]. Chinese Journal of Computers, 2014, 37(4): 873-883. (赵秋月,左万利,田中生,等.一种基于改进D-S证据理论的信任关系强度评估方法研究[J].计算机学报,2014,37(4):873-883.) [19] SCHLOSSER M T, CONDIE T E, KAMVAR S D. Simulating a file-sharing P2P network [EB/OL]. [2015-01-23] http://ilpubs.stanford.edu:8090/589/1/2003-28.pdf. [20] KULKARNI C, WEI K P, LE H, et al. Peer and self-assessment in massive online classes [J]. ACM Transactions on Computer-Human Interaction, 2013, 20(6): Article No. 33. [21] Al-ATABI M, DEBOER J. Teaching entrepreneurship using Massive Open Online Course (MOOC) [J]. Technovation, 2014, 34(4): 261-264. [22] COOPER S, SAHAMI M. Reflections on Stanford's MOOCs [J]. Communications of the ACM, 2013, 56(2): 28-30. [23] ZHU Y, HUANG L, CHEN G, et al. Dynamic trust evaluation model under distributed computing environment [J]. Chinese Journal of Computers, 2011, 34(1): 55-64. (朱友文,黄刘生,陈国良,等.分布式计算环境下的动态可信度评估模型[J].计算机学报,2011,34(1):55-64.) |