SlideShare a Scribd company logo
1 of 32
HARM
  A Hybrid Rule-based Agent Reputation
Model based on Temporal Defeasible Logic


                     Kalliopi Kravari, Nick Bassiliades
                            Department of Informatics
                   Aristotle University of Thessaloniki
                                 Thessaloniki, Greece
OVERVIEW
      Agents in the SW interact under uncertain and risky situations.


      Whenever they have to interact with partners of whom they know nothing..
                                              they have to make decision involving risk.


      Thus:
      Their success may depend on their ability to choose reliable partners.


      Solution:
      Reliable trust and/or reputation models.

               SW        Intelligent
                                                    SW Trust Layer
            evolution      Agents


Nick Bassiliades                       RuleML 2012, Montpellier, Aug 27-29
                                                                                           2
OVERVIEW
      Trust is the degree of trust that can be invested in a certain agent.

      Reputation is the opinion of the public towards an agent.

      Reputation (trust) models provide the means to quantify
        reputation and trust
       help agents to decide who to trust
       encourage trustworthy behavior
       deter dishonest participation

      Current computational reputation models are usually built either on
                                           interaction trust or witness reputation.


                                                 an agent’s direct experience
                                                                         reports provided by
                                                                                      others
Nick Bassiliades                      RuleML 2012, Montpellier, Aug 27-29
                                                                                               3
APPROACHES’ LIMITATIONS
       If the reputation estimation is based only on direct experience, it would
        require a long time for an agent to reach a satisfying estimation level.
                                         Why?
            because when an agent enters an environment for the first time,
        it has no history of interactions with the other agents in the environment.


       If the reputation estimation is based only on witness reports, it could
        not guarantee reliable estimation.
                                          Why?
              because self-interested agents could be unwilling or unable
                 to sacrifice their resources in order to provide reports.



Nick Bassiliades                     RuleML 2012, Montpellier, Aug 27-29
                                                                                      4
HYBRID MODELS


      Hybrid models combine both interaction trust and witness reputation.

      We propose HARM:
      an incremental reputation model that combines
       the advantages of the hybrid reputation models
       the benefits of temporal defeasible logic (rule-based approach)




Nick Bassiliades                   RuleML 2012, Montpellier, Aug 27-29
                                                                             5
(Temporal) Defeasible Logic
      Temporal defeasible logic (TDL) is an extension of defeasible logic (DL).

      DL is a kind of non-monotonic reasoning

      Why defeasible logic?
       Rule-based, deterministic (without disjunction)
       Enhanced representational capabilities
       Classical negation used in rule heads and bodies
       Negation-as-failure can be emulated
       Rules may support conflicting conclusions
       Skeptical: conflicting rules do not fire
       Priorities on rules resolve conflicts among rules
       Low computational complexity

Nick Bassiliades                       RuleML 2012, Montpellier, Aug 27-29
                                                                                  6
Defeasible Logic
        Facts: e.g. student(Sofia)
        Strict Rules: e.g. student(X) person(X)
        Defeasible Rules: e.g. r: person(X) works(X)
                                   r’: student(X) ¬works(X)
        Priority Relation between rules, e.g. r’ > r

        Proof theory example:
                A literal q is defeasibly provable if:
                 supported by a rule whose premises are all defeasibly provable
                   AND
                  q is not definitely provable AND
                 each attacking rule is non-applicable or defeated by a superior
                   counter-attacking rule

Nick Bassiliades                         RuleML 2012, Montpellier, Aug 27-29
                                                                                    7
Temporal Defeasible Logic
        Two types of temporal literals:
         expiring temporal literals l:t (a literal l is valid for t time instances)
         persistent temporal literals l@t
                 (a literal l is active after t time instances have passed and is valid
                                                                            thereafter)
         temporal rules: a1:d1 ... an:dn d b:db

                          delay between the cause a1:d1 ... an:dn and the effect b:db

        Example:
        (r1) => a@1                                                          Literal a is created due to r1.
        (r2) a@1=>7 b:3                                          It becomes active at time offset 1.
                                                      It causes the head of r2 to be fired at time 8.
                                                               The result b lasts only until time 10.
                                                               Thereafter, only the fact a remains.


Nick Bassiliades                       RuleML 2012, Montpellier, Aug 27-29
                                                                                                               8
HARM – Evaluated Abilities
        Evaluates four agent abilities:
         validity, completeness, correctness and response time.
        An agent is valid if it is both sincere and credible.
                Sincere: believes what it says
                Credible: what it believes is true in the world
        An agent is complete if it is both cooperative and vigilant.
                Cooperative: says what it believes
                Vigilant: believes what is true in the world
        An agent is correct if its provided service is correct with
         respect to a specification.
        Response time is the time that an agent needs to complete
         the transaction.

Nick Bassiliades                          RuleML 2012, Montpellier, Aug 27-29
                                                                                9
HARM - Ratings
        Agent A establishes interaction with agent B:
        (A)Truster is the evaluating agent
        (B) Trustee is the evaluated agent

        Truster’s rating value (r) in HARM has 8 coefficients:
         2 IDs: Truster, Trustee
         4 abilities:
           Validity, Completeness, Correctness, Response time
         2 weights: Confidence, Transaction value
                  Confidence: how confident the agent is for the rating
                  Transaction value: how important the transaction was for the
                   agent


Nick Bassiliades                        RuleML 2012, Montpellier, Aug 27-29
                                                                                  10
HARM – Experience Types
         Direct Experience (PRAX )
         Indirect Experience
           reports provided by strangers (SRAX)
           reports provided by known agents (e.g friends) due to
             previous interactions (KRAX )
         Both

                   Final reputation value of an agent X,
                          required by an agent A:
                       RAX = {PRAX , KRAX, SRAX}




Nick Bassiliades               RuleML 2012, Montpellier, Aug 27-29
                                                                     11
HARM – Experience Types
         Sometimes one or more rating categories are missing.
               ▫ e.g. a newcomer has no personal experience
         A user is much more likely to believe statements from a trusted
          acquaintance than from a stranger.
               ▫ Thus, personal opinion (AX) is more valuable than strangers’ opinion
                 (SX), as well as it is more valuable even from previously trusted partners
                 (KX).
         Superiority relationship among rating categories
                                                  AX, KX, SX


                                    AX, KX             AX, SX                       KX, SX



                                             AX              KX                    SX


Nick Bassiliades                             RuleML 2012, Montpellier, Aug 27-29
                                                                                              12
HARM – Final reputation value
        RAX is a function that combines each available category
               ▫ personal opinion (AX)
               ▫ strangers’ opinion (SX)
               ▫ previously trusted partners (KX)

        RAX             PR AX , KR AX , SR AX
        HARM allows agents to define weights of ratings’
         coefficients
               ▫ Personal preferences
                                 coefficient                    coefficient                           coefficient
                    AVG wi log prAX                AVG wi log krAX                       AVG wi log srAX
           RAX                  4
                                               ,                     4
                                                                                     ,               4
                                                                                                                    ,
                                i 1
                                      wi                             i 1
                                                                           wi                        i 1
                                                                                                           wi
          coefficient    validity, completeness, correctness, response _ time 2



Nick Bassiliades                               RuleML 2012, Montpellier, Aug 27-29
                                                                                                                        13
HARM
  Rule-based Decision Making Mechanism / Facts

       Truster’s rating (r) (defeasible RuleML / d-POSL syntax):

        rating(id→rating’s_id, truster→truster’s_name,
                 trustee→trustee’s_name, validity→value1,
                   completeness→value2, correctness→value3,
                       response_time→value4, confidence→value5,
                              transaction_value→value6).

        e.g.
        rating(id→1, truster→A, trustee→B, validity→5,
                       completeness→6, correctness→6, response_time→8,
                              confidence→0.8, transaction_value→0.9).



Nick Bassiliades                  RuleML 2012, Montpellier, Aug 27-29
                                                                         14
HARM
  Rule-based Decision Making Mechanism

       Confidence and transaction value allow us to decide
        how much attention we should pay on each rating.
       It is important to take into account ratings that were
        made by confident trusters, since their ratings are more
        likely to be right.
       Confident trusters, that were interacting in an
        important for them transaction, are even more likely to
        report truthful ratings.




Nick Bassiliades               RuleML 2012, Montpellier, Aug 27-29
                                                                     15
HARM
  Which ratings “count”?
     r1: count_rating(rating→?idx, truster→?a, trustee→ ?x) :=
                   confidence_threshold(?conf),
                                                                          •     if both truster’s confidence and
                   transaction_value_threshold(?tran),                          transaction importance are high,
                   rating(id→?idx, confidence→?confx,                           then that rating will be counted
                            transaction_value→?tranx),                          during the estimation process
                   ?confx >= ?conf, ?tranx >= ?tran.
     r2: count_rating(…) :=                                           •       if the transaction value is lower than
                                                                              the threshold, it doesn’t matter so much
             …                                                                if the truster’s confidence is high
             ?confx >= ?conf.
                                                                  •       if there are only ratings with high
     r3: count_rating(…) :=
                                                                          transaction value,
             …                                                            then they should be taken into account
             ?tranx >= ?tran.
     r1 > r2 > r3                                                     •       In any other case, the rating
                                                                              should be omitted.

Nick Bassiliades                          RuleML 2012, Montpellier, Aug 27-29
                                                                                                                    16
HARM
  Conflicting Literals

   All the previous rules are conclude positive literals.
   These literals are conflicting each other, for the same pair of
    agents (truster and trustee)
           ▫ We want in the presence e.g. of personal experience to omit strangers’
             ratings.
           ▫ That’s why there is also a superiority relationship between the rules.
   The conflict set is formally determined as follows:
     C[count_rating(truster→?a, trustee→?x)] =
                   { ¬ count_rating(truster→?a, trustee→?x) }
                   { count_rating(truster→?a1, trustee→?x1) | ?a               ?a1 ∧ ?x   ?x1 }



Nick Bassiliades                         RuleML 2012, Montpellier, Aug 27-29
                                                                                                  17
HARM
  Determining Experience Types

     r4: known(agent1→?a, agent2→?y) :-                                    Which agents
             count_rating(rating → ?id, truster→?a, trustee→?y).           are considered
                                                                           as known?

     r5: count_prAX(agent→?a, truster→?a, trustee→?x, rating→?id) :-
             count_rating(rating → ?id, truster→? a, trustee→ ?x).

     r6: count_krAX(agent→?a, truster→?k, trustee→?x, rating →?id) :-
             known(agent1→?a, agent2→?k),                                         Categori
                                                                                  zation of
             count_rating(rating→?id, truster→?k, trustee→ ?x).
                                                                                   ratings
     r7: count_srAX(agent→?a, truster→?s, trustee→?x, rating→?id) :-
             count_rating(rating → ?id, truster →?s, trustee→ ?x),
             not(known(agent1→?a, agent2→?s)).



Nick Bassiliades                     RuleML 2012, Montpellier, Aug 27-29
                                                                                            18
HARM
  Rule-based Decision Making Mechanism
     Final step is to decide whose experience will “count”:
      direct, indirect (witness), or both.
     The decision for RAX is based on a relationship theory

      e.g. Theory #1: All categories count equally.

      r8: participate(agent→?a, trustee→?x, rating→?id_ratingAX) :=
             count_pr(agent→?a, trustee→?x, rating→ ?id_ratingAX).
      r9: participate(agent→?a, trustee→?x, rating→?id_ratingKX) :=
             count_kr(agent→?a, trustee→?x, rating→ ?id_ratingKX).
      r10: participate(agent→?a, trustee→?x, rating→?id_ratingSX) :=
             count_sr(agent→?a, trustee→?x, rating→ ?id_ratingSX).


Nick Bassiliades                 RuleML 2012, Montpellier, Aug 27-29
                                                                       19
HARM
  Theory #1: All categories count equally

                                 AX, KX, SX


                   AX, KX               AX, SX                          KX, SX



                            AX                   KX                    SX


Nick Bassiliades                 RuleML 2012, Montpellier, Aug 27-29
                                                                                 20
HARM
  Rule-based Decision Making Mechanism

        e.g. Theory #2:
          An agent relies on its own experience if it believes it is
          sufficient.
          If not it acquires the opinions of others.

        r8: participate(agent→?a, trustee→?x, rating→?id_ratingAX) :=
               count_pr(agent→?a, trustee→?x, rating→ ?id_ratingAX).
        r9: participate(agent→?a, trustee→?x, rating→?id_ratingKX) :=
               count_kr(agent→?a, trustee→?x, rating→ ?id_ratingKX).
        r10: participate(agent→?a, trustee→?x, rating→?id_ratingSX) :=
               count_sr(agent→?a, trustee→?x, rating→ ?id_ratingSX).
        r8>r9>r10

Nick Bassiliades                   RuleML 2012, Montpellier, Aug 27-29
                                                                         21
HARM
  Theory #2: Personal experience is preferred to
  friends’ opinion to strangers’ opinion


                                 AX, KX, SX


                   AX, KX              AX, SX                                KX, SX



                            AX   >                 KX                   >   SX


Nick Bassiliades                  RuleML 2012, Montpellier, Aug 27-29
                                                                                      22
HARM
  Rule-based Decision Making Mechanism

        e.g. Theory #3:
          If direct experience is available (PRAX), then it is preferred
          to be combined with ratings from known agents (KRAX).
          If not, HARM acts as a pure witness system.

        r8: participate(agent→?a, trustee→?x, rating→?id_ratingAX) :=
               count_pr(agent→?a, trustee→?x, rating→ ?id_ratingAX).
        r9: participate(agent→?a, trustee→?x, rating→?id_ratingKX) :=
               count_kr(agent→?a, trustee→?x, rating→ ?id_ratingKX).
        r10: participate(agent→?a, trustee→?x, rating→?id_ratingSX) :=
               count_sr(agent→?a, trustee→?x, rating→ ?id_ratingSX).
        r8> r10, r9>r10


Nick Bassiliades                   RuleML 2012, Montpellier, Aug 27-29
                                                                           23
HARM
  Theory #3: Personal experience and friends’
  opinion is preferred to strangers’ opinion


                                 AX, KX, SX


                   AX, KX          AX, SX                                 KX, SX

                                            >
                            AX              KX                           SX

Nick Bassiliades                   RuleML 2012, Montpellier, Aug 27-29
                                                                                   24
HARM
      Temporal Defeasible Logic Extension
       Agents may change their objectives at any time
             Evolution of trust over time should be taken into account
             Only the latest ratings participate in the reputation estimation
       In the temporal extension of HARM:
                each rating is a persistent temporal literal of TDL
                each rule conclusion is an expiring temporal literal of TDL
       The truster’s rating (r) is active after time_offset time
        instances have passed and is valid thereafter
        rating(id→value1, truster→value2, trustee→ value3, validity→value4,
               completeness→value5, correctness→value6,
               response_time →value7, confidence→value8,
               transaction_value→value9)@time_offset.

Nick Bassiliades                         RuleML 2012, Montpellier, Aug 27-29
                                                                                 25
HARM
      Temporal Defeasible Logic Extension

       Rules are modified accordingly:
           each rating is active after t time instances have passed (“@t”)
           each conclusion has a duration (“:duration”)
           each rule has a delay, which models the delay between the cause and
              the effect.
        e.g.
        r1: count_rating(rating→?idx, truster→?a, trustee→ ?x):duration := delay
                confidence_threshold(?conf),
                transaction_value_threshold(?tran),
                rating(id→?idx, confidence→?confx,
                                 transaction_value→?tranx) @t,
                ?confx >= ?conf, ?tranx >= ?tran.


Nick Bassiliades                    RuleML 2012, Montpellier, Aug 27-29
                                                                               26
HARM Evaluation
          We implemented the model in EMERALD
                Framework for interoperating knowledge-based
                 intelligent agents in the SW.
                Built on JADE multi-agent platform
          EMERALD uses Reasoners (agents offering
           reasoning services)
                Supports the DR-Device defeasible logic system
                Used temporal predicates to simulate the temporal
                 semantics.
                   o No available temporal defeasible logic reasoner


Nick Bassiliades                          RuleML 2012, Montpellier, Aug 27-29
                                                                                27
HARM - Evaluation
       All agents provide the same service
             Performance is service – independent
       Consumer agent selects the provider with the highest
        reputation value
                                                           5. Report rating
                                          1. Request reputations of the provider agents
                                 2. Inform about the provider with the highest reputation
                   Consumer agent                                                                HARMAgent

                               4. Service providing
                     3. Service request


                                                                               Provider agenty
                                             Provider agentx
Nick Bassiliades                                   RuleML 2012, Montpellier, Aug 27-29
                                                                                                             28
HARM - Evaluation                                                            Number of simulation: 500
       Performance of providers (e.g.                                             Number of providers: 100
        quality of service) is the utility                                     Good providers          10
        that a consumer gains from each                                       Ordinary providers       40
        interaction
                                                                                 Intermittent
             Utility Gain (UG), UG [-10, 10]                                    providers
                                                                                                        5

       Four models are used:                                                   Bad providers          45
                  HARM (rule-based / temporal)
                  T-REX (temporal degradation)                               Average UG per interaction
                  SERM (uses all history)                                         HARM              5.73
                  NONE (no trust mechanism).                                      T-REX             5.57
                                                                                   SERM              2.41
       From previous study:
                                                                                   NONE              0.16
             CR, SPORAS (literature famous,                                         CR              5.48
              distributed)
                                                                                  SPORAS             4.65

Nick Bassiliades                        RuleML 2012, Montpellier, Aug 27-29
                                                                                                               29
Conclusions
      We proposed HARM that combines:
            the hybrid approach (interaction trust and witness reputation)
            the benefits of temporal defeasible logic (rule-based approach)
      Overcomes the difficulty to locate witness reports
       (centralized administration authority)
      It is the first reputation model that uses explicitly
       knowledge, in the form of defeasible logic, to predict
       agent’s future behavior
            Easy to simulate human decision making




Nick Bassiliades                      RuleML 2012, Montpellier, Aug 27-29
                                                                               30
Future Work
      Fully implement HARM with temporal defeasible logic
      Compare HARM’s performance with other centralized
       and decentralized models from the literature
      Combine HARM and T-REX
      Develop a distributed version of HARM
      Verify its performance in real-world e-commerce
       applications
      Combining it with Semantic Web metadata for trust




Nick Bassiliades            RuleML 2012, Montpellier, Aug 27-29
                                                                  31
Thank you!
                   Any Questions?



Nick Bassiliades       RuleML 2012, Montpellier, Aug 27-29
                                                             32

More Related Content

Viewers also liked

Ruleml2012 - Rule-based high-level situation recognition from incomplete tra...
Ruleml2012  - Rule-based high-level situation recognition from incomplete tra...Ruleml2012  - Rule-based high-level situation recognition from incomplete tra...
Ruleml2012 - Rule-based high-level situation recognition from incomplete tra...RuleML
 
KELPS LPS - A Logic-Based Framework for Reactive System30 aug 2012
KELPS LPS - A Logic-Based Framework for Reactive System30 aug 2012KELPS LPS - A Logic-Based Framework for Reactive System30 aug 2012
KELPS LPS - A Logic-Based Framework for Reactive System30 aug 2012RuleML
 
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML
 
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...RuleML
 
RuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the BrowserRuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the BrowserRuleML
 
A Model Driven Reverse Engineering framework for extracting business rules ou...
A Model Driven Reverse Engineering framework for extracting business rules ou...A Model Driven Reverse Engineering framework for extracting business rules ou...
A Model Driven Reverse Engineering framework for extracting business rules ou...RuleML
 
RuleML2015: GRAAL - a toolkit for query answering with existential rules
RuleML2015:  GRAAL - a toolkit for query answering with existential rulesRuleML2015:  GRAAL - a toolkit for query answering with existential rules
RuleML2015: GRAAL - a toolkit for query answering with existential rulesRuleML
 
RuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth ContextRuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth ContextRuleML
 
RuleML2015: Using PSL to Extend and Evaluate Event Ontologies
RuleML2015: Using PSL to Extend and Evaluate Event OntologiesRuleML2015: Using PSL to Extend and Evaluate Event Ontologies
RuleML2015: Using PSL to Extend and Evaluate Event OntologiesRuleML
 
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and RulesRuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and RulesRuleML
 
RuleML2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML2015:  Semantics of Notation3 Logic: A Solution for Implicit Quantifica...RuleML2015:  Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...RuleML
 
Ruleml2012 - A production rule-based framework for causal and epistemic reaso...
Ruleml2012 - A production rule-based framework for causal and epistemic reaso...Ruleml2012 - A production rule-based framework for causal and epistemic reaso...
Ruleml2012 - A production rule-based framework for causal and epistemic reaso...RuleML
 

Viewers also liked (15)

Ruleml2012 - Rule-based high-level situation recognition from incomplete tra...
Ruleml2012  - Rule-based high-level situation recognition from incomplete tra...Ruleml2012  - Rule-based high-level situation recognition from incomplete tra...
Ruleml2012 - Rule-based high-level situation recognition from incomplete tra...
 
KELPS LPS - A Logic-Based Framework for Reactive System30 aug 2012
KELPS LPS - A Logic-Based Framework for Reactive System30 aug 2012KELPS LPS - A Logic-Based Framework for Reactive System30 aug 2012
KELPS LPS - A Logic-Based Framework for Reactive System30 aug 2012
 
English test2
English test2English test2
English test2
 
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
 
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
 
RuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the BrowserRuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the Browser
 
A Model Driven Reverse Engineering framework for extracting business rules ou...
A Model Driven Reverse Engineering framework for extracting business rules ou...A Model Driven Reverse Engineering framework for extracting business rules ou...
A Model Driven Reverse Engineering framework for extracting business rules ou...
 
RuleML2015: GRAAL - a toolkit for query answering with existential rules
RuleML2015:  GRAAL - a toolkit for query answering with existential rulesRuleML2015:  GRAAL - a toolkit for query answering with existential rules
RuleML2015: GRAAL - a toolkit for query answering with existential rules
 
RuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth ContextRuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth Context
 
RuleML2015: Using PSL to Extend and Evaluate Event Ontologies
RuleML2015: Using PSL to Extend and Evaluate Event OntologiesRuleML2015: Using PSL to Extend and Evaluate Event Ontologies
RuleML2015: Using PSL to Extend and Evaluate Event Ontologies
 
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and RulesRuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
 
RuleML2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML2015:  Semantics of Notation3 Logic: A Solution for Implicit Quantifica...RuleML2015:  Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
 
Ruleml2012 - A production rule-based framework for causal and epistemic reaso...
Ruleml2012 - A production rule-based framework for causal and epistemic reaso...Ruleml2012 - A production rule-based framework for causal and epistemic reaso...
Ruleml2012 - A production rule-based framework for causal and epistemic reaso...
 
Voz pasiva recetas
Voz pasiva recetasVoz pasiva recetas
Voz pasiva recetas
 
Curso de francés Basico
Curso de francés BasicoCurso de francés Basico
Curso de francés Basico
 

Similar to HARM: A Hybrid Rule-based Agent Reputation Model based on Temporal Defeasible Logic

trust,bargain,negotiate in artificail intelligence
trust,bargain,negotiate in artificail intelligencetrust,bargain,negotiate in artificail intelligence
trust,bargain,negotiate in artificail intelligencePriyadharshiniG41
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust modelNexgen Technology
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONA COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONnexgentechnology
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust modelnexgentech15
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...Nexgen Technology
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...graphhoc
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkijwscjournal
 
Rocket Hire Assessment 101 4 Steps To Success
Rocket Hire Assessment 101  4 Steps To SuccessRocket Hire Assessment 101  4 Steps To Success
Rocket Hire Assessment 101 4 Steps To SuccessRocket-Hire
 
security framework
security frameworksecurity framework
security frameworkJihad Labban
 
Presentation for Sir John Talbot's Technology College
Presentation for Sir John Talbot's Technology CollegePresentation for Sir John Talbot's Technology College
Presentation for Sir John Talbot's Technology Collegebexatharper
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
Doing observation and Data Analysis for Qualitative Research
Doing observation and Data Analysis for Qualitative ResearchDoing observation and Data Analysis for Qualitative Research
Doing observation and Data Analysis for Qualitative ResearchAhmad Johari Sihes
 
Scenario-Driven Selection and Exploitation of Semantic Data for Optimal Named...
Scenario-Driven Selection and Exploitation of Semantic Data for Optimal Named...Scenario-Driven Selection and Exploitation of Semantic Data for Optimal Named...
Scenario-Driven Selection and Exploitation of Semantic Data for Optimal Named...Panos Alexopoulos
 

Similar to HARM: A Hybrid Rule-based Agent Reputation Model based on Temporal Defeasible Logic (20)

trust,bargain,negotiate in artificail intelligence
trust,bargain,negotiate in artificail intelligencetrust,bargain,negotiate in artificail intelligence
trust,bargain,negotiate in artificail intelligence
 
Human Assessment of Ontologies
Human Assessment of OntologiesHuman Assessment of Ontologies
Human Assessment of Ontologies
 
28
2828
28
 
28
2828
28
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONA COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p network
 
40
4040
40
 
Rocket Hire Assessment 101 4 Steps To Success
Rocket Hire Assessment 101  4 Steps To SuccessRocket Hire Assessment 101  4 Steps To Success
Rocket Hire Assessment 101 4 Steps To Success
 
Value
ValueValue
Value
 
security framework
security frameworksecurity framework
security framework
 
Presentation for Sir John Talbot's Technology College
Presentation for Sir John Talbot's Technology CollegePresentation for Sir John Talbot's Technology College
Presentation for Sir John Talbot's Technology College
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
Reputation resiliency drj 3.28.2012 final
Reputation resiliency drj 3.28.2012 finalReputation resiliency drj 3.28.2012 final
Reputation resiliency drj 3.28.2012 final
 
Doing observation and Data Analysis for Qualitative Research
Doing observation and Data Analysis for Qualitative ResearchDoing observation and Data Analysis for Qualitative Research
Doing observation and Data Analysis for Qualitative Research
 
Scenario-Driven Selection and Exploitation of Semantic Data for Optimal Named...
Scenario-Driven Selection and Exploitation of Semantic Data for Optimal Named...Scenario-Driven Selection and Exploitation of Semantic Data for Optimal Named...
Scenario-Driven Selection and Exploitation of Semantic Data for Optimal Named...
 

More from RuleML

Aggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and SolutionsAggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and SolutionsRuleML
 
A software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasksA software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasksRuleML
 
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...RuleML
 
RuleML 2015: When Processes Rule Events
RuleML 2015: When Processes Rule EventsRuleML 2015: When Processes Rule Events
RuleML 2015: When Processes Rule EventsRuleML
 
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...RuleML
 
Rule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive ConceptsRule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive ConceptsRuleML
 
RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?RuleML
 
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box RuleML
 
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...RuleML
 
A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...RuleML
 
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-RuleML
 
RuleML2015: Binary Frontier-guarded ASP with Function Symbols
RuleML2015: Binary Frontier-guarded ASP with Function SymbolsRuleML2015: Binary Frontier-guarded ASP with Function Symbols
RuleML2015: Binary Frontier-guarded ASP with Function SymbolsRuleML
 
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge PlatformsRuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge PlatformsRuleML
 
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML
 
RuleML2015: Compact representation of conditional probability for rule-based...
RuleML2015:  Compact representation of conditional probability for rule-based...RuleML2015:  Compact representation of conditional probability for rule-based...
RuleML2015: Compact representation of conditional probability for rule-based...RuleML
 
RuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information SystemsRuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information SystemsRuleML
 
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...RuleML
 
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...RuleML
 
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...RuleML
 
Industry@RuleML2015 DataGraft
Industry@RuleML2015 DataGraftIndustry@RuleML2015 DataGraft
Industry@RuleML2015 DataGraftRuleML
 

More from RuleML (20)

Aggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and SolutionsAggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and Solutions
 
A software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasksA software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasks
 
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
 
RuleML 2015: When Processes Rule Events
RuleML 2015: When Processes Rule EventsRuleML 2015: When Processes Rule Events
RuleML 2015: When Processes Rule Events
 
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
 
Rule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive ConceptsRule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive Concepts
 
RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?
 
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
 
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
 
A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...
 
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
 
RuleML2015: Binary Frontier-guarded ASP with Function Symbols
RuleML2015: Binary Frontier-guarded ASP with Function SymbolsRuleML2015: Binary Frontier-guarded ASP with Function Symbols
RuleML2015: Binary Frontier-guarded ASP with Function Symbols
 
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge PlatformsRuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
 
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
 
RuleML2015: Compact representation of conditional probability for rule-based...
RuleML2015:  Compact representation of conditional probability for rule-based...RuleML2015:  Compact representation of conditional probability for rule-based...
RuleML2015: Compact representation of conditional probability for rule-based...
 
RuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information SystemsRuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information Systems
 
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...
 
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...
 
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...
 
Industry@RuleML2015 DataGraft
Industry@RuleML2015 DataGraftIndustry@RuleML2015 DataGraft
Industry@RuleML2015 DataGraft
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

HARM: A Hybrid Rule-based Agent Reputation Model based on Temporal Defeasible Logic

  • 1. HARM A Hybrid Rule-based Agent Reputation Model based on Temporal Defeasible Logic Kalliopi Kravari, Nick Bassiliades Department of Informatics Aristotle University of Thessaloniki Thessaloniki, Greece
  • 2. OVERVIEW Agents in the SW interact under uncertain and risky situations. Whenever they have to interact with partners of whom they know nothing.. they have to make decision involving risk. Thus: Their success may depend on their ability to choose reliable partners. Solution: Reliable trust and/or reputation models. SW Intelligent SW Trust Layer evolution Agents Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 2
  • 3. OVERVIEW Trust is the degree of trust that can be invested in a certain agent. Reputation is the opinion of the public towards an agent. Reputation (trust) models provide the means to quantify reputation and trust  help agents to decide who to trust  encourage trustworthy behavior  deter dishonest participation Current computational reputation models are usually built either on interaction trust or witness reputation. an agent’s direct experience reports provided by others Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 3
  • 4. APPROACHES’ LIMITATIONS  If the reputation estimation is based only on direct experience, it would require a long time for an agent to reach a satisfying estimation level. Why? because when an agent enters an environment for the first time, it has no history of interactions with the other agents in the environment.  If the reputation estimation is based only on witness reports, it could not guarantee reliable estimation. Why? because self-interested agents could be unwilling or unable to sacrifice their resources in order to provide reports. Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 4
  • 5. HYBRID MODELS Hybrid models combine both interaction trust and witness reputation. We propose HARM: an incremental reputation model that combines  the advantages of the hybrid reputation models  the benefits of temporal defeasible logic (rule-based approach) Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 5
  • 6. (Temporal) Defeasible Logic Temporal defeasible logic (TDL) is an extension of defeasible logic (DL). DL is a kind of non-monotonic reasoning Why defeasible logic?  Rule-based, deterministic (without disjunction)  Enhanced representational capabilities  Classical negation used in rule heads and bodies  Negation-as-failure can be emulated  Rules may support conflicting conclusions  Skeptical: conflicting rules do not fire  Priorities on rules resolve conflicts among rules  Low computational complexity Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 6
  • 7. Defeasible Logic Facts: e.g. student(Sofia) Strict Rules: e.g. student(X) person(X) Defeasible Rules: e.g. r: person(X) works(X) r’: student(X) ¬works(X) Priority Relation between rules, e.g. r’ > r Proof theory example:  A literal q is defeasibly provable if: supported by a rule whose premises are all defeasibly provable AND  q is not definitely provable AND each attacking rule is non-applicable or defeated by a superior counter-attacking rule Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 7
  • 8. Temporal Defeasible Logic Two types of temporal literals:  expiring temporal literals l:t (a literal l is valid for t time instances)  persistent temporal literals l@t (a literal l is active after t time instances have passed and is valid thereafter)  temporal rules: a1:d1 ... an:dn d b:db delay between the cause a1:d1 ... an:dn and the effect b:db Example: (r1) => a@1 Literal a is created due to r1. (r2) a@1=>7 b:3 It becomes active at time offset 1. It causes the head of r2 to be fired at time 8. The result b lasts only until time 10. Thereafter, only the fact a remains. Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 8
  • 9. HARM – Evaluated Abilities Evaluates four agent abilities: validity, completeness, correctness and response time. An agent is valid if it is both sincere and credible.  Sincere: believes what it says  Credible: what it believes is true in the world An agent is complete if it is both cooperative and vigilant.  Cooperative: says what it believes  Vigilant: believes what is true in the world An agent is correct if its provided service is correct with respect to a specification. Response time is the time that an agent needs to complete the transaction. Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 9
  • 10. HARM - Ratings Agent A establishes interaction with agent B: (A)Truster is the evaluating agent (B) Trustee is the evaluated agent Truster’s rating value (r) in HARM has 8 coefficients:  2 IDs: Truster, Trustee  4 abilities: Validity, Completeness, Correctness, Response time  2 weights: Confidence, Transaction value  Confidence: how confident the agent is for the rating  Transaction value: how important the transaction was for the agent Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 10
  • 11. HARM – Experience Types  Direct Experience (PRAX )  Indirect Experience  reports provided by strangers (SRAX)  reports provided by known agents (e.g friends) due to previous interactions (KRAX )  Both Final reputation value of an agent X, required by an agent A: RAX = {PRAX , KRAX, SRAX} Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 11
  • 12. HARM – Experience Types  Sometimes one or more rating categories are missing. ▫ e.g. a newcomer has no personal experience  A user is much more likely to believe statements from a trusted acquaintance than from a stranger. ▫ Thus, personal opinion (AX) is more valuable than strangers’ opinion (SX), as well as it is more valuable even from previously trusted partners (KX).  Superiority relationship among rating categories AX, KX, SX AX, KX AX, SX KX, SX AX KX SX Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 12
  • 13. HARM – Final reputation value RAX is a function that combines each available category ▫ personal opinion (AX) ▫ strangers’ opinion (SX) ▫ previously trusted partners (KX) RAX PR AX , KR AX , SR AX HARM allows agents to define weights of ratings’ coefficients ▫ Personal preferences coefficient coefficient coefficient AVG wi log prAX AVG wi log krAX AVG wi log srAX RAX 4 , 4 , 4 , i 1 wi i 1 wi i 1 wi coefficient validity, completeness, correctness, response _ time 2 Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 13
  • 14. HARM Rule-based Decision Making Mechanism / Facts  Truster’s rating (r) (defeasible RuleML / d-POSL syntax): rating(id→rating’s_id, truster→truster’s_name, trustee→trustee’s_name, validity→value1, completeness→value2, correctness→value3, response_time→value4, confidence→value5, transaction_value→value6). e.g. rating(id→1, truster→A, trustee→B, validity→5, completeness→6, correctness→6, response_time→8, confidence→0.8, transaction_value→0.9). Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 14
  • 15. HARM Rule-based Decision Making Mechanism  Confidence and transaction value allow us to decide how much attention we should pay on each rating.  It is important to take into account ratings that were made by confident trusters, since their ratings are more likely to be right.  Confident trusters, that were interacting in an important for them transaction, are even more likely to report truthful ratings. Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 15
  • 16. HARM Which ratings “count”? r1: count_rating(rating→?idx, truster→?a, trustee→ ?x) := confidence_threshold(?conf), • if both truster’s confidence and transaction_value_threshold(?tran), transaction importance are high, rating(id→?idx, confidence→?confx, then that rating will be counted transaction_value→?tranx), during the estimation process ?confx >= ?conf, ?tranx >= ?tran. r2: count_rating(…) := • if the transaction value is lower than the threshold, it doesn’t matter so much … if the truster’s confidence is high ?confx >= ?conf. • if there are only ratings with high r3: count_rating(…) := transaction value, … then they should be taken into account ?tranx >= ?tran. r1 > r2 > r3 • In any other case, the rating should be omitted. Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 16
  • 17. HARM Conflicting Literals  All the previous rules are conclude positive literals.  These literals are conflicting each other, for the same pair of agents (truster and trustee) ▫ We want in the presence e.g. of personal experience to omit strangers’ ratings. ▫ That’s why there is also a superiority relationship between the rules.  The conflict set is formally determined as follows: C[count_rating(truster→?a, trustee→?x)] = { ¬ count_rating(truster→?a, trustee→?x) } { count_rating(truster→?a1, trustee→?x1) | ?a ?a1 ∧ ?x ?x1 } Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 17
  • 18. HARM Determining Experience Types r4: known(agent1→?a, agent2→?y) :- Which agents count_rating(rating → ?id, truster→?a, trustee→?y). are considered as known? r5: count_prAX(agent→?a, truster→?a, trustee→?x, rating→?id) :- count_rating(rating → ?id, truster→? a, trustee→ ?x). r6: count_krAX(agent→?a, truster→?k, trustee→?x, rating →?id) :- known(agent1→?a, agent2→?k), Categori zation of count_rating(rating→?id, truster→?k, trustee→ ?x). ratings r7: count_srAX(agent→?a, truster→?s, trustee→?x, rating→?id) :- count_rating(rating → ?id, truster →?s, trustee→ ?x), not(known(agent1→?a, agent2→?s)). Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 18
  • 19. HARM Rule-based Decision Making Mechanism  Final step is to decide whose experience will “count”: direct, indirect (witness), or both.  The decision for RAX is based on a relationship theory e.g. Theory #1: All categories count equally. r8: participate(agent→?a, trustee→?x, rating→?id_ratingAX) := count_pr(agent→?a, trustee→?x, rating→ ?id_ratingAX). r9: participate(agent→?a, trustee→?x, rating→?id_ratingKX) := count_kr(agent→?a, trustee→?x, rating→ ?id_ratingKX). r10: participate(agent→?a, trustee→?x, rating→?id_ratingSX) := count_sr(agent→?a, trustee→?x, rating→ ?id_ratingSX). Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 19
  • 20. HARM Theory #1: All categories count equally AX, KX, SX AX, KX AX, SX KX, SX AX KX SX Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 20
  • 21. HARM Rule-based Decision Making Mechanism e.g. Theory #2: An agent relies on its own experience if it believes it is sufficient. If not it acquires the opinions of others. r8: participate(agent→?a, trustee→?x, rating→?id_ratingAX) := count_pr(agent→?a, trustee→?x, rating→ ?id_ratingAX). r9: participate(agent→?a, trustee→?x, rating→?id_ratingKX) := count_kr(agent→?a, trustee→?x, rating→ ?id_ratingKX). r10: participate(agent→?a, trustee→?x, rating→?id_ratingSX) := count_sr(agent→?a, trustee→?x, rating→ ?id_ratingSX). r8>r9>r10 Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 21
  • 22. HARM Theory #2: Personal experience is preferred to friends’ opinion to strangers’ opinion AX, KX, SX AX, KX AX, SX KX, SX AX > KX > SX Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 22
  • 23. HARM Rule-based Decision Making Mechanism e.g. Theory #3: If direct experience is available (PRAX), then it is preferred to be combined with ratings from known agents (KRAX). If not, HARM acts as a pure witness system. r8: participate(agent→?a, trustee→?x, rating→?id_ratingAX) := count_pr(agent→?a, trustee→?x, rating→ ?id_ratingAX). r9: participate(agent→?a, trustee→?x, rating→?id_ratingKX) := count_kr(agent→?a, trustee→?x, rating→ ?id_ratingKX). r10: participate(agent→?a, trustee→?x, rating→?id_ratingSX) := count_sr(agent→?a, trustee→?x, rating→ ?id_ratingSX). r8> r10, r9>r10 Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 23
  • 24. HARM Theory #3: Personal experience and friends’ opinion is preferred to strangers’ opinion AX, KX, SX AX, KX AX, SX KX, SX > AX KX SX Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 24
  • 25. HARM Temporal Defeasible Logic Extension  Agents may change their objectives at any time  Evolution of trust over time should be taken into account  Only the latest ratings participate in the reputation estimation  In the temporal extension of HARM:  each rating is a persistent temporal literal of TDL  each rule conclusion is an expiring temporal literal of TDL  The truster’s rating (r) is active after time_offset time instances have passed and is valid thereafter rating(id→value1, truster→value2, trustee→ value3, validity→value4, completeness→value5, correctness→value6, response_time →value7, confidence→value8, transaction_value→value9)@time_offset. Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 25
  • 26. HARM Temporal Defeasible Logic Extension  Rules are modified accordingly:  each rating is active after t time instances have passed (“@t”)  each conclusion has a duration (“:duration”)  each rule has a delay, which models the delay between the cause and the effect. e.g. r1: count_rating(rating→?idx, truster→?a, trustee→ ?x):duration := delay confidence_threshold(?conf), transaction_value_threshold(?tran), rating(id→?idx, confidence→?confx, transaction_value→?tranx) @t, ?confx >= ?conf, ?tranx >= ?tran. Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 26
  • 27. HARM Evaluation  We implemented the model in EMERALD  Framework for interoperating knowledge-based intelligent agents in the SW.  Built on JADE multi-agent platform  EMERALD uses Reasoners (agents offering reasoning services)  Supports the DR-Device defeasible logic system  Used temporal predicates to simulate the temporal semantics. o No available temporal defeasible logic reasoner Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 27
  • 28. HARM - Evaluation  All agents provide the same service  Performance is service – independent  Consumer agent selects the provider with the highest reputation value 5. Report rating 1. Request reputations of the provider agents 2. Inform about the provider with the highest reputation Consumer agent HARMAgent 4. Service providing 3. Service request Provider agenty Provider agentx Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 28
  • 29. HARM - Evaluation Number of simulation: 500  Performance of providers (e.g. Number of providers: 100 quality of service) is the utility Good providers 10 that a consumer gains from each Ordinary providers 40 interaction Intermittent  Utility Gain (UG), UG [-10, 10] providers 5  Four models are used: Bad providers 45  HARM (rule-based / temporal)  T-REX (temporal degradation) Average UG per interaction  SERM (uses all history) HARM 5.73  NONE (no trust mechanism). T-REX 5.57 SERM 2.41  From previous study: NONE 0.16  CR, SPORAS (literature famous, CR 5.48 distributed) SPORAS 4.65 Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 29
  • 30. Conclusions  We proposed HARM that combines:  the hybrid approach (interaction trust and witness reputation)  the benefits of temporal defeasible logic (rule-based approach)  Overcomes the difficulty to locate witness reports (centralized administration authority)  It is the first reputation model that uses explicitly knowledge, in the form of defeasible logic, to predict agent’s future behavior  Easy to simulate human decision making Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 30
  • 31. Future Work  Fully implement HARM with temporal defeasible logic  Compare HARM’s performance with other centralized and decentralized models from the literature  Combine HARM and T-REX  Develop a distributed version of HARM  Verify its performance in real-world e-commerce applications  Combining it with Semantic Web metadata for trust Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 31
  • 32. Thank you! Any Questions? Nick Bassiliades RuleML 2012, Montpellier, Aug 27-29 32

Editor's Notes

  1. ..deter dishonest participation by providing the mean through which reputation and ultimately trust can be quantified
  2. Hence, models based only on one or the other approach typically cannot guarantee stable and reliable estimations.
  3. The testbed environment for evaluating HARM is a multi-agent system consisting ofagents providing services and agents using these services in an on-line community.We assume that the performance of a provider (and effectively its trustworthiness) isindependent from the service that is provided. In order to reduce the complexity of the testbed’s environment, it isassumed that there is only one type of service in the testbed.The value of UG variesfrom −10 to 10 and depends on the level of performance of the provider in the interaction.Τώρα όσον αφορά τα άλλα μοντέλα που χρησιμοποιούμε ούτε στο paper λέμε κάτι. Μπορείτε να πείτε αν θέλετε ότι το μόνο το HARM έχει temporal, ενώ το t-rexλαμβάνει υπόψη τον χρόνο θεωρώντας τα πιο πρόσφατα rating πιο σημαντικά με την χρήση ουσιαστικά του clock (Timer) ενώ το setmδεν λαμβάνει υπόψη τον χρόνο.
  4. The testbed environment for evaluating HARM is a multi-agent system consisting ofagents providing services and agents using these services in an on-line community.We assume that the performance of a provider (and effectively its trustworthiness) isindependent from the service that is provided. In order to reduce the complexity of the testbed’s environment, it isassumed that there is only one type of service in the testbed.The value of UG variesfrom −10 to 10 and depends on the level of performance of the provider in the interaction.Τώρα όσον αφορά τα άλλα μοντέλα που χρησιμοποιούμε ούτε στο paper λέμε κάτι. Μπορείτε να πείτε αν θέλετε ότι το μόνο το HARM έχει temporal, ενώ το t-rexλαμβάνει υπόψη τον χρόνο θεωρώντας τα πιο πρόσφατα rating πιο σημαντικά με την χρήση ουσιαστικά του clock (Timer) ενώ το setmδεν λαμβάνει υπόψη τον χρόνο.