Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
tutorial
Public Access

Quality of Information in Mobile Crowdsensing: Survey and Research Challenges

Published: 30 November 2017 Publication History

Abstract

Smartphones have become the most pervasive devices in people’s lives and are clearly transforming the way we live and perceive technology. Today’s smartphones benefit from almost ubiquitous Internet connectivity and come equipped with a plethora of inexpensive yet powerful embedded sensors, such as an accelerometer, a gyroscope, a microphone, and a camera. This unique combination has enabled revolutionary applications based on the mobile crowdsensing paradigm, such as real-time road traffic monitoring, air and noise pollution, crime control, and wildlife monitoring, just to name a few. Differently from prior sensing paradigms, humans are now the primary actors of the sensing process, since they become fundamental in retrieving reliable and up-to-date information about the event being monitored. As humans may behave unreliably or maliciously, assessing and guaranteeing Quality of Information (QoI) becomes more important than ever. In this article, we provide a new framework for defining and enforcing the QoI in mobile crowdsensing and analyze in depth the current state of the art on the topic. We also outline novel research challenges, along with possible directions of future work.

References

[1]
Tarek Abdelzaher, Yaw Anokwa, Péter Boda, Jeff Burke, Deborah Estrin, Leonidas Guibas, Aman Kansal, Samuel Madden, and Jim Reich. 2007. Mobiscopes for human spaces. IEEE Pervasive Computing 6, 2 (April 2007), 20--29.
[2]
Amro Al-Akkad, Leonardo Ramirez, Alexander Boden, Dave Randall, and Andreas Zimmermann. 2014. Help beacons: Design and evaluation of an ad-hoc lightweight s.O.S. system for smartphones. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’14). ACM, New York, 1485--1494.
[3]
Haleh Amintoosi and Salil S. Kanhere. 2013. A trust-based recruitment framework for multi-hop social participatory sensing. In Proceedings of the 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS'13) . 266--273.
[4]
Haleh Amintoosi and Salil S. Kanhere. 2013. A Trust Framework for Social Participatory Sensing Systems. Springer, Berlin,237--249.
[5]
Haleh Amintoosi and Salil S. Kanhere. 2014. A reputation framework for social participatory sensing systems. Mobile Networks and Applications 19, 1 (2014), 88--100.
[6]
Haleh Amintoosi, Salil S. Kanhere, and Mohammad Allahbakhsh. 2015. Trust-based privacy-aware participant selection in social participatory sensing. Journal of Information Security and Applications 20 (2015), 11--25. Security, Privacy and Trust in Future Networks and Mobile Computing.
[7]
Kelsey D. Atherton. 2014. Israeli students spoof Waze with fake traffic jam. Popular Science. Retreived from http://www.popsci.com/article/gadgets/israeli-students-spoof-waze-app-fake-traffic-jam.
[8]
James E. Bailey and Sammy W. Pearson. 1983. Development of a tool for measuring and analyzing computer user satisfaction. Management Science 29, 5 (1983), 530--545.
[9]
Fenye Bao, Ing-Ray Chen, MoonJeong Chang, and Jin-Hee Cho. 2012. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management 9, 2 (June 2012), 169--183.
[10]
Xuan Bao and Romit Roy Choudhury. 2010. MoVi: Mobile phone based video highlights via collaborative sensing. In Proceedings of the 2010 ACM International Conference on Mobile Systems, Applications, and Services (MobiSys’10). ACM, New York, 357--370.
[11]
Andrew G. Barto. 1998. Reinforcement Learning: An Introduction. MIT Press.
[12]
Suvadip Batabyal and Parama Bhaumik. 2015. Mobility models, traces and impact of mobility on opportunistic routing algorithms: A survey. IEEE Communications Surveys Tutorials 17, 3 (2015), 1679--1707.
[13]
Peter Benson. 2009. ISO 8000 data quality: The fundamentals, part 1. Real-World Decision Support (RWDS) Journal 3, 4 (2009), 1--9.
[14]
José M. Bernardo and Adrian F. M. Smith. 2001. Bayesian theory. 610 pages.
[15]
Dimitri P. Bertsekas. 1999. Nonlinear Programming. Athena Scientific Belmont.
[16]
Kamal K. Bharadwaj and Mohammad Yahya H. Al-Shamri. 2009. Fuzzy computational models for trust and reputation systems. Electronic Commerce Research and Applications 8, 1 (2009), 37--47.
[17]
Chatschik Bisdikian, Lance M. Kaplan, and Mani B. Srivastava. 2013. On the quality and value of information in sensor networks. ACM Transactions on Sensor Networks 9, 4, Article 48 (July 2013), 26 pages.
[18]
Alessandro Bozzon, Marco Brambilla, Stefano Ceri, Matteo Silvestri, and Giuliano Vesci. 2013. Choosing the right crowd: Expert finding in social networks. In Proceedings of the 16th International Conference on Extending Database Technology (EDBT'13). ACM, 637--648.
[19]
Sergey Brin and Lawrence Page. 2012. Reprint of: The anatomy of a large-scale hypertextual web search engine. Computer Networks 56, 18 (2012), 3825--3833.
[20]
Jeff Burke, Deborah Estrin, Mark Hansen, Andrew Parker, Nithya Ramanathan, Sasank Reddy, and Mani B. Srivastava. 2006. Participatory sensing. In Proceedings of the 2006 Workshop on World-Sensor-Web: Mobile Device Centric Sensor Networks and Applications (WSW’06). 117--134.
[21]
Colin F. Camerer. 2003. Behavioural studies of strategic thinking in games. Trends in Cognitive Sciences 7, 5 (2003), 225--231.
[22]
Colin F. Camerer, Teck-Hua Ho, and Juin-Kuan Chong. 2002. Sophisticated experience-weighted attraction learning and strategic teaching in repeated games. Journal of Economic Theory 104, 1 (2002), 137--188.
[23]
Andrew T. Campbell, Shane B. Eisenman, Nicholas D. Lane, Emiliano Miluzzo, and Ronald A. Peterson. 2006. People-centric urban sensing. In Proceedings of the 2006 ACM Annual International Workshop on Wireless Internet (WICON’06). ACM, New York, Article 18.
[24]
Andrew T. Campbell, Shane B. Eisenman, Nicholas D. Lane, Emiliano Miluzzo, Ronald A. Peterson, Hong Lu, Xiao Zheng, Mirco Musolesi, Kristóf Fodor, and Gahng-Seop Ahn. 2008. The rise of people-centric sensing. IEEE Internet Computing 12, 4 (July 2008), 12--21.
[25]
Francesco Caravelli, Lorenzo Sindoni, Fabio Caccioli, and Cozmin Ududec. 2016. Optimal growth trajectories with finite carrying capacity. 94, 2 (Aug 2016), 022315.
[26]
Javier Carbo, Jose M. Molina, and Jorge Davila. 2003. Trust management through fuzzy reputation. International Journal of Cooperative Information Systems 12, 1 (2003), 135--155.
[27]
Christiano Castelfranchi and Rino Falcone. 2010. Trust Theory: A Socio-cognitive and Computational Model. Vol. 18. John Wiley 8 Sons.
[28]
Kevin Chan, Kelvin Marcus, Lisa Scott, and Rommie Hardy. 2015. Quality of information approach to improving source selection in tactical networks. In Proceedings of the 2015 18th International Conference on Information Fusion (Fusion’15). 566--573.
[29]
Huihui Chen, Bin Guo, Zhiwen Yu, and Qi Han. 2016. Toward real-time and cooperative mobile visual sensing and sharing. In Proceedings of the 35th Annual IEEE International Conference on Computer Communications (IEEE INFOCOM’16). 1--9.
[30]
Xiao Chen, Min Liu, Yaqin Zhou, Zhongcheng Li, Shuang Chen, and Xiangnan He. 2017. A truthful incentive mechanism for online recruitment in mobile crowd sensing system. Sensors 17, 1 (2017), 1--19.
[31]
Syngjoo Choi, Douglas Gale, and Shachar Kariv. 2012. Social learning in networks: A quantal response equilibrium analysis of experimental data. Review of Economic Design 16, 2--3 (2012), 135--157.
[32]
Radu-Ioan Ciobanu, Radu-Corneliu Marin, Ciprian Dobre, and Valentin Cristea. 2017. Trust and reputation management for opportunistic dissemination. Pervasive and Mobile Computing 36 (2017), 44--56. Special Issue on Pervasive Social Computing.
[33]
Henry Corrigan-Gibbs, Nakull Gupta, Curtis Northcutt, Edward Cutrell, and William Thies. 2015. Deterring cheating in online environments. ACM Transactions on Computer-Human Interaction 22, 6, Article 28 (Sept. 2015), 23 pages.
[34]
Paulo C. G. Costa, Kathryn B. Laskey, Erik Blasch, and Anne-Laure Jousselme. 2012. Towards unbiased evaluation of uncertainty reasoning: The URREF ontology. In Proceedings of the 2012 15th International Conference on Information Fusion (FUSION’12). 2301--2308.
[35]
Jeffrey Dean and Sanjay Ghemawat. 2008. MapReduce: Simplified data processing on large clusters. Communications of the ACM 51, 1 (2008), 107--113.
[36]
Ofer Dekel and Ohad Shamir. 2009. Good learners for evil teachers. In Proceedings of the 26th Annual International Conference on Machine Learning (ICML’09). ACM, New York, 233--240.
[37]
Arthur P. Dempster, Nan M. Laird, and Donald B. Rubin. 1977. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, Series B 39, 1 (1977), 1--38.
[38]
Sebastian Deterding, Dan Dixon, Rilla Khaled, and Lennart Nacke. 2011. From game design elements to gamefulness: Defining “gamification”. In Proceedings of the 2011 ACM International Academic MindTrek Conference: Envisioning Future Media Environments (MindTrek’11). ACM, New York, 9--15.
[39]
Ellie D’Hondt, Matthias Stevens, and An Jacobs. 2013. Participatory noise mapping works! An evaluation of participatory sensing as an alternative to standard techniques for environmental monitoring. Pervasive and Mobile Computing 9, 5 (2013), 681--694. Special issue on Pervasive Urban Applications.
[40]
eBay. 2017. The eBay Online Marketplace. Retrieved from http://www.ebay.com.
[41]
James Edwards, Ahmed Bahjat, Yurong Jiang, Trevor Cook, and Thomas F. La Porta. 2014. Quality of information-aware mobile applications. Pervasive and Mobile Computing 11 (2014), 216--228.
[42]
Sylvanus A. Ehikioya. 1999. A characterization of information quality using fuzzy logic. In Proceedings of the 18th International Conference of the North American Fuzzy Information Processing Society, 1999 (NAFIPS’99). 635--639.
[43]
Samina Ehsan and Bechir Hamdaoui. 2012. A survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks. IEEE Communications Surveys Tutorials 14, 2 (2012), 265--278.
[44]
Larry P. English. 2009. Information Quality Applied: Best Practices for Improving Business Information, Processes and Systems. Wiley Publishing.
[45]
Ericsson. 2016. Ericsson Mobility Report. Retrieved October 16, 2016, from https://www.ericsson.com/res/docs/2016/ericsson-mobility-report-2016.pdf.
[46]
Rasool Fakoor, Mayank Raj, Azade Nazi, Mario Di Francesco, and Sajal K. Das. 2012. An integrated cloud-based framework for mobile phone sensing. In Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing (MCC’12). ACM, New York, 47--52.
[47]
Meng Fang and Xingquan Zhu. 2014. Active learning with uncertain labeling knowledge. Pattern Recognition Letters 43 (2014), 98--108.
[48]
Peter Filzmoser. 2016. Identification of multivariate outliers: A performance study. Austrian Journal of Statistics 34, 2 (2016), 127--138.
[49]
Internet Engineering Task Force. 1998. RFC 2386 - A Framework for QoS-based Routing in the Internet. Retrieved October 16, 2016, from https://tools.ietf.org/html/rfc2386.
[50]
Benoit Frenay and Michel Verleysen. 2014. Classification in the presence of label noise: A survey. IEEE Transactions on Neural Networks and Learning Systems 25, 5 (May 2014), 845--869.
[51]
Sebastian Frischbier, Peter Pietzuch, and Alejandro Buchmann. 2014. Managing Expectations: Runtime Negotiation of Information Quality Requirements in Event-Based Systems. Springer, Berlin,199--213.
[52]
Roy Furchgott. 2010. Filling in Map Gaps With Waze Games. New York Times. Retrieved December 4, 2014, from http://wheels.blogs.nytimes.com/2010/05/06/filling-in-the-map-gaps-with-waze-games/.
[53]
Ujwal Gadiraju, Gianluca Demartini, Ricardo Kawase, and Stefan Dietze. 2015. Human beyond the machine: Challenges and opportunities of microtask crowdsourcing. IEEE Intelligent Systems 30, 4 (July 2015), 81--85.
[54]
Ujwal Gadiraju, Ricardo Kawase, Stefan Dietze, and Gianluca Demartini. 2015. Understanding malicious behavior in crowdsourcing platforms: The case of online surveys. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI’15). ACM, New York, 1631--1640.
[55]
Alban Galland, Serge Abiteboul, Amélie Marian, and Pierre Senellart. 2010. Corroborating information from disagreeing views. In Proceedings of the 3rd ACM International Conference on Web Search and Data Mining (WSDM’10). ACM, New York, 131--140.
[56]
Saurabh Ganeriwal, Laura K. Balzano, and Mani B. Srivastava. 2008. Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN) 4, 3 (2008), 15.
[57]
Raghu K. Ganti, Fan Ye, and Hui Lei. 2011. Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine 49, 11 (November 2011), 32--39.
[58]
Hui Gao, Chi Harold Liu, Wendong Wang, Jianxin Zhao, Zheng Song, Xin Su, Jon Crowcroft, and Kin K. Leung. 2015. A survey of incentive mechanisms for participatory sensing. IEEE Communications Surveys Tutorials 17, 2 (2015), 918--943.
[59]
Peixin Gao, Hui Miao, John S. Baras, and Jennifer Golbeck. 2016. STAR: Semiring trust inference for trust-aware social recommenders. In Proceedings of the 10th ACM Conference on Recommender Systems (RecSys’16). ACM, New York, 301--308.
[60]
Shravan Gaonkar, Jack Li, Romit Roy Choudhury, Landon Cox, and Al Schmidt. 2008. Micro-blog: Sharing and querying content through mobile phones and social participation. In Proceedings of the 2008 ACM International Conference on Mobile Systems, Applications, and Services (MobiSys’08). ACM, New York, 174--186.
[61]
Lincy M. George and K. R. Remesh Babu. 2016. A mobile crowd sensing based task assignment in internet of things. In Proceedings of the International Conference on Emerging Technological Trends (ICETT’16). IEEE, 1--4.
[62]
Benjamin Gompertz. 1825. On the nature of the function expressive of the law of human mortality, and on a new mode of determining the value of life contingencies. Philosophical Transactions of the Royal Society of London 115 (1825), 513--583.
[63]
Tyrone Grandison and Morris Sloman. 2003. Trust management tools for internet applications. In International Conference on Trust Management. Springer, 91--107.
[64]
Domenico De Guglielmo, Francesco Restuccia, Giuseppe Anastasi, Marco Conti, and Sajal K. Das. 2016. Accurate and efficient modeling of 802.15.4 unslotted CSMA/CA through event chains computation. IEEE Transactions on Mobile Computing 15, 12 (Dec. 2016), 2954--2968.
[65]
Bin Guo, Zhu Wang, Zhiwen Yu, Yu Wang, Neil Y. Yen, Runhe Huang, and Xingshe Zhou. 2015. Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm. Computing Surveys 48, 1, Article 7 (Aug. 2015), 31 pages.
[66]
Juho Hamari, Jonna Koivisto, and Harri Sarsa. 2014. Does gamification work? -- A literature review of empirical studies on gamification. In Proceedings of the 2014 Hawaii International Conference on System Sciences (HICSS’14). IEEE Computer Society, 3025--3034.
[67]
Richard H. R. Harper. 2014. Trust, Computing, and Society. Cambridge University Press.
[68]
Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, and Athanasios V. Vasilakos. 2012. ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine 16, 4 (July 2012), 623--632.
[69]
Jaymi Heimbuch. 2016. Turn Your iPhone Into An Environmental Sensor. Retrieved October 16, 2016, from http://www.treehugger.com/gadgets/turn-your-iphone-into-environmental-sensor.html.
[70]
Philippe Herzig, Kay Jugel, Christof Momm, Michael Ameling, and Alexander Schill. 2013. GaML - A modeling language for gamification. In Proceedings of the 2013 IEEE/ACM International Conference on Utility and Cloud Computing (UCC’13). 494--499.
[71]
Kashmir Hill. 2016. Fusion: If you use Waze, hackers can stalk you. Retrieved October 16, 2016, from http://fusion.net/story/293157/waze-hack/.
[72]
Jun-Won Ho, Matthew K. Wright, and Sajal K. Das. 2012. ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing. IEEE Transactions on Dependable and Secure Computing 9, 4 (2012), 494--511.
[73]
Victoria Hodge and Jim Austin. 2004. A survey of outlier detection methodologies. Artificial Intelligence Review 22, 2 (2004), 85--126.
[74]
M. Anwar Hossain, Pradeep K. Atrey, and Abdulmotaleb El Saddik. 2011. Modeling and assessing quality of information in multisensor multimedia monitoring systems. ACM Transactions on Multimedia Computing and Communication Applications 7, 1, Article 3 (Feb. 2011), 30 pages.
[75]
Baoqi Huang, Guodong Qi, Xiaokun Yang, Long Zhao, and Han Zou. 2016. Exploiting cyclic features of walking for pedestrian dead reckoning with unconstrained smartphones. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’16). ACM, New York, 374--385.
[76]
Chao Huang and Dong Wang. 2015. Spatial-temporal aware truth finding in big data social sensing applications. In Proceedings of the 2015 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'15), Vol. 2. 72--79.
[77]
Chao Huang and Dong Wang. 2016. Topic-aware social sensing with arbitrary source dependency graphs. In Proceedings of the 15th International Conference on Information Processing in Sensor Networks (IPSN'16). IEEE Press, 7:1--7:12. http://dl.acm.org/citation.cfm?id=2959355.2959362.
[78]
Kuan Lun Huang, Salil S. Kanhere, and Wen Hu. 2010. Are you contributing trustworthy data?: The case for a reputation system in participatory sensing. In Proceedings of the 2010 ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM’10). ACM, New York, 14--22.
[79]
Kuan Lun Huang, Salil S. Kanhere, and Wen Hu. 2014. On the need for a reputation system in mobile phone based sensing. Ad Hoc Networks 12 (2014), 130--149.
[80]
Simon Jackman. 2009. Bayesian Analysis for the Social Sciences. Vol. 846. John Wiley 8 Sons.
[81]
Luis G. Jaimes, Idalides J. Vergara-Laurens, and Andrew. Raij. 2015. A survey of incentive techniques for mobile crowd sensing. IEEE Internet of Things Journal 2, 5 (Oct. 2015), 370--380.
[82]
Nathan Jensen. 2015. From pastoralists to Mechanical Turks: Using the crowd to validate crowdsourced data. Retrieved from http://tinyurl.com/zwbhk3w.
[83]
Jinfang Jiang, Guangjie Han, Feng Wang, Lei Shu, and Mohsen Guizani. 2015. An efficient distributed trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 26, 5 (May 2015), 1228--1237.
[84]
Jinfang Jiang, Guangjie Han, Chunsheng Zhu, Sammy Chan, and Joel J. P. C. Rodrigues. 2017. A trust cloud model for underwater wireless sensor networks. IEEE Communications Magazine 55, 3 (March 2017), 110--116.
[85]
Haiming Jin, Lu Su, and Klara Nahrstedt. 2017. CENTURION: Incentivizing multi-requester mobile crowd sensing. arXiv Preprint arXiv:1701.01533 (2017).
[86]
Haiming Jin, Lu Su, Houping Xiao, and Klara Nahrstedt. 2016. INCEPTION: Incentivizing privacy-preserving data aggregation for mobile crowd sensing systems. In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’16). ACM, New York, 341--350.
[87]
Audun Jøsang. 1999. An algebra for assessing trust in certification chains. In NDSS, Vol. 99. 80.
[88]
Audun Jøsang and Zied Elouedi. 2007. Interpreting belief functions as Dirichlet distributions. In European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty. Springer, 393--404.
[89]
Audun Josang and Roslan Ismail. 2002. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference, Vol. 5. 2502--2511.
[90]
Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (2007), 618--644.
[91]
Ryoma Kawajiri, Masamichi Shimosaka, and Hisashi Kahima. 2014. Steered crowdsensing: Incentive design towards quality-oriented place-centric crowdsensing. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’14). ACM, New York, 691--701.
[92]
Wazir Z. Khan, Yang Xiang, Mohammed Y. Aalsalem, and Quratulain Arshad. 2013. Mobile phone sensing systems: A survey. IEEE Communications Surveys and Tutorials 15, 1 (2013), 402--427.
[93]
Yeolib Kim and Robert A. Peterson. 2017. A meta-analysis of online trust relationships in E-commerce. Journal of Interactive Marketing 38 (2017), 44--54.
[94]
George Klir and Bo Yuan. 1995. Fuzzy Sets and Fuzzy Logic. Vol. 4. Prentice Hall New Jersey.
[95]
Shirlee-ann Knight. 2008. User Perceptions of Information Quality in World Wide Web Information Retrieval Behaviour. Ph.D. Dissertation. Edith Cowan University.
[96]
Koteswararao Kondepu, Francesco Restuccia, Giuseppe Anastasi, and Marco Conti. 2012. A hybrid and flexible discovery algorithm for wireless sensor networks with mobile elements. In Proceedings of the 2012 IEEE Symposium on Computers and Communications (ISCC’12). 000295--000300.
[97]
Andreas Krause, Eric Horvitz, Aman Kansal, and Feng Zhao. 2008. Toward community sensing. In Proceedings of the 2008 ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN’08). 481--492.
[98]
Nicholas D. Lane, Emiliano Miluzzo, Hong Lu, Daniel Peebles, Tanzeem Choudhury, and Andrew T. Campbell. 2010. A survey of mobile phone sensing. IEEE Communications Magazine 48, 9 (Sept. 2010), 140--150.
[99]
Na Li and Sajal K. Das. 2013. A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Networks 11, 4 (2013), 1497--1509. System and Theoretical Issues in Designing and Implementing Scalable and Sustainable Wireless Sensor Networks. Wireless Communications and Networking in Challenged Environments.
[100]
Xiaoyong Li, Feng Zhou, and Junping Du. 2013. LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security 8, 6 (June 2013), 924--935.
[101]
Yaliang Li, Jing Gao, Chuishi Meng, Qi Li, Lu Su, Bo Zhao, Wei Fan, and Jiawei Han. 2016. A survey on truth discovery. SIGKDD Exploration Newsletter 17, 2 (Feb. 2016), 1--16.
[102]
Yaliang Li, Jing Gao, Chuishi Meng, Qi Li, Lu Su, Bo Zhao, Wei Fan, and Jiawei Han. 2016. A survey on truth discovery. SIGKDD Exploration Newsletter 17, 2 (Feb. 2016), 1--16.
[103]
Shuyi Lin, Wenxing Hong, Dingding Wang, and Tao Li. 2017. A survey on expert finding techniques. Journal of Intelligent Information Systems (2017), 1--25.
[104]
Yan Liu, Bin Guo, Yang Wang, Wenle Wu, Zhiwen Yu, and Daqing Zhang. 2016. TaskMe: Multi-task allocation in mobile crowd sensing. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’16). ACM, New York, 403--414.
[105]
Tie Luo, Salil S. Kanhere, and Hwee-Pink Tan. 2014. SEW-ing a simple endorsement web to incentivize trustworthy participatory sensing. In Proceedings of the 2014 Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’14).
[106]
Tie Luo, Salil S. Kanhere, and Hwee-Pink Tan. 2014. SEW-ing a simple endorsement web to incentivize trustworthy participatory sensing. In 2014 11th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON’14). 636--644.
[107]
Fenglong Ma, Yaliang Li, Qi Li, Minghui Qiu, Jing Gao, Shi Zhi, Lu Su, Bo Zhao, Heng Ji, and Jiawei Han. 2015. FaitCrowd: Fine grained truth discovery for crowdsourced data aggregation. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’15). ACM, New York, 745--754.
[108]
Stephen Paul Marsh. 1994. Formalising trust as a computational concept. University of Stirling, 1--184.
[109]
Jermaine Marshall, Munira Syed, and Dong Wang. 2016. Hardness-aware truth discovery in social sensing applications. In Proceedings of the 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS’16). 143--152.
[110]
Engin Masazade, Makan Fardad, and Pramod K. Varshney. 2012. Sparsity-promoting extended kalman filtering for target tracking in wireless sensor networks. IEEE Signal Processing Letters 19, 12 (Dec. 2012), 845--848.
[111]
Mini Mathew and Ning Weng. 2014. Quality of information and energy efficiency optimization for sensor networks via adaptive sensing and transmitting. IEEE Sensors Journal 14, 2 (Feb. 2014), 341--348.
[112]
Elizabeth A. McCartney, Kari J. Craun, Erin Korris, David A. Brostuen, and Laurence R. Moore. 2015. Crowdsourcing the national map. Cartography and Geographic Information Science 42, Supp1 (2015), 54--57. arXiv:http://dx.doi.org/10.1080/15230406.2015.1059187
[113]
Richard D. McKelvey and Thomas R. Palfrey. 1995. Quantal response equilibria for normal form games. Games and Economic Behavior 10, 1 (1995), 6--38.
[114]
Richard D. McKelvey and Thomas R. Palfrey. 1998. Quantal response equilibria for extensive form games. Experimental Economics 1, 1 (1998), 9--41.
[115]
Chuishi Meng, Wenjun Jiang, Yaliang Li, Jing Gao, Lu Su, Hu Ding, and Yun Cheng. 2015. Truth discovery on crowd sensing of correlated entities. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys’15). ACM, New York, 169--182.
[116]
Chuishi Meng, Houping Xiao, Lu Su, and Yun Cheng. 2016. Tackling the redundancy and sparsity in crowd sensing applications. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM (SenSys'16). ACM, 150--163. http://doi.acm.org/10.1145/2994551.2994567
[117]
Chenglin Miao, Wenjun Jiang, Lu Su, Yaliang Li, Suxin Guo, Zhan Qin, Houping Xiao, Jing Gao, and Kui Ren. 2015. Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys’15). ACM, New York, 183--196.
[118]
Hayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Osama Younes, Mohiy Hadhoud, and Lionel Brunie. 2015. Trust management and reputation systems in mobile participatory sensing applications: A survey. Computer Networks 90 (2015), 49--73. Crowdsourcing.
[119]
Eric J. Msechu and Georgios B. Giannakis. 2012. Sensor-centric data reduction for estimation with WSNs via censoring and quantization. IEEE Transactions on Signal Processing 60, 1 (Jan. 2012), 400--414.
[120]
Lik Mui, Mojdeh Mohtashemi, and Ari Halberstadt. 2002. A computational model of trust and reputation. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2002 (HICSS’02). IEEE, 2431--2439.
[121]
Tridib Mukherjee, Deepthi Chander, Anirban Mondal, Koutsuv Dasgupta, Amit Kumar, and Ashwin Venkat. 2014. CityZen: A cost-effective city management system with incentive-driven resident engagement. In Proceedings of the 2014 IEEE International Conference on Mobile Data Management (MDM’14), Vol. 1. 289--296.
[122]
Sarfraz Nawaz and Cecilia Mascolo. 2014. Mining users’ significant driving routes with low-power sensors. In Proceedings of the 2014 ACM Conference on Embedded Network Sensor Systems (SenSys’14). ACM, New York, 236--250.
[123]
Reza Olfati-Saber. 2007. Distributed Kalman filtering for sensor networks. In 2007 46th IEEE Conference on Decision and Control. 5492--5498.
[124]
Tiago Oliveira, Matilde Alhinho, Paulo Rita, and Gurpreet Dhillon. 2017. Modelling and testing consumer trust dimensions in e-commerce. Computers in Human Behavior 71 (2017), 153--164.
[125]
International Standards Organization. 2015. ISO 9000:2015 - Quality management. Retrieved October 16, 2016, from http://www.iso.org/iso/home/standards/management-standards/iso_9000.htm.
[126]
Robin W. Ouyang, Lance M. Kaplan, Alice Toniolo, Mani Srivastava, and Timothy J. Norman. 2016. Aggregating crowdsourced quantitative claims: Additive and multiplicative models. IEEE Transactions on Knowledge and Data Engineering 28, 7 (July 2016), 1621--1634.
[127]
Robin W. Ouyang, Mani Srivastava, Alice Toniolo, and Timothy J. Norman. 2016. Truth discovery in crowdsourced detection of spatial events. IEEE Transactions on Knowledge and Data Engineering 28, 4 (April 2016), 1047--1060.
[128]
Jeff Pasternack and Dan Roth. 2010. Knowing what to believe (when you already know something). In Proceedings of the 23rd International Conference on Computational Linguistics (COLING’10). Association for Computational Linguistics, Stroudsburg, PA, 877--885. Retrieved from http://dl.acm.org/citation.cfm?id=1873781.1873880.
[129]
Jeff Pasternack and Dan Roth. 2011. Generalized fact-finding. In Proceedings of the 20th International Conference Companion on World Wide Web (WWW’11). ACM, New York, 99--100.
[130]
Silvana S. Pereira, Roberto Lòpez-Valcarce, and Alba Pagès-Zamora. 2013. A diffusion-based em algorithm for distributed estimation in unreliable sensor networks. IEEE Signal Processing Letters 20, 6 (June 2013), 595--598.
[131]
Maryam Pouryazdan, Burak Kantarci, Tolga Soyata, Luca Foschini, and Houbing Song. 2017. Quantifying user reputation scores, data trustworthiness, and user incentives in mobile crowd-sensing. IEEE Access 5 (2017), 1382--1397.
[132]
Guo-Jun Qi, Charu C. Aggarwal, Jiawei Han, and Thomas Huang. 2013. Mining collective intelligence in diverse groups. In Proceedings of the 22nd International Conference on World Wide Web (WWW’13). ACM, New York, 1041--1052.
[133]
Fudong Qiu, Fan Wu, and Guihai Chen. 2015. Privacy and quality preserving multimedia data aggregation for participatory sensing systems. IEEE Transactions on Mobile Computing 14, 6 (June 2015), 1287--1300.
[134]
Kiran K. Rachuri, Mirco Musolesi, Cecilia Mascolo, Peter J. Rentfrow, Chris Longworth, and Andrius Aucinas. 2010. EmotionSense: A mobile phones based adaptive platform for experimental social psychology research. In Proceedings of the 2010 ACM International Conference on Ubiquitous Computing (Ubicomp’10). ACM, New York, 281--290.
[135]
Sarvapali D. Ramchurn, Nicholas R. Jennings, Carles Sierra, and Lluis Godo. 2004. Devising a trust model for multi-agent interactions using confidence and reputation. Applied Artificial Intelligence 18, 9--10 (2004), 833--852.
[136]
Rajib Rana, Chun Tung Chou, Nirupama Bulusu, Salil Kanhere, and Wen Hu. 2014. Ear-phone: A context-aware noise mapping using smart phones. Pervasive and Mobile Computing 17 (2014), 1--22.
[137]
Heena Rathore, Venkataramana Badarla, and Supratim Shit. 2016. Consensus-aware sociopsychological trust model for wireless sensor networks. ACM Transactions on Sensor Networks 12, 3, Article 21 (July 2016), 27 pages.
[138]
Sasank Reddy, Deborah Estrin, and Mani Srivastava. 2010. Recruitment Framework for Participatory Sensing Data Collections. Springer, Berlin,138--155.
[139]
Sasank Reddy, Andrew Parker, Josh Hyman, Jeff Burke, Deborah Estrin, and Mark Hansen. 2007. Image browsing, processing, and clustering for participatory sensing: Lessons from a dietsense prototype. In Proceedings of the 2007 ACM Workshop on Embedded Networked Sensors (EmNets’07). ACM, New York, 13--17.
[140]
Ju Ren, Yaoxue Zhang, Kuan Zhang, and Xuemin (Sherman) Shen. 2015. SACRM: Social aware crowdsourcing with reputation management in mobile sensing. Computer Communications 65 (2015), 55--65. Mobile Ubiquitous Sensing from Social Network Viewpoint.
[141]
Francesco Restuccia. 2016. Mechanisms for Improving Information Quality in Smartphone Crowdsensing Systems. Ph.D. Dissertation. Missouri University of Science and Technology.
[142]
Francesco Restuccia, Giuseppe Anastasi, Marco Conti, and Sajal K. Das. 2012. Performance analysis of a hierarchical discovery protocol for WSNs with mobile elements. In Proceedings of the 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’12). 1--9.
[143]
Francesco Restuccia, Giuseppe Anastasi, Marco Conti, and Sajal K. Das. 2014. Analysis and optimization of a protocol for mobile element discovery in sensor networks. IEEE Transactions on Mobile Computing 13, 9 (Sept. 2014), 1942--1954.
[144]
Francesco Restuccia and Sajal K. Das. 2014. FIDES: A trust-based framework for secure user incentivization in participatory sensing. In Proceedings of the 2014 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14). 1--10.
[145]
Francesco Restuccia and Sajal K. Das. 2015. Lifetime optimization with QoS of sensor networks with uncontrollable mobile sinks. In Proceedings of the 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’15). 1--9.
[146]
Francesco Restuccia and Sajal K. Das. 2016. Optimizing the lifetime of sensor networks with uncontrollable mobile sinks and QoS constraints. ACM Transactions on Sensor Networks 12, 1, Article 2 (March 2016), 31 pages.
[147]
Francesco Restuccia, Sajal K. Das, and Jamie Payton. 2016. Incentive mechanisms for participatory sensing: Survey and research challenges. ACM Transactions on Sensor Networks 12, 2, Article 13 (April 2016), 40 pages.
[148]
Francesco Restuccia, Srinivas C. Thandu, Sriram Chellappan, and Sajal K. Das. 2016. RescuePal: A smartphone-based system to discover people in emergency scenarios. In Proceedings of the 2016 IEEE 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’16). 1--6.
[149]
Jiang Rong, Tao Qin, and Bo An. 2015. Computing quantal response equilibrium for sponsored search auctions. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems (AAMAS’15). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 1803--1804. http://dl.acm.org/citation.cfm?id=2772879.2773445.
[150]
Matthew Roth. 2013. Wikimedia Foundation sends cease and desist letter to WikiPR. Retrieved October 16, 2016, from https://blog.wikimedia.org/2013/11/19/wikimedia-foundation-sends-cease-and-desist-letter-to-wikipr/.
[151]
Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia. 2014. Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. IEEE Transactions on Information Forensics and Security 9, 4 (April 2014), 681--694.
[152]
Jordi Sabater-Mir and Mario Paolucci. 2007. On representation and aggregation of social evaluations in computational trust and reputation models. International Journal of Approximate Reasoning 46, 3 (2007), 458--483.
[153]
Mahmood Salehi, Azzedine Boukerche, Amir Darehshoorzadeh, and Abdelhamid Mammeri. 2016. Towards a novel trust-based opportunistic routing protocol for wireless networks. Wireless Networks 22, 3 (2016), 927--943.
[154]
G. Enrico Santagati and Tommaso Melodia. 2015. U-wear: Software-defined ultrasonic networking for wearable devices. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’15). ACM, New York, 241--256.
[155]
Fatemeh Saremi, Omid Fatemieh, Hossein Ahmadi, Hongyan Wang, Tarek Abdelzaher, Raghu Ganti, Hengchang Liu, Shaohan Hu, Shen Li, and Lu Su. 2016. Experiences with greenGPS -- Fuel-efficient navigation using participatory sensing. IEEE Transactions on Mobile Computing 15, 3 (March 2016), 672--689.
[156]
Stefan Saroiu and Alec Wolman. 2010. I am a sensor, and i approve this message. In Proceedings of the 11th Workshop on Mobile Computing Systems 8 Applications (HotMobile’10). ACM, New York, 37--42.
[157]
Victor S. Sheng, Foster Provost, and Panagiotis G. Ipeirotis. 2008. Get another label? Improving data quality and data mining using multiple, noisy labelers. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’08). ACM, New York, 614--622.
[158]
Xiaohong Sheng and Yu-Hen Hu. 2005. Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks. IEEE Transactions on Signal Processing 53, 1 (Jan. 2005), 44--53.
[159]
Herbert A. Simon. 1957. Models of man; social and rational. Wiley, 279 pages.
[160]
Herbert Alexander Simon. 1982. Models of Bounded Rationality: Empirically Grounded Economic Reason. Vol. 3. MIT Press.
[161]
Tilo Strutz. 2016. Data Fitting and Uncertainty: A Practical Introduction to Weighted Least Squares and Beyond. Springer Verlag.
[162]
Lu Su, Qi Li, Shaohan Hu, Shiguang Wang, Jing Gao, Hengchang Liu, Tarek F. Abdelzaher, Jiawei Han, Xue Liu, Yan Gao, and Lance Kaplan. 2014. Generalized decision aggregation in distributed sensing systems. In Proceedings of the 2014 IEEE Real-Time Systems Symposium (RTSS’14). 1--10.
[163]
Yan Sun, Hong Luo, and Sajal K. Das. 2012. A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing 9, 6 (Nov. 2012), 785--797.
[164]
Niranjan Suri, Giacomo Benincasa, Rita Lenzi, Mauro Tortonesi, Cesare Stefanelli, and Laurel Sadler. 2015. Exploring value-of-information-based approaches to support effective communications in tactical networks. IEEE Communications Magazine 53, 10 (Oct. 2015), 39--45.
[165]
Manoop Talasila, Reza Curtmola, and Cristian Borcea. 2015. Collaborative Bluetooth-based location authentication on smart phones. Pervasive and Mobile Computing 17, Part A (2015), 43--62.
[166]
Alexey Tarasov, Sarah Jane Delany, and Brian Mac Namee. 2014. Dynamic estimation of worker reliability in crowdsourcing for regression tasks: Making it work. Expert Systems with Applications 41, 14 (2014), 6190--6210.
[167]
Chen-Khong Tham and Tie Luo. 2015. Quality of contributed service and market equilibrium for participatory sensing. IEEE Transactions on Mobile Computing 14, 4 (April 2015), 829--842.
[168]
Thermodo. 2016. Thermodo temperature sensor. Retrieved October 16, 2016, from http://www.thermodo.com.
[169]
Yoshitaka Ueyama, Morihiko Tamai, Yutaka Arakawa, and Keiichi Yasumoto. 2014. Gamification-based incentive mechanism for participatory sensing. In Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops’14). 98--103.
[170]
International Telecommunication Unit. 2008. ITU-T Rec. E.800. Retrieved October 16, 2016, from http://www.itu.int/rec/T-REC-E.800-200809-I.
[171]
R. Annie Uthra and S. V. Raja. 2012. QoS routing in wireless sensor networks -- A survey. ACM Computing Surveys (CSUR) 45, 1 (2012), 9.
[172]
Werner Van Leekwijck and Etienne E. Kerre. 1999. Defuzzification: Criteria and classification. Fuzzy Sets and Systems 108, 2 (1999), 159--178.
[173]
Tom Vanderbilt. 2016. Waze: The App That Changed Driving. Retrieved October 16, 2016, from http://www.mensjournal.com/gear/cars/waze-the-app-that-changed-driving-20160208.
[174]
Dong Wang, Tarek Abdelzaher, Hossein Ahmadi, Jeff Pasternack, Dan Roth, Manish Gupta, Jiawei Han, Omid Fatemieh, Hieu Le, and Charu C. Aggarwal. 2011. On Bayesian interpretation of fact-finding in information networks. In Proceedings of the 14th International Conference on Information Fusion (FUSION'11). 1--8.
[175]
Dong Wang, Tarek Abdelzaher, and Lance Kaplan. 2015. Social Sensing: Building Reliable Systems on Unreliable Data. Morgan Kaufmann Publishers, San Francisco, CA.
[176]
Dong Wang, Tarek Abdelzaher, Lance Kaplan, Raghu Ganti, Shaohan Hu, and Hengchang Liu. 2013. Exploitation of physical constraints for reliable social sensing. In Proceedings of the 2013 IEEE 34th Real-Time Systems Symposium (RTSS’13). 212--223.
[177]
Dong Wang, Md Tanvir Amin, Shen Li, Tarek Abdelzaher, Lance Kaplan, Siyu Gu, Chenji Pan, Hengchang Liu, Charu C. Aggarwal, Raghu Ganti, Xinlei Wang, Prasant Mohapatra, Boleslaw Szymanski, and Hieu Le. 2014. Using humans as sensors: An estimation-theoretic perspective. In Proceedings of the 13th International Symposium on Information Processing in Sensor Networks (IPSN’14). IEEE Press, Piscataway, NJ, 35--46. Retrieved from http://dl.acm.org/citation.cfm?id=2602339.2602344.
[178]
Dong Wang, Lance Kaplan, Hieu Le, and Tarek Abdelzaher. 2012. On truth discovery in social sensing: A maximum likelihood estimation approach. In Proceedings of the 11th International Conference on Information Processing in Sensor Networks (IPSN’12). ACM, New York, 233--244.
[179]
Gang Wang, Sarita Schoenebeck, Haitao Zheng, and Ben Zhao. 2016. “Will Check-in for Badges”: Understanding Bias and Misbehavior on Location-Based Social Networks. Retrieved from http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13027.
[180]
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y. Zhao. 2016. Defending against sybil devices in crowdsourced mapping services. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’16). ACM, New York, 179--191.
[181]
G. Alan Wang, Jian Jiao, Alan S. Abrahams, Weiguo Fan, and Zhongju Zhang. 2013. ExpertRank: A topic-aware expert finding algorithm for online knowledge communities. Decision Support Systems 54, 3 (2013), 1442--1451.
[182]
Jiangtao Wang, Yasha Wang, Daqing Zhang, Feng Wang, Yuanduo He, and Liantao Ma. 2017. PSAllocator: Multi-task allocation for participatory sensing with sensing capability constraints. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW’17). ACM, New York, 1139--1151.
[183]
Jiangtao Wang, Yasha Wang, Daqing Zhang, Leye Wang, Haoyi Xiong, Abdelsalam Helal, Yuanduo He, and Feng Wang. 2016. Fine-grained multitask allocation for participatory sensing with a shared budget. IEEE Internet of Things Journal 3, 6 (2016), 1395--1405.
[184]
Jianwei Wang, Yuping Zhao, and Dong Wang. 2007. A novel fast anti-collision algorithm for RFID systems. In Proceedings of the 2007 International Conference on Wireless Communications, Networking and Mobile Computing (WiCom'07). 2044--2047.
[185]
Richard Y. Wang and Diane M. Strong. 1996. Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems 12, 4 (1996), 5--33.
[186]
Shiguang Wang, Lu Su, Shen Li, Shaohan Hu, Tanvir Amin, Hongwei Wang, Shuochao Yao, Lance Kaplan, and Tarek Abdelzaher. 2015. Scalable social sensing of interdependent phenomena. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks (IPSN’15). ACM, New York, 202--213.
[187]
Shiguang Wang, Dong Wang, Lu Su, Lance Kaplan, and Tarek F. Abdelzaher. 2014. Towards cyber-physical systems in social spaces: The data reliability challenge. In Proceedings of the 2014 IEEE Real-Time Systems Symposium (RTSS’14). 74--85.
[188]
Xinlei Wang, Wei Cheng, Prasant Mohapatra, and Tarek Abdelzaher. 2013. ARTSense: Anonymous reputation and trust in participatory sensing. In Proceedings of the 2013 IEEE International Conference of Computer Communications (INFOCOM’13). 2517--2525.
[189]
Xinlei Wang, Wei Cheng, Prasant Mohapatra, and Tarek Abdelzaher. 2014. Enabling reputation and trust in privacy-preserving mobile sensing. IEEE Transactions on Mobile Computing 13, 12 (Dec. 2014), 2777--2790.
[190]
Xingbo Wang, Minyue Fu, and Huanshui Zhang. 2012. Target tracking in wireless sensor networks based on the combination of KF and MLE using distance measurements. IEEE Transactions on Mobile Computing 11, 4 (April 2012), 567--576.
[191]
Xinlei Wang, Kannan Govindan, and Prasant Mohapatra. 2011. Collusion-resilient quality of information evaluation based on information provenance. In Proceedings of the 2011 Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’11). 395--403.
[192]
Xinlei Wang, Kannan Govindan, and Prasant Mohapatra. 2011. Collusion-resilient quality of information evaluation based on information provenance. In 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'11). 395--403.
[193]
Xinlei Wang, Amit Pande, Jindan Zhu, and Prasant Mohapatra. 2016. STAMP: Enabling privacy-preserving location proofs for mobile users. IEEE/ACM Transactions on Networking 24, 6 (Dec. 2016), 3276--3289.
[194]
The Waze Traffic Monitoring Application. Website of the app. Retrieved from http://www.waze.com.
[195]
Merriam Webster. 2017. Definition of Trust. Retrieved February 16, 2017, from https://www.merriam-webster.com/dictionary/trust.
[196]
Qikun Xiang, Jie Zhang, Ido Nevat, and Pengfei Zhang. 2017. A trust-based mixture of gaussian processes model for robust participatory sensing. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems (AAMAS’17). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 1760--1762. http://dl.acm.org/citation.cfm?id=3091282.3091430.
[197]
Fei Xiong, Yun Liu, and Junjun Cheng. 2017. Modeling and predicting opinion formation with trust propagation in online social networks. Communications in Nonlinear Science and Numerical Simulation 44 (2017), 513--524.
[198]
Lin Yao, Yanmao Man, Zhong Huang, Jing Deng, and Xin Wang. 2016. Secure routing based on social similarity in opportunistic networks. IEEE Transactions on Wireless Communications 15, 1 (Jan. 2016), 594--605.
[199]
Shuochao Yao, Md Tanvir Amin, Lu Su, Shaohan Hu, Shen Li, Shiguang Wang, Yiran Zhao, Tarek Abdelzaher, Lance Kaplan, Charu Aggarwal, and others. 2016. Recursive ground truth estimator for social data streams. In 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN’16). IEEE, 1--12.
[200]
Shuochao Yao, Md. Tanvir Amin, Lu Su, Shaohan Hu, Shen Li, Shiguang Wang, Yiran Zhao, Tarek Abdelzaher, Lance Kaplan, Charu Aggarwal, and others. 2016. Recursive ground truth estimator for social data streams. In Proceedings of the 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN’16). 1--12.
[201]
Shuochao Yao, Shaohan Hu, Shen Li, Yiran Zhao, Lu Su, Lance Kaplan, Aylin Yener, and Tarek Abdelzaher. 2016. On source dependency models for reliable social sensing: Algorithms and fundamental error bounds. In Proceedings of the 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS’16). IEEE, 467--476.
[202]
Xiaoxin Yin, Jiawei Han, and Philip S. Yu. 2008. Truth discovery with multiple conflicting information providers on the web. IEEE Transactions on Knowledge and Data Engineering 20, 6 (June 2008), 796--808.
[203]
Mohamed Younis, Izzet F. Senturk, Kemal Akkaya, Sookyoung Lee, and Fatih Senel. 2014. Topology management techniques for tolerating node failures in wireless sensor networks: A survey. Computer Networks 58 (2014), 254--283.
[204]
Dian Yu, Hongzhao Huang, Taylor Cassidy, Heng Ji, Chi Wang, Shi Zhi, Jiawei Han, Clare R. Voss, and Malik Magdon-Ismail. 2014. The wisdom of minority: Unsupervised slot filling validation based on multi-dimensional truth-finding. In Coling. 1567--1578.
[205]
Ruiyun Yu, Rui Liu, Xingwei Wang, and Jiannong Cao. 2014. Improving data quality with an accumulated reputation model in participatory sensing systems. Sensors 14, 3 (2014), 5573--5594.
[206]
Alexandros Zenonos, Sebastian Stein, and Nicholas R. Jennings. 2015. Coordinating measurements for air pollution monitoring in participatory sensing settings. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems (AAMAS’15). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 493--501.
[207]
Daqing Zhang, Haoyi Xiong, Leye Wang, and Guanling Chen. 2014. CrowdRecruiter: Selecting participants for piggyback crowdsensing under probabilistic coverage constraint. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’14). ACM, New York, 703--714.
[208]
Maotiang Zhang, Panlong Yang, Chang Tian, Shaojie Tang, Xiaofeng Gao, Baowei Wang, and Fu Xiao. 2016. Quality-aware sensing coverage in budget-constrained mobile crowdsensing networks. IEEE Transactions on Vehicular Technology 65, 9 (Sept. 2016), 7698--7707.
[209]
Bo Zhao, Benjamin I. P. Rubinstein, Jim Gemmell, and Jiawei Han. 2012. A Bayesian approach to discovering truth from conflicting sources for data integration. In Proceedings of the VLDB Endowement 5, 6 (Feb. 2012), 550--561.
[210]
Pengfei Zhou, Yuanqing Zheng, and Mo Li. 2014. How long to wait? Predicting bus arrival time with mobile phone based participatory sensing. IEEE Transactions on Mobile Computing 13, 6 (June 2014), 1228--1241.
[211]
Tongqing Zhou, Zhiping Cai, Kui Wu, Yueyue Chen, and Ming Xu. 2017. FIDC: A framework for improving data credibility in mobile crowdsensing. Computer Networks 120 (2017), 157--169.
[212]
M. H. Zwietering, Il Jongenburger, F. M. Rombouts, and K. Van’t Riet. 1990. Modeling of the bacterial growth curve. Applied and Environmental Microbiology 56, 6 (1990), 1875--1881.

Cited By

View all
  • (2024)A UAV deployment strategy based on a probabilistic data coverage model for mobile CrowdSensing applicationsJournal of Ambient Intelligence and Smart Environments10.3233/AIS-22060116:2(241-268)Online publication date: 1-Jan-2024
  • (2024)Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCSIEEE Transactions on Services Computing10.1109/TSC.2024.335424017:2(589-603)Online publication date: Mar-2024
  • (2024) PAM 3 S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS IEEE/ACM Transactions on Networking10.1109/TNET.2023.329725832:1(729-744)Online publication date: Feb-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Sensor Networks
ACM Transactions on Sensor Networks  Volume 13, Issue 4
November 2017
290 pages
ISSN:1550-4859
EISSN:1550-4867
DOI:10.1145/3139355
  • Editor:
  • Chenyang Lu
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 30 November 2017
Accepted: 01 August 2017
Revised: 01 August 2017
Received: 01 June 2017
Published in TOSN Volume 13, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Quality
  2. challenges
  3. framework
  4. information
  5. reputation
  6. survey
  7. trust
  8. truth discovery

Qualifiers

  • Tutorial
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)310
  • Downloads (Last 6 weeks)30
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A UAV deployment strategy based on a probabilistic data coverage model for mobile CrowdSensing applicationsJournal of Ambient Intelligence and Smart Environments10.3233/AIS-22060116:2(241-268)Online publication date: 1-Jan-2024
  • (2024)Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCSIEEE Transactions on Services Computing10.1109/TSC.2024.335424017:2(589-603)Online publication date: Mar-2024
  • (2024) PAM 3 S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS IEEE/ACM Transactions on Networking10.1109/TNET.2023.329725832:1(729-744)Online publication date: Feb-2024
  • (2024)Privacy-Preserved Data Disturbance and Truthfulness Verification for Data TradingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.340216219(5545-5560)Online publication date: 2024
  • (2024)HyperMLL: Toward Robust Hyperspectral Image Classification With Multisource Label LearningIEEE Transactions on Geoscience and Remote Sensing10.1109/TGRS.2024.344109562(1-15)Online publication date: 2024
  • (2024)Hybrid User-Based Task Assignment for Mobile Crowdsensing: Problem and AlgorithmIEEE Internet of Things Journal10.1109/JIOT.2024.336795811:11(19589-19601)Online publication date: 1-Jun-2024
  • (2024)Sparse Mobile Crowdsensing for Cost-Effective Traffic State Estimation With Spatio–Temporal Transformer Graph Neural NetworkIEEE Internet of Things Journal10.1109/JIOT.2024.335655411:9(16227-16242)Online publication date: 1-May-2024
  • (2024)Challenges of Modeling Participant Behavior in CrowdSensing Evaluation2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454892(1-6)Online publication date: 6-Jan-2024
  • (2024)On the Decentralization of Mobile Crowdsensing in Distributed Ledgers: An Architectural Vision2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454822(311-317)Online publication date: 6-Jan-2024
  • (2024)GTDIM: Grid-based Two-stage Dynamic Incentive Mechanism for Mobile Crowd SensingPervasive and Mobile Computing10.1016/j.pmcj.2024.101964103(101964)Online publication date: Oct-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media