skip to main content
tutorial
Public Access

Quality of Information in Mobile Crowdsensing: Survey and Research Challenges

Published:30 November 2017Publication History
Skip Abstract Section

Abstract

Smartphones have become the most pervasive devices in people’s lives and are clearly transforming the way we live and perceive technology. Today’s smartphones benefit from almost ubiquitous Internet connectivity and come equipped with a plethora of inexpensive yet powerful embedded sensors, such as an accelerometer, a gyroscope, a microphone, and a camera. This unique combination has enabled revolutionary applications based on the mobile crowdsensing paradigm, such as real-time road traffic monitoring, air and noise pollution, crime control, and wildlife monitoring, just to name a few. Differently from prior sensing paradigms, humans are now the primary actors of the sensing process, since they become fundamental in retrieving reliable and up-to-date information about the event being monitored. As humans may behave unreliably or maliciously, assessing and guaranteeing Quality of Information (QoI) becomes more important than ever. In this article, we provide a new framework for defining and enforcing the QoI in mobile crowdsensing and analyze in depth the current state of the art on the topic. We also outline novel research challenges, along with possible directions of future work.

References

  1. Tarek Abdelzaher, Yaw Anokwa, Péter Boda, Jeff Burke, Deborah Estrin, Leonidas Guibas, Aman Kansal, Samuel Madden, and Jim Reich. 2007. Mobiscopes for human spaces. IEEE Pervasive Computing 6, 2 (April 2007), 20--29. DOI:http://dx.doi.org/10.1109/MPRV.2007.38 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Amro Al-Akkad, Leonardo Ramirez, Alexander Boden, Dave Randall, and Andreas Zimmermann. 2014. Help beacons: Design and evaluation of an ad-hoc lightweight s.O.S. system for smartphones. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’14). ACM, New York, 1485--1494. DOI:http://dx.doi.org/10.1145/2556288.2557002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Haleh Amintoosi and Salil S. Kanhere. 2013. A trust-based recruitment framework for multi-hop social participatory sensing. In Proceedings of the 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS'13) . 266--273. DOI:http://dx.doi.org/10.1109/DCOSS.2013.29 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Haleh Amintoosi and Salil S. Kanhere. 2013. A Trust Framework for Social Participatory Sensing Systems. Springer, Berlin,237--249. DOI:http://dx.doi.org/10.1007/978-3-642-40238-8_20 Google ScholarGoogle ScholarCross RefCross Ref
  5. Haleh Amintoosi and Salil S. Kanhere. 2014. A reputation framework for social participatory sensing systems. Mobile Networks and Applications 19, 1 (2014), 88--100. DOI:http://dx.doi.org/10.1007/s11036-013-0455-x Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Haleh Amintoosi, Salil S. Kanhere, and Mohammad Allahbakhsh. 2015. Trust-based privacy-aware participant selection in social participatory sensing. Journal of Information Security and Applications 20 (2015), 11--25. DOI:http://dx.doi.org/10.1016/j.jisa.2014.10.003 Security, Privacy and Trust in Future Networks and Mobile Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kelsey D. Atherton. 2014. Israeli students spoof Waze with fake traffic jam. Popular Science. Retreived from http://www.popsci.com/article/gadgets/israeli-students-spoof-waze-app-fake-traffic-jam.Google ScholarGoogle Scholar
  8. James E. Bailey and Sammy W. Pearson. 1983. Development of a tool for measuring and analyzing computer user satisfaction. Management Science 29, 5 (1983), 530--545. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Fenye Bao, Ing-Ray Chen, MoonJeong Chang, and Jin-Hee Cho. 2012. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management 9, 2 (June 2012), 169--183. DOI:http://dx.doi.org/10.1109/TCOMM.2012.031912.110179 Google ScholarGoogle ScholarCross RefCross Ref
  10. Xuan Bao and Romit Roy Choudhury. 2010. MoVi: Mobile phone based video highlights via collaborative sensing. In Proceedings of the 2010 ACM International Conference on Mobile Systems, Applications, and Services (MobiSys’10). ACM, New York, 357--370. DOI:http://dx.doi.org/10.1145/1814433.1814468 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Andrew G. Barto. 1998. Reinforcement Learning: An Introduction. MIT Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Suvadip Batabyal and Parama Bhaumik. 2015. Mobility models, traces and impact of mobility on opportunistic routing algorithms: A survey. IEEE Communications Surveys Tutorials 17, 3 (2015), 1679--1707. DOI:http://dx.doi.org/10.1109/COMST.2015.2419819 Google ScholarGoogle ScholarCross RefCross Ref
  13. Peter Benson. 2009. ISO 8000 data quality: The fundamentals, part 1. Real-World Decision Support (RWDS) Journal 3, 4 (2009), 1--9.Google ScholarGoogle Scholar
  14. José M. Bernardo and Adrian F. M. Smith. 2001. Bayesian theory. 610 pages.Google ScholarGoogle Scholar
  15. Dimitri P. Bertsekas. 1999. Nonlinear Programming. Athena Scientific Belmont.Google ScholarGoogle Scholar
  16. Kamal K. Bharadwaj and Mohammad Yahya H. Al-Shamri. 2009. Fuzzy computational models for trust and reputation systems. Electronic Commerce Research and Applications 8, 1 (2009), 37--47. DOI:http://dx.doi.org/10.1016/j.elerap.2008.08.001 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Chatschik Bisdikian, Lance M. Kaplan, and Mani B. Srivastava. 2013. On the quality and value of information in sensor networks. ACM Transactions on Sensor Networks 9, 4, Article 48 (July 2013), 26 pages. DOI:http://dx.doi.org/10.1145/2489253.2489265 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Alessandro Bozzon, Marco Brambilla, Stefano Ceri, Matteo Silvestri, and Giuliano Vesci. 2013. Choosing the right crowd: Expert finding in social networks. In Proceedings of the 16th International Conference on Extending Database Technology (EDBT'13). ACM, 637--648. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Sergey Brin and Lawrence Page. 2012. Reprint of: The anatomy of a large-scale hypertextual web search engine. Computer Networks 56, 18 (2012), 3825--3833. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Jeff Burke, Deborah Estrin, Mark Hansen, Andrew Parker, Nithya Ramanathan, Sasank Reddy, and Mani B. Srivastava. 2006. Participatory sensing. In Proceedings of the 2006 Workshop on World-Sensor-Web: Mobile Device Centric Sensor Networks and Applications (WSW’06). 117--134.Google ScholarGoogle Scholar
  21. Colin F. Camerer. 2003. Behavioural studies of strategic thinking in games. Trends in Cognitive Sciences 7, 5 (2003), 225--231. Google ScholarGoogle ScholarCross RefCross Ref
  22. Colin F. Camerer, Teck-Hua Ho, and Juin-Kuan Chong. 2002. Sophisticated experience-weighted attraction learning and strategic teaching in repeated games. Journal of Economic Theory 104, 1 (2002), 137--188. Google ScholarGoogle ScholarCross RefCross Ref
  23. Andrew T. Campbell, Shane B. Eisenman, Nicholas D. Lane, Emiliano Miluzzo, and Ronald A. Peterson. 2006. People-centric urban sensing. In Proceedings of the 2006 ACM Annual International Workshop on Wireless Internet (WICON’06). ACM, New York, Article 18. DOI:http://dx.doi.org/10.1145/1234161.1234179 Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Andrew T. Campbell, Shane B. Eisenman, Nicholas D. Lane, Emiliano Miluzzo, Ronald A. Peterson, Hong Lu, Xiao Zheng, Mirco Musolesi, Kristóf Fodor, and Gahng-Seop Ahn. 2008. The rise of people-centric sensing. IEEE Internet Computing 12, 4 (July 2008), 12--21. DOI:http://dx.doi.org/10.1109/MIC.2008.90 Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Francesco Caravelli, Lorenzo Sindoni, Fabio Caccioli, and Cozmin Ududec. 2016. Optimal growth trajectories with finite carrying capacity. 94, 2 (Aug 2016), 022315. DOI:http://dx.doi.org/10.1103/PhysRevE.94.022315arxiv:q-fin.PM/1510.05123Google ScholarGoogle Scholar
  26. Javier Carbo, Jose M. Molina, and Jorge Davila. 2003. Trust management through fuzzy reputation. International Journal of Cooperative Information Systems 12, 1 (2003), 135--155. Google ScholarGoogle ScholarCross RefCross Ref
  27. Christiano Castelfranchi and Rino Falcone. 2010. Trust Theory: A Socio-cognitive and Computational Model. Vol. 18. John Wiley 8 Sons. Google ScholarGoogle ScholarCross RefCross Ref
  28. Kevin Chan, Kelvin Marcus, Lisa Scott, and Rommie Hardy. 2015. Quality of information approach to improving source selection in tactical networks. In Proceedings of the 2015 18th International Conference on Information Fusion (Fusion’15). 566--573.Google ScholarGoogle Scholar
  29. Huihui Chen, Bin Guo, Zhiwen Yu, and Qi Han. 2016. Toward real-time and cooperative mobile visual sensing and sharing. In Proceedings of the 35th Annual IEEE International Conference on Computer Communications (IEEE INFOCOM’16). 1--9. DOI:http://dx.doi.org/10.1109/INFOCOM.2016.7524481 Google ScholarGoogle ScholarCross RefCross Ref
  30. Xiao Chen, Min Liu, Yaqin Zhou, Zhongcheng Li, Shuang Chen, and Xiangnan He. 2017. A truthful incentive mechanism for online recruitment in mobile crowd sensing system. Sensors 17, 1 (2017), 1--19. Google ScholarGoogle ScholarCross RefCross Ref
  31. Syngjoo Choi, Douglas Gale, and Shachar Kariv. 2012. Social learning in networks: A quantal response equilibrium analysis of experimental data. Review of Economic Design 16, 2--3 (2012), 135--157. DOI:http://dx.doi.org/10.1007/s10058-012-0122-x Google ScholarGoogle ScholarCross RefCross Ref
  32. Radu-Ioan Ciobanu, Radu-Corneliu Marin, Ciprian Dobre, and Valentin Cristea. 2017. Trust and reputation management for opportunistic dissemination. Pervasive and Mobile Computing 36 (2017), 44--56. DOI:http://dx.doi.org/10.1016/j.pmcj.2016.09.016 Special Issue on Pervasive Social Computing. Google ScholarGoogle ScholarCross RefCross Ref
  33. Henry Corrigan-Gibbs, Nakull Gupta, Curtis Northcutt, Edward Cutrell, and William Thies. 2015. Deterring cheating in online environments. ACM Transactions on Computer-Human Interaction 22, 6, Article 28 (Sept. 2015), 23 pages. DOI:http://dx.doi.org/10.1145/2810239 Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Paulo C. G. Costa, Kathryn B. Laskey, Erik Blasch, and Anne-Laure Jousselme. 2012. Towards unbiased evaluation of uncertainty reasoning: The URREF ontology. In Proceedings of the 2012 15th International Conference on Information Fusion (FUSION’12). 2301--2308.Google ScholarGoogle Scholar
  35. Jeffrey Dean and Sanjay Ghemawat. 2008. MapReduce: Simplified data processing on large clusters. Communications of the ACM 51, 1 (2008), 107--113. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Ofer Dekel and Ohad Shamir. 2009. Good learners for evil teachers. In Proceedings of the 26th Annual International Conference on Machine Learning (ICML’09). ACM, New York, 233--240. DOI:http://dx.doi.org/10.1145/1553374.1553404 Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Arthur P. Dempster, Nan M. Laird, and Donald B. Rubin. 1977. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, Series B 39, 1 (1977), 1--38.Google ScholarGoogle ScholarCross RefCross Ref
  38. Sebastian Deterding, Dan Dixon, Rilla Khaled, and Lennart Nacke. 2011. From game design elements to gamefulness: Defining “gamification”. In Proceedings of the 2011 ACM International Academic MindTrek Conference: Envisioning Future Media Environments (MindTrek’11). ACM, New York, 9--15. DOI:http://dx.doi.org/10.1145/2181037.2181040 Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Ellie D’Hondt, Matthias Stevens, and An Jacobs. 2013. Participatory noise mapping works! An evaluation of participatory sensing as an alternative to standard techniques for environmental monitoring. Pervasive and Mobile Computing 9, 5 (2013), 681--694. DOI:http://dx.doi.org/10.1016/j.pmcj.2012.09.002 Special issue on Pervasive Urban Applications. Google ScholarGoogle ScholarCross RefCross Ref
  40. eBay. 2017. The eBay Online Marketplace. Retrieved from http://www.ebay.com.Google ScholarGoogle Scholar
  41. James Edwards, Ahmed Bahjat, Yurong Jiang, Trevor Cook, and Thomas F. La Porta. 2014. Quality of information-aware mobile applications. Pervasive and Mobile Computing 11 (2014), 216--228. DOI:http://dx.doi.org/10.1016/j.pmcj.2013.05.003 Google ScholarGoogle ScholarCross RefCross Ref
  42. Sylvanus A. Ehikioya. 1999. A characterization of information quality using fuzzy logic. In Proceedings of the 18th International Conference of the North American Fuzzy Information Processing Society, 1999 (NAFIPS’99). 635--639. DOI:http://dx.doi.org/10.1109/NAFIPS.1999.781771 Google ScholarGoogle ScholarCross RefCross Ref
  43. Samina Ehsan and Bechir Hamdaoui. 2012. A survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks. IEEE Communications Surveys Tutorials 14, 2 (2012), 265--278. DOI:http://dx.doi.org/10.1109/SURV.2011.020211.00058 Google ScholarGoogle ScholarCross RefCross Ref
  44. Larry P. English. 2009. Information Quality Applied: Best Practices for Improving Business Information, Processes and Systems. Wiley Publishing.Google ScholarGoogle Scholar
  45. Ericsson. 2016. Ericsson Mobility Report. Retrieved October 16, 2016, from https://www.ericsson.com/res/docs/2016/ericsson-mobility-report-2016.pdf.Google ScholarGoogle Scholar
  46. Rasool Fakoor, Mayank Raj, Azade Nazi, Mario Di Francesco, and Sajal K. Das. 2012. An integrated cloud-based framework for mobile phone sensing. In Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing (MCC’12). ACM, New York, 47--52. DOI:http://dx.doi.org/10.1145/2342509.2342520 Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Meng Fang and Xingquan Zhu. 2014. Active learning with uncertain labeling knowledge. Pattern Recognition Letters 43 (2014), 98--108. DOI:http://dx.doi.org/10.1016/j.patrec.2013.10.011 Google ScholarGoogle ScholarCross RefCross Ref
  48. Peter Filzmoser. 2016. Identification of multivariate outliers: A performance study. Austrian Journal of Statistics 34, 2 (2016), 127--138. Google ScholarGoogle ScholarCross RefCross Ref
  49. Internet Engineering Task Force. 1998. RFC 2386 - A Framework for QoS-based Routing in the Internet. Retrieved October 16, 2016, from https://tools.ietf.org/html/rfc2386.Google ScholarGoogle Scholar
  50. Benoit Frenay and Michel Verleysen. 2014. Classification in the presence of label noise: A survey. IEEE Transactions on Neural Networks and Learning Systems 25, 5 (May 2014), 845--869. DOI:http://dx.doi.org/10.1109/TNNLS.2013.2292894 Google ScholarGoogle ScholarCross RefCross Ref
  51. Sebastian Frischbier, Peter Pietzuch, and Alejandro Buchmann. 2014. Managing Expectations: Runtime Negotiation of Information Quality Requirements in Event-Based Systems. Springer, Berlin,199--213. DOI:http://dx.doi.org/10.1007/978-3-662-45391-9_14 Google ScholarGoogle ScholarCross RefCross Ref
  52. Roy Furchgott. 2010. Filling in Map Gaps With Waze Games. New York Times. Retrieved December 4, 2014, from http://wheels.blogs.nytimes.com/2010/05/06/filling-in-the-map-gaps-with-waze-games/.Google ScholarGoogle Scholar
  53. Ujwal Gadiraju, Gianluca Demartini, Ricardo Kawase, and Stefan Dietze. 2015. Human beyond the machine: Challenges and opportunities of microtask crowdsourcing. IEEE Intelligent Systems 30, 4 (July 2015), 81--85. DOI:http://dx.doi.org/10.1109/MIS.2015.66 Google ScholarGoogle ScholarCross RefCross Ref
  54. Ujwal Gadiraju, Ricardo Kawase, Stefan Dietze, and Gianluca Demartini. 2015. Understanding malicious behavior in crowdsourcing platforms: The case of online surveys. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI’15). ACM, New York, 1631--1640. DOI:http://dx.doi.org/10.1145/2702123.2702443 Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Alban Galland, Serge Abiteboul, Amélie Marian, and Pierre Senellart. 2010. Corroborating information from disagreeing views. In Proceedings of the 3rd ACM International Conference on Web Search and Data Mining (WSDM’10). ACM, New York, 131--140. DOI:http://dx.doi.org/10.1145/1718487.1718504 Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Saurabh Ganeriwal, Laura K. Balzano, and Mani B. Srivastava. 2008. Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN) 4, 3 (2008), 15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Raghu K. Ganti, Fan Ye, and Hui Lei. 2011. Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine 49, 11 (November 2011), 32--39. DOI:http://dx.doi.org/10.1109/MCOM.2011.6069707 Google ScholarGoogle ScholarCross RefCross Ref
  58. Hui Gao, Chi Harold Liu, Wendong Wang, Jianxin Zhao, Zheng Song, Xin Su, Jon Crowcroft, and Kin K. Leung. 2015. A survey of incentive mechanisms for participatory sensing. IEEE Communications Surveys Tutorials 17, 2 (2015), 918--943. DOI:http://dx.doi.org/10.1109/COMST.2014.2387836 Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Peixin Gao, Hui Miao, John S. Baras, and Jennifer Golbeck. 2016. STAR: Semiring trust inference for trust-aware social recommenders. In Proceedings of the 10th ACM Conference on Recommender Systems (RecSys’16). ACM, New York, 301--308. DOI:http://dx.doi.org/10.1145/2959100.2959148 Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Shravan Gaonkar, Jack Li, Romit Roy Choudhury, Landon Cox, and Al Schmidt. 2008. Micro-blog: Sharing and querying content through mobile phones and social participation. In Proceedings of the 2008 ACM International Conference on Mobile Systems, Applications, and Services (MobiSys’08). ACM, New York, 174--186. DOI:http://dx.doi.org/10.1145/1378600.1378620 Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Lincy M. George and K. R. Remesh Babu. 2016. A mobile crowd sensing based task assignment in internet of things. In Proceedings of the International Conference on Emerging Technological Trends (ICETT’16). IEEE, 1--4. Google ScholarGoogle ScholarCross RefCross Ref
  62. Benjamin Gompertz. 1825. On the nature of the function expressive of the law of human mortality, and on a new mode of determining the value of life contingencies. Philosophical Transactions of the Royal Society of London 115 (1825), 513--583. Google ScholarGoogle ScholarCross RefCross Ref
  63. Tyrone Grandison and Morris Sloman. 2003. Trust management tools for internet applications. In International Conference on Trust Management. Springer, 91--107. Google ScholarGoogle ScholarCross RefCross Ref
  64. Domenico De Guglielmo, Francesco Restuccia, Giuseppe Anastasi, Marco Conti, and Sajal K. Das. 2016. Accurate and efficient modeling of 802.15.4 unslotted CSMA/CA through event chains computation. IEEE Transactions on Mobile Computing 15, 12 (Dec. 2016), 2954--2968. DOI:http://dx.doi.org/10.1109/TMC.2016.2528248 Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Bin Guo, Zhu Wang, Zhiwen Yu, Yu Wang, Neil Y. Yen, Runhe Huang, and Xingshe Zhou. 2015. Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm. Computing Surveys 48, 1, Article 7 (Aug. 2015), 31 pages. DOI:http://dx.doi.org/10.1145/2794400 Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Juho Hamari, Jonna Koivisto, and Harri Sarsa. 2014. Does gamification work? -- A literature review of empirical studies on gamification. In Proceedings of the 2014 Hawaii International Conference on System Sciences (HICSS’14). IEEE Computer Society, 3025--3034. DOI:http://dx.doi.org/10.1109/HICSS.2014.377 Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Richard H. R. Harper. 2014. Trust, Computing, and Society. Cambridge University Press. Google ScholarGoogle ScholarCross RefCross Ref
  68. Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, and Athanasios V. Vasilakos. 2012. ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine 16, 4 (July 2012), 623--632. DOI:http://dx.doi.org/10.1109/TITB.2012.2194788 Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Jaymi Heimbuch. 2016. Turn Your iPhone Into An Environmental Sensor. Retrieved October 16, 2016, from http://www.treehugger.com/gadgets/turn-your-iphone-into-environmental-sensor.html.Google ScholarGoogle Scholar
  70. Philippe Herzig, Kay Jugel, Christof Momm, Michael Ameling, and Alexander Schill. 2013. GaML - A modeling language for gamification. In Proceedings of the 2013 IEEE/ACM International Conference on Utility and Cloud Computing (UCC’13). 494--499. DOI:http://dx.doi.org/10.1109/UCC.2013.96 Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Kashmir Hill. 2016. Fusion: If you use Waze, hackers can stalk you. Retrieved October 16, 2016, from http://fusion.net/story/293157/waze-hack/.Google ScholarGoogle Scholar
  72. Jun-Won Ho, Matthew K. Wright, and Sajal K. Das. 2012. ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing. IEEE Transactions on Dependable and Secure Computing 9, 4 (2012), 494--511. DOI:http://dx.doi.org/10.1109/TDSC.2011.65 Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Victoria Hodge and Jim Austin. 2004. A survey of outlier detection methodologies. Artificial Intelligence Review 22, 2 (2004), 85--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. M. Anwar Hossain, Pradeep K. Atrey, and Abdulmotaleb El Saddik. 2011. Modeling and assessing quality of information in multisensor multimedia monitoring systems. ACM Transactions on Multimedia Computing and Communication Applications 7, 1, Article 3 (Feb. 2011), 30 pages. DOI:http://dx.doi.org/10.1145/1870121.1870124 Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Baoqi Huang, Guodong Qi, Xiaokun Yang, Long Zhao, and Han Zou. 2016. Exploiting cyclic features of walking for pedestrian dead reckoning with unconstrained smartphones. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’16). ACM, New York, 374--385. DOI:http://dx.doi.org/10.1145/2971648.2971742 Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Chao Huang and Dong Wang. 2015. Spatial-temporal aware truth finding in big data social sensing applications. In Proceedings of the 2015 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'15), Vol. 2. 72--79. DOI:http://dx.doi.org/10.1109/Trustcom.2015.564 Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Chao Huang and Dong Wang. 2016. Topic-aware social sensing with arbitrary source dependency graphs. In Proceedings of the 15th International Conference on Information Processing in Sensor Networks (IPSN'16). IEEE Press, 7:1--7:12. http://dl.acm.org/citation.cfm?id=2959355.2959362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Kuan Lun Huang, Salil S. Kanhere, and Wen Hu. 2010. Are you contributing trustworthy data?: The case for a reputation system in participatory sensing. In Proceedings of the 2010 ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM’10). ACM, New York, 14--22. DOI:http://dx.doi.org/10.1145/1868521.1868526 Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Kuan Lun Huang, Salil S. Kanhere, and Wen Hu. 2014. On the need for a reputation system in mobile phone based sensing. Ad Hoc Networks 12 (2014), 130--149. DOI:http://dx.doi.org/10.1016/j.adhoc.2011.12.002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Simon Jackman. 2009. Bayesian Analysis for the Social Sciences. Vol. 846. John Wiley 8 Sons. Google ScholarGoogle ScholarCross RefCross Ref
  81. Luis G. Jaimes, Idalides J. Vergara-Laurens, and Andrew. Raij. 2015. A survey of incentive techniques for mobile crowd sensing. IEEE Internet of Things Journal 2, 5 (Oct. 2015), 370--380. DOI:http://dx.doi.org/10.1109/JIOT.2015.2409151 Google ScholarGoogle ScholarCross RefCross Ref
  82. Nathan Jensen. 2015. From pastoralists to Mechanical Turks: Using the crowd to validate crowdsourced data. Retrieved from http://tinyurl.com/zwbhk3w.Google ScholarGoogle Scholar
  83. Jinfang Jiang, Guangjie Han, Feng Wang, Lei Shu, and Mohsen Guizani. 2015. An efficient distributed trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 26, 5 (May 2015), 1228--1237. DOI:http://dx.doi.org/10.1109/TPDS.2014.2320505 Google ScholarGoogle ScholarCross RefCross Ref
  84. Jinfang Jiang, Guangjie Han, Chunsheng Zhu, Sammy Chan, and Joel J. P. C. Rodrigues. 2017. A trust cloud model for underwater wireless sensor networks. IEEE Communications Magazine 55, 3 (March 2017), 110--116. DOI:http://dx.doi.org/10.1109/MCOM.2017.1600502CM Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Haiming Jin, Lu Su, and Klara Nahrstedt. 2017. CENTURION: Incentivizing multi-requester mobile crowd sensing. arXiv Preprint arXiv:1701.01533 (2017).Google ScholarGoogle Scholar
  86. Haiming Jin, Lu Su, Houping Xiao, and Klara Nahrstedt. 2016. INCEPTION: Incentivizing privacy-preserving data aggregation for mobile crowd sensing systems. In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’16). ACM, New York, 341--350. DOI:http://dx.doi.org/10.1145/2942358.2942375 Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Audun Jøsang. 1999. An algebra for assessing trust in certification chains. In NDSS, Vol. 99. 80.Google ScholarGoogle Scholar
  88. Audun Jøsang and Zied Elouedi. 2007. Interpreting belief functions as Dirichlet distributions. In European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty. Springer, 393--404.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Audun Josang and Roslan Ismail. 2002. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference, Vol. 5. 2502--2511.Google ScholarGoogle Scholar
  90. Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (2007), 618--644.Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Ryoma Kawajiri, Masamichi Shimosaka, and Hisashi Kahima. 2014. Steered crowdsensing: Incentive design towards quality-oriented place-centric crowdsensing. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’14). ACM, New York, 691--701. DOI:http://dx.doi.org/10.1145/2632048.2636064 Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Wazir Z. Khan, Yang Xiang, Mohammed Y. Aalsalem, and Quratulain Arshad. 2013. Mobile phone sensing systems: A survey. IEEE Communications Surveys and Tutorials 15, 1 (2013), 402--427. DOI:http://dx.doi.org/10.1109/SURV.2012.031412.00077 Google ScholarGoogle ScholarCross RefCross Ref
  93. Yeolib Kim and Robert A. Peterson. 2017. A meta-analysis of online trust relationships in E-commerce. Journal of Interactive Marketing 38 (2017), 44--54. DOI:http://dx.doi.org/10.1016/j.intmar.2017.01.001 Google ScholarGoogle ScholarCross RefCross Ref
  94. George Klir and Bo Yuan. 1995. Fuzzy Sets and Fuzzy Logic. Vol. 4. Prentice Hall New Jersey.Google ScholarGoogle Scholar
  95. Shirlee-ann Knight. 2008. User Perceptions of Information Quality in World Wide Web Information Retrieval Behaviour. Ph.D. Dissertation. Edith Cowan University.Google ScholarGoogle Scholar
  96. Koteswararao Kondepu, Francesco Restuccia, Giuseppe Anastasi, and Marco Conti. 2012. A hybrid and flexible discovery algorithm for wireless sensor networks with mobile elements. In Proceedings of the 2012 IEEE Symposium on Computers and Communications (ISCC’12). 000295--000300. DOI:http://dx.doi.org/10.1109/ISCC.2012.6249311 Google ScholarGoogle ScholarCross RefCross Ref
  97. Andreas Krause, Eric Horvitz, Aman Kansal, and Feng Zhao. 2008. Toward community sensing. In Proceedings of the 2008 ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN’08). 481--492. DOI:http://dx.doi.org/10.1109/IPSN.2008.37 Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Nicholas D. Lane, Emiliano Miluzzo, Hong Lu, Daniel Peebles, Tanzeem Choudhury, and Andrew T. Campbell. 2010. A survey of mobile phone sensing. IEEE Communications Magazine 48, 9 (Sept. 2010), 140--150. DOI:http://dx.doi.org/10.1109/MCOM.2010.5560598 Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Na Li and Sajal K. Das. 2013. A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Networks 11, 4 (2013), 1497--1509. DOI:http://dx.doi.org/10.1016/j.adhoc.2011.01.0181. System and Theoretical Issues in Designing and Implementing Scalable and Sustainable Wireless Sensor Networks. Wireless Communications and Networking in Challenged Environments.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Xiaoyong Li, Feng Zhou, and Junping Du. 2013. LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security 8, 6 (June 2013), 924--935. DOI:http://dx.doi.org/10.1109/TIFS.2013.2240299 Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. Yaliang Li, Jing Gao, Chuishi Meng, Qi Li, Lu Su, Bo Zhao, Wei Fan, and Jiawei Han. 2016. A survey on truth discovery. SIGKDD Exploration Newsletter 17, 2 (Feb. 2016), 1--16. DOI:http://dx.doi.org/10.1145/2897350.2897352Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Yaliang Li, Jing Gao, Chuishi Meng, Qi Li, Lu Su, Bo Zhao, Wei Fan, and Jiawei Han. 2016. A survey on truth discovery. SIGKDD Exploration Newsletter 17, 2 (Feb. 2016), 1--16. DOI:http://dx.doi.org/10.1145/2897350.2897352 Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. Shuyi Lin, Wenxing Hong, Dingding Wang, and Tao Li. 2017. A survey on expert finding techniques. Journal of Intelligent Information Systems (2017), 1--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Yan Liu, Bin Guo, Yang Wang, Wenle Wu, Zhiwen Yu, and Daqing Zhang. 2016. TaskMe: Multi-task allocation in mobile crowd sensing. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’16). ACM, New York, 403--414. DOI:http://dx.doi.org/10.1145/2971648.2971709 Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Tie Luo, Salil S. Kanhere, and Hwee-Pink Tan. 2014. SEW-ing a simple endorsement web to incentivize trustworthy participatory sensing. In Proceedings of the 2014 Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’14).Google ScholarGoogle ScholarCross RefCross Ref
  106. Tie Luo, Salil S. Kanhere, and Hwee-Pink Tan. 2014. SEW-ing a simple endorsement web to incentivize trustworthy participatory sensing. In 2014 11th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON’14). 636--644. DOI:http://dx.doi.org/10.1109/SAHCN.2014.6990404 Google ScholarGoogle ScholarCross RefCross Ref
  107. Fenglong Ma, Yaliang Li, Qi Li, Minghui Qiu, Jing Gao, Shi Zhi, Lu Su, Bo Zhao, Heng Ji, and Jiawei Han. 2015. FaitCrowd: Fine grained truth discovery for crowdsourced data aggregation. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’15). ACM, New York, 745--754. DOI:http://dx.doi.org/10.1145/2783258.2783314 Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Stephen Paul Marsh. 1994. Formalising trust as a computational concept. University of Stirling, 1--184.Google ScholarGoogle Scholar
  109. Jermaine Marshall, Munira Syed, and Dong Wang. 2016. Hardness-aware truth discovery in social sensing applications. In Proceedings of the 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS’16). 143--152. DOI:http://dx.doi.org/10.1109/DCOSS.2016.9 Google ScholarGoogle ScholarCross RefCross Ref
  110. Engin Masazade, Makan Fardad, and Pramod K. Varshney. 2012. Sparsity-promoting extended kalman filtering for target tracking in wireless sensor networks. IEEE Signal Processing Letters 19, 12 (Dec. 2012), 845--848. DOI:http://dx.doi.org/10.1109/LSP.2012.2220350 Google ScholarGoogle ScholarCross RefCross Ref
  111. Mini Mathew and Ning Weng. 2014. Quality of information and energy efficiency optimization for sensor networks via adaptive sensing and transmitting. IEEE Sensors Journal 14, 2 (Feb. 2014), 341--348. DOI:http://dx.doi.org/10.1109/JSEN.2013.2282774 Google ScholarGoogle ScholarCross RefCross Ref
  112. Elizabeth A. McCartney, Kari J. Craun, Erin Korris, David A. Brostuen, and Laurence R. Moore. 2015. Crowdsourcing the national map. Cartography and Geographic Information Science 42, Supp1 (2015), 54--57. DOI:http://dx.doi.org/10.1080/15230406.2015.1059187, arXiv:http://dx.doi.org/10.1080/15230406.2015.1059187 Google ScholarGoogle ScholarCross RefCross Ref
  113. Richard D. McKelvey and Thomas R. Palfrey. 1995. Quantal response equilibria for normal form games. Games and Economic Behavior 10, 1 (1995), 6--38. Google ScholarGoogle ScholarCross RefCross Ref
  114. Richard D. McKelvey and Thomas R. Palfrey. 1998. Quantal response equilibria for extensive form games. Experimental Economics 1, 1 (1998), 9--41. DOI:http://dx.doi.org/10.1007/BF01426213 Google ScholarGoogle ScholarCross RefCross Ref
  115. Chuishi Meng, Wenjun Jiang, Yaliang Li, Jing Gao, Lu Su, Hu Ding, and Yun Cheng. 2015. Truth discovery on crowd sensing of correlated entities. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys’15). ACM, New York, 169--182. DOI:http://dx.doi.org/10.1145/2809695.2809715 Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Chuishi Meng, Houping Xiao, Lu Su, and Yun Cheng. 2016. Tackling the redundancy and sparsity in crowd sensing applications. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM (SenSys'16). ACM, 150--163. http://doi.acm.org/10.1145/2994551.2994567 Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. Chenglin Miao, Wenjun Jiang, Lu Su, Yaliang Li, Suxin Guo, Zhan Qin, Houping Xiao, Jing Gao, and Kui Ren. 2015. Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys’15). ACM, New York, 183--196. DOI:http://dx.doi.org/10.1145/2809695.2809719 Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. Hayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Osama Younes, Mohiy Hadhoud, and Lionel Brunie. 2015. Trust management and reputation systems in mobile participatory sensing applications: A survey. Computer Networks 90 (2015), 49--73. DOI:http://dx.doi.org/10.1016/j.comnet.2015.07.011 Crowdsourcing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Eric J. Msechu and Georgios B. Giannakis. 2012. Sensor-centric data reduction for estimation with WSNs via censoring and quantization. IEEE Transactions on Signal Processing 60, 1 (Jan. 2012), 400--414. DOI:http://dx.doi.org/10.1109/TSP.2011.2171686 Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. Lik Mui, Mojdeh Mohtashemi, and Ari Halberstadt. 2002. A computational model of trust and reputation. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2002 (HICSS’02). IEEE, 2431--2439. Google ScholarGoogle ScholarCross RefCross Ref
  121. Tridib Mukherjee, Deepthi Chander, Anirban Mondal, Koutsuv Dasgupta, Amit Kumar, and Ashwin Venkat. 2014. CityZen: A cost-effective city management system with incentive-driven resident engagement. In Proceedings of the 2014 IEEE International Conference on Mobile Data Management (MDM’14), Vol. 1. 289--296. DOI:http://dx.doi.org/10.1109/MDM.2014.41 Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Sarfraz Nawaz and Cecilia Mascolo. 2014. Mining users’ significant driving routes with low-power sensors. In Proceedings of the 2014 ACM Conference on Embedded Network Sensor Systems (SenSys’14). ACM, New York, 236--250. DOI:http://dx.doi.org/10.1145/2668332.2668348 Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Reza Olfati-Saber. 2007. Distributed Kalman filtering for sensor networks. In 2007 46th IEEE Conference on Decision and Control. 5492--5498. DOI:http://dx.doi.org/10.1109/CDC.2007.4434303 Google ScholarGoogle ScholarCross RefCross Ref
  124. Tiago Oliveira, Matilde Alhinho, Paulo Rita, and Gurpreet Dhillon. 2017. Modelling and testing consumer trust dimensions in e-commerce. Computers in Human Behavior 71 (2017), 153--164. DOI:http://dx.doi.org/10.1016/j.chb.2017.01.050 Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. International Standards Organization. 2015. ISO 9000:2015 - Quality management. Retrieved October 16, 2016, from http://www.iso.org/iso/home/standards/management-standards/iso_9000.htm.Google ScholarGoogle Scholar
  126. Robin W. Ouyang, Lance M. Kaplan, Alice Toniolo, Mani Srivastava, and Timothy J. Norman. 2016. Aggregating crowdsourced quantitative claims: Additive and multiplicative models. IEEE Transactions on Knowledge and Data Engineering 28, 7 (July 2016), 1621--1634. DOI:http://dx.doi.org/10.1109/TKDE.2016.2535383 Google ScholarGoogle ScholarCross RefCross Ref
  127. Robin W. Ouyang, Mani Srivastava, Alice Toniolo, and Timothy J. Norman. 2016. Truth discovery in crowdsourced detection of spatial events. IEEE Transactions on Knowledge and Data Engineering 28, 4 (April 2016), 1047--1060. DOI:http://dx.doi.org/10.1109/TKDE.2015.2504928 Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. Jeff Pasternack and Dan Roth. 2010. Knowing what to believe (when you already know something). In Proceedings of the 23rd International Conference on Computational Linguistics (COLING’10). Association for Computational Linguistics, Stroudsburg, PA, 877--885. Retrieved from http://dl.acm.org/citation.cfm?id=1873781.1873880.Google ScholarGoogle ScholarDigital LibraryDigital Library
  129. Jeff Pasternack and Dan Roth. 2011. Generalized fact-finding. In Proceedings of the 20th International Conference Companion on World Wide Web (WWW’11). ACM, New York, 99--100. DOI:http://dx.doi.org/10.1145/1963192.1963243 Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. Silvana S. Pereira, Roberto Lòpez-Valcarce, and Alba Pagès-Zamora. 2013. A diffusion-based em algorithm for distributed estimation in unreliable sensor networks. IEEE Signal Processing Letters 20, 6 (June 2013), 595--598. DOI:http://dx.doi.org/10.1109/LSP.2013.2260329 Google ScholarGoogle ScholarCross RefCross Ref
  131. Maryam Pouryazdan, Burak Kantarci, Tolga Soyata, Luca Foschini, and Houbing Song. 2017. Quantifying user reputation scores, data trustworthiness, and user incentives in mobile crowd-sensing. IEEE Access 5 (2017), 1382--1397. DOI:http://dx.doi.org/10.1109/ACCESS.2017.2660461 Google ScholarGoogle Scholar
  132. Guo-Jun Qi, Charu C. Aggarwal, Jiawei Han, and Thomas Huang. 2013. Mining collective intelligence in diverse groups. In Proceedings of the 22nd International Conference on World Wide Web (WWW’13). ACM, New York, 1041--1052. DOI:http://dx.doi.org/10.1145/2488388.2488479 Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. Fudong Qiu, Fan Wu, and Guihai Chen. 2015. Privacy and quality preserving multimedia data aggregation for participatory sensing systems. IEEE Transactions on Mobile Computing 14, 6 (June 2015), 1287--1300. DOI:http://dx.doi.org/10.1109/TMC.2014.2352253 Google ScholarGoogle ScholarCross RefCross Ref
  134. Kiran K. Rachuri, Mirco Musolesi, Cecilia Mascolo, Peter J. Rentfrow, Chris Longworth, and Andrius Aucinas. 2010. EmotionSense: A mobile phones based adaptive platform for experimental social psychology research. In Proceedings of the 2010 ACM International Conference on Ubiquitous Computing (Ubicomp’10). ACM, New York, 281--290. DOI:http://dx.doi.org/10.1145/1864349.1864393 Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. Sarvapali D. Ramchurn, Nicholas R. Jennings, Carles Sierra, and Lluis Godo. 2004. Devising a trust model for multi-agent interactions using confidence and reputation. Applied Artificial Intelligence 18, 9--10 (2004), 833--852.Google ScholarGoogle ScholarCross RefCross Ref
  136. Rajib Rana, Chun Tung Chou, Nirupama Bulusu, Salil Kanhere, and Wen Hu. 2014. Ear-phone: A context-aware noise mapping using smart phones. Pervasive and Mobile Computing 17 (2014), 1--22. DOI:http://dx.doi.org/10.1016/j.pmcj.2014.02.001 Google ScholarGoogle ScholarDigital LibraryDigital Library
  137. Heena Rathore, Venkataramana Badarla, and Supratim Shit. 2016. Consensus-aware sociopsychological trust model for wireless sensor networks. ACM Transactions on Sensor Networks 12, 3, Article 21 (July 2016), 27 pages. DOI:http://dx.doi.org/10.1145/2903721 Google ScholarGoogle ScholarDigital LibraryDigital Library
  138. Sasank Reddy, Deborah Estrin, and Mani Srivastava. 2010. Recruitment Framework for Participatory Sensing Data Collections. Springer, Berlin,138--155. DOI:http://dx.doi.org/10.1007/978-3-642-12654-3_9 Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. Sasank Reddy, Andrew Parker, Josh Hyman, Jeff Burke, Deborah Estrin, and Mark Hansen. 2007. Image browsing, processing, and clustering for participatory sensing: Lessons from a dietsense prototype. In Proceedings of the 2007 ACM Workshop on Embedded Networked Sensors (EmNets’07). ACM, New York, 13--17. DOI:http://dx.doi.org/10.1145/1278972.1278975 Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. Ju Ren, Yaoxue Zhang, Kuan Zhang, and Xuemin (Sherman) Shen. 2015. SACRM: Social aware crowdsourcing with reputation management in mobile sensing. Computer Communications 65 (2015), 55--65. DOI:http://dx.doi.org/10.1016/j.comcom.2015.01.022 Mobile Ubiquitous Sensing from Social Network Viewpoint. Google ScholarGoogle ScholarDigital LibraryDigital Library
  141. Francesco Restuccia. 2016. Mechanisms for Improving Information Quality in Smartphone Crowdsensing Systems. Ph.D. Dissertation. Missouri University of Science and Technology.Google ScholarGoogle Scholar
  142. Francesco Restuccia, Giuseppe Anastasi, Marco Conti, and Sajal K. Das. 2012. Performance analysis of a hierarchical discovery protocol for WSNs with mobile elements. In Proceedings of the 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’12). 1--9. DOI:http://dx.doi.org/10.1109/WoWMoM.2012.6263708 Google ScholarGoogle ScholarCross RefCross Ref
  143. Francesco Restuccia, Giuseppe Anastasi, Marco Conti, and Sajal K. Das. 2014. Analysis and optimization of a protocol for mobile element discovery in sensor networks. IEEE Transactions on Mobile Computing 13, 9 (Sept. 2014), 1942--1954. DOI:http://dx.doi.org/10.1109/TMC.2013.88 Google ScholarGoogle ScholarCross RefCross Ref
  144. Francesco Restuccia and Sajal K. Das. 2014. FIDES: A trust-based framework for secure user incentivization in participatory sensing. In Proceedings of the 2014 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14). 1--10. DOI:http://dx.doi.org/10.1109/WoWMoM.2014.6918972 Google ScholarGoogle ScholarCross RefCross Ref
  145. Francesco Restuccia and Sajal K. Das. 2015. Lifetime optimization with QoS of sensor networks with uncontrollable mobile sinks. In Proceedings of the 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’15). 1--9. DOI:http://dx.doi.org/10.1109/WoWMoM.2015.7158130 Google ScholarGoogle ScholarCross RefCross Ref
  146. Francesco Restuccia and Sajal K. Das. 2016. Optimizing the lifetime of sensor networks with uncontrollable mobile sinks and QoS constraints. ACM Transactions on Sensor Networks 12, 1, Article 2 (March 2016), 31 pages. DOI:http://dx.doi.org/10.1145/2873059 Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. Francesco Restuccia, Sajal K. Das, and Jamie Payton. 2016. Incentive mechanisms for participatory sensing: Survey and research challenges. ACM Transactions on Sensor Networks 12, 2, Article 13 (April 2016), 40 pages. DOI:http://dx.doi.org/10.1145/2888398 Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. Francesco Restuccia, Srinivas C. Thandu, Sriram Chellappan, and Sajal K. Das. 2016. RescuePal: A smartphone-based system to discover people in emergency scenarios. In Proceedings of the 2016 IEEE 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’16). 1--6. DOI:http://dx.doi.org/10.1109/WoWMoM.2016.7523566 Google ScholarGoogle ScholarCross RefCross Ref
  149. Jiang Rong, Tao Qin, and Bo An. 2015. Computing quantal response equilibrium for sponsored search auctions. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems (AAMAS’15). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 1803--1804. http://dl.acm.org/citation.cfm?id=2772879.2773445.Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. Matthew Roth. 2013. Wikimedia Foundation sends cease and desist letter to WikiPR. Retrieved October 16, 2016, from https://blog.wikimedia.org/2013/11/19/wikimedia-foundation-sends-cease-and-desist-letter-to-wikipr/.Google ScholarGoogle Scholar
  151. Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia. 2014. Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. IEEE Transactions on Information Forensics and Security 9, 4 (April 2014), 681--694. DOI:http://dx.doi.org/10.1109/TIFS.2014.2307197 Google ScholarGoogle ScholarDigital LibraryDigital Library
  152. Jordi Sabater-Mir and Mario Paolucci. 2007. On representation and aggregation of social evaluations in computational trust and reputation models. International Journal of Approximate Reasoning 46, 3 (2007), 458--483. Google ScholarGoogle ScholarDigital LibraryDigital Library
  153. Mahmood Salehi, Azzedine Boukerche, Amir Darehshoorzadeh, and Abdelhamid Mammeri. 2016. Towards a novel trust-based opportunistic routing protocol for wireless networks. Wireless Networks 22, 3 (2016), 927--943. DOI:http://dx.doi.org/10.1007/s11276-015-1010-4 Google ScholarGoogle ScholarDigital LibraryDigital Library
  154. G. Enrico Santagati and Tommaso Melodia. 2015. U-wear: Software-defined ultrasonic networking for wearable devices. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’15). ACM, New York, 241--256. DOI:http://dx.doi.org/10.1145/2742647.2742655 Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. Fatemeh Saremi, Omid Fatemieh, Hossein Ahmadi, Hongyan Wang, Tarek Abdelzaher, Raghu Ganti, Hengchang Liu, Shaohan Hu, Shen Li, and Lu Su. 2016. Experiences with greenGPS -- Fuel-efficient navigation using participatory sensing. IEEE Transactions on Mobile Computing 15, 3 (March 2016), 672--689. DOI:http://dx.doi.org/10.1109/TMC.2015.2421939 Google ScholarGoogle ScholarDigital LibraryDigital Library
  156. Stefan Saroiu and Alec Wolman. 2010. I am a sensor, and i approve this message. In Proceedings of the 11th Workshop on Mobile Computing Systems 8 Applications (HotMobile’10). ACM, New York, 37--42. DOI:http://dx.doi.org/10.1145/1734583.1734593 Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. Victor S. Sheng, Foster Provost, and Panagiotis G. Ipeirotis. 2008. Get another label? Improving data quality and data mining using multiple, noisy labelers. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’08). ACM, New York, 614--622. DOI:http://dx.doi.org/10.1145/1401890.1401965 Google ScholarGoogle ScholarDigital LibraryDigital Library
  158. Xiaohong Sheng and Yu-Hen Hu. 2005. Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks. IEEE Transactions on Signal Processing 53, 1 (Jan. 2005), 44--53. DOI:http://dx.doi.org/10.1109/TSP.2004.838930 Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. Herbert A. Simon. 1957. Models of man; social and rational. Wiley, 279 pages.Google ScholarGoogle Scholar
  160. Herbert Alexander Simon. 1982. Models of Bounded Rationality: Empirically Grounded Economic Reason. Vol. 3. MIT Press.Google ScholarGoogle Scholar
  161. Tilo Strutz. 2016. Data Fitting and Uncertainty: A Practical Introduction to Weighted Least Squares and Beyond. Springer Verlag. Google ScholarGoogle ScholarCross RefCross Ref
  162. Lu Su, Qi Li, Shaohan Hu, Shiguang Wang, Jing Gao, Hengchang Liu, Tarek F. Abdelzaher, Jiawei Han, Xue Liu, Yan Gao, and Lance Kaplan. 2014. Generalized decision aggregation in distributed sensing systems. In Proceedings of the 2014 IEEE Real-Time Systems Symposium (RTSS’14). 1--10. DOI:http://dx.doi.org/10.1109/RTSS.2014.40 Google ScholarGoogle ScholarCross RefCross Ref
  163. Yan Sun, Hong Luo, and Sajal K. Das. 2012. A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing 9, 6 (Nov. 2012), 785--797. DOI:http://dx.doi.org/10.1109/TDSC.2012.68 Google ScholarGoogle ScholarDigital LibraryDigital Library
  164. Niranjan Suri, Giacomo Benincasa, Rita Lenzi, Mauro Tortonesi, Cesare Stefanelli, and Laurel Sadler. 2015. Exploring value-of-information-based approaches to support effective communications in tactical networks. IEEE Communications Magazine 53, 10 (Oct. 2015), 39--45. DOI:http://dx.doi.org/10.1109/MCOM.2015.7295461 Google ScholarGoogle ScholarCross RefCross Ref
  165. Manoop Talasila, Reza Curtmola, and Cristian Borcea. 2015. Collaborative Bluetooth-based location authentication on smart phones. Pervasive and Mobile Computing 17, Part A (2015), 43--62. DOI:http://dx.doi.org/10.1016/j.pmcj.2014.02.004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  166. Alexey Tarasov, Sarah Jane Delany, and Brian Mac Namee. 2014. Dynamic estimation of worker reliability in crowdsourcing for regression tasks: Making it work. Expert Systems with Applications 41, 14 (2014), 6190--6210. DOI:http://dx.doi.org/10.1016/j.eswa.2014.04.012 Google ScholarGoogle ScholarCross RefCross Ref
  167. Chen-Khong Tham and Tie Luo. 2015. Quality of contributed service and market equilibrium for participatory sensing. IEEE Transactions on Mobile Computing 14, 4 (April 2015), 829--842. DOI:http://dx.doi.org/10.1109/TMC.2014.2330302 Google ScholarGoogle ScholarCross RefCross Ref
  168. Thermodo. 2016. Thermodo temperature sensor. Retrieved October 16, 2016, from http://www.thermodo.com.Google ScholarGoogle Scholar
  169. Yoshitaka Ueyama, Morihiko Tamai, Yutaka Arakawa, and Keiichi Yasumoto. 2014. Gamification-based incentive mechanism for participatory sensing. In Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops’14). 98--103. DOI:http://dx.doi.org/10.1109/PerComW.2014.6815172 Google ScholarGoogle ScholarCross RefCross Ref
  170. International Telecommunication Unit. 2008. ITU-T Rec. E.800. Retrieved October 16, 2016, from http://www.itu.int/rec/T-REC-E.800-200809-I.Google ScholarGoogle Scholar
  171. R. Annie Uthra and S. V. Raja. 2012. QoS routing in wireless sensor networks -- A survey. ACM Computing Surveys (CSUR) 45, 1 (2012), 9.Google ScholarGoogle Scholar
  172. Werner Van Leekwijck and Etienne E. Kerre. 1999. Defuzzification: Criteria and classification. Fuzzy Sets and Systems 108, 2 (1999), 159--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  173. Tom Vanderbilt. 2016. Waze: The App That Changed Driving. Retrieved October 16, 2016, from http://www.mensjournal.com/gear/cars/waze-the-app-that-changed-driving-20160208.Google ScholarGoogle Scholar
  174. Dong Wang, Tarek Abdelzaher, Hossein Ahmadi, Jeff Pasternack, Dan Roth, Manish Gupta, Jiawei Han, Omid Fatemieh, Hieu Le, and Charu C. Aggarwal. 2011. On Bayesian interpretation of fact-finding in information networks. In Proceedings of the 14th International Conference on Information Fusion (FUSION'11). 1--8.Google ScholarGoogle Scholar
  175. Dong Wang, Tarek Abdelzaher, and Lance Kaplan. 2015. Social Sensing: Building Reliable Systems on Unreliable Data. Morgan Kaufmann Publishers, San Francisco, CA. Google ScholarGoogle ScholarCross RefCross Ref
  176. Dong Wang, Tarek Abdelzaher, Lance Kaplan, Raghu Ganti, Shaohan Hu, and Hengchang Liu. 2013. Exploitation of physical constraints for reliable social sensing. In Proceedings of the 2013 IEEE 34th Real-Time Systems Symposium (RTSS’13). 212--223. DOI:http://dx.doi.org/10.1109/RTSS.2013.29 Google ScholarGoogle ScholarDigital LibraryDigital Library
  177. Dong Wang, Md Tanvir Amin, Shen Li, Tarek Abdelzaher, Lance Kaplan, Siyu Gu, Chenji Pan, Hengchang Liu, Charu C. Aggarwal, Raghu Ganti, Xinlei Wang, Prasant Mohapatra, Boleslaw Szymanski, and Hieu Le. 2014. Using humans as sensors: An estimation-theoretic perspective. In Proceedings of the 13th International Symposium on Information Processing in Sensor Networks (IPSN’14). IEEE Press, Piscataway, NJ, 35--46. Retrieved from http://dl.acm.org/citation.cfm?id=2602339.2602344. Google ScholarGoogle ScholarCross RefCross Ref
  178. Dong Wang, Lance Kaplan, Hieu Le, and Tarek Abdelzaher. 2012. On truth discovery in social sensing: A maximum likelihood estimation approach. In Proceedings of the 11th International Conference on Information Processing in Sensor Networks (IPSN’12). ACM, New York, 233--244. DOI:http://dx.doi.org/10.1145/2185677.2185737 Google ScholarGoogle ScholarDigital LibraryDigital Library
  179. Gang Wang, Sarita Schoenebeck, Haitao Zheng, and Ben Zhao. 2016. “Will Check-in for Badges”: Understanding Bias and Misbehavior on Location-Based Social Networks. Retrieved from http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13027.Google ScholarGoogle Scholar
  180. Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y. Zhao. 2016. Defending against sybil devices in crowdsourced mapping services. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’16). ACM, New York, 179--191. DOI:http://dx.doi.org/10.1145/2906388.2906420 Google ScholarGoogle ScholarDigital LibraryDigital Library
  181. G. Alan Wang, Jian Jiao, Alan S. Abrahams, Weiguo Fan, and Zhongju Zhang. 2013. ExpertRank: A topic-aware expert finding algorithm for online knowledge communities. Decision Support Systems 54, 3 (2013), 1442--1451. Google ScholarGoogle ScholarDigital LibraryDigital Library
  182. Jiangtao Wang, Yasha Wang, Daqing Zhang, Feng Wang, Yuanduo He, and Liantao Ma. 2017. PSAllocator: Multi-task allocation for participatory sensing with sensing capability constraints. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW’17). ACM, New York, 1139--1151. DOI:http://dx.doi.org/10.1145/2998181.2998193 Google ScholarGoogle ScholarDigital LibraryDigital Library
  183. Jiangtao Wang, Yasha Wang, Daqing Zhang, Leye Wang, Haoyi Xiong, Abdelsalam Helal, Yuanduo He, and Feng Wang. 2016. Fine-grained multitask allocation for participatory sensing with a shared budget. IEEE Internet of Things Journal 3, 6 (2016), 1395--1405. Google ScholarGoogle ScholarCross RefCross Ref
  184. Jianwei Wang, Yuping Zhao, and Dong Wang. 2007. A novel fast anti-collision algorithm for RFID systems. In Proceedings of the 2007 International Conference on Wireless Communications, Networking and Mobile Computing (WiCom'07). 2044--2047. DOI:http://dx.doi.org/10.1109/WICOM.2007.511 Google ScholarGoogle ScholarCross RefCross Ref
  185. Richard Y. Wang and Diane M. Strong. 1996. Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems 12, 4 (1996), 5--33. DOI:http://dx.doi.org/10.1080/07421222.1996.11518099 Google ScholarGoogle ScholarDigital LibraryDigital Library
  186. Shiguang Wang, Lu Su, Shen Li, Shaohan Hu, Tanvir Amin, Hongwei Wang, Shuochao Yao, Lance Kaplan, and Tarek Abdelzaher. 2015. Scalable social sensing of interdependent phenomena. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks (IPSN’15). ACM, New York, 202--213. DOI:http://dx.doi.org/10.1145/2737095.2737114 Google ScholarGoogle ScholarDigital LibraryDigital Library
  187. Shiguang Wang, Dong Wang, Lu Su, Lance Kaplan, and Tarek F. Abdelzaher. 2014. Towards cyber-physical systems in social spaces: The data reliability challenge. In Proceedings of the 2014 IEEE Real-Time Systems Symposium (RTSS’14). 74--85. DOI:http://dx.doi.org/10.1109/RTSS.2014.19 Google ScholarGoogle ScholarCross RefCross Ref
  188. Xinlei Wang, Wei Cheng, Prasant Mohapatra, and Tarek Abdelzaher. 2013. ARTSense: Anonymous reputation and trust in participatory sensing. In Proceedings of the 2013 IEEE International Conference of Computer Communications (INFOCOM’13). 2517--2525. DOI:http://dx.doi.org/10.1109/INFCOM.2013.6567058 Google ScholarGoogle ScholarCross RefCross Ref
  189. Xinlei Wang, Wei Cheng, Prasant Mohapatra, and Tarek Abdelzaher. 2014. Enabling reputation and trust in privacy-preserving mobile sensing. IEEE Transactions on Mobile Computing 13, 12 (Dec. 2014), 2777--2790. DOI:http://dx.doi.org/10.1109/TMC.2013.150 Google ScholarGoogle ScholarCross RefCross Ref
  190. Xingbo Wang, Minyue Fu, and Huanshui Zhang. 2012. Target tracking in wireless sensor networks based on the combination of KF and MLE using distance measurements. IEEE Transactions on Mobile Computing 11, 4 (April 2012), 567--576. DOI:http://dx.doi.org/10.1109/TMC.2011.59 Google ScholarGoogle ScholarDigital LibraryDigital Library
  191. Xinlei Wang, Kannan Govindan, and Prasant Mohapatra. 2011. Collusion-resilient quality of information evaluation based on information provenance. In Proceedings of the 2011 Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’11). 395--403. DOI:http://dx.doi.org/10.1109/SAHCN.2011.5984923Google ScholarGoogle Scholar
  192. Xinlei Wang, Kannan Govindan, and Prasant Mohapatra. 2011. Collusion-resilient quality of information evaluation based on information provenance. In 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'11). 395--403. DOI:http://dx.doi.org/10.1109/SAHCN.2011.5984923 Google ScholarGoogle ScholarCross RefCross Ref
  193. Xinlei Wang, Amit Pande, Jindan Zhu, and Prasant Mohapatra. 2016. STAMP: Enabling privacy-preserving location proofs for mobile users. IEEE/ACM Transactions on Networking 24, 6 (Dec. 2016), 3276--3289. DOI:http://dx.doi.org/10.1109/TNET.2016.2515119 Google ScholarGoogle ScholarDigital LibraryDigital Library
  194. The Waze Traffic Monitoring Application. Website of the app. Retrieved from http://www.waze.com.Google ScholarGoogle Scholar
  195. Merriam Webster. 2017. Definition of Trust. Retrieved February 16, 2017, from https://www.merriam-webster.com/dictionary/trust.Google ScholarGoogle Scholar
  196. Qikun Xiang, Jie Zhang, Ido Nevat, and Pengfei Zhang. 2017. A trust-based mixture of gaussian processes model for robust participatory sensing. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems (AAMAS’17). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 1760--1762. http://dl.acm.org/citation.cfm?id=3091282.3091430.Google ScholarGoogle ScholarDigital LibraryDigital Library
  197. Fei Xiong, Yun Liu, and Junjun Cheng. 2017. Modeling and predicting opinion formation with trust propagation in online social networks. Communications in Nonlinear Science and Numerical Simulation 44 (2017), 513--524. DOI:http://dx.doi.org/10.1016/j.cnsns.2016.09.015 Google ScholarGoogle ScholarCross RefCross Ref
  198. Lin Yao, Yanmao Man, Zhong Huang, Jing Deng, and Xin Wang. 2016. Secure routing based on social similarity in opportunistic networks. IEEE Transactions on Wireless Communications 15, 1 (Jan. 2016), 594--605. DOI:http://dx.doi.org/10.1109/TWC.2015.2476466 Google ScholarGoogle ScholarCross RefCross Ref
  199. Shuochao Yao, Md Tanvir Amin, Lu Su, Shaohan Hu, Shen Li, Shiguang Wang, Yiran Zhao, Tarek Abdelzaher, Lance Kaplan, Charu Aggarwal, and others. 2016. Recursive ground truth estimator for social data streams. In 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN’16). IEEE, 1--12.Google ScholarGoogle ScholarCross RefCross Ref
  200. Shuochao Yao, Md. Tanvir Amin, Lu Su, Shaohan Hu, Shen Li, Shiguang Wang, Yiran Zhao, Tarek Abdelzaher, Lance Kaplan, Charu Aggarwal, and others. 2016. Recursive ground truth estimator for social data streams. In Proceedings of the 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN’16). 1--12. DOI:http://dx.doi.org/10.1109/IPSN.2016.7460719 Google ScholarGoogle ScholarCross RefCross Ref
  201. Shuochao Yao, Shaohan Hu, Shen Li, Yiran Zhao, Lu Su, Lance Kaplan, Aylin Yener, and Tarek Abdelzaher. 2016. On source dependency models for reliable social sensing: Algorithms and fundamental error bounds. In Proceedings of the 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS’16). IEEE, 467--476.Google ScholarGoogle ScholarCross RefCross Ref
  202. Xiaoxin Yin, Jiawei Han, and Philip S. Yu. 2008. Truth discovery with multiple conflicting information providers on the web. IEEE Transactions on Knowledge and Data Engineering 20, 6 (June 2008), 796--808. DOI:http://dx.doi.org/10.1109/TKDE.2007.190745 Google ScholarGoogle ScholarDigital LibraryDigital Library
  203. Mohamed Younis, Izzet F. Senturk, Kemal Akkaya, Sookyoung Lee, and Fatih Senel. 2014. Topology management techniques for tolerating node failures in wireless sensor networks: A survey. Computer Networks 58 (2014), 254--283. DOI:http://dx.doi.org/10.1016/j.comnet.2013.08.021 Google ScholarGoogle ScholarDigital LibraryDigital Library
  204. Dian Yu, Hongzhao Huang, Taylor Cassidy, Heng Ji, Chi Wang, Shi Zhi, Jiawei Han, Clare R. Voss, and Malik Magdon-Ismail. 2014. The wisdom of minority: Unsupervised slot filling validation based on multi-dimensional truth-finding. In Coling. 1567--1578.Google ScholarGoogle Scholar
  205. Ruiyun Yu, Rui Liu, Xingwei Wang, and Jiannong Cao. 2014. Improving data quality with an accumulated reputation model in participatory sensing systems. Sensors 14, 3 (2014), 5573--5594. DOI:http://dx.doi.org/10.3390/s140305573 Google ScholarGoogle ScholarCross RefCross Ref
  206. Alexandros Zenonos, Sebastian Stein, and Nicholas R. Jennings. 2015. Coordinating measurements for air pollution monitoring in participatory sensing settings. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems (AAMAS’15). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 493--501.Google ScholarGoogle Scholar
  207. Daqing Zhang, Haoyi Xiong, Leye Wang, and Guanling Chen. 2014. CrowdRecruiter: Selecting participants for piggyback crowdsensing under probabilistic coverage constraint. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’14). ACM, New York, 703--714. DOI:http://dx.doi.org/10.1145/2632048.2632059 Google ScholarGoogle ScholarDigital LibraryDigital Library
  208. Maotiang Zhang, Panlong Yang, Chang Tian, Shaojie Tang, Xiaofeng Gao, Baowei Wang, and Fu Xiao. 2016. Quality-aware sensing coverage in budget-constrained mobile crowdsensing networks. IEEE Transactions on Vehicular Technology 65, 9 (Sept. 2016), 7698--7707. DOI:http://dx.doi.org/10.1109/TVT.2015.2490679 Google ScholarGoogle ScholarCross RefCross Ref
  209. Bo Zhao, Benjamin I. P. Rubinstein, Jim Gemmell, and Jiawei Han. 2012. A Bayesian approach to discovering truth from conflicting sources for data integration. In Proceedings of the VLDB Endowement 5, 6 (Feb. 2012), 550--561. DOI:http://dx.doi.org/10.14778/2168651.2168656 Google ScholarGoogle ScholarDigital LibraryDigital Library
  210. Pengfei Zhou, Yuanqing Zheng, and Mo Li. 2014. How long to wait? Predicting bus arrival time with mobile phone based participatory sensing. IEEE Transactions on Mobile Computing 13, 6 (June 2014), 1228--1241. DOI:http://dx.doi.org/10.1109/TMC.2013.136 Google ScholarGoogle ScholarDigital LibraryDigital Library
  211. Tongqing Zhou, Zhiping Cai, Kui Wu, Yueyue Chen, and Ming Xu. 2017. FIDC: A framework for improving data credibility in mobile crowdsensing. Computer Networks 120 (2017), 157--169. DOI:http://dx.doi.org/10.1016/j.comnet.2017.04.015 Google ScholarGoogle ScholarDigital LibraryDigital Library
  212. M. H. Zwietering, Il Jongenburger, F. M. Rombouts, and K. Van’t Riet. 1990. Modeling of the bacterial growth curve. Applied and Environmental Microbiology 56, 6 (1990), 1875--1881.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Quality of Information in Mobile Crowdsensing: Survey and Research Challenges

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Sensor Networks
            ACM Transactions on Sensor Networks  Volume 13, Issue 4
            November 2017
            290 pages
            ISSN:1550-4859
            EISSN:1550-4867
            DOI:10.1145/3139355
            • Editor:
            • Chenyang Lu
            Issue’s Table of Contents

            Copyright © 2017 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 November 2017
            • Revised: 1 August 2017
            • Accepted: 1 August 2017
            • Received: 1 June 2017
            Published in tosn Volume 13, Issue 4

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • tutorial
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader