On Exploiting Trustors in Trust-Based Recommendation

被引:2
作者
Hwang, Won-Seok [1 ]
Li, Shaoyu [1 ]
Kim, Sang-Wook [1 ]
Choi, Ho Jin [2 ]
机构
[1] Hanyang Univ, Dept Elect & Comp Engn, Seoul, South Korea
[2] Korea Adv Inst Sci & Technol, Dept Comp Sci, Sch Comp, Taejon, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2015年 / 16卷 / 04期
基金
新加坡国家研究基金会;
关键词
Recommendation system; Collaborative filtering; Trust network; Performance evaluation; SYSTEMS;
D O I
10.6138/JIT.2015.16.4.20150310c
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a trust network, two users connected by a trust relationship are assumed to have similar interests. Based on this assumption, existing trust-based recommendation methods predict ratings for a target user on unseen items by utilizing available ratings information of those users who are "similar" to the target user in the trust network. Here, the concept of similarity is defined as the reachability via the trust relationship in the network. In the process, however, these methods usually follow the trustor-trustee relationship only in the forward direction, i.e., from trustor to trustee, but not in the backward direction. That is, they have overlooked the possibility of utilizing the ratings information obtainable from those users reachable in the backward direction who, we believe, are also deemed to have similar interests to the target user. In this paper, we investigate this possibility of identifying and adding these users to the trustable user group when predicting ratings by collaborative filtering. Experiments show that our approach can improve the coverage of prediction while preserving the accuracy.
引用
收藏
页码:755 / 765
页数:11
相关论文
共 26 条
[1]   Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions [J].
Adomavicius, G ;
Tuzhilin, A .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (06) :734-749
[2]  
[Anonymous], 2008, P 17 ACM C INF KNOWL
[3]  
[Anonymous], 2005, AAAI
[4]  
[Anonymous], 2000, P 6 ACM SIGKDD INT C
[5]  
[Anonymous], 2011, P 5 ACM C REC SYST
[6]  
Billsus D., 1998, Machine Learning. Proceedings of the Fifteenth International Conference (ICML'98), P46
[7]  
Breese J. S., 1998, Uncertainty in Artificial Intelligence. Proceedings of the Fourteenth Conference (1998), P43
[8]   The anatomy of a large-scale hypertextual Web search engine [J].
Brin, S ;
Page, L .
COMPUTER NETWORKS AND ISDN SYSTEMS, 1998, 30 (1-7) :107-117
[9]  
Golbeck Jennifer A., 2005, THESIS U MARYLAND MD
[10]   Management and applications of trust in Wireless Sensor Networks: A survey [J].
Han, Guangjie ;
Jiang, Jinfang ;
Shu, Lei ;
Niu, Jianwei ;
Chao, Han-Chieh .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) :602-617