{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:07:29Z","timestamp":1725977249592},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319912615"},{"type":"electronic","value":"9783319912622"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91262-2_37","type":"book-chapter","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T13:22:44Z","timestamp":1525958564000},"page":"408-422","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Recommendation Algorithm Considering User Trust and Interest"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9211-0332","authenticated-orcid":false,"given":"Chuanmin","family":"Mi","sequence":"first","affiliation":[]},{"given":"Peng","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Mierzwiak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,11]]},"reference":[{"key":"37_CR1","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.knosys.2013.03.012","volume":"46","author":"J Bobadilla","year":"2013","unstructured":"Bobadilla, J., Ortega, F., Hernando, A., Guti\u00e9rrez, A.: Recommender systems survey. Knowl.-Based Syst. 46, 109\u2013132 (2013)","journal-title":"Knowl.-Based Syst."},{"issue":"4","key":"37_CR2","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/2.666847","volume":"31","author":"A Borchers","year":"1998","unstructured":"Borchers, A., Herlocker, J., Konstan, J., Reidl, J.: Ganging up on information overload. Computer 31(4), 106\u2013108 (1998)","journal-title":"Computer"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Gemulla, R., Nijkamp, E., Haas, P.J., Sismanis, Y.: Large-scale matrix factorization with distributed stochastic gradient descent. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 69\u201377. ACM (2011)","DOI":"10.1145\/2020408.2020426"},{"key":"37_CR4","unstructured":"Golbeck, J.: Personalizing applications through integration of inferred trust values in semantic web-based social networks. In: 2005 Proceedings on Semantic Network Analysis Workshop, Galway, Ireland (2005)"},{"key":"37_CR5","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.knosys.2017.01.027","volume":"122","author":"G Guo","year":"2017","unstructured":"Guo, G., Zhang, J., Zhu, F., Wang, X.: Factored similarity models with social trust for top-N item recommendation. Knowl.-Based Syst. 122, 17\u201325 (2017)","journal-title":"Knowl.-Based Syst."},{"key":"37_CR6","unstructured":"Jamali, M., Ester, M.: Trustwalker: a random walk model for combining trust-based and item-based recommendation. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 397\u2013406. ACM (2009)"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Jamali, M., Ester, M.: A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the Fourth ACM Conference on Recommender Systems, pp. 135\u2013142. ACM (2010)","DOI":"10.1145\/1864708.1864736"},{"issue":"8","key":"37_CR8","doi-asserted-by":"publisher","first-page":"4000","DOI":"10.1016\/j.eswa.2013.12.019","volume":"41","author":"H Kim","year":"2014","unstructured":"Kim, H., Kim, H.-J.: A framework for tag-aware recommender systems. Expert Syst. Appl. 41(8), 4000\u20134009 (2014)","journal-title":"Expert Syst. Appl."},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Koenigstein, N., Paquet, U.: Xbox movies recommendations: variational Bayes matrix factorization with embedded feature selection. In: Proceedings of the 7th ACM Conference on Recommender Systems, pp. 129\u2013136. ACM (2013)","DOI":"10.1145\/2507157.2507168"},{"key":"37_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.knosys.2016.05.037","volume":"106","author":"WP Lee","year":"2016","unstructured":"Lee, W.P., Ma, C.Y.: Enhancing collaborative recommendation performance by combining user preference and trust-distrust propagation in social networks. Knowl.-Based Syst. 106, 125\u2013134 (2016)","journal-title":"Knowl.-Based Syst."},{"key":"37_CR11","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.knosys.2017.02.032","volume":"127","author":"J Li","year":"2017","unstructured":"Li, J., Chen, C., Chen, H., Tong, C.: Towards context-aware social recommendation via individual trust. Knowl.-Based Syst. 127, 58\u201366 (2017)","journal-title":"Knowl.-Based Syst."},{"key":"37_CR12","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.eswa.2017.07.046","volume":"89","author":"H Lim","year":"2017","unstructured":"Lim, H., Kim, H.-J.: Item recommendation using tag emotion in social cataloging services. Expert Syst. Appl. 89, 179\u2013187 (2017)","journal-title":"Expert Syst. Appl."},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Lu, Z., Agarwal, D., Dhillon, I.S.: A spatio-temporal approach to collaborative filtering. In: Proceedings of the Third ACM Conference on Recommender Systems, pp. 13\u201320. ACM (2009)","DOI":"10.1145\/1639714.1639719"},{"key":"37_CR14","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.knosys.2011.09.006","volume":"27","author":"X Luo","year":"2012","unstructured":"Luo, X., Xia, Y., Zhu, Q.: Incremental collaborative filtering recommender based on regularized matrix factorization. Knowl.-Based Syst. 27, 271\u2013280 (2012)","journal-title":"Knowl.-Based Syst."},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Ma, H., Yang, H., Lyu, M.R., King, I.: SoRec: social recommendation using probabilistic matrix factorization. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, pp. 931\u2013940. ACM (2008)","DOI":"10.1145\/1458082.1458205"},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"Ma, H., Zhou, D., Liu, C., Lyu, M.R., King, I.: Recommender systems with social regularization. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, pp. 287\u2013296. ACM (2011)","DOI":"10.1145\/1935826.1935877"},{"issue":"2","key":"37_CR17","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1961209.1961212","volume":"29","author":"H Ma","year":"2011","unstructured":"Ma, H., Zhou, T.C., Lyu, M.R., King, I.: Improving recommender systems by incorporating social contextual information. ACM Trans. Inf. Syst. (TOIS) 29(2), 9 (2011)","journal-title":"ACM Trans. Inf. Syst. (TOIS)"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Massa, P., Avesani, P.: Trust-aware recommender systems. In: Proceedings of the 2007 ACM Conference on Recommender Systems, pp. 17\u201324. ACM (2007)","DOI":"10.1145\/1297231.1297235"},{"issue":"3\/4","key":"37_CR19","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1108\/K-06-2013-0123","volume":"43","author":"C Mi","year":"2014","unstructured":"Mi, C., Shan, X., Qiang, Y., Stephanie, Y., Chen, Y.: A new method for evaluating tour online review based on grey 2-tuple linguistic. Kybernetes 43(3\/4), 601\u2013613 (2014)","journal-title":"Kybernetes"},{"key":"37_CR20","unstructured":"Mnih, A., Salakhutdinov, R.R.: Probabilistic matrix factorization. In: Advances in Neural Information Processing Systems, pp. 1257\u20131264 (2008)"},{"key":"37_CR21","unstructured":"Sun, X., Kong, F., Ye, S.: A comparison of several algorithms for collaborative filtering in startup stage. In: 2005 IEEE Proceedings of Networking, Sensing and Control, pp. 25\u201328. IEEE (2005)"},{"issue":"5","key":"37_CR22","first-page":"55","volume":"20","author":"J Tao","year":"2011","unstructured":"Tao, J., Zhang, N.: Similarity measurement method based on user\u2019s interesting-ness in collaborative filtering. Comput. Syst. Appl. 20(5), 55\u201359 (2011)","journal-title":"Comput. Syst. Appl."},{"key":"37_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.neucom.2015.10.134","volume":"204","author":"Y Zuo","year":"2016","unstructured":"Zuo, Y., Zeng, J., Gong, M., Jiao, L.: Tag-aware recommender systems based on deep neural networks. Neurocomputing 204, 51\u201360 (2016)","journal-title":"Neurocomputing"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91262-2_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:32:26Z","timestamp":1710325946000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91262-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319912615","9783319912622"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91262-2_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"11 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Soft Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zakopane","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaisc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icaisc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}