{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:39:05Z","timestamp":1743079145180,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031545337"},{"type":"electronic","value":"9783031545344"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54534-4_20","type":"book-chapter","created":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T10:39:18Z","timestamp":1710844758000},"page":"281-293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Metamorphic Testing for\u00a0Recommender Systems"],"prefix":"10.1007","author":[{"given":"Sofia","family":"Iakusheva","sequence":"first","affiliation":[]},{"given":"Anton","family":"Khritankov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,12]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.: The nonstochastic multiarmed bandit problem. SIAM J. Comput. 32, 48\u201377 (2002)","journal-title":"SIAM J. Comput."},{"issue":"5","key":"20_CR2","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TSE.2014.2372785","volume":"41","author":"E Barr","year":"2015","unstructured":"Barr, E., Harman, M., McMinn, P., Shahbaz, M., Yoo, S.: The oracle problem in software testing: a survey. IEEE Trans. Software Eng. 41(5), 507\u2013525 (2015). https:\/\/doi.org\/10.1109\/TSE.2014.2372785","journal-title":"IEEE Trans. Software Eng."},{"issue":"3","key":"20_CR3","doi-asserted-by":"publisher","first-page":"380","DOI":"10.3390\/e23030380","volume":"23","author":"E Cavenaghi","year":"2021","unstructured":"Cavenaghi, E., Sottocornola, G., Stella, F., Zanker, M.: Non stationary multi-armed bandit: empirical evaluation of a new concept drift-aware algorithm. Entropy 23(3), 380 (2021)","journal-title":"Entropy"},{"issue":"1","key":"20_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3143561","volume":"51","author":"TY Chen","year":"2018","unstructured":"Chen, T.Y., et al.: Metamorphic testing: a review of challenges and opportunities. ACM Comput. Surv. (CSUR) 51(1), 1\u201327 (2018). https:\/\/doi.org\/10.1145\/3143561","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1023\/A:1011145532042","volume":"11","author":"G Fischer","year":"2001","unstructured":"Fischer, G.: User modeling in human-computer interaction. User Model. User-Adap. Inter. 11, 65\u201386 (2001)","journal-title":"User Model. User-Adap. Inter."},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Iakusheva, S., Khritankov, A.: Composite metamorphic relations for integration testing. In: 2022 8th International Conference on Computer Technology Applications, May 12\u201314, Vienna, Austria (2022). https:\/\/doi.org\/10.1145\/3543712.3543725","DOI":"10.1145\/3543712.3543725"},{"key":"20_CR7","doi-asserted-by":"publisher","unstructured":"Khritankov, A., Pershin, N., Ukhov, N., Ukhov., A.: MLDev: data science experiment automation and reproducibility software. In: Pozanenko, A., Stupnikov, S., Thalheim, B., Mendez, E., Kiselyova, N. (eds.) Data Analytics and Management in Data Intensive Domains. Communications in Computer and Information Science, vol. 1620, pp. 3\u201318. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-031-12285-9_1","DOI":"10.1007\/978-3-031-12285-9_1"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science()","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-030-91560-5_19","volume-title":"Web Information Systems Engineering - WISE 2021","author":"A Khritankov","year":"2021","unstructured":"Khritankov, A., Pilkevich, A.: Existence conditions for hidden feedback loops in online recommender systems. In: Zhang, W., Zou, L., Maamar, Z., Chen, L. (eds.) Web Information Systems Engineering - WISE 2021. Lecture Notes in Computer Science(), vol. 13081, pp. 267\u2013274. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-91560-5_19"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s10618-008-0114-1","volume":"18","author":"R Kohavi","year":"2009","unstructured":"Kohavi, R., Longbotham, R., Sommerfield, D., Henne, R.M.: Controlled experiments on the web: survey and practical guide. Data Min. Knowl. Disc. 18, 140\u2013181 (2009)","journal-title":"Data Min. Knowl. Disc."},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Mao, C., Yi, X., Chen, T. Y.: Metamorphic robustness testing for recommender systems: a case study. In: 2020 7th International Conference on Dependable Systems and Their Applications (DSA), pp. 331\u2013336. IEEE (2020)","DOI":"10.1109\/DSA51864.2020.00060"},{"issue":"4","key":"20_CR11","doi-asserted-by":"publisher","first-page":"163","DOI":"10.24867\/IJIEM-2010-4-019","volume":"1","author":"P Matkovi\u0107","year":"2010","unstructured":"Matkovi\u0107, P., Tumbas, P.: A comparative overview of the evolution of software development models. Int. J. Ind. Eng. Manag. 1(4), 163 (2010)","journal-title":"Int. J. Ind. Eng. Manag."},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Pesu, D., Zhou, Z. Q., Zhen, J., Towey, D.: A monte Carlo method for metamorphic testing of machine translation services. In: Proceedings of the 3rd International Workshop on Metamorphic Testing, pp. 38\u201345 (2018)","DOI":"10.1145\/3193977.3193980"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"ur Rehman, F., Izurieta, C.: Statistical metamorphic testing of neural network based intrusion detection systems. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 20\u201326. IEEE(2021)","DOI":"10.1109\/CSR51186.2021.9527993"},{"key":"20_CR14","volume-title":"Recommender Systems Handbook","author":"F Ricci","year":"2010","unstructured":"Ricci, F., Rokach, L., Shapira, B., Kantor, P.B.: Recommender Systems Handbook, 1st edn. Springer-Verlag, Berlin (2010)","edition":"1"},{"issue":"1","key":"20_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000070","volume":"11","author":"DJ Russo","year":"2018","unstructured":"Russo, D.J., Roy, B.V., Kazerouni, A., Osband, I., Wen, Z.: A Tutorial on Thompson Sampling. Found. Trends R Mach. Learn. 11(1), 1\u201396 (2018)","journal-title":"Found. Trends R Mach. Learn."},{"issue":"1\u20132","key":"20_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000068","volume":"12","author":"A Slivkins","year":"2019","unstructured":"Slivkins, A.: Introduction to multi-armed bandits. Found. Trends Mach. Learn. 12(1\u20132), 1\u2013286 (2019). https:\/\/doi.org\/10.1561\/2200000068","journal-title":"Found. Trends Mach. Learn."},{"issue":"1","key":"20_CR17","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1002\/cjs.10094","volume":"39","author":"JC Wang","year":"2011","unstructured":"Wang, J.C., Meyer, M.C.: Testing the monotonicity or convexity of a function using regression splines. Can. J. Stat. 39(1), 89\u2013107 (2011)","journal-title":"Can. J. Stat."},{"issue":"6","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1109\/TSE.2019.2915065","volume":"47","author":"ZQ Zhou","year":"2019","unstructured":"Zhou, Z.Q., Tse, T.H., Witheridge, M.: Metamorphic robustness testing: exposing hidden defects in citation statistics and journal impact factors. IEEE Trans. Softw. Eng. 47(6), 1164\u20131183 (2019)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Analysis of Images, Social Networks and Texts"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54534-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T10:43:24Z","timestamp":1710845004000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54534-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031545337","9783031545344"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54534-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Analysis of Images, Social Networks and Texts","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yerevan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Armenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aist2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aistconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.62","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Out of the 93 submission, 17 were rejected before being sent to peer review.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}