{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:09:19Z","timestamp":1725548959646},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540233053"},{"type":"electronic","value":"9783540301929"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30192-9_8","type":"book-chapter","created":{"date-parts":[[2010,3,2]],"date-time":"2010-03-02T18:02:43Z","timestamp":1267552963000},"page":"78-89","source":"Crossref","is-referenced-by-count":29,"title":["Semantic Web Recommender Systems"],"prefix":"10.1007","author":[{"given":"Cai-Nicolas","family":"Ziegler","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: New Security Paradigms Workshop, Cumbria, UK, pp. 48\u201360 (September 1997)","DOI":"10.1145\/283699.283739"},{"issue":"3","key":"8_CR2","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/245108.245124","volume":"40","author":"M. Balabanovi\u0107","year":"1997","unstructured":"Balabanovi\u0107, M., Shoham, Y.: Fab \u2013 Content-based, collaborative recommendation. Communications of the ACM\u00a040(3), 66\u201372 (1997)","journal-title":"Communications of the ACM"},{"key":"8_CR3","volume-title":"The Handbook of Social Psychology","author":"E. Berscheid","year":"1998","unstructured":"Berscheid, E.: Interpersonal attraction. In: Gilbert, D., Fiske, S., Lindzey, G. (eds.) The Handbook of Social Psychology, 4th edn., vol.\u00a0II, McGraw-Hill, New York (1998)","edition":"4"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","first-page":"3","volume-title":"Computer Security - ESORICS 94","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875, pp. 3\u201318. Springer, Heidelberg (1994)"},{"key":"8_CR5","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-45217-1_18","volume-title":"Cooperative Information Agents VII","author":"J. Golbeck","year":"2003","unstructured":"Golbeck, J., Parsia, B., Hendler, J.: Trust networks on the Semantic Web. In: Klusch, M., Omicini, A., Ossowski, S., Laamanen, H. (eds.) CIA 2003. LNCS (LNAI), vol.\u00a02782, pp. 238\u2013249. Springer, Heidelberg (2003)"},{"issue":"12","key":"8_CR6","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/138859.138867","volume":"35","author":"D. Goldberg","year":"1992","unstructured":"Goldberg, D., Nichols, D., Oki, B., Terry, D.: Using collaborative filtering to weave an information tapestry. Communications of the ACM\u00a035(12), 61\u201370 (1992)","journal-title":"Communications of the ACM"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/544220.544231","volume-title":"Proceedings of the Second ACM\/IEEE-CS Joint Conference on Digital Libraries","author":"Z. Huang","year":"2002","unstructured":"Huang, Z., Chung, W., Ong, T.-H., Chen, H.: A graph-based recommender system for digital library. In: Proceedings of the Second ACM\/IEEE-CS Joint Conference on Digital Libraries, Portland, OR, USA, pp. 65\u201373. ACM Press, New York (2002)"},{"key":"8_CR8","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1145\/503376.503456","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"C. Jensen","year":"2002","unstructured":"Jensen, C., Davis, J., Farnham, S.: Finding others online: Reputation systems for social online spaces. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Minneapolis, MN, USA, pp. 447\u2013454. ACM Press, New York (2002)"},{"issue":"3","key":"8_CR9","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/245108.245123","volume":"40","author":"H. Kautz","year":"1997","unstructured":"Kautz, H., Selman, B., Shah, M.: Referral Web: Combining social networks and collaborative filtering. Communications of the ACM\u00a040(3), 63\u201365 (1997)","journal-title":"Communications of the ACM"},{"key":"8_CR10","unstructured":"Levien, R., Aiken, A.: Attack-resistant trust metrics for public key certification. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA (January 1998)"},{"key":"8_CR11","unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling, Stirling, UK (1994)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-540-24747-0_17","volume-title":"Trust Management","author":"P. Massa","year":"2004","unstructured":"Massa, P., Bhattacharjee, B.: Using trust in recommender systems: An experimental analysis. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, pp. 221\u2013235. Springer, Heidelberg (2004)"},{"key":"8_CR13","unstructured":"Middleton, S., Alani, H., Shadbolt, N., De Roure, D.: Exploiting synergy between ontologies and recommender systems. In: Proceedings of the WWW2002 International Workshop on the Semantic Web. CEUR Workshop Proceedings, Maui, HW, USA, vol.\u00a055 (May 2002)"},{"key":"8_CR14","volume-title":"Proceedings of the ACM 2003 Conference on Intelligent User Interfaces (Accepted Poster)","author":"B. Miller","year":"2003","unstructured":"Miller, B., Albert, I., Lam, S., Konstan, J., Riedl, J.: MovieLens unplugged: Experiences with an occasionally connected recommender system. In: Proceedings of the ACM 2003 Conference on Intelligent User Interfaces (Accepted Poster), Chapel Hill, NC, USA. ACM, New York (2003)"},{"key":"8_CR15","unstructured":"Olsson, T.: Bootstrapping and Decentralizing Recommender Systems. PhD thesis, Uppsala University, Uppsala, Sweden (2003)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"O\u2019Mahony, M., Hurley, N., Kushmerick, N., Silvestre, G.: Collaborative recommendation: A robustness analysis. ACM Transactions on Internet Technology\u00a04(3) (August 2004)","DOI":"10.1145\/1031114.1031116"},{"key":"8_CR17","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: Bringing order to the Web. Technical report, Stanford Digital Library Technologies Project (1998)"},{"key":"8_CR18","first-page":"227","volume-title":"Semantic Information Processing","author":"R. Quillian","year":"1968","unstructured":"Quillian, R.: Semantic memory. In: Minsky, M. (ed.) Semantic Information Processing, pp. 227\u2013270. MIT Press, Boston (1968)"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1145\/336992.337035","volume-title":"Proceedings of the 1st ACM Conference on Electronic Commerce","author":"B. Schafer","year":"1999","unstructured":"Schafer, B., Konstan, J., Riedl, J.: Recommender systems in e-commerce. In: Proceedings of the 1st ACM Conference on Electronic Commerce, Denver, CO, USA, pp. 158\u2013166. ACM Press, New York (1999)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Shardanand, U., Maes, P.: Social information filtering: Algorithms for automating \u201cword of mouth\u201d. In: Proceedings of the ACM CHI 1995 Conference on Human Factors in Computing Systems, vol.\u00a01, pp. 210\u2013217 (1995)","DOI":"10.1145\/223904.223931"},{"key":"8_CR21","unstructured":"Sinha, R., Swearingen, K.: Comparing recommendations made by online systems and friends. In: Proceedings of the DELOS-NSF Workshop on Personalization and Recommender Systems in Digital Libraries, Dublin, Ireland (June 2001)"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-24747-0_19","volume-title":"Trust Management","author":"C.-N. Ziegler","year":"2004","unstructured":"Ziegler, C.-N., Lausen, G.: Analyzing correlation between trust and user similarity in online communities. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, pp. 251\u2013265. Springer, Heidelberg (2004)"},{"key":"8_CR23","volume-title":"Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service","author":"C.-N. Ziegler","year":"2004","unstructured":"Ziegler, C.-N., Lausen, G.: Spreading activation models for trust propagation. In: Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service, Taipei, Taiwan. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Ziegler, C.-N., Lausen, G., Schmidt-Thieme, L.: Taxonomy-driven computation of product recommendations (submitted for publication, 2004)","DOI":"10.1145\/1031171.1031252"}],"container-title":["Lecture Notes in Computer Science","Current Trends in Database Technology - EDBT 2004 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30192-9_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,24]],"date-time":"2021-10-24T07:38:07Z","timestamp":1635061087000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30192-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540233053","9783540301929"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30192-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}