{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:13:35Z","timestamp":1725534815824},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/spac.2014.6982724","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T18:51:18Z","timestamp":1419965478000},"page":"405-410","source":"Crossref","is-referenced-by-count":1,"title":["Flickr group recommendation using content interest and social information"],"prefix":"10.1109","author":[{"given":"Cong","family":"Guo","sequence":"first","affiliation":[]},{"given":"Xinmei","family":"Tian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.2296528"},{"journal-title":"Exploiting Click Constraints and Multi-view Features for Image Re-ranking","year":"2014","author":"yu","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2255302"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807276"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2072315"},{"key":"2","first-page":"43","article-title":"Empirical analysis of predictive algorithms for collaborative filtering","author":"breese","year":"1998","journal-title":"Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312682"},{"key":"10","first-page":"239","article-title":"Two-stage learning kernel algorithms","author":"cortes","year":"2010","journal-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631421"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1386352.1386406"},{"key":"5","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1145\/1240624.1240772","article-title":"Why we tag: Motivations for annotation in mobile and online media","author":"ames","year":"2007","journal-title":"Proceedings of the SIGCHI conference on Human Factors in computing systems ACM"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297235"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1178677.1178712"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835591"}],"event":{"name":"2014 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","start":{"date-parts":[[2014,10,18]]},"location":"Wuhan, China","end":{"date-parts":[[2014,10,19]]}},"container-title":["Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6971853\/6982642\/06982724.pdf?arnumber=6982724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:18:02Z","timestamp":1602674282000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6982724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/spac.2014.6982724","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}