{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:46Z","timestamp":1750307266208,"version":"3.41.0"},"reference-count":70,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T00:00:00Z","timestamp":1291161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst."],"published-print":{"date-parts":[[2010,12]]},"abstract":"<jats:p>\n            Digital content production and distribution has radically changed our business models. An unprecedented volume of supply is now on offer, whetted by the demand of millions of users from all over the world. Since users cannot be expected to browse through millions of different items to find what they might like, filtering has become a popular technique to connect supply and demand:\n            <jats:italic>trusted<\/jats:italic>\n            users are first identified, and their opinions are then used to create recommendations. In this domain, users' trustworthiness has been measured according to one of the following two criteria:\n            <jats:italic>taste similarity<\/jats:italic>\n            (i.e., \u201cI trust those who agree with me\u201d), or\n            <jats:italic>social ties<\/jats:italic>\n            (i.e., \u201cI trust my friends, and the people that my friends trust\u201d). The former criterion aims at identifying\n            <jats:italic>concordant<\/jats:italic>\n            users, but is subject to abuse by malicious behaviors. The latter aims at detecting\n            <jats:italic>well-intentioned<\/jats:italic>\n            users, but fails to capture the natural subjectivity of tastes. In this article, we propose a new definition of\n            <jats:italic>trusted recommenders<\/jats:italic>\n            , addressing those users that are\n            <jats:italic>both<\/jats:italic>\n            well-intentioned and concordant. Based on this characterisation, we propose a novel approach to information filtering that we call\n            <jats:italic>dependable filtering<\/jats:italic>\n            . We describe alternative algorithms realizing this approach, and demonstrate, by means of extensive performance evaluation on a variety of real large-scale datasets, the high degree of both accuracy and robustness they entail.\n          <\/jats:p>","DOI":"10.1145\/1877766.1877771","type":"journal-article","created":{"date-parts":[[2010,12,22]],"date-time":"2010-12-22T14:41:31Z","timestamp":1293028891000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Dependable filtering"],"prefix":"10.1145","volume":"29","author":[{"given":"Matteo","family":"Dell'Amico","sequence":"first","affiliation":[{"name":"Eurecom, cedex, France"}]},{"given":"Licia","family":"Capra","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2010,12,27]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312230"},{"key":"e_1_2_1_2_1","unstructured":"Anderson C. 2006. The Long Tail: Why the Future of Business Is Selling Less of More. Hyperion.   Anderson C. 2006. The Long Tail: Why the Future of Business Is Selling Less of More. Hyperion."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1067036"},{"volume-title":"The Evolution of Cooperation","author":"Axelrod R.","key":"e_1_2_1_4_1","doi-asserted-by":"crossref","DOI":"10.1126\/science.7466396"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1451983.1451996"},{"volume-title":"Proceedings of the AAAI Workshop on Intelligent Techniques for Web Personalization. 17--26","year":"2007","author":"Bhaumik R.","key":"e_1_2_1_6_1"},{"volume-title":"Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization.","author":"Bhaumik R.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10550-006-0080-3"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.127"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199506)46:5%3C348::AID-ASI6%3E3.0.CO;2-1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080202"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1097047.1097061"},{"volume-title":"Proceedings of the 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security. 135--150","author":"Dell'Amico M.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963776"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/988772.988788"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2005.10129104"},{"volume-title":"Proceedings of the 1st Workshop on Networked Systems (NetEcon'06)","author":"Friedman E. J.","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2006.10129128"},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Golbeck J. 2008. Weaving a Web of Trust. Sci. 1640--1641.  Golbeck J. 2008. Weaving a Web of Trust. Sci. 1640--1641.","DOI":"10.1126\/science.1163357"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1316624.1316643"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/776322.776346"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367738"},{"key":"e_1_2_1_26_1","unstructured":"Haveliwala T. Kamvar A. and Jeh G. 2003. An analytical comparison of approaches to personalizing Pagerank. Tech. rep. Stanford InfoLab.  Haveliwala T. Kamvar A. and Jeh G. 2003. An analytical comparison of approaches to personalizing Pagerank. Tech. rep. Stanford InfoLab."},{"key":"e_1_2_1_27_1","unstructured":"Haveliwala T. and Kamvar S. 2003. The second eigenvalue of the google matrix. Tech. rep. 20\/2003 Stanford University.  Haveliwala T. and Kamvar S. 2003. The second eigenvalue of the google matrix. Tech. rep. 20\/2003 Stanford University."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1208999"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312682"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.22"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963775"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065385.1065415"},{"volume-title":"Proceedings of the 15th Annual Workshop on Information Technologies and Systems. 33--38","author":"Huang Z.","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0619"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.44"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775191"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304877"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245123"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_2_1_41_1","unstructured":"Kofman I. and Rajaraman S. 2010. New video page launches for all users. http:\/\/youtube-global. blogspot.com\/2010\/03\/new-video-page-launches-for-all-users.html.  Kofman I. and Rajaraman S. 2010. New video page launches for all users. http:\/\/youtube-global. blogspot.com\/2010\/03\/new-video-page-launches-for-all-users.html."},{"volume-title":"Proceedings of the FOAF Workshop.","year":"2004","author":"Kruk S.","key":"e_1_2_1_42_1"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/11766155_2"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"volume-title":"Proceedings of the Workshop on Privacy at Ubicomp","year":"2003","author":"Langheinrich M.","key":"e_1_2_1_45_1"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454008.1454044"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364172"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/382979.383041"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297235"},{"key":"e_1_2_1_50_1","first-page":"14","article-title":"A survey of attack-resistant collaborative filtering algorithms","volume":"31","author":"Mehta B.","year":"2008","journal-title":"Bull. Techn. Comm. Data Engin."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.45"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278366.1278372"},{"volume-title":"Proceedings of the 21st Conference on Artificial Intelligence (AAAI'06)","author":"Mobasher B.","key":"e_1_2_1_53_1"},{"key":"e_1_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Nowak M. A. and Sigmund K. 1998. Evolution of indirect reciprocity by image scoring. Nature 393 6685 573--577.  Nowak M. A. and Sigmund K. 1998. Evolution of indirect reciprocity by image scoring. Nature 393 6685 573--577.","DOI":"10.1038\/31225"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111476"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000036256.39422.25"},{"volume":"2453","volume-title":"Database and Expert Systems Applications. Lecture Notes in Computer Science","author":"O'Mahony M.","key":"e_1_2_1_57_1"},{"key":"e_1_2_1_58_1","unstructured":"Page L. Brin S. Motwani R. and Winograd T. 1998. The PageRank citation ranking: Bringing order to the web. Tech. rep. Stanford Digital Library Technologies Project.  Page L. Brin S. Motwani R. and Winograd T. 1998. The PageRank citation ranking: Bringing order to the web. Tech. rep. Stanford Digital Library Technologies Project."},{"key":"e_1_2_1_59_1","unstructured":"Rajaraman S. 2009. Five stars dominate ratings. http:\/\/youtube-global.blogspot.com\/2009\/09\/five-stars-dominate-ratings.html.  Rajaraman S. 2009. Five stars dominate ratings. http:\/\/youtube-global.blogspot.com\/2009\/09\/five-stars-dominate-ratings.html."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01718-6_8"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297236"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454008.1454033"},{"volume-title":"Proceedings of the 8th International Conference on E-Commerce and Web Technologies (EC-Web'07)","author":"Sandvig J.","key":"e_1_2_1_63_1"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297249"},{"key":"e_1_2_1_65_1","first-page":"3","article-title":"A survey of collaborative recommendation and the robustness of model-based algorithms","volume":"31","author":"Sandvig J. J.","year":"2008","journal-title":"Bull. Techn. Comm. Data Engin."},{"volume-title":"Proceedings of the 1st International Conference on Peer-to-Peer Computing.","year":"2001","author":"Schollmeier R.","key":"e_1_2_1_66_1"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/11735106_5"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-007-0013-0"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150508"},{"key":"e_1_2_1_71_1","unstructured":"Zheng R. Provost F. and Ghose A. 2007. Social network collaborative filtering. Tech. rep. CeDER-07-04 New York University. September.  Zheng R. Provost F. and Ghose A. 2007. Social network collaborative filtering. Tech. rep. CeDER-07-04 New York University. September."}],"container-title":["ACM Transactions on Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1877766.1877771","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1877766.1877771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:47Z","timestamp":1750243967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1877766.1877771"}},"subtitle":["Philosophy and realizations"],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":70,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["10.1145\/1877766.1877771"],"URL":"https:\/\/doi.org\/10.1145\/1877766.1877771","relation":{},"ISSN":["1046-8188","1558-2868"],"issn-type":[{"type":"print","value":"1046-8188"},{"type":"electronic","value":"1558-2868"}],"subject":[],"published":{"date-parts":[[2010,12]]},"assertion":[{"value":"2008-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-12-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}