{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:08Z","timestamp":1750307048182,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,10]],"date-time":"2012-06-10T00:00:00Z","timestamp":1339286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,10]]},"DOI":"10.1145\/2232817.2232915","type":"proceedings-article","created":{"date-parts":[[2012,6,11]],"date-time":"2012-06-11T13:03:31Z","timestamp":1339419811000},"page":"409-410","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Social network-based recommendation"],"prefix":"10.1145","author":[{"given":"Xin","family":"Li","sequence":"first","affiliation":[{"name":"City University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Xin","family":"Su","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Mengyue","family":"Wang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2012,6,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"the Beyond Personalization Workshop","author":"Bonhard P.","year":"2005","unstructured":"Bonhard , P. 2005 . Who do trust? Combining recommender systems and social networking for better advice . In the Beyond Personalization Workshop , San Diego. Bonhard, P. 2005. Who do trust? Combining recommender systems and social networking for better advice. In the Beyond Personalization Workshop, San Diego."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.46"},{"volume-title":"IEEE CCNC '06","author":"Golbeck J.","key":"e_1_3_2_1_3_1","unstructured":"Golbeck , J. , and Hendler , J . 2006. FilmTrust: Movie recommendations using trust in Web-based social networks . In IEEE CCNC '06 . Golbeck, J., and Hendler, J. 2006. FilmTrust: Movie recommendations using trust in Web-based social networks. In IEEE CCNC '06."},{"volume-title":"NIPS '02","author":"Kandola J., N.","key":"e_1_3_2_1_4_1","unstructured":"Kandola , J., N. Cristianini , and Shawe-Taylor, J . 2002. Learning semantic similarity . In NIPS '02 . Kandola, J., N. Cristianini, and Shawe-Taylor, J. 2002. Learning semantic similarity. In NIPS '02."},{"volume-title":"ICML '02","author":"Kondor R. I.","key":"e_1_3_2_1_5_1","unstructured":"Kondor , R. I. , and Lafferty , J . 2002. Diffusion kernels on graphs and other discrete structures . In ICML '02 . Kondor, R. I., and Lafferty, J. 2002. Diffusion kernels on graphs and other discrete structures. In ICML '02."},{"volume-title":"HotWeb '08","author":"Sarda K.","key":"e_1_3_2_1_6_1","unstructured":"Sarda , K. , Gupta , P. , Mukherjee , D. , Padhy , S. , and Saran , H . 2008. A distributed trust-based recommendation system on social networks . In HotWeb '08 . Sarda, K., Gupta, P., Mukherjee, D., Padhy, S., and Saran, H. 2008. A distributed trust-based recommendation system on social networks. In HotWeb '08."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557914.1557959"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639747"}],"event":{"name":"JCDL '12: 12th ACM\/IEEE-CS Joint Conference on Digital Libraries","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Washington DC USA","acronym":"JCDL '12"},"container-title":["Proceedings of the 12th ACM\/IEEE-CS joint conference on Digital Libraries"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2232817.2232915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2232817.2232915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:03Z","timestamp":1750238463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2232817.2232915"}},"subtitle":["a graph random walk kernel approach"],"short-title":[],"issued":{"date-parts":[[2012,6,10]]},"references-count":8,"alternative-id":["10.1145\/2232817.2232915","10.1145\/2232817"],"URL":"https:\/\/doi.org\/10.1145\/2232817.2232915","relation":{},"subject":[],"published":{"date-parts":[[2012,6,10]]},"assertion":[{"value":"2012-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}