{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:18:22Z","timestamp":1772727502483,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,3]],"date-time":"2014-07-03T00:00:00Z","timestamp":1404345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,3]]},"DOI":"10.1145\/2600428.2609488","type":"proceedings-article","created":{"date-parts":[[2014,7,8]],"date-time":"2014-07-08T12:20:11Z","timestamp":1404822011000},"page":"975-978","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Modeling dual role preferences for trust-aware recommendation"],"prefix":"10.1145","author":[{"given":"Weilong","family":"Yao","sequence":"first","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jing","family":"He","sequence":"additional","affiliation":[{"name":"Centre for Applied Informatics, Victoria University, Melbourne, Australia"}]},{"given":"Guangyan","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Melbourne, Australia"}]},{"given":"Yanchun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Centre for Applied Informatics, Victoria University, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2014,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.99"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864736"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1571978"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458205"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935877"},{"key":"e_1_3_2_1_6_1","first-page":"1257","volume-title":"NIPS","author":"Mnih A.","year":"2007","unstructured":"A. Mnih and R. Salakhutdinov . Probabilistic matrix factorization . In NIPS , pages 1257 -- 1264 , 2007 . A. Mnih and R. Salakhutdinov. Probabilistic matrix factorization. In NIPS, pages 1257--1264, 2007."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_2_1_8_1","first-page":"2712","volume-title":"IJCAI","author":"Tang J.","year":"2013","unstructured":"J. Tang , X. Hu , H. Gao , and H. Liu . Exploiting local and global social context for recommendation . In IJCAI , pages 2712 -- 2718 . AAAI Press , 2013 . J. Tang, X. Hu, H. Gao, and H. Liu. Exploiting local and global social context for recommendation. In IJCAI, pages 2712--2718. AAAI Press, 2013."},{"key":"e_1_3_2_1_9_1","first-page":"2747","volume-title":"IJCAI","author":"Yang B.","year":"2013","unstructured":"B. Yang , L. Yu , D. Liu , and J. Liu . Social collaborative filtering by trust . In IJCAI , pages 2747 -- 2753 . AAAI Press , 2013 . B. Yang, L. Yu, D. Liu, and J. Liu. Social collaborative filtering by trust. In IJCAI, pages 2747--2753. AAAI Press, 2013."}],"event":{"name":"SIGIR '14: The 37th International ACM SIGIR Conference on Research and Development in Information Retrieval","location":"Gold Coast Queensland Australia","acronym":"SIGIR '14","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 37th international ACM SIGIR conference on Research &amp; development in information retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600428.2609488","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600428.2609488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:05Z","timestamp":1750230065000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600428.2609488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,3]]},"references-count":9,"alternative-id":["10.1145\/2600428.2609488","10.1145\/2600428"],"URL":"https:\/\/doi.org\/10.1145\/2600428.2609488","relation":{},"subject":[],"published":{"date-parts":[[2014,7,3]]},"assertion":[{"value":"2014-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}