{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:06:24Z","timestamp":1761807984678,"version":"3.41.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National High-tech R&D Program","award":["2015AA015402"],"award-info":[{"award-number":["2015AA015402"]}]},{"name":"Shenzhen development Foundation","award":["J- CYJ20130401160028781"],"award-info":[{"award-number":["J- CYJ20130401160028781"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303025, 61370055"],"award-info":[{"award-number":["61303025, 61370055"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2015,10,26]]},"abstract":"<jats:p>\n            Recommender systems have been studied comprehensively in both academic and industrial fields over the past decade. As user interests can be affected by context at any time and any place in mobile scenarios, rich context information becomes more and more important for personalized context-aware recommendations. Although existing context-aware recommender systems can make context-aware recommendations to some extent, they suffer several inherent weaknesses: (1) Users\u2019 context-aware interests are not modeled realistically, which reduces the recommendation quality; (2) Current context-aware recommender systems ignore trust relations among users. Trust relations are actually context-aware and associated with certain aspects (i.e., categories of items) in mobile scenarios. In this article, we define a term\n            <jats:italic>role<\/jats:italic>\n            to model common context-aware interests among a group of users. We propose an efficient role mining algorithm to mine roles from a \u201cuser-context-behavior\u201d matrix, and a role-based trust model to calculate context-aware trust value between two users. During online recommendation, given a user\n            <jats:italic>u<\/jats:italic>\n            in a context\n            <jats:italic>c<\/jats:italic>\n            , an efficient weighted set similarity query (WSSQ) algorithm is designed to build\n            <jats:italic>u<\/jats:italic>\n            \u2019s\n            <jats:italic>role-based trust network<\/jats:italic>\n            in context\n            <jats:italic>c<\/jats:italic>\n            . Finally, we make recommendations to\n            <jats:italic>u<\/jats:italic>\n            based on\n            <jats:italic>u<\/jats:italic>\n            \u2019s role-based trust network by considering both context-aware roles and trust relations. Extensive experiments demonstrate that our recommendation approach outperforms the state-of-the-art methods in both effectiveness and efficiency.\n          <\/jats:p>","DOI":"10.1145\/2751562","type":"journal-article","created":{"date-parts":[[2015,10,13]],"date-time":"2015-10-13T22:31:00Z","timestamp":1444775460000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Context-Aware Recommendation Using Role-Based Trust Network"],"prefix":"10.1145","volume":"10","author":[{"given":"Liang","family":"Hong","sequence":"first","affiliation":[{"name":"Wuhan University"}]},{"given":"Lei","family":"Zou","sequence":"additional","affiliation":[{"name":"Peking University"}]},{"given":"Cheng","family":"Zeng","sequence":"additional","affiliation":[{"name":"Wuhan University"}]},{"given":"Luming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hefei University of Technology"}]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[{"name":"Wuhan University"}]},{"given":"Jilei","family":"Tian","sequence":"additional","affiliation":[{"name":"Nokia Research Center, Beijing"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"volume-title":"AI Magazine. AAAI","author":"Adomavicius Gediminas","key":"e_1_2_1_1_1","unstructured":"Gediminas Adomavicius , Bamshad Mobasher , Francesco Ricci , and Alex Tuzhilin . 2011. Context-aware recommender systems . In AI Magazine. AAAI , Palo Alto , California, USA. Gediminas Adomavicius, Bamshad Mobasher, Francesco Ricci, and Alex Tuzhilin. 2011. Context-aware recommender systems. In AI Magazine. AAAI, Palo Alto, California, USA."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454008.1454068"},{"volume-title":"Contextual recommendation. From Web to Social Web: Discovering and Deploying User and Content Profiles","author":"Anand Sarabjot Singh","key":"e_1_2_1_3_1","unstructured":"Sarabjot Singh Anand and Bamshad Mobasher . 2007. Contextual recommendation. From Web to Social Web: Discovering and Deploying User and Content Profiles . Springer , Berlin, Heidelberg , Germany. Sarabjot Singh Anand and Bamshad Mobasher. 2007. Contextual recommendation. From Web to Social Web: Discovering and Deploying User and Content Profiles. Springer, Berlin, Heidelberg, Germany."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.16"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1291233.1291369"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.9"},{"key":"e_1_2_1_7_1","unstructured":"Tom DuBois Jennifer Golbeck T. M. Khoshgoftaar and X. Zhu. 2009. Improving recommendation accuracy by clustering social networks with trust. In RecSys. ACM New York NY USA.  Tom DuBois Jennifer Golbeck T. M. Khoshgoftaar and X. Zhu. 2009. Improving recommendation accuracy by clustering social networks with trust. In RecSys. ACM New York NY USA."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2589921.2589932"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594173.1594174"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/138859.138867"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497435"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559891"},{"volume-title":"Bulletin of the IEEE Computer Society Technical Committee on Data Engineering","author":"Hadjieleftheriou Marios","key":"e_1_2_1_13_1","unstructured":"Marios Hadjieleftheriou and Divesh Srivastava . 2010. Weighted set-based string similarity . In Bulletin of the IEEE Computer Society Technical Committee on Data Engineering . IEEE , New York, NY, USA . Marios Hadjieleftheriou and Divesh Srivastava. 2010. Weighted set-based string similarity. In Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. IEEE, New York, NY, USA."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772734"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557067"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639745"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864727"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553454"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1386790.1386838"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1571978"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458205"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297235"},{"key":"e_1_2_1_24_1","first-page":"1","article-title":"Birds of a feather: Homophily in social networks","volume":"27","author":"McPherson M.","year":"2009","unstructured":"M. McPherson , L. Smith-Lovin , and J. Cook . 2009 . Birds of a feather: Homophily in social networks . Annual Review of Sociology 27 , 1 . M. McPherson, L. Smith-Lovin, and J. Cook. 2009. Birds of a feather: Homophily in social networks. Annual Review of Sociology 27, 1.","journal-title":"Annual Review of Sociology"},{"volume-title":"AAAI. AAAI","author":"Pan Weike","key":"e_1_2_1_25_1","unstructured":"Weike Pan , Evan W. Xiang , Nathan N. Liu , and Qiang Yang . 2010. Transfer learning in collaborative filtering for sparsity reduction . In AAAI. AAAI , Palo Alto , California, USA. Weike Pan, Evan W. Xiang, Nathan N. Liu, and Qiang Yang. 2010. Transfer learning in collaborative filtering for sparsity reduction. In AAAI. AAAI, Palo Alto, California, USA."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168752.2168771"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2010002"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007652"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055709.1055714"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.70"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751562","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2751562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:07Z","timestamp":1750225387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751562"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,10,26]]}},"alternative-id":["10.1145\/2751562"],"URL":"https:\/\/doi.org\/10.1145\/2751562","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"type":"print","value":"1556-4681"},{"type":"electronic","value":"1556-472X"}],"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2013-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}