{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:24:20Z","timestamp":1753601060808,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,17]],"date-time":"2015-10-17T00:00:00Z","timestamp":1445040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Research Grants Council of the Hong Kong Special Administrative Region, China","award":["Project No. CUHK 413213"],"award-info":[{"award-number":["Project No. CUHK 413213"]}]},{"name":"National Grand Fundamental Research 973 Program of China","award":["No. 2014CB340405"],"award-info":[{"award-number":["No. 2014CB340405"]}]},{"name":"Microsoft Research Asia Regional Seed Fund in Big Data Research","award":["Grant No. FY13-RES-SPONSOR-036"],"award-info":[{"award-number":["Grant No. FY13-RES-SPONSOR-036"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,17]]},"DOI":"10.1145\/2806416.2806510","type":"proceedings-article","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T13:03:43Z","timestamp":1445951023000},"page":"851-860","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Exploiting Game Theoretic Analysis for Link Recommendation in Social Networks"],"prefix":"10.1145","author":[{"given":"Tong","family":"Zhao","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"H. Vicky","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Alberta, Edmonton, Canada"}]},{"given":"Irwin","family":"King","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2015,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367525"},{"key":"e_1_3_2_1_2_1","volume-title":"Social networks and the stepping stone effect: The case of tobacco and marijuana. working paper","author":"Badev A. I.","year":"2014","unstructured":"A. I. Badev . Social networks and the stepping stone effect: The case of tobacco and marijuana. working paper , 2014 . A. I. Badev. Social networks and the stepping stone effect: The case of tobacco and marijuana. working paper, 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"Moderate interactions in games with induced complementarities","author":"Armengol A.","year":"2007","unstructured":"Ballester, Coralio, and A. CalvU- Armengol . Moderate interactions in games with induced complementarities . 2007 . Ballester, Coralio, and A. CalvU-Armengol. Moderate interactions in games with induced complementarities. 2007."},{"key":"e_1_3_2_1_4_1","volume-title":"Econometrica","author":"Armengol A.","year":"2006","unstructured":"Ballester, Coralio, A. CalvU- Armengol , and Y. Zenou . Who's who in networks. wanted: the key player . Econometrica , 2006 . Ballester, Coralio, A. CalvU-Armengol, and Y. Zenou. Who's who in networks. wanted: the key player. Econometrica, 2006."},{"key":"e_1_3_2_1_5_1","volume-title":"Bargaining dynamics in exchange networks","author":"Bayati M.","year":"2010","unstructured":"M. Bayati , C. Borgs , J. Chayes , Y. Kanoria , and A. Montanari . Bargaining dynamics in exchange networks . 2010 . M. Bayati, C. Borgs, J. Chayes, Y. Kanoria, and A. Montanari. Bargaining dynamics in exchange networks. 2010."},{"key":"e_1_3_2_1_6_1","volume-title":"ASE ICSC","author":"Beigi G.","year":"2014","unstructured":"G. Beigi , H. Alvari , M. Jalili , and G. Sukthankar . Leveraging community detection for accurate trust prediction . ASE ICSC , 2014 . G. Beigi, H. Alvari, M. Jalili, and G. Sukthankar. Leveraging community detection for accurate trust prediction. ASE ICSC, 2014."},{"key":"e_1_3_2_1_7_1","volume-title":"CIRPEE Working Paper","author":"Bramoulle Y.","year":"2011","unstructured":"Y. Bramoulle , R. Kranton , and M. DiAmours . Strategic interaction and networks . CIRPEE Working Paper , 2011 . Y. Bramoulle, R. Kranton, and M. DiAmours. Strategic interaction and networks. CIRPEE Working Paper, 2011."},{"key":"e_1_3_2_1_8_1","author":"Currarini S.","year":"2010","unstructured":"S. Currarini and M. Morelli . Network formation with sequential demands. Review of Economic Design , 2010 . S. Currarini and M. Morelli. Network formation with sequential demands. Review of Economic Design, 2010.","journal-title":"Network formation with sequential demands. Review of Economic Design"},{"key":"e_1_3_2_1_9_1","volume-title":"CIKM","author":"David L.-N.","year":"2003","unstructured":"L.-N. David and K. Jon . The link prediction problem for social networks . CIKM , 2003 . L.-N. David and K. Jon. The link prediction problem for social networks. CIKM, 2003."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.140"},{"key":"e_1_3_2_1_11_1","author":"Dutta B.","year":"2005","unstructured":"B. Dutta , S. Ghosal , and D. Ray . Farsighted network formation. Journal of Economic Theory , 2005 . B. Dutta, S. Ghosal, and D. Ray. Farsighted network formation. Journal of Economic Theory, 2005.","journal-title":"Journal of Economic Theory"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.22"},{"key":"e_1_3_2_1_14_1","volume-title":"Handbook of Game Theory","author":"Jackson M.","year":"2012","unstructured":"M. Jackson and Y. Zenou . Games on networks . Handbook of Game Theory , 2012 . M. Jackson and Y. Zenou. Games on networks. Handbook of Game Theory, 2012."},{"key":"e_1_3_2_1_15_1","volume-title":"A survey of models of network formation: Stability and efficiency","author":"Jackson M. O.","year":"2004","unstructured":"M. O. Jackson . A survey of models of network formation: Stability and efficiency . Group Formation in Economics. Networks, Clubs and Coalitions, 2004 . M. O. Jackson. A survey of models of network formation: Stability and efficiency. Group Formation in Economics. Networks, Clubs and Coalitions, 2004."},{"key":"e_1_3_2_1_16_1","author":"Jackson M. O.","year":"1996","unstructured":"M. O. Jackson and A. Wolinsky . A strategic model of social and economic networks. Journal of Economic Theory, pages 44--74 , 1996 . M. O. Jackson and A. Wolinsky. A strategic model of social and economic networks. Journal of Economic Theory, pages 44--74, 1996.","journal-title":"Journal of Economic Theory, pages 44--74"},{"key":"e_1_3_2_1_17_1","volume-title":"Behavioral game theory on online social networks: Colonel blotto is on facebook","author":"Kohli P.","year":"2011","unstructured":"P. Kohli , Y. Bachrach , T. Graepel , G. Smyth , M. Armstrong , D. Stillwell , and M. Kearns . Behavioral game theory on online social networks: Colonel blotto is on facebook . 2011 . P. Kohli, Y. Bachrach, T. Graepel, G. Smyth, M. Armstrong, D. Stillwell, and M. Kearns. Behavioral game theory on online social networks: Colonel blotto is on facebook. 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380738"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124317"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2580049"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2102345"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1920\/wp.cem.2010.3210"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2034117.2034146"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.16"},{"key":"e_1_3_2_1_26_1","volume-title":"Identification of preferences in network formation games","author":"Paula A. D.","year":"2015","unstructured":"A. D. Paula , S. Richards-Shubik , and E. Tamer . Identification of preferences in network formation games . 2015 . A. D. Paula, S. Richards-Shubik, and E. Tamer. Identification of preferences in network formation games. 2015."},{"key":"e_1_3_2_1_27_1","first-page":"452","volume-title":"UAI","author":"Rendle S.","year":"2009","unstructured":"S. Rendle , C. Freuden-thaler, Z. Gantner , and L. Schmidt-Thieme . Bpr:bayesian personalized ranking from implicit feedback . In UAI , pages 452 -- 461 , 2009 . S. Rendle, C. Freuden-thaler, Z. Gantner, and L. Schmidt-Thieme. Bpr:bayesian personalized ranking from implicit feedback. In UAI, pages 452--461, 2009."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772773"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556195.2556248"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718498"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.97.16.9340"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433405"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124309"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339574"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202228"},{"key":"e_1_3_2_1_36_1","volume-title":"WWW","author":"Yao Y.","year":"2013","unstructured":"Y. Yao , H. Tong , X. Yan , F. Xu , and J. Lu . Matri a multi-aspect and transitive trust inference model . In WWW , 2013 . Y. Yao, H. Tong, X. Yan, F. Xu, and J. Lu. Matri a multi-aspect and transitive trust inference model. In WWW, 2013."},{"key":"e_1_3_2_1_37_1","volume-title":"Workshop in AAAI","author":"Zappella G.","year":"2013","unstructured":"G. Zappella , A. Karatzoglou , and L. Baltrunas . Games of friends: A game-theoretical approach for link prediction in online social networks . Workshop in AAAI , 2013 . G. Zappella, A. Karatzoglou, and L. Baltrunas. Games of friends: A game-theoretical approach for link prediction in online social networks. Workshop in AAAI, 2013."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661998"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.11.003"}],"event":{"name":"CIKM'15: 24th ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Melbourne Australia","acronym":"CIKM'15"},"container-title":["Proceedings of the 24th ACM International on Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2806416.2806510","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2806416.2806510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:11Z","timestamp":1750225391000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2806416.2806510"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,17]]},"references-count":39,"alternative-id":["10.1145\/2806416.2806510","10.1145\/2806416"],"URL":"https:\/\/doi.org\/10.1145\/2806416.2806510","relation":{},"subject":[],"published":{"date-parts":[[2015,10,17]]},"assertion":[{"value":"2015-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}