{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T13:41:43Z","timestamp":1774705303534,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,7]],"date-time":"2017-09-07T00:00:00Z","timestamp":1504742400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["69595-CS-II"],"award-info":[{"award-number":["69595-CS-II"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Center for Selective C-H Functionalization, National Science Foundation","award":["CNS-1566465"],"award-info":[{"award-number":["CNS-1566465"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,7]]},"DOI":"10.1145\/2959100.2959147","type":"proceedings-article","created":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T14:25:14Z","timestamp":1472739914000},"page":"167-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Mood-Sensitive Truth Discovery For Reliable Recommendation Systems in Social Sensing"],"prefix":"10.1145","author":[{"given":"Jermaine","family":"Marshall","sequence":"first","affiliation":[{"name":"University of Notre Dame, Notre Dame, IN, USA"}]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,9,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6309-2_9"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2815540"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185677.2185737"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2602339.2602344"},{"key":"e_1_3_2_2_5_1","first-page":"172","volume-title":"15th International Symposium","author":"Liu C.","year":"2012","unstructured":"C.Lin; T.Lin; W.Liu. A trust and distrust mechanism for a social network-based recommendation system. In Wireless Personal Multimedia Communications (WPMC), 15th International Symposium, pages 172--176, 2012."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2500276"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963439"},{"key":"e_1_3_2_2_8_1","volume-title":"Tenth International AAAI Conference on Web and Social Media","author":"Wang Dong","year":"2016","unstructured":"Dong Wang, Jermaine Marshall, and Chao Huang. Theme-relevant truth discovery on twitter: An estimation theoretic approach. In Tenth International AAAI Conference on Web and Social Media, 2016."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737095.2737116"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2031331.2031341"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190745"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2014.19"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2959355.2959362"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2015.39"},{"key":"e_1_3_2_2_16_1","first-page":"336","volume-title":"2015 12th Annual IEEE International Conference on","author":"Wang Dong","year":"2015","unstructured":"Dong Wang and Chao Huang. Confidence-aware truth estimation in social sensing applications. In Sensing, Communication, and Networking (SECON), 2015 12th Annual IEEE International Conference on, pages 336--344. IEEE, 2015."},{"issue":"4","key":"e_1_3_2_2_17_1","first-page":"624","article-title":"Provenance-assisted classification in social networks. Selected Topics in Signal Processing","volume":"8","author":"Wang Dong","year":"2014","unstructured":"Dong Wang, Md Tanvir Al Amin, Tarek Abdelzaher, Dan Roth, Clare R Voss, Lance M Kaplan, Stephen Tratz, Jamal Laoudi, and Douglas Briesch. Provenance-assisted classification in social networks. Selected Topics in Signal Processing, IEEE Journal of, 8(4):624--637, 2014.","journal-title":"IEEE Journal of"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2007.16"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6451.2010.00405.x"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1530-9134.2006.00103.x"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1830476"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868521.1868526"},{"key":"e_1_3_2_2_23_1","first-page":"1","volume-title":"Information Fusion (FUSION), 2014 17th International Conference on","author":"Kaplan Lance","year":"2014","unstructured":"Lance Kaplan, Murat Scensoy, and Geeth de Mel. Trust estimation and fusion of uncertain information by exploiting consistency. In Information Fusion (FUSION), 2014 17th International Conference on, pages 1--8. IEEE, 2014."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.12.002"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.54"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1941904"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020480"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01818-3_12"},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of the ACM SIGIR: SWSM","author":"Rosa Kevin Dela","year":"2011","unstructured":"Kevin Dela Rosa, Rushin Shah, Bo Lin, Anatole Gershman, and Robert Frederking. Topical clustering of tweets. Proceedings of the ACM SIGIR: SWSM, 2011."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2012-0095"}],"event":{"name":"RecSys '16: Tenth ACM Conference on Recommender Systems","location":"Boston Massachusetts USA","acronym":"RecSys '16","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval","SIGecom Special Interest Group on Economics and Computation"]},"container-title":["Proceedings of the 10th ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2959100.2959147","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2959100.2959147","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2959100.2959147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:43:55Z","timestamp":1763459035000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2959100.2959147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,7]]},"references-count":30,"alternative-id":["10.1145\/2959100.2959147","10.1145\/2959100"],"URL":"https:\/\/doi.org\/10.1145\/2959100.2959147","relation":{},"subject":[],"published":{"date-parts":[[2016,9,7]]},"assertion":[{"value":"2016-09-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}