{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:52:17Z","timestamp":1760709137109,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,7]],"date-time":"2016-09-07T00:00:00Z","timestamp":1473206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Maryland Procurement Office","award":["H98230-14-C-0137"],"award-info":[{"award-number":["H98230-14-C-0137"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,7]]},"DOI":"10.1145\/2959100.2959148","type":"proceedings-article","created":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T18:25:14Z","timestamp":1472754314000},"page":"301-308","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["STAR"],"prefix":"10.1145","author":[{"given":"Peixin","family":"Gao","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Hui","family":"Miao","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"John S.","family":"Baras","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Jennifer","family":"Golbeck","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,9,7]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Epinions trust network dataset -- KONECT Oct. 2014.  Epinions trust network dataset -- KONECT Oct. 2014."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29659-3"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367525"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1067036"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","DOI":"10.1007\/b95712","volume-title":"Semirings for soft constraint solving and programming","author":"Bistarelli S.","year":"2004","unstructured":"S. Bistarelli . Semirings for soft constraint solving and programming , volume 2962 . Springer Science & Business Media , 2004 . S. Bistarelli. Semirings for soft constraint solving and programming, volume 2962. Springer Science & Business Media, 2004."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","DOI":"10.1002\/9780470519851","volume-title":"Trust theory: A socio-cognitive and computational model","author":"Castelfranchi C.","year":"2010","unstructured":"C. Castelfranchi and R. Falcone . Trust theory: A socio-cognitive and computational model , volume 18 . John Wiley & Sons , 2010 . C. Castelfranchi and R. Falcone. Trust theory: A socio-cognitive and computational model, volume 18. John Wiley & Sons, 2010."},{"key":"e_1_3_2_2_7_1","volume-title":"Privacy, Security","author":"DuBois T.","year":"2011","unstructured":"T. DuBois , J. Golbeck , and A. Srinivasan . Predicting trust and distrust in social networks . In Privacy, Security , Risk and Trust (PASSAT) and IEEE SocialCom , 2011 . T. DuBois, J. Golbeck, and A. Srinivasan. Predicting trust and distrust in social networks. In Privacy, Security, Risk and Trust (PASSAT) and IEEE SocialCom, 2011."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800198"},{"key":"e_1_3_2_2_9_1","volume-title":"Semiring-based trust evaluation for information fusion in social network services","author":"Gao P.","year":"2015","unstructured":"P. Gao , J. S. Baras , and J. Golbeck . Semiring-based trust evaluation for information fusion in social network services . In IEEE Fusion , 2015 . P. Gao, J. S. Baras, and J. Golbeck. Semiring-based trust evaluation for information fusion in social network services. In IEEE Fusion, 2015."},{"key":"e_1_3_2_2_11_1","volume-title":"Semantic Network Analysis Workshop at ISWC","author":"Golbeck J.","year":"2005","unstructured":"J. Golbeck . Personalizing applications through integration of inferred trust values in semantic web-based social networks . In Semantic Network Analysis Workshop at ISWC , 2005 . J. Golbeck. Personalizing applications through integration of inferred trust values in semantic web-based social networks. In Semantic Network Analysis Workshop at ISWC, 2005."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA447900"},{"key":"e_1_3_2_2_13_1","volume-title":"Computing with social trust","author":"Golbeck J.","year":"2008","unstructured":"J. Golbeck . Computing with social trust . Springer , 2008 . J. Golbeck. Computing with social trust. Springer, 2008."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.5"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557067"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864736"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11755593_14"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"e_1_3_2_2_21_1","first-page":"399","author":"London B.","year":"2014","unstructured":"B. London and L. Getoor . Collective classification of network data. Data Classification: Algorithms and Applications , 399 , 2014 . B. London and L. Getoor. Collective classification of network data. Data Classification: Algorithms and Applications, 399, 2014.","journal-title":"Collective classification of network data. Data Classification: Algorithms and Applications"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1571978"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639746"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458205"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297235"},{"key":"e_1_3_2_2_26_1","first-page":"13","volume-title":"Proc. AAAI Workshop on Learning Statistical Models from Relational Data","author":"Neville J.","year":"2000","unstructured":"J. Neville and D. Jensen . Iterative classification in relational data . In Proc. AAAI Workshop on Learning Statistical Models from Relational Data , pages 13 -- 20 , 2000 . J. Neville and D. Jensen. Iterative classification in relational data. In Proc. AAAI Workshop on Learning Statistical Models from Relational Data, pages 13--20, 2000."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39718-2_23"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-013-0141-9"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023648"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","DOI":"10.2991\/978-94-91216-08-4","volume-title":"Trust networks for recommender systems","author":"Victor P.","year":"2011","unstructured":"P. Victor , C. Cornelis , and M. De Cock . Trust networks for recommender systems , volume 4 . Springer , 2011 . P. Victor, C. Cornelis, and M. De Cock. Trust networks for recommender systems, volume 4. Springer, 2011."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-005-4807-3"}],"event":{"name":"RecSys '16: Tenth ACM Conference on Recommender Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval","SIGecom Special Interest Group on Economics and Computation"],"location":"Boston Massachusetts USA","acronym":"RecSys '16"},"container-title":["Proceedings of the 10th ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2959100.2959148","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2959100.2959148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:31Z","timestamp":1750220611000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2959100.2959148"}},"subtitle":["Semiring Trust Inference for Trust-Aware Social Recommenders"],"short-title":[],"issued":{"date-parts":[[2016,9,7]]},"references-count":30,"alternative-id":["10.1145\/2959100.2959148","10.1145\/2959100"],"URL":"https:\/\/doi.org\/10.1145\/2959100.2959148","relation":{},"subject":[],"published":{"date-parts":[[2016,9,7]]},"assertion":[{"value":"2016-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}