{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:42:54Z","timestamp":1763458974982,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,2]],"date-time":"2018-02-02T00:00:00Z","timestamp":1517529600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ONR","award":["N00014-13-1-0764"],"award-info":[{"award-number":["N00014-13-1-0764"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["Bigdata-1419210","III-1360971"],"award-info":[{"award-number":["Bigdata-1419210","III-1360971"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"AFOSR","award":["FA9550-13-1-0137"],"award-info":[{"award-number":["FA9550-13-1-0137"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,2]]},"DOI":"10.1145\/3018661.3018681","type":"proceedings-article","created":{"date-parts":[[2017,2,2]],"date-time":"2017-02-02T15:09:48Z","timestamp":1486048188000},"page":"475-484","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Online Matrix Completion for Signed Link Prediction"],"prefix":"10.1145","author":[{"given":"Jing","family":"Wang","sequence":"first","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Jie","family":"Shen","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Ping","family":"Li","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Huan","family":"Xu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,2,2]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"46","volume-title":"Proceedings of the 15th International Conference on Machine Learning","author":"Billsus D.","year":"1998","unstructured":"D. Billsus and M. J. Pazzani. Learning collaborative information filters. In Proceedings of the 15th International Conference on Machine Learning, pages 46--54, 1998."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-004-0564-1"},{"key":"e_1_3_2_1_3_1","first-page":"595","volume-title":"NIPS","author":"Busa-Fekete R.","year":"2015","unstructured":"R. Busa-Fekete, B. Sz\u00f6r\u00e9nyi, K. Dembczynski, and E. H\u00fcllermeier. Online f-measure optimization. In NIPS, pages 595--603, 2015."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/080738970"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567709.2627673"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-009-9045-5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063742"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1892099"},{"key":"e_1_3_2_1_9_1","unstructured":"M. Grant and S. Boyd. CVX: Matlab software for disciplined convex programming version 2.1. http:\/\/cvxr.com\/cvx Mar. 2014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0407-0"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339612"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v27i1.8675"},{"key":"e_1_3_2_1_14_1","first-page":"2647","volume-title":"Proceedings of the 23rd International Joint Conference on Artificial Intelligence","author":"Huang J.","year":"2013","unstructured":"J. Huang, F. Nie, H. Huang, Y. Lei, and C. Ding. Social trust prediction using rank-k matrix recovery. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence, pages 2647--2653, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398515"},{"key":"e_1_3_2_1_16_1","first-page":"937","volume-title":"NIPS","author":"Jain P.","year":"2010","unstructured":"P. Jain, R. Meka, and I. S. Dhillon. Guaranteed rank minimization via singular value projection. In NIPS, pages 937--945, 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775126"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3015812.3015839"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972795.94"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289026"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2046205"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_1_23_1","first-page":"1297","volume-title":"NIPS","author":"Lee J. D.","year":"2010","unstructured":"J. D. Lee, B. Recht, N. Srebro, J. Tropp, and R. R. Salakhutdinov. Practical large-scale optimization for max-norm regularization. In NIPS, pages 1297--1305, 2010."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150436"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20591"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956972"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00493-007-2160-5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935877"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.025102"},{"key":"e_1_3_2_1_31_1","first-page":"426","volume-title":"AISTATS","author":"Ni R.","year":"2016","unstructured":"R. Ni and Q. Gu. Optimal statistical and computational rates for one bit matrix completion. In AISTATS, pages 426--434, 2016."},{"key":"e_1_3_2_1_32_1","first-page":"2098","volume-title":"NIPS","author":"Rao N.","year":"2015","unstructured":"N. Rao, H.-F. Yu, P. K. Ravikumar, and I. S. Dhillon. Collaborative filtering with graph information: Consistency and scalable methods. In NIPS, pages 2098--2106, 2015."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1137\/070697835"},{"key":"e_1_3_2_1_34_1","first-page":"1718","volume-title":"NIPS","author":"Shen J.","year":"2014","unstructured":"J. Shen, H. Xu, and P. Li. Online optimization for max-norm regularization. In NIPS, pages 1718--1726, 2014."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741285"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33460-3_36"},{"key":"e_1_3_2_1_37_1","first-page":"1329","volume-title":"NIPS","author":"Srebro N.","year":"2004","unstructured":"N. Srebro, J. D. Rennie, and T. Jaakkola. Maximum-margin matrix factorization. In NIPS, pages 1329--1336, 2004."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/11503415_37"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685295"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433405"},{"key":"e_1_3_2_1_41_1","volume-title":"Privacy, & Trust, 10(1):1--129","author":"Tang J.","year":"2015","unstructured":"J. Tang and H. Liu. Trust in social media. Synthesis Lectures on Information Security, Privacy, & Trust, 10(1):1--129, 2015."}],"event":{"name":"WSDM 2017: Tenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Cambridge United Kingdom","acronym":"WSDM 2017"},"container-title":["Proceedings of the Tenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018661.3018681","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018661.3018681","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018661.3018681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:38:12Z","timestamp":1763458692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018661.3018681"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,2]]},"references-count":41,"alternative-id":["10.1145\/3018661.3018681","10.1145\/3018661"],"URL":"https:\/\/doi.org\/10.1145\/3018661.3018681","relation":{},"subject":[],"published":{"date-parts":[[2017,2,2]]},"assertion":[{"value":"2017-02-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}