{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:14:10Z","timestamp":1753888450292,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Program on Key Basic Research Project","award":["2015CB352300"],"award-info":[{"award-number":["2015CB352300"]}]},{"name":"National Natural Science Foundation of China Major Project","award":["U1611461"],"award-info":[{"award-number":["U1611461"]}]},{"name":"China Postdoctoral Science Foundation","award":["BX201700136"],"award-info":[{"award-number":["BX201700136"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330939","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"1518-1527","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Social Recommendation with Optimal Limited Attention"],"prefix":"10.1145","author":[{"given":"Xin","family":"Wang","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Wenwu","family":"Zhu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Chenghao","family":"Liu","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.99"},{"key":"e_1_3_2_1_2_1","unstructured":"Oren Anava and Kfir Levy. 2016. k*-Nearest Neighbors: From Global to Local. In Advances in Neural Information Processing Systems. 4916--4924.   Oren Anava and Kfir Levy. 2016. k*-Nearest Neighbors: From Global to Local. In Advances in Neural Information Processing Systems. 4916--4924."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271742"},{"key":"e_1_3_2_1_4_1","first-page":"97","article-title":"Taking It All In","volume":"11","author":"Counts Scott","year":"2011","journal-title":"Visual Attention in Microblog Consumption. ICWSM"},{"volume-title":"Individual Interest and Trust Driving Collective Intelligence Awareness for Social Recommendation","author":"Cui Lin","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518736"},{"volume-title":"Validation of Dunbar's number in Twitter conversations. arXiv:1105.5170","year":"2011","author":"Goncalves Bruno","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.03.004"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.129"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557067"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864736"},{"volume-title":"Attention and effort","author":"Kahneman Daniel","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Jeon-Hyung Kang and Kristina Lerman. 2013. LA-CTR: A Limited Attention Collaborative Topic Regression for Social Media.. In AAAI .   Jeon-Hyung Kang and Kristina Lerman. 2013. LA-CTR: A Limited Attention Collaborative Topic Regression for Social Media.. In AAAI ."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37210-0_23"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401944"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1571978"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458205"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935877"},{"key":"e_1_3_2_1_21_1","first-page":"127","article-title":"Network studies of social influence. Sociological Methods 'I&","volume":"22","author":"Marsden Peter V","year":"1994","journal-title":"Research"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"e_1_3_2_1_23_1","unstructured":"Andriy Mnih and Ruslan Salakhutdinov. 2007. Probabilistic matrix factorization. In NIPS. 1257--1264.   Andriy Mnih and Ruslan Salakhutdinov. 2007. Probabilistic matrix factorization. In NIPS. 1257--1264."},{"key":"e_1_3_2_1_24_1","unstructured":"Sanjay Purushotham Yan Liu and C-C Jay Kuo. 2012. Collaborative Topic Regression with Social Matrix Factorization for Recommendation Systems. (2012).  Sanjay Purushotham Yan Liu and C-C Jay Kuo. 2012. Collaborative Topic Regression with Social Matrix Factorization for Recommendation Systems. (2012)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.168"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102441"},{"volume-title":"To see or not to see: The need for attention to perceive changes in scenes. Psychological science","year":"1997","author":"Rensink Ronald A","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Francesco Ricci Lior Rokach Bracha Shapira and Paul B. Kantor (Eds.). 2011. Recommender Systems Handbook .Springer.   Francesco Ricci Lior Rokach Bracha Shapira and Paul B. Kantor (Eds.). 2011. Recommender Systems Handbook .Springer.","DOI":"10.1007\/978-0-387-85820-3"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390267"},{"key":"e_1_3_2_1_30_1","unstructured":"Nathan Srebro and Tommi Jaakkola. 2003. Weighted low-rank approximations. In ICML-03. 720--727.   Nathan Srebro and Tommi Jaakkola. 2003. Weighted low-rank approximations. In ICML-03. 720--727."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/421425"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433405"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Xin Wang Roger Donaldson Christopher Nell Peter Gorniak Martin Ester and Jiajun Bu. 2016a. Recommending groups to users using user-group engagement and time-dependent matrix factorization. In AAAI .   Xin Wang Roger Donaldson Christopher Nell Peter Gorniak Martin Ester and Jiajun Bu. 2016a. Recommending groups to users using user-group engagement and time-dependent matrix factorization. In AAAI .","DOI":"10.1609\/aaai.v30i1.10160"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052556"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983701"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186063"},{"volume-title":"Competition among memes in a world with limited attention. Scientific reports","year":"2012","author":"Weng Lillian","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837885.1837894"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2872842"},{"volume-title":"Social collaborative filtering by trust","author":"Yang Bo","key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","DOI":"10.1109\/TPAMI.2016.2605085"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963481"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348373"},{"volume-title":"Social Bayesian Personal Ranking for Missing Data in Implicit Feedback Recommendation","author":"Zhang Yijia","key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-99365-2_27"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661998"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2569096"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Anchorage AK USA","acronym":"KDD '19"},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330939","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:04Z","timestamp":1750206364000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":45,"alternative-id":["10.1145\/3292500.3330939","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330939","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}