{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:07:44Z","timestamp":1752984464350,"version":"3.41.0"},"reference-count":83,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2019,12,11]],"date-time":"2019-12-11T00:00:00Z","timestamp":1576022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61971267, 61972223, 61861136003, 61621091, 61673237"],"award-info":[{"award-number":["61971267, 61972223, 61861136003, 61621091, 61673237"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the research fund of Tsinghua University-Tencent Joint Laboratory for Internet Innovation Technology"},{"DOI":"10.13039\/501100017582","name":"Beijing National Research Center for Information Science and Technology","doi-asserted-by":"crossref","award":["20031887521"],"award-info":[{"award-number":["20031887521"]}],"id":[{"id":"10.13039\/501100017582","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Beijing Natural Science Foundation","award":["L182038"],"award-info":[{"award-number":["L182038"]}]},{"name":"the MOE-CMCC Joint Research Fund of China","award":["MCM20160101"],"award-info":[{"award-number":["MCM20160101"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2019,12,11]]},"abstract":"<jats:p>With the rapid development of Internet services and mobile devices, nowadays, users can connect to online services anytime and anywhere. Naturally, user's online activity behavior is coupled with time and location contexts and highly influenced by them. Therefore, personalized context-aware online activity modelling and prediction is very meaningful and necessary but also very challenging, due to the complicated relationship between users, activities, spatial and temporal contexts and data sparsity issues. To tackle the challenges, we introduce offline check-in data as auxiliary data and build a user-location-time-activity 4D-tensor and a location-time-POI 3D-tensor, aiming to model the relationship between different entities and transfer semantic features of time and location contexts among them. Accordingly, in this paper we propose a transfer learning based collaborative tensor factorization method to achieve personalized context-aware online activity prediction. Based on real-world datasets, we compare the performance of our method with several state-of-the-arts and demonstrate that our method can provide more effective prediction results in the high sparsity scenario. With only 30% of observed time and location contexts, our solution can achieve 40% improvement in predicting user's Top5 activity behavior in new time and location scenarios. Our study is the first step forward for transferring knowledge learned from offline check-in behavior to online activity prediction to provide better personalized context-aware recommendation services for mobile users.<\/jats:p>","DOI":"10.1145\/3369829","type":"journal-article","created":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T13:16:03Z","timestamp":1576156563000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Personalized Context-aware Collaborative Online Activity Prediction"],"prefix":"10.1145","volume":"3","author":[{"given":"Yali","family":"Fan","sequence":"first","affiliation":[{"name":"School of Electronics and Information Technology, Sun Yat-Sen University, China"}]},{"given":"Zhen","family":"Tu","sequence":"additional","affiliation":[{"name":"Tencent Inc. China"}]},{"given":"Yong","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Tsinghua University, China"}]},{"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Technology, Sun Yat-Sen University, China"}]},{"given":"Hui","family":"Gao","sequence":"additional","affiliation":[{"name":"Tencent Inc. China"}]},{"given":"Lin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Technology, Sun Yat-Sen University, China"}]},{"given":"Li","family":"Su","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Tsinghua University, China"}]},{"given":"Depeng","family":"Jin","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Tsinghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/116873.116880"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45068-6_38"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741077"},{"key":"e_1_2_1_4_1","first-page":"26","article-title":"Content-based tag propagation and tensor factorization for personalized item recommendation based on social tagging","volume":"3","author":"Blaze Jennifer","year":"2014","journal-title":"Acm Transactions on Interactive Intelligent Systems"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2449396.2449431"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Andrzej Cichocki Rafal Zdunek Anh Huy Phan and Shun Ichi Amari. 2009. Non negative Matrix and Tensor Factorizations: Applications to Exploratory Multi-Way Data Analysis and Blind Source Separation.  Andrzej Cichocki Rafal Zdunek Anh Huy Phan and Shun Ichi Amari. 2009. Non negative Matrix and Tensor Factorizations: Applications to Exploratory Multi-Way Data Analysis and Blind Source Separation.","DOI":"10.1002\/9780470747278"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Enrique Costa-Montenegro Ana Bel\u00e9n Barrag\u00e1ns-Mart\u00ednez and Marta Rey-L\u00f3pez. 2012. Which App? A recommender system of applications in markets: Implementation of the service for monitoring users\u00e2\u0102&Zacute; interaction. Expert systems with applications 39 10 (2012) 9367--9375.  Enrique Costa-Montenegro Ana Bel\u00e9n Barrag\u00e1ns-Mart\u00ednez and Marta Rey-L\u00f3pez. 2012. Which App? A recommender system of applications in markets: Implementation of the service for monitoring users\u00e2\u0102&Zacute; interaction. Expert systems with applications 39 10 (2012) 9367--9375.","DOI":"10.1016\/j.eswa.2012.02.131"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109899"},{"volume-title":"Proc. ACM ICMI. 353--360","year":"2011","author":"Tri Do Trinh Minh","key":"e_1_2_1_9_1"},{"volume-title":"Sesame: Self-Constructive System Energy Modeling for Battery-Powered Mobile Systems.","year":"2011","author":"Dong Mian","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109883"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009925"},{"key":"e_1_2_1_14_1","unstructured":"Elena Viorica Epure Benjamin Kille Jon Espen Ingvaldsen Rebecca Deneckere Camille Salinesi and Sahin Albayrak. 2017. Recommending Personalized News in Short User Sessions. (2017).  Elena Viorica Epure Benjamin Kille Jon Espen Ingvaldsen Rebecca Deneckere Camille Salinesi and Sahin Albayrak. 2017. Recommending Personalized News in Short User Sessions. (2017)."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814453"},{"volume-title":"IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence.","year":"2013","author":"Fei Wang","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851600.1851698"},{"key":"e_1_2_1_18_1","first-page":"1","article-title":"Social networking sites and our lives","volume":"16","author":"Hampton Keith","year":"2011","journal-title":"Pew Internet & American Life Project"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2017.04.004"},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Ma Hao Haixuan Yang Michael R. Lyu and Irwin King. 2008. SoRec: Social recommendation using probabilistic matrix factorization.  Ma Hao Haixuan Yang Michael R. Lyu and Irwin King. 2008. SoRec: Social recommendation using probabilistic matrix factorization.","DOI":"10.1145\/1458082.1458205"},{"key":"e_1_2_1_21_1","unstructured":"R. A Harshman. 1970. Foundations of the PARAFAC procedure: Models and conditions for an \"explanatory\" multi-model factor analysis. Ucla Working Papers in Phonetics 16 (1970).  R. A Harshman. 1970. Foundations of the PARAFAC procedure: Models and conditions for an \"explanatory\" multi-model factor analysis. Ucla Working Papers in Phonetics 16 (1970)."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.01.007"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.019"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307658"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398683"},{"key":"e_1_2_1_26_1","unstructured":"C. G. Khatri and C. Radhakrishna Rao. 1968. Solutions to Some Functional Equations and Their Applications to Characterization of Probability Distributions. Sankhy\u00c4\u0104: The Indian Journal of Statistics Series A (1961-2002) 30 2 (1968) 167--180.  C. G. Khatri and C. Radhakrishna Rao. 1968. Solutions to Some Functional Equations and Their Applications to Characterization of Probability Distributions. Sankhy\u00c4\u0104: The Indian Journal of Statistics Series A (1961-2002) 30 2 (1968) 167--180."},{"volume-title":"International Conference.","year":"2010","author":"Lee Kyunghan","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.08.034"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484028.2484035"},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Kuan-Yu Lin and Hsi-Peng Lu. 2011. Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in human behavior 27 3 (2011) 1152--1161.  Kuan-Yu Lin and Hsi-Peng Lu. 2011. Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in human behavior 27 3 (2011) 1152--1161.","DOI":"10.1016\/j.chb.2010.12.009"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685322"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.01.005"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622013500077"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms15227"},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Hao Ma Dengyong Zhou Chao Liu Michael R. Lyu and Irwin King. 2011. Recommender systems with social regularization. (2011).  Hao Ma Dengyong Zhou Chao Liu Michael R. Lyu and Irwin King. 2011. Recommender systems with social regularization. (2011).","DOI":"10.1145\/1935826.1935877"},{"key":"e_1_2_1_36_1","unstructured":"Eric Malmi and Ingmar Weber. 2016. You Are What Apps You Use: Demographic Prediction Based on User's Apps. (2016).  Eric Malmi and Ingmar Weber. 2016. You Are What Apps You Use: Demographic Prediction Based on User's Apps. (2016)."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840694"},{"volume-title":"Asian conference on computer vision. Springer, 709--720","year":"2010","author":"Nguyen Hieu V","key":"e_1_2_1_38_1"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2010.60"},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Weike Pan and Qiang Yang. 2013. Transfer learning in heterogeneous collaborative filtering domains. Artificial intelligence 197 (2013) 39--55.  Weike Pan and Qiang Yang. 2013. Transfer learning in heterogeneous collaborative filtering domains. Artificial intelligence 197 (2013) 39--55.","DOI":"10.1016\/j.artint.2013.01.003"},{"volume-title":"Thirtieth Aaai Conference on Artificial Intelligence.","year":"2016","author":"Qiang Liu","key":"e_1_2_1_41_1"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2012.2208186"},{"key":"e_1_2_1_43_1","unstructured":"A. Ravve. 1982. Principles of Polymer Chemistry.  A. Ravve. 1982. Principles of Polymer Chemistry."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2010002"},{"volume-title":"Acm International Joint Conference on Pervasive Ubiquitous Computing.","year":"2014","author":"Rong Du","key":"e_1_2_1_45_1"},{"key":"e_1_2_1_46_1","unstructured":"Elaine Shi Niu Yuan Markus Jakobsson and Richard Chow. 2011. Implicit Authentication through Learning User Behavior.  Elaine Shi Niu Yuan Markus Jakobsson and Richard Chow. 2011. Implicit Authentication through Learning User Behavior."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348308"},{"volume-title":"Proc. ACM Ubicomp.","author":"Shin Choonsung","key":"e_1_2_1_48_1"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052714"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2733338"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063212.2063228"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"volume-title":"Joint European Conference on Machine Learning Knowledge Discovery in Databases.","year":"2012","author":"Tikk Domonkos","key":"e_1_2_1_53_1"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314413"},{"key":"e_1_2_1_55_1","first-page":"138","article-title":"Your apps give you away: distinguishing mobile users by their app usage fingerprints","volume":"2","author":"Tu Zhen","year":"2018","journal-title":"Proc. ACM UbiComp"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289464"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971707"},{"key":"e_1_2_1_58_1","unstructured":"Wikipedia. 2017. Jaccard index. https:\/\/en.wikipedia.org\/wiki\/Jaccard_index.  Wikipedia. 2017. Jaccard index. https:\/\/en.wikipedia.org\/wiki\/Jaccard_index."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2007.4401078"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314417"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132911"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971673"},{"key":"e_1_2_1_63_1","first-page":"1","article-title":"Leveraging app usage contexts for app recommendation: a neural approach","volume":"8","author":"Xu Yanan","year":"2018","journal-title":"World Wide Web"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000007"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307648"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109923"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767794"},{"key":"e_1_2_1_68_1","unstructured":"Ting Fang Yen Yinglian Xie Fang Yu Roger Peng Yu and Martin Abadi. 2012. Host Fingerprinting and Tracking on the Web:Privacy and Security Implications. 11 1 (2012) 111--124.  Ting Fang Yen Yinglian Xie Fang Yu Roger Peng Yu and Martin Abadi. 2012. Host Fingerprinting and Tracking on the Web:Privacy and Security Implications. 11 1 (2012) 111--124."},{"volume-title":"Mobi-SAGE: A Sparse Additive Generative Model for Mobile App Recommendation. In IEEE International Conference on Data Engineering.","year":"2017","author":"Yin Hongzhi","key":"e_1_2_1_69_1"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433446"},{"key":"e_1_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Yuankai Ying Chen Ling and Gencai Chen. 2017. A temporal-aware POI recommendation system using context-aware tensor decomposition and weighted HITS.  Yuankai Ying Chen Ling and Gencai Chen. 2017. A temporal-aware POI recommendation system using context-aware tensor decomposition and weighted HITS.","DOI":"10.1016\/j.neucom.2017.02.067"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161413"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30217-6_36"},{"key":"e_1_2_1_74_1","doi-asserted-by":"crossref","unstructured":"Duoduo Zhang Yang Ning and Yuchi Ma. 2016. Explicable Location Prediction Based on Preference Tensor Model.  Duoduo Zhang Yang Ning and Yuchi Ma. 2016. Explicable Location Prediction Based on Preference Tensor Model.","DOI":"10.1007\/978-3-319-39937-9_16"},{"key":"e_1_2_1_75_1","doi-asserted-by":"crossref","unstructured":"Shuo Zhang Khaled Alanezi Mike Gartrell Richard Han Lv Qin Shivakaht Mishra Shuo Zhang Khaled Alanezi Mike Gartrell and Richard Han. 2017. Understanding Group Event Scheduling via the OutWithFriendz Mobile Application. (2017).  Shuo Zhang Khaled Alanezi Mike Gartrell Richard Han Lv Qin Shivakaht Mishra Shuo Zhang Khaled Alanezi Mike Gartrell and Richard Han. 2017. Understanding Group Event Scheduling via the OutWithFriendz Mobile Application. (2017).","DOI":"10.1145\/3161200"},{"key":"e_1_2_1_76_1","first-page":"S09507051173057","article-title":"Hybrid EGU-based Group Event Participation Prediction in Event-based Social Networks","volume":"143","author":"Zhang Shuo","year":"2017","journal-title":"Knowledge-Based Systems"},{"key":"e_1_2_1_77_1","unstructured":"Sha Zhao Zhiling Luo Ziwen Jiang Haiyan Wang Feng Xu Shijian Li Jianwei Yin and Gang Pan. 2012. AppUsage2Vec: Modeling Smartphone App Usage for Prediction. (2012).  Sha Zhao Zhiling Luo Ziwen Jiang Haiyan Wang Feng Xu Shijian Li Jianwei Yin and Gang Pan. 2012. AppUsage2Vec: Modeling Smartphone App Usage for Prediction. (2012)."},{"volume-title":"Proc. ACM UbiComp. 498--509","author":"Zhao Sha","key":"e_1_2_1_78_1"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2948649.2948656"},{"volume-title":"Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2010","year":"2010","author":"Zheng Vincent Wenchen","key":"e_1_2_1_80_1"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2532515"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.31"},{"key":"e_1_2_1_83_1","unstructured":"Hengshu Zhu Xiong Hui Ge Yong and Enhong Chen. 2014. Mobile app recommendations with security and privacy awareness. (2014).  Hengshu Zhu Xiong Hui Ge Yong and Enhong Chen. 2014. Mobile app recommendations with security and privacy awareness. (2014)."}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3369829","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3369829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:27Z","timestamp":1750203867000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3369829"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,11]]},"references-count":83,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12,11]]}},"alternative-id":["10.1145\/3369829"],"URL":"https:\/\/doi.org\/10.1145\/3369829","relation":{},"ISSN":["2474-9567"],"issn-type":[{"type":"electronic","value":"2474-9567"}],"subject":[],"published":{"date-parts":[[2019,12,11]]},"assertion":[{"value":"2020-09-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}