{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T04:03:55Z","timestamp":1748837035630,"version":"3.41.0"},"reference-count":35,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2016]]},"DOI":"10.1587\/transinf.2015edp7199","type":"journal-article","created":{"date-parts":[[2016,1,31]],"date-time":"2016-01-31T22:13:16Z","timestamp":1454278396000},"page":"397-405","source":"Crossref","is-referenced-by-count":3,"title":["Using Trust of Social Ties for Recommendation"],"prefix":"10.1587","volume":"E99.D","author":[{"given":"Liang","family":"CHEN","sequence":"first","affiliation":[{"name":"College of Computer, National University of Defense Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chengcheng","family":"SHAO","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peidong","family":"ZHU","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haoyang","family":"ZHU","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] M.J. Eppler and J. Mengis, \u201cThe concept of information overload: A review of literature from organization science, accounting, marketing, MIS, and related disciplines,\u201d The Information Society, vol.20, no.5, pp.325-344, 2004.","DOI":"10.1080\/01972240490507974"},{"key":"2","unstructured":"[2] J.D. Lasica, \u201cBlogs and journalism need each other,\u201d Nieman Reports, vol.57, no.3, pp.70-74, 2003."},{"key":"3","unstructured":"[3] Wikipedia entry on information, available at &lt;http:\/\/en.wikipedia.org\/wiki\/Information&gt;"},{"key":"4","unstructured":"[4] J. Tang, X. Hu, and H. Liu, \u201cSocial recommendation: a review,\u201d Social Network Analysis and Mining, vol.3, no.4, pp.1113-1133, 2013."},{"key":"5","unstructured":"[5] M. Gr\u010dar, D. Mladeni\u010d, B. Fortuna, and M. Grobelnik, \u201cData sparsity issues in the collaborative filtering framework,\u201d in Advances in Web Mining and Web Usage Analysis, Lecture Notes in Computer Science, vol.4198, pp.58-76, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006."},{"key":"6","unstructured":"[6] facebook statistics, available at &lt;http:\/\/www.statisticbrain.com\/facebook-statistics\/&gt;"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] I. Guy and D. Carmel, \u201cSocial recommender systems,\u201d Proceedings of the 20th International Conference Companion on World wide web, pp.283-284, ACM, 2011.","DOI":"10.1145\/1963192.1963312"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] J. Chen, W. Geyer, C. Dugan, M. Muller, and I. Guy, \u201cMake new friends, but keep the old: recommending people on social networking sites,\u201d Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.201-210, ACM, 2009.","DOI":"10.1145\/1518701.1518735"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] V. Agarwal and K.K. Bharadwaj, \u201cA collaborative filtering framework for friends recommendation in social networks based on interaction intensity and adaptive user similarity,\u201d Social Network Analysis and Mining, vol.3, no.3, pp.359-379, 2013.","DOI":"10.1007\/s13278-012-0083-7"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] W.-Y. Chen, J.-C. Chu, J. Luan, H. Bai, Y. Wang, and E.Y. Chang, \u201cCollaborative filtering for Orkut communities: discovery of user latent behavior,\u201d Proceedings of the 18th International Conference on World wide web, pp.681-690, ACM, 2009.","DOI":"10.1145\/1526709.1526801"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] M. Jiang, P. Cui, R. Liu, Q. Yang, F. Wang, W. Zhu, and S. Yang, \u201cSocial contextual recommendation,\u201d Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2012.","DOI":"10.1145\/2396761.2396771"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] M. Jamali and M. Ester, \u201cA matrix factorization technique with trust propagation for recommendation,\u201d Social Networks Proceedings of the 2010 ACM Conference on Recommender systems (RecSys), 2010.","DOI":"10.1145\/1864708.1864736"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] F. Walter, S. Battiston, and F. Schweitzer, \u201cA model of a trust-based recommendation system on a social network,\u201d Autonomous Agents and Multi-Agent Systems, vol.16, no.1, pp.57-74, 2008.","DOI":"10.1007\/s10458-007-9021-x"},{"key":"14","unstructured":"[14] Epinions, available at &lt;http:\/\/www.epinions.com\/&gt;."},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] M. Pazzani and D. Billsus, \u201cLearning and revising user profiles: The identification of interesting web sites,\u201d Machine Learning, vol.27, no.3, pp.313-331, 1997.","DOI":"10.1023\/A:1007369909943"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] H.C. Wu, R.W.P. Luk, K.F. Wong, and K.L. Kwok, \u201cInterpretingtf-idf term weights as making relevance decisions,\u201d ACM Trans. Information Systems (TOIS), vol.26, no.3, pp.13, 2008.","DOI":"10.1145\/1361684.1361686"},{"key":"17","unstructured":"[17] R.J. Mooney, P.N. Bennett, and L. Roy, \u201cBook recommending using text categorization with extracted information,\u201d Proc. Recommender Systems Papers from 1998 Workshop, Technical Report, WS-98-08, 1998."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] M. Balabanovic and Y. Shoham, \u201cFab: content-based, collaborative recommendation,\u201d Communications of the ACM, vol.40, no.3, pp.66-72, 1997.","DOI":"10.1145\/245108.245124"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] Y. Koren, \u201cFactorization meets the neighborhood: a multifaceted collaborative filtering model,\u201d Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.426-434, ACM, 2008.","DOI":"10.1145\/1401890.1401944"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] J.L. Herlocker, J.A. Konstan, A. Borchers, and J. Riedl, \u201cAn algorithmic framework for performing collaborative filtering,\u201d Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp.230-237, ACM, 1999.","DOI":"10.1145\/312624.312682"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] H. Yildirim and M.S. Krishnamoorthy, \u201cA random walk method for alleviating the sparsity problem in collaborative filtering,\u201d Proceedings of the 2008 ACM Conference on Recommender Systems, pp.131-138, ACM, 2008.","DOI":"10.1145\/1454008.1454031"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] H. Ma, H. Yang, M.R. Lyu, and I. King, \u201cSoRec: social recommendation using probabilistic matrix factorization,\u201d International Conference on Information and Knowledge Management (CIKM), 2008.","DOI":"10.1145\/1458082.1458205"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] M. Jamali and M. Ester, \u201cA matrix factorization technique with trust propagation for recommendation,\u201d Social Networks, Proceedings of the 2010 ACM Conference on Recommender Systems (RecSys), 2010.","DOI":"10.1145\/1864708.1864736"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] J. Golbeck and J. Hendler, \u201cFilmTrust: movie recommendations using trust in web-based social networks,\u201d Proceedings of the IEEE Consumer Communications and Networking Conference, pp.282-286, Jan. 2006.","DOI":"10.1109\/CCNC.2006.1593032"},{"key":"25","unstructured":"[25] P. Massa and P. Avesani, \u201cControversial users demand local trust metrics: an experimental study on epinions.com community,\u201d Proceedings of the 25th American Association for Artificial Intelligence Conference, 2005."},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] G. Guo, J. Zhang, and D. Thalmann, \u201cMerging trust in collaborative filtering to alleviate data sparsity and cold start,\u201d Knowledge-Based Systems, vol.57, pp.57-68, 2014.","DOI":"10.1016\/j.knosys.2013.12.007"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] P. Moradi and S. Ahmadian, \u201cA reliability-based recommendation method to improve trust-aware recommender systems,\u201d Expert Systems with Applications, vol.42, no.21, pp.7386-7398, 2015.","DOI":"10.1016\/j.eswa.2015.05.027"},{"key":"28","unstructured":"[28] J. Jin and Q. Chen, \u201cA trust-based Top-K recommender system using social tagging network,\u201d Proceedings of the 9th IEEE International Conference on Fuzzy Systems and Knowledge Discovery, pp.1270-1274, 2012."},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] S. Fazeli, H. Drachsler, and F. Brouns, \u201cTowards a social trust-aware recommender for teachers,\u201d Recommender Systems for Technology Enhanced Learning, pp.177-194, Springer, New York, 2014.","DOI":"10.1007\/978-1-4939-0530-0_9"},{"key":"30","unstructured":"[30] S.H. Cha, \u201cComprehensive survey on distance\/similarity measures between probability density functions,\u201d International Journal of Mathematical Models and Methods in Applied Sciences, vol.1, no.2, 1, 2007."},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] P. Massa and P. Avesani, \u201cTrust-aware recommender systems,\u201d ACM Conference on Recommender Systems, pp.17-24, 2007.","DOI":"10.1145\/1297231.1297235"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] M. Jamali and M. Ester, \u201cTrustWalker: a random walk model for combining trust-based and item-based recommendation,\u201d Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.397-406, ACM, 2009.","DOI":"10.1145\/1557019.1557067"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] S. Deng, L. Huang, and G. Xu, \u201cSocial network-based service recommendation with trust enhancement,\u201d Expert Systems with Applications, vol.41, no.18, pp.8075-8084, 2014.","DOI":"10.1016\/j.eswa.2014.07.012"},{"key":"34","doi-asserted-by":"crossref","unstructured":"[34] P. Massa and P. Avesani, \u201cTrust-aware bootstrapping of recommender systems,\u201d ECAI Workshop on Recommender Systems, pp.29-33, 2006.","DOI":"10.1145\/1297231.1297235"},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] P. Massa and B. Bhattacharjee, \u201cUsing trust in recommender systems: an experimental analysis,\u201d Proceedings of iTrust2004 International Conference, pp.221-235, 2004.","DOI":"10.1007\/978-3-540-24747-0_17"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/2\/E99.D_2015EDP7199\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T08:13:37Z","timestamp":1748765617000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/2\/E99.D_2015EDP7199\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2015edp7199","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"type":"print","value":"0916-8532"},{"type":"electronic","value":"1745-1361"}],"subject":[],"published":{"date-parts":[[2016]]}}}