SlideShare une entreprise Scribd logo
1  sur  54
Random Walk by User Trust and Temporal
Issues toward Sparsity Problem in Social
Tagging Recommender Systems
20130513
Speaker: Yan Kai Huang
NTU Internet Research Lab
1
Outline
• Introduction
• Related Works
• Cold Start:
– Random Walk and Probability Assignment
• Algorithms
• Temporal Decay Issues
• Credibility & Accordance
• Experiment Design
• Discussion and Conclusion
2
3
Introduction to
Recommender Systems
• Recommendation systems (RS) help to match users
with items
– Ease information overload
– Sales assistance (guidance, advisory, persuasion,…)
• Collaborative Filtering
– Considers Users with Similar Rating Patterns
– Aggregates the ratings of Similar Users
• Social Networks Emerged Recently
– Independent source of information
• Motivations of Trust-based RS
– Social Influence: users adopt the behavior of their
friends
Motivation
• User generated data obtained by predefined
website.
– instead of random graph generator
– e.g. ER model, BA model, WS model… etc.
– Unable to generate uni-partite,
not to mentioned bipartite.
• “Knowledge discovery”
– What is the characteristics of user-action data?
– What can be attributed into pragmatic
applications?
– Data-proven reliability.
4
Preliminaries
• Recommender system assumes:
– A set of users, U = {u1, u2…un}
– A set of items, I = {i1, i2… im}
– Each user u do actions for a set of items:
Iu = {iu1, iu2… iuk}
– The action of user u on item i is denoted by Au,I
5
Preliminaries: Trust Network
• Additionally, there is a trust network among
users in trust-based system:
tu,v ∈ Tu: a real number in [0,1] denotes u trust v .
• The trust network can be represented as a
directed graph G = <U, T>
• T={ (u, v) | u ∈ U, v ∈ Tu}
6
Network Model of User Trust and
Actions
User Layer
Item Layer
7
Recommendation :
Collaborative Filtering for Rating Value
• Common task of recommendation:
– Given an user u∈U and an item i ∈ I
– For an unknown action, predict action value (rating
stars in [0,5]) for user u on item i.
• Is “value prediction” what the user want?
 Tractable to compare and optimize.
 NOT practical and user-friendly
 Serendipity
8
Problem Definition -
Top-N Item Recommendation
• Given a target user u
• recommend a set of items Îu where | Îu | < N
and Îu ∩ Îu= Ø
– Once produced, the rank within set does NOT
matter anymore.
• Verify whether the testing item îu is
contained in the resulting item set.
9
Outline
• Introduction
• Related Works
– Itembased CF
– RandomWalk Recommendation
– TrustWalker
– Influence Probabilities
• Cold Start Problem
• Random Walk and Probability Assignment
• Algorithm
• Temporal Decay Issues
• Credibility & Accordance
• Experiment Design
• Discussion and Conclusion
10
Related Work – Item-based CF
• By similarity between items or users
• Simply predict by weighted sum of similar
items. (ex: 5*0.2+4*0.3+3*0.5 = 3.7)
• Take the highest rating n items as the top-N
11
[1] Badrul Sarwar, George Karypis, Joseph Konstan, and John Riedl. 2001. Item-based
collaborative filtering recommendation algorithms. In Proceedings of the 10th international
conference on World Wide Web (WWW '01).
Related Works –
Random Walk Recommendation
12
[3] Yildirim, Hilmi, and Mukkai S. Krishnamoorthy. "A random walk method for alleviating
the sparsity problem in collaborative filtering." Proceedings of the 2008 ACM conference on
Recommender systems. ACM, 2008.
Random Walk Recommendation
– Three components
1. Building the item graph which captures the similarity of
items between each other
2. The second component computes the rank values of items
for each user by simulating a random walk
3. Finally the last component interprets and scales the rank
scores as ratings for each user-item pair.
13
Related Works - TrustWalker
• Combined user-based recommendation and item-based and waiting for
random walk variance converge.
• Starts from Source user u0, at step k, at node u:
– If u has rated i, return ru,i
– With Φu,i,k , the random walk stops
• Randomly select item j rated by u and return ru,j .
– With 1- Φu,i,k , continue the random walk to a direct neighbor of u.
• Three way to stop:
1. Reaching a node uk who has expressed an action on item i
2. Decide to stay at the user uk and select one of the items i rated by uk
3. Define max-depth = 6 (by “six-degrees of separation”)
14
[5] Mohsen Jamali and Martin Ester. 2009. ”TrustWalker: a random walk model for
combining trust-based and item-based recommendation.” In Proceedings of the 15th ACM
SIGKDD international conference on Knowledge discovery and data mining (KDD '09).
[4] Mohsen Jamali and Martin Ester. "Using a trust network to improve top-N
recommendation." Proceedings of the third ACM conference on Recommender systems. ACM, 2009.
Related Works-
Influence Probabilities
• Toward Influence Maximization problem
– To find the influence between each user pair.
– Assume influence probabilities do NOT remain
constant independently of time?
Exponential Decay
• Dataset Difference
– Yahoo! Flickr dataset
– “Joining a group”(?!) is considered as action
– User “James” joined “Whistler Mountains” at
timestamp 5.
15
[6] Goyal, Amit, Francesco Bonchi, and Laks VS Lakshmanan. "Learning influence
probabilities in social networks." Proceedings of the third ACM international conference
on Web search and data mining. ACM, 2010.
Learning Influence Probabilities
the Models
• Parameters to learn:
– #actions performed by each user – Au
– #actions propagated via each edge–
Av2u
– Mean life time –
P a1 5
Q a1 10
R a1 15
Q a2 12
R a2 14
R a3 6
P a3 14
u Au
P
Q
R
P Q R
P X
Q 0,0 X
R 0,0 X
01
01
01
0,01,5 0,01,10
2
2
0,01,2
3
2
0,01,8
uv,
uv,uv, ,A 
16
[6] Goyal, Amit, Francesco Bonchi, and Laks VS Lakshmanan. "Learning influence
probabilities in social networks." Proceedings of the third ACM international conference
on Web search and data mining. ACM, 2010.
Influence
Models
Q R
P
0.33
0
0
0.5
0.5
0.2
Outline
• Introduction
• Related Works
• Cold Start:
– Random Walk and Probability Assignment
• Algorithm
• Temporal Decay Issues
• Credibility & Accordance
• Experiment Design
• Discussion and Conclusion
17
Cold Start Problem
• Similarity matrices are usually too sparse to capture actual dependencies
between items.
– item i that hasn’t been rated by any user who has rated item j : similarity score of 0
– However these items would be found as closely to each other, if another item t is
similar to both items.
• Random Walk Recommender captures these transitive associations in
various levels proportional to the length of the random walk.
• Parameterize the length of the walk according to the sparsity level of the rating
matrix by continue probability (typically 0.8~0.85)
• Cold Start User
User with few action and plenty relation/friend
User with plenty action and few relation/friend
• Not cold user -> traditional CF works best!
 New Comer with few action and few relation
• Use sigmoid function and alpha to beverage ratio between user-similarity and
social influence
18
Consider the State-of-the-art
Recommendation
• Matrix Factorization method[2] still dominates
if you only concern about the value accuracy:
 Highly effective: learning by training dataset
 Low efficiency: high complexity and memory costs
 Without quality indicator and source explain-ability
 “Latent” is scanty of physical meaning
 Centralized information is needed.
• Network Method
 based-on neighborhood similarity: distributed
 Random work with lower complexity
 Feasible to update immediately
Trust
20
User Similarity v.s. Node Distance
• Uni-partite previous
• Katz centrality with penalty beta
• Similar to pageRank
21
Outline
• Introduction
• Related Works
• Cold Start:
– Random Walk and Probability Assignment
• Algorithms
– Item-based Random Walk
– User-based Random Walk
– Influence-based Random Walk
• Temporal Decay Issues
• Credibility & Accordance
• Experiment Design
• Discussion and Conclusion
22
Item-Based Random Walk (ItemRW)
• Construct item-based similarity matrix
– By Jaccard index
• the Random walk process:
– Denote Yu,i the random variable for selecting item j
amongst items rated by u for an item similar to i.
– General by Sigmoid Function, where exp as
common neighbor
Liben‐Nowell, David, and Jon Kleinberg. "The link‐prediction problem for social
networks." Journal of the American society for information science and
technology 58.7 (2007): 1019-1031. 23
User-Based Random Walk (UserRW)
• Construct user-based similarity
• the Random walk process:
– Denote Xu,i the random variable for selecting
user v amongst all v for an user similar to u.
– Pick a nearest neighbor and output the action
set of v.
24
Influence-Based Random Walk
Algorithm
1. Build the item and user graph with correlation
2. learn influence power by parsing the trust corpus
3. Perform random walk on the graph to get rank list.
• To perform a random walk, we can acquire needed
information by user request distributedly.
• To validate the algorithm, we compute the expected value and
sort the state probabilities of each items.
– Most of them remain 0 -> no need to parse full item vector I to perform
matrix operation
25
Build Graph
Learning
Influence
updated
Random
Walk to
produce
rank list
Learning Influence - Graph
User Layer
Item Layer
Goyal, Amit, Francesco Bonchi, and Laks VS Lakshmanan. "Learning influence
probabilities in social networks." Proceedings of the third ACM international conference
on Web search and data mining. ACM, 2010.
Influence Power △t = (t2-t1)
{u1, i1, t1} {u2, i1, t2}
u1 take action i1
at timestamp t1
26
Algorithm Formulation
27
Sigmoid Smoothing
• Adjust the weight for fewer related items
• A sigmoid function is a mathematical
function having an "S" shape (sigmoid
curve). Often, sigmoid function refers to the
special case of the logistic function and
defined by the formula
Influence-Based
Random Walk
u1
u2
u
u4
u5
Item
i
Φu1,i
item
j
Φu2,i
Φu4,i
Φu5,i
simi,j
• Influence-based User Random Walk
Probability:
α*user-similarity(u,v) + (1-α)*Influence Power(u,v)
User Layer
Yildirim, Hilmi, and Mukkai S. Krishnamoorthy. "A random walk method for alleviating
the sparsity problem in collaborative filtering." Proceedings of the 2008 ACM
conference on Recommender systems. ACM, 2008.
Influence-based
User Transition Probabilities
Outline
• Introduction
• Related Works
• Cold Start:
– Random Walk and Probability Assignment
• Algorithms
• Temporal Decay Issues
– ItemBetw
– PastDecay
• Credibility & Accordance
• Experiment Design
• Discussion and Conclusion
31
Exponential Time Decay Function
32
Dunlavy, Daniel M., Tamara G. Kolda, and Evrim Acar. "Temporal link prediction
using matrix and tensor factorizations." ACM Transactions on Knowledge Discovery
from Data (TKDD) 5.2 (2011): 10.
Time Interval Analysis
– ItemBetw
User Layer
Item Layer
{u, i1, t1}
{u, i2, t2}
User u take action
i1 at timestamp t1
i2 at timestamp t2
33
Time Interval – ItemBetw
• By assumption:
items which users took action on it in short
interval gains higher similarity
“you all items are my favorite of past…”
Where items which user take action during long
timeslot will become close to 0
34
Time Interval Analysis –
PastDecay
User Layer
Item Layer
{u, i, t1}
{u, j, t2}
User u take action
i at timestamp t1
j at timestamp t2
k at timestamp t3
{u, k, t3}
35
Time Interval - PastDecay
• By assumption:
items which users action it in short time before
now gains higher similarity
The newer, the better !!!
Where items which user take action during long
time interval will be close to 0
36
Outline
• Introduction
• Related Works
• Cold Start:
– Random Walk and Probability Assignment
• Algorithms
• Temporal Decay Issues
• Credibility & Accordance
• Experiment Design
• Discussion and Conclusion
37
Credibility & Accordance
• What is the evidently to examine recommendation
quality of algorithm?
– The ranking of testing item in our rank list!
– For the best case: rank = 1, presented by avg. percentage:
Rank 3 out of top-15 => credibility u,i =20%
– Metrics to a Recommender System/Method
• Select the highest Probability of related item/user
as the reference
38
Outline
• Introduction
• Related Works
• Cold Start:
– Random Walk and Probability Assignment
• Algorithms
• Temporal Decay Issues
• Credibility & Accordance
• Experiment Design
– ALL-BUT-ONE Evaluation
– Dataset Description
– Experimental Result
• Discussion and Conclusion
39
ALL-BUT-ONE Evaluation
• Also called “leave-one-out” method
• Predict the last item i target user u took
• Output top-N, if the action items is contained, calls
a HIT
Item Layer
{u, i1, t1} {u, i2, t2}
{u, i3, t3}
40
{u, i?, tlast}
, L to be the testing set size.
Dataset of Experiment
41
• bookmark data
• 68,215 bookmark URLs from 1,867 users
• friendship “become mutual fans” with timestamp
information
<source_user, target_user, timestamp>
• Action also with timestamp to measure the interval
influence.
<user, item, timestamp>
Dataset Description
• Social degree of node (trust) conforms
power-law distribution.
42
0
10
20
30
40
50
60
70
80
1 5 9 13 17 21 25 29 33 37 41 45 49 53 57 61 65 69 73 77 81 85 89
User Action Times Distribution
#(Itemto
Tag)
(#Days
)
0
100
200
300
400
500
600
700
800
900
10 20 30 40 50 60 70 80 90 100110120
USER DEGREE OF TRUST
DISTRIBUTION
(#Social Degree)
(#User
s)
Experiment - Learning Influence
• User-Based Similarity:
– Average correlation by Jaccard index
– 2.58%
– Average correlation in mutual trust
– 8.28% (4 times as average!)
0
500
1000
1500
2000
2500
3000
3500
4000
4500
0.001
0.011
0.021
0.031
0.041
0.051
0.061
0.071
0.081
0.091
0.101
0.111
0.121
0.131
0.141
0.151
0.161
0.171
0.181
0.191
User-based Similarity
0.001
0.01
0.019
0.028
0.037
0.046
0.055
0.064
0.073
0.082
0.091
0.1
0.109
0.118
0.127
0.136
0.145
0.154
0.163
0.172
0.181
0.19
0.199
User-based Similarity – with
Mutual Trust
43
Experimental Result
44
0
5
10
15
20
25
30
10 20 30 40 50 60 70 80 90 100
RECALL AND TOP-K SIZE
MIN_ITEM_FOR_USER>5
user-based influence based
itemBased itemEnhanced
relational popular
0
5
10
15
20
25
10 20 30 40 50 60 70 80 90 100
RECALL AND TOP-K SIZE
MIN_ITEM_FOR_USER > 1
userbased influenceBased
itemBased itemEnhanced
Trustwalker popular
Result for Cold Start User
0
5
10
15
20
25
30
35
40
45
Recall for Cold Start User
with action-item <10
item-based RW
user-based RW
Influence
itemAdjust
TrustWalker
Hit
Radio(%)
10 20 30 40 50 60 70 80 90 100
Results for ratio of
Global/Friendship Ratio α
α*user-similarity(u,v) + (1-α)*Influence Power(u,v)
0
5
10
15
20
25
30
35
40
45
1 2 3 4 5 6 7 8 9 10
Recall for Cold Start User
with Action-item <10
alpha = 0.1 alpha =0.01
alpha =0.001 alpha =0.0001
Hit
Radio(%)
Time Interval Decay Result -
ItemBetw
• Set decay function as constant = 1 gain the
best performance!
0
5
10
15
20
25
30
1.5 1.1 1.05 1.01 1 0.99 0.95 0.9 0.8 0.7
TIME ITEMBETW TOP-K
CURVE
47
Hit
Radio(%)
0
5
10
15
20
25
30
10 30 50 70 90
Time ItemBetw Top-K Curve
1.5
1.1
1.05
1.01
1
0.99
0.95
0.99
0.95
0.7
Time Interval Decay Result -
PastDecay
0
5
10
15
20
25
10 20 30 40 50 60 70 80 90 100
TIMEDECAY
1.5 1.1 1.05 1.01 1
0.99 0.95 0.9 0.8
0
5
10
15
20
25
1.5
1.1
1.05
1.01
1
0.99
0.95
0.9
0.8
0.7
TimeDecay Top-k Curve
48
Outline
• Introduction
• Related Works
• Cold Start:
– Random Walk and Probability Assignment
• Algorithms
• Temporal Decay Issues
• Credibility & Accordance
• Experiment Design
• Discussion and Conclusion
49
Discussion - Why TrustWalker Fails?
• TrustWalker puts more emphasis on the local
trusted user instead of global similar user.
• Minimize the Mean Square Error :
– Similar to Non-personalized Popular List
• As mentioned, top-N result is more user-friendly
50
TrustWalker Experiment on
dataset: Epinion
Become a fans of experts and
Columnists
Trust > Global similarity
Discussion:
Influence Based Random Walk
51
• For α is near to 0.001
– In the different scale of user similarit
• Like Decision tree:
– Similarity would be the primary and
Influence power are the secondary
Comparison metrics sim(u,v)
Influence Power(u,v)
Discussion: Time Interval Decay
52
• Achieve peak when all the data remain the same
weight in the time issue.
• “In predefined dataset, you should not easily
abandon or under estimate value of old data.”
Conclusion
• Propose novel method by influence.
– Influence-based Random Walk
– Intersection with item and user
• Probe and leverage influence probabilities and
user correlation for cold start user
• Provide creditability and Accordance for user
experience and feedback in RS
• Analyze the time decay function by 2 decay
function
– PastDecay
– Itembetw
53
Q&A
Thanks for Your Attention!
54

Contenu connexe

Tendances

KICSS2020 Invited Talk 2: Prof. Quan Bai from University of Tasmania
KICSS2020 Invited Talk 2: Prof. Quan Bai from University of TasmaniaKICSS2020 Invited Talk 2: Prof. Quan Bai from University of Tasmania
KICSS2020 Invited Talk 2: Prof. Quan Bai from University of TasmaniaJawad Haqbeen
 
A Scalable, High-performance Algorithm for Hybrid Job Recommendations
A Scalable, High-performance Algorithm for Hybrid Job RecommendationsA Scalable, High-performance Algorithm for Hybrid Job Recommendations
A Scalable, High-performance Algorithm for Hybrid Job RecommendationsToon De Pessemier
 
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...Adrien Joly
 
Introduction to Topological Data Analysis
Introduction to Topological Data AnalysisIntroduction to Topological Data Analysis
Introduction to Topological Data AnalysisMason Porter
 
13 An Introduction to Stochastic Actor-Oriented Models (aka SIENA)
13 An Introduction to Stochastic Actor-Oriented Models (aka SIENA)13 An Introduction to Stochastic Actor-Oriented Models (aka SIENA)
13 An Introduction to Stochastic Actor-Oriented Models (aka SIENA)dnac
 
Machine Learning Summary for Caltech2
Machine Learning Summary for Caltech2Machine Learning Summary for Caltech2
Machine Learning Summary for Caltech2Lukas Mandrake
 
Recommendation system using unsupervised machine learning algorithm & assoc
Recommendation system using unsupervised machine learning algorithm & assocRecommendation system using unsupervised machine learning algorithm & assoc
Recommendation system using unsupervised machine learning algorithm & associjerd
 
Introduction to Recommender System
Introduction to Recommender SystemIntroduction to Recommender System
Introduction to Recommender SystemWQ Fan
 
Item Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation AlgorithmsItem Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation Algorithmsnextlib
 
Modeling and Aggregation of Complex Annotations
Modeling and Aggregation of Complex AnnotationsModeling and Aggregation of Complex Annotations
Modeling and Aggregation of Complex AnnotationsAlexander Braylan
 
Temporal Learning and Sequence Modeling for a Job Recommender System
Temporal Learning and Sequence Modeling for a Job Recommender SystemTemporal Learning and Sequence Modeling for a Job Recommender System
Temporal Learning and Sequence Modeling for a Job Recommender SystemAnoop Kumar
 
An introduction to Recommender Systems
An introduction to Recommender SystemsAn introduction to Recommender Systems
An introduction to Recommender SystemsDavid Zibriczky
 
Simulation in Social Sciences - Lecture 6 in Introduction to Computational S...
Simulation in Social Sciences -  Lecture 6 in Introduction to Computational S...Simulation in Social Sciences -  Lecture 6 in Introduction to Computational S...
Simulation in Social Sciences - Lecture 6 in Introduction to Computational S...Lauri Eloranta
 
Content - Based Recommendations Enhanced with Collaborative Information
Content - Based Recommendations Enhanced with Collaborative InformationContent - Based Recommendations Enhanced with Collaborative Information
Content - Based Recommendations Enhanced with Collaborative InformationAlessandro Liparoti
 
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...Matthew Lease
 
HT2014 Tutorial: Evaluating Recommender Systems - Ensuring Replicability of E...
HT2014 Tutorial: Evaluating Recommender Systems - Ensuring Replicability of E...HT2014 Tutorial: Evaluating Recommender Systems - Ensuring Replicability of E...
HT2014 Tutorial: Evaluating Recommender Systems - Ensuring Replicability of E...Alejandro Bellogin
 
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...Lauri Eloranta
 
Recsys 2014 Tutorial - The Recommender Problem Revisited
Recsys 2014 Tutorial - The Recommender Problem RevisitedRecsys 2014 Tutorial - The Recommender Problem Revisited
Recsys 2014 Tutorial - The Recommender Problem RevisitedXavier Amatriain
 

Tendances (20)

KICSS2020 Invited Talk 2: Prof. Quan Bai from University of Tasmania
KICSS2020 Invited Talk 2: Prof. Quan Bai from University of TasmaniaKICSS2020 Invited Talk 2: Prof. Quan Bai from University of Tasmania
KICSS2020 Invited Talk 2: Prof. Quan Bai from University of Tasmania
 
A Scalable, High-performance Algorithm for Hybrid Job Recommendations
A Scalable, High-performance Algorithm for Hybrid Job RecommendationsA Scalable, High-performance Algorithm for Hybrid Job Recommendations
A Scalable, High-performance Algorithm for Hybrid Job Recommendations
 
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...
 
Introduction to Topological Data Analysis
Introduction to Topological Data AnalysisIntroduction to Topological Data Analysis
Introduction to Topological Data Analysis
 
13 An Introduction to Stochastic Actor-Oriented Models (aka SIENA)
13 An Introduction to Stochastic Actor-Oriented Models (aka SIENA)13 An Introduction to Stochastic Actor-Oriented Models (aka SIENA)
13 An Introduction to Stochastic Actor-Oriented Models (aka SIENA)
 
Machine Learning Summary for Caltech2
Machine Learning Summary for Caltech2Machine Learning Summary for Caltech2
Machine Learning Summary for Caltech2
 
Recommendation system using unsupervised machine learning algorithm & assoc
Recommendation system using unsupervised machine learning algorithm & assocRecommendation system using unsupervised machine learning algorithm & assoc
Recommendation system using unsupervised machine learning algorithm & assoc
 
Introduction to Recommender System
Introduction to Recommender SystemIntroduction to Recommender System
Introduction to Recommender System
 
Item Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation AlgorithmsItem Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation Algorithms
 
Modeling and Aggregation of Complex Annotations
Modeling and Aggregation of Complex AnnotationsModeling and Aggregation of Complex Annotations
Modeling and Aggregation of Complex Annotations
 
Temporal Learning and Sequence Modeling for a Job Recommender System
Temporal Learning and Sequence Modeling for a Job Recommender SystemTemporal Learning and Sequence Modeling for a Job Recommender System
Temporal Learning and Sequence Modeling for a Job Recommender System
 
An introduction to Recommender Systems
An introduction to Recommender SystemsAn introduction to Recommender Systems
An introduction to Recommender Systems
 
Can we predict your sentiments by listening to your peers?
Can we predict your sentiments by listening to your peers?Can we predict your sentiments by listening to your peers?
Can we predict your sentiments by listening to your peers?
 
Simulation in Social Sciences - Lecture 6 in Introduction to Computational S...
Simulation in Social Sciences -  Lecture 6 in Introduction to Computational S...Simulation in Social Sciences -  Lecture 6 in Introduction to Computational S...
Simulation in Social Sciences - Lecture 6 in Introduction to Computational S...
 
Content - Based Recommendations Enhanced with Collaborative Information
Content - Based Recommendations Enhanced with Collaborative InformationContent - Based Recommendations Enhanced with Collaborative Information
Content - Based Recommendations Enhanced with Collaborative Information
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...
 
HT2014 Tutorial: Evaluating Recommender Systems - Ensuring Replicability of E...
HT2014 Tutorial: Evaluating Recommender Systems - Ensuring Replicability of E...HT2014 Tutorial: Evaluating Recommender Systems - Ensuring Replicability of E...
HT2014 Tutorial: Evaluating Recommender Systems - Ensuring Replicability of E...
 
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
 
Recsys 2014 Tutorial - The Recommender Problem Revisited
Recsys 2014 Tutorial - The Recommender Problem RevisitedRecsys 2014 Tutorial - The Recommender Problem Revisited
Recsys 2014 Tutorial - The Recommender Problem Revisited
 

Similaire à Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Social Tagging Recommender Systems

IntroductionRecommenderSystems_Petroni.pdf
IntroductionRecommenderSystems_Petroni.pdfIntroductionRecommenderSystems_Petroni.pdf
IntroductionRecommenderSystems_Petroni.pdfAlphaIssaghaDiallo
 
Crowdsourcing Predictors of Behavioral Outcomes
Crowdsourcing Predictors of Behavioral OutcomesCrowdsourcing Predictors of Behavioral Outcomes
Crowdsourcing Predictors of Behavioral OutcomesAlekya Yermal
 
Ronny lempelyahooindiabigthinkerapril2013
Ronny lempelyahooindiabigthinkerapril2013Ronny lempelyahooindiabigthinkerapril2013
Ronny lempelyahooindiabigthinkerapril2013Muthusamy Chelliah
 
Scalable Similarity-Based Neighborhood Methods with MapReduce
Scalable Similarity-Based Neighborhood Methods with MapReduceScalable Similarity-Based Neighborhood Methods with MapReduce
Scalable Similarity-Based Neighborhood Methods with MapReducesscdotopen
 
Collaborative Filtering Recommendation System
Collaborative Filtering Recommendation SystemCollaborative Filtering Recommendation System
Collaborative Filtering Recommendation SystemMilind Gokhale
 
Continuous Evaluation of Collaborative Recommender Systems in Data Stream Man...
Continuous Evaluation of Collaborative Recommender Systems in Data Stream Man...Continuous Evaluation of Collaborative Recommender Systems in Data Stream Man...
Continuous Evaluation of Collaborative Recommender Systems in Data Stream Man...Dr. Cornelius Ludmann
 
Usability evaluation methods (part 2) and performance metrics
Usability evaluation methods (part 2) and performance metricsUsability evaluation methods (part 2) and performance metrics
Usability evaluation methods (part 2) and performance metricsAndres Baravalle
 
Usability evaluations (part 2)
Usability evaluations (part 2) Usability evaluations (part 2)
Usability evaluations (part 2) Andres Baravalle
 
Evaluation and User Study in HCI
Evaluation and User Study in HCIEvaluation and User Study in HCI
Evaluation and User Study in HCIByungkyu (Jay) Kang
 
Analyzing behavioral data for improving search experience
Analyzing behavioral data for improving search experienceAnalyzing behavioral data for improving search experience
Analyzing behavioral data for improving search experiencePavel Serdyukov
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Waqas Tariq
 
Chapter 02 collaborative recommendation
Chapter 02   collaborative recommendationChapter 02   collaborative recommendation
Chapter 02 collaborative recommendationAravindharamanan S
 
Chapter 02 collaborative recommendation
Chapter 02   collaborative recommendationChapter 02   collaborative recommendation
Chapter 02 collaborative recommendationAravindharamanan S
 
introduction to machine learning 3d-collab-filtering.pptx
introduction to machine learning 3d-collab-filtering.pptxintroduction to machine learning 3d-collab-filtering.pptx
introduction to machine learning 3d-collab-filtering.pptxPratik Gohel
 
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...LINE Corp.
 
Preference Elicitation Interface
Preference Elicitation InterfacePreference Elicitation Interface
Preference Elicitation Interface晓愚 孟
 
Collaborative Filtering with Spark
Collaborative Filtering with SparkCollaborative Filtering with Spark
Collaborative Filtering with SparkChris Johnson
 
Apache Mahout Tutorial - Recommendation - 2013/2014
Apache Mahout Tutorial - Recommendation - 2013/2014 Apache Mahout Tutorial - Recommendation - 2013/2014
Apache Mahout Tutorial - Recommendation - 2013/2014 Cataldo Musto
 
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...Kishor Datta Gupta
 

Similaire à Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Social Tagging Recommender Systems (20)

IntroductionRecommenderSystems_Petroni.pdf
IntroductionRecommenderSystems_Petroni.pdfIntroductionRecommenderSystems_Petroni.pdf
IntroductionRecommenderSystems_Petroni.pdf
 
Crowdsourcing Predictors of Behavioral Outcomes
Crowdsourcing Predictors of Behavioral OutcomesCrowdsourcing Predictors of Behavioral Outcomes
Crowdsourcing Predictors of Behavioral Outcomes
 
Ronny lempelyahooindiabigthinkerapril2013
Ronny lempelyahooindiabigthinkerapril2013Ronny lempelyahooindiabigthinkerapril2013
Ronny lempelyahooindiabigthinkerapril2013
 
Scalable Similarity-Based Neighborhood Methods with MapReduce
Scalable Similarity-Based Neighborhood Methods with MapReduceScalable Similarity-Based Neighborhood Methods with MapReduce
Scalable Similarity-Based Neighborhood Methods with MapReduce
 
Collaborative Filtering Recommendation System
Collaborative Filtering Recommendation SystemCollaborative Filtering Recommendation System
Collaborative Filtering Recommendation System
 
Continuous Evaluation of Collaborative Recommender Systems in Data Stream Man...
Continuous Evaluation of Collaborative Recommender Systems in Data Stream Man...Continuous Evaluation of Collaborative Recommender Systems in Data Stream Man...
Continuous Evaluation of Collaborative Recommender Systems in Data Stream Man...
 
Usability evaluation methods (part 2) and performance metrics
Usability evaluation methods (part 2) and performance metricsUsability evaluation methods (part 2) and performance metrics
Usability evaluation methods (part 2) and performance metrics
 
Usability evaluations (part 2)
Usability evaluations (part 2) Usability evaluations (part 2)
Usability evaluations (part 2)
 
Evaluation and User Study in HCI
Evaluation and User Study in HCIEvaluation and User Study in HCI
Evaluation and User Study in HCI
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Analyzing behavioral data for improving search experience
Analyzing behavioral data for improving search experienceAnalyzing behavioral data for improving search experience
Analyzing behavioral data for improving search experience
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
 
Chapter 02 collaborative recommendation
Chapter 02   collaborative recommendationChapter 02   collaborative recommendation
Chapter 02 collaborative recommendation
 
Chapter 02 collaborative recommendation
Chapter 02   collaborative recommendationChapter 02   collaborative recommendation
Chapter 02 collaborative recommendation
 
introduction to machine learning 3d-collab-filtering.pptx
introduction to machine learning 3d-collab-filtering.pptxintroduction to machine learning 3d-collab-filtering.pptx
introduction to machine learning 3d-collab-filtering.pptx
 
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...
 
Preference Elicitation Interface
Preference Elicitation InterfacePreference Elicitation Interface
Preference Elicitation Interface
 
Collaborative Filtering with Spark
Collaborative Filtering with SparkCollaborative Filtering with Spark
Collaborative Filtering with Spark
 
Apache Mahout Tutorial - Recommendation - 2013/2014
Apache Mahout Tutorial - Recommendation - 2013/2014 Apache Mahout Tutorial - Recommendation - 2013/2014
Apache Mahout Tutorial - Recommendation - 2013/2014
 
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
 

Dernier

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Dernier (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Social Tagging Recommender Systems

  • 1. Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Social Tagging Recommender Systems 20130513 Speaker: Yan Kai Huang NTU Internet Research Lab 1
  • 2. Outline • Introduction • Related Works • Cold Start: – Random Walk and Probability Assignment • Algorithms • Temporal Decay Issues • Credibility & Accordance • Experiment Design • Discussion and Conclusion 2
  • 3. 3 Introduction to Recommender Systems • Recommendation systems (RS) help to match users with items – Ease information overload – Sales assistance (guidance, advisory, persuasion,…) • Collaborative Filtering – Considers Users with Similar Rating Patterns – Aggregates the ratings of Similar Users • Social Networks Emerged Recently – Independent source of information • Motivations of Trust-based RS – Social Influence: users adopt the behavior of their friends
  • 4. Motivation • User generated data obtained by predefined website. – instead of random graph generator – e.g. ER model, BA model, WS model… etc. – Unable to generate uni-partite, not to mentioned bipartite. • “Knowledge discovery” – What is the characteristics of user-action data? – What can be attributed into pragmatic applications? – Data-proven reliability. 4
  • 5. Preliminaries • Recommender system assumes: – A set of users, U = {u1, u2…un} – A set of items, I = {i1, i2… im} – Each user u do actions for a set of items: Iu = {iu1, iu2… iuk} – The action of user u on item i is denoted by Au,I 5
  • 6. Preliminaries: Trust Network • Additionally, there is a trust network among users in trust-based system: tu,v ∈ Tu: a real number in [0,1] denotes u trust v . • The trust network can be represented as a directed graph G = <U, T> • T={ (u, v) | u ∈ U, v ∈ Tu} 6
  • 7. Network Model of User Trust and Actions User Layer Item Layer 7
  • 8. Recommendation : Collaborative Filtering for Rating Value • Common task of recommendation: – Given an user u∈U and an item i ∈ I – For an unknown action, predict action value (rating stars in [0,5]) for user u on item i. • Is “value prediction” what the user want?  Tractable to compare and optimize.  NOT practical and user-friendly  Serendipity 8
  • 9. Problem Definition - Top-N Item Recommendation • Given a target user u • recommend a set of items Îu where | Îu | < N and Îu ∩ Îu= Ø – Once produced, the rank within set does NOT matter anymore. • Verify whether the testing item îu is contained in the resulting item set. 9
  • 10. Outline • Introduction • Related Works – Itembased CF – RandomWalk Recommendation – TrustWalker – Influence Probabilities • Cold Start Problem • Random Walk and Probability Assignment • Algorithm • Temporal Decay Issues • Credibility & Accordance • Experiment Design • Discussion and Conclusion 10
  • 11. Related Work – Item-based CF • By similarity between items or users • Simply predict by weighted sum of similar items. (ex: 5*0.2+4*0.3+3*0.5 = 3.7) • Take the highest rating n items as the top-N 11 [1] Badrul Sarwar, George Karypis, Joseph Konstan, and John Riedl. 2001. Item-based collaborative filtering recommendation algorithms. In Proceedings of the 10th international conference on World Wide Web (WWW '01).
  • 12. Related Works – Random Walk Recommendation 12 [3] Yildirim, Hilmi, and Mukkai S. Krishnamoorthy. "A random walk method for alleviating the sparsity problem in collaborative filtering." Proceedings of the 2008 ACM conference on Recommender systems. ACM, 2008.
  • 13. Random Walk Recommendation – Three components 1. Building the item graph which captures the similarity of items between each other 2. The second component computes the rank values of items for each user by simulating a random walk 3. Finally the last component interprets and scales the rank scores as ratings for each user-item pair. 13
  • 14. Related Works - TrustWalker • Combined user-based recommendation and item-based and waiting for random walk variance converge. • Starts from Source user u0, at step k, at node u: – If u has rated i, return ru,i – With Φu,i,k , the random walk stops • Randomly select item j rated by u and return ru,j . – With 1- Φu,i,k , continue the random walk to a direct neighbor of u. • Three way to stop: 1. Reaching a node uk who has expressed an action on item i 2. Decide to stay at the user uk and select one of the items i rated by uk 3. Define max-depth = 6 (by “six-degrees of separation”) 14 [5] Mohsen Jamali and Martin Ester. 2009. ”TrustWalker: a random walk model for combining trust-based and item-based recommendation.” In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '09). [4] Mohsen Jamali and Martin Ester. "Using a trust network to improve top-N recommendation." Proceedings of the third ACM conference on Recommender systems. ACM, 2009.
  • 15. Related Works- Influence Probabilities • Toward Influence Maximization problem – To find the influence between each user pair. – Assume influence probabilities do NOT remain constant independently of time? Exponential Decay • Dataset Difference – Yahoo! Flickr dataset – “Joining a group”(?!) is considered as action – User “James” joined “Whistler Mountains” at timestamp 5. 15 [6] Goyal, Amit, Francesco Bonchi, and Laks VS Lakshmanan. "Learning influence probabilities in social networks." Proceedings of the third ACM international conference on Web search and data mining. ACM, 2010.
  • 16. Learning Influence Probabilities the Models • Parameters to learn: – #actions performed by each user – Au – #actions propagated via each edge– Av2u – Mean life time – P a1 5 Q a1 10 R a1 15 Q a2 12 R a2 14 R a3 6 P a3 14 u Au P Q R P Q R P X Q 0,0 X R 0,0 X 01 01 01 0,01,5 0,01,10 2 2 0,01,2 3 2 0,01,8 uv, uv,uv, ,A  16 [6] Goyal, Amit, Francesco Bonchi, and Laks VS Lakshmanan. "Learning influence probabilities in social networks." Proceedings of the third ACM international conference on Web search and data mining. ACM, 2010. Influence Models Q R P 0.33 0 0 0.5 0.5 0.2
  • 17. Outline • Introduction • Related Works • Cold Start: – Random Walk and Probability Assignment • Algorithm • Temporal Decay Issues • Credibility & Accordance • Experiment Design • Discussion and Conclusion 17
  • 18. Cold Start Problem • Similarity matrices are usually too sparse to capture actual dependencies between items. – item i that hasn’t been rated by any user who has rated item j : similarity score of 0 – However these items would be found as closely to each other, if another item t is similar to both items. • Random Walk Recommender captures these transitive associations in various levels proportional to the length of the random walk. • Parameterize the length of the walk according to the sparsity level of the rating matrix by continue probability (typically 0.8~0.85) • Cold Start User User with few action and plenty relation/friend User with plenty action and few relation/friend • Not cold user -> traditional CF works best!  New Comer with few action and few relation • Use sigmoid function and alpha to beverage ratio between user-similarity and social influence 18
  • 19. Consider the State-of-the-art Recommendation • Matrix Factorization method[2] still dominates if you only concern about the value accuracy:  Highly effective: learning by training dataset  Low efficiency: high complexity and memory costs  Without quality indicator and source explain-ability  “Latent” is scanty of physical meaning  Centralized information is needed. • Network Method  based-on neighborhood similarity: distributed  Random work with lower complexity  Feasible to update immediately
  • 21. User Similarity v.s. Node Distance • Uni-partite previous • Katz centrality with penalty beta • Similar to pageRank 21
  • 22. Outline • Introduction • Related Works • Cold Start: – Random Walk and Probability Assignment • Algorithms – Item-based Random Walk – User-based Random Walk – Influence-based Random Walk • Temporal Decay Issues • Credibility & Accordance • Experiment Design • Discussion and Conclusion 22
  • 23. Item-Based Random Walk (ItemRW) • Construct item-based similarity matrix – By Jaccard index • the Random walk process: – Denote Yu,i the random variable for selecting item j amongst items rated by u for an item similar to i. – General by Sigmoid Function, where exp as common neighbor Liben‐Nowell, David, and Jon Kleinberg. "The link‐prediction problem for social networks." Journal of the American society for information science and technology 58.7 (2007): 1019-1031. 23
  • 24. User-Based Random Walk (UserRW) • Construct user-based similarity • the Random walk process: – Denote Xu,i the random variable for selecting user v amongst all v for an user similar to u. – Pick a nearest neighbor and output the action set of v. 24
  • 25. Influence-Based Random Walk Algorithm 1. Build the item and user graph with correlation 2. learn influence power by parsing the trust corpus 3. Perform random walk on the graph to get rank list. • To perform a random walk, we can acquire needed information by user request distributedly. • To validate the algorithm, we compute the expected value and sort the state probabilities of each items. – Most of them remain 0 -> no need to parse full item vector I to perform matrix operation 25 Build Graph Learning Influence updated Random Walk to produce rank list
  • 26. Learning Influence - Graph User Layer Item Layer Goyal, Amit, Francesco Bonchi, and Laks VS Lakshmanan. "Learning influence probabilities in social networks." Proceedings of the third ACM international conference on Web search and data mining. ACM, 2010. Influence Power △t = (t2-t1) {u1, i1, t1} {u2, i1, t2} u1 take action i1 at timestamp t1 26
  • 28. Sigmoid Smoothing • Adjust the weight for fewer related items • A sigmoid function is a mathematical function having an "S" shape (sigmoid curve). Often, sigmoid function refers to the special case of the logistic function and defined by the formula
  • 30. • Influence-based User Random Walk Probability: α*user-similarity(u,v) + (1-α)*Influence Power(u,v) User Layer Yildirim, Hilmi, and Mukkai S. Krishnamoorthy. "A random walk method for alleviating the sparsity problem in collaborative filtering." Proceedings of the 2008 ACM conference on Recommender systems. ACM, 2008. Influence-based User Transition Probabilities
  • 31. Outline • Introduction • Related Works • Cold Start: – Random Walk and Probability Assignment • Algorithms • Temporal Decay Issues – ItemBetw – PastDecay • Credibility & Accordance • Experiment Design • Discussion and Conclusion 31
  • 32. Exponential Time Decay Function 32 Dunlavy, Daniel M., Tamara G. Kolda, and Evrim Acar. "Temporal link prediction using matrix and tensor factorizations." ACM Transactions on Knowledge Discovery from Data (TKDD) 5.2 (2011): 10.
  • 33. Time Interval Analysis – ItemBetw User Layer Item Layer {u, i1, t1} {u, i2, t2} User u take action i1 at timestamp t1 i2 at timestamp t2 33
  • 34. Time Interval – ItemBetw • By assumption: items which users took action on it in short interval gains higher similarity “you all items are my favorite of past…” Where items which user take action during long timeslot will become close to 0 34
  • 35. Time Interval Analysis – PastDecay User Layer Item Layer {u, i, t1} {u, j, t2} User u take action i at timestamp t1 j at timestamp t2 k at timestamp t3 {u, k, t3} 35
  • 36. Time Interval - PastDecay • By assumption: items which users action it in short time before now gains higher similarity The newer, the better !!! Where items which user take action during long time interval will be close to 0 36
  • 37. Outline • Introduction • Related Works • Cold Start: – Random Walk and Probability Assignment • Algorithms • Temporal Decay Issues • Credibility & Accordance • Experiment Design • Discussion and Conclusion 37
  • 38. Credibility & Accordance • What is the evidently to examine recommendation quality of algorithm? – The ranking of testing item in our rank list! – For the best case: rank = 1, presented by avg. percentage: Rank 3 out of top-15 => credibility u,i =20% – Metrics to a Recommender System/Method • Select the highest Probability of related item/user as the reference 38
  • 39. Outline • Introduction • Related Works • Cold Start: – Random Walk and Probability Assignment • Algorithms • Temporal Decay Issues • Credibility & Accordance • Experiment Design – ALL-BUT-ONE Evaluation – Dataset Description – Experimental Result • Discussion and Conclusion 39
  • 40. ALL-BUT-ONE Evaluation • Also called “leave-one-out” method • Predict the last item i target user u took • Output top-N, if the action items is contained, calls a HIT Item Layer {u, i1, t1} {u, i2, t2} {u, i3, t3} 40 {u, i?, tlast} , L to be the testing set size.
  • 41. Dataset of Experiment 41 • bookmark data • 68,215 bookmark URLs from 1,867 users • friendship “become mutual fans” with timestamp information <source_user, target_user, timestamp> • Action also with timestamp to measure the interval influence. <user, item, timestamp>
  • 42. Dataset Description • Social degree of node (trust) conforms power-law distribution. 42 0 10 20 30 40 50 60 70 80 1 5 9 13 17 21 25 29 33 37 41 45 49 53 57 61 65 69 73 77 81 85 89 User Action Times Distribution #(Itemto Tag) (#Days ) 0 100 200 300 400 500 600 700 800 900 10 20 30 40 50 60 70 80 90 100110120 USER DEGREE OF TRUST DISTRIBUTION (#Social Degree) (#User s)
  • 43. Experiment - Learning Influence • User-Based Similarity: – Average correlation by Jaccard index – 2.58% – Average correlation in mutual trust – 8.28% (4 times as average!) 0 500 1000 1500 2000 2500 3000 3500 4000 4500 0.001 0.011 0.021 0.031 0.041 0.051 0.061 0.071 0.081 0.091 0.101 0.111 0.121 0.131 0.141 0.151 0.161 0.171 0.181 0.191 User-based Similarity 0.001 0.01 0.019 0.028 0.037 0.046 0.055 0.064 0.073 0.082 0.091 0.1 0.109 0.118 0.127 0.136 0.145 0.154 0.163 0.172 0.181 0.19 0.199 User-based Similarity – with Mutual Trust 43
  • 44. Experimental Result 44 0 5 10 15 20 25 30 10 20 30 40 50 60 70 80 90 100 RECALL AND TOP-K SIZE MIN_ITEM_FOR_USER>5 user-based influence based itemBased itemEnhanced relational popular 0 5 10 15 20 25 10 20 30 40 50 60 70 80 90 100 RECALL AND TOP-K SIZE MIN_ITEM_FOR_USER > 1 userbased influenceBased itemBased itemEnhanced Trustwalker popular
  • 45. Result for Cold Start User 0 5 10 15 20 25 30 35 40 45 Recall for Cold Start User with action-item <10 item-based RW user-based RW Influence itemAdjust TrustWalker Hit Radio(%) 10 20 30 40 50 60 70 80 90 100
  • 46. Results for ratio of Global/Friendship Ratio α α*user-similarity(u,v) + (1-α)*Influence Power(u,v) 0 5 10 15 20 25 30 35 40 45 1 2 3 4 5 6 7 8 9 10 Recall for Cold Start User with Action-item <10 alpha = 0.1 alpha =0.01 alpha =0.001 alpha =0.0001 Hit Radio(%)
  • 47. Time Interval Decay Result - ItemBetw • Set decay function as constant = 1 gain the best performance! 0 5 10 15 20 25 30 1.5 1.1 1.05 1.01 1 0.99 0.95 0.9 0.8 0.7 TIME ITEMBETW TOP-K CURVE 47 Hit Radio(%) 0 5 10 15 20 25 30 10 30 50 70 90 Time ItemBetw Top-K Curve 1.5 1.1 1.05 1.01 1 0.99 0.95 0.99 0.95 0.7
  • 48. Time Interval Decay Result - PastDecay 0 5 10 15 20 25 10 20 30 40 50 60 70 80 90 100 TIMEDECAY 1.5 1.1 1.05 1.01 1 0.99 0.95 0.9 0.8 0 5 10 15 20 25 1.5 1.1 1.05 1.01 1 0.99 0.95 0.9 0.8 0.7 TimeDecay Top-k Curve 48
  • 49. Outline • Introduction • Related Works • Cold Start: – Random Walk and Probability Assignment • Algorithms • Temporal Decay Issues • Credibility & Accordance • Experiment Design • Discussion and Conclusion 49
  • 50. Discussion - Why TrustWalker Fails? • TrustWalker puts more emphasis on the local trusted user instead of global similar user. • Minimize the Mean Square Error : – Similar to Non-personalized Popular List • As mentioned, top-N result is more user-friendly 50 TrustWalker Experiment on dataset: Epinion Become a fans of experts and Columnists Trust > Global similarity
  • 51. Discussion: Influence Based Random Walk 51 • For α is near to 0.001 – In the different scale of user similarit • Like Decision tree: – Similarity would be the primary and Influence power are the secondary Comparison metrics sim(u,v) Influence Power(u,v)
  • 52. Discussion: Time Interval Decay 52 • Achieve peak when all the data remain the same weight in the time issue. • “In predefined dataset, you should not easily abandon or under estimate value of old data.”
  • 53. Conclusion • Propose novel method by influence. – Influence-based Random Walk – Intersection with item and user • Probe and leverage influence probabilities and user correlation for cold start user • Provide creditability and Accordance for user experience and feedback in RS • Analyze the time decay function by 2 decay function – PastDecay – Itembetw 53
  • 54. Q&A Thanks for Your Attention! 54