Skip to main content
Log in

A bandit method using probabilistic matrix factorization in recommendation

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

In recommendation system, sparse data and cold-start user have always been a challenging problem. Using a linear upper confidence bound (UCB) bandit approach as the item selection strategy based on the user historical ratings and user-item context, we model the recommendation problem as a multi-arm bandit (MAB) problem in this paper. Enabling the engine to recommend while it learns, we adopt probabilistic matrix factorization (PMF) in this strategy learning phase after observing the payoff. In particular, we propose a new approach to get the upper bound statistics out of latent feature matrix. In the experiment, we use two public datasets (Netfilx and MovieLens) to evaluate our proposed model. The model shows good results especially on cold-start users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Sarwar B, Karypis G, Konstan J, et al. Itembased collaborative filtering recommendation algorithms [C]//Proceedings of the 10th international conference on World Wide Web. Hong Kong, China: ACM, 2001: 285–295.

    Google Scholar 

  2. Schein A I, Popescul A, Ungar L H, et al. Methods and metrics for cold-start recommendations [C]//Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. Tampere, Finland: ACM, 2002: 253–260.

    Google Scholar 

  3. Koren Y, Bell R, Volinsky C. Matrix factorization techniques for recommender systems [J]. Computer, 2009, 42(8): 30–37.

    Article  Google Scholar 

  4. Lee D D, Seung H. Algorithms for non-negative matrix factorization [J]. Advances in Neural Information Processing Systems, 2001, 13: 556–562.

    Google Scholar 

  5. Jamali M, Ester M. A matrix factorization technique with trust propagation for recommendation in social networks [C]//Proceedings of the 4th ACM Conference on Recommender Systems. Barcelona, Spain: ACM, 2010: 135–142.

    Chapter  Google Scholar 

  6. Ma H, Yang H, Lyu M R, et al. Sorec: Social recommendation using probabilistic matrix factorization [C]//Proceedings of the 17th ACM Conference on Information and Knowledge Management. Napa. Valley, California, USA: ACM, 2008: 931–940.

    Google Scholar 

  7. Macready W G, Wolpert D H. Bandit problems and the exploration/exploitation tradeoff [J]. IEEE Transactions on Evolutionary Computation, 1998, 2(1): 2–22.

    Article  Google Scholar 

  8. Auer P. Using confidence bounds for exploitationexploration trade-offs [J]. The Journal of Machine Learning Research, 2003, 3: 397–422.

    MathSciNet  MATH  Google Scholar 

  9. Salakhutdinov R, Mnih A. Probabilistic matrix factorization [C]//Advances in Neural Information Processing Systems. Cambridge, Massachusetts: MIT Press, 2007: 1257–1264.

    Google Scholar 

  10. Golub G H, Reinsch C. Singular value decomposition and least squares solutions [J]. Numerische Mathematik, 1970, 14(5): 403–420.

    Article  MathSciNet  MATH  Google Scholar 

  11. Precup D, Sutton R S, Singh S. Eligibility traces for off-policy policy evaluation [C]//Proceedings of 17th International Conference on Machine Learning. San Francisco, CA, USA: Morgan Kaufmann, 2000: 759–766.

    Google Scholar 

  12. Li L, Chu W, Langford J, et al. A contextual-bandit approach to personalized news article recommendation [C]//Proceedings of the 19th International Conference on World Wide Web. Raleish, North Carolina, USA: ACM, 2010: 661–670.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shi-tao Tu  (涂世涛).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tu, St., Zhu, Lj. A bandit method using probabilistic matrix factorization in recommendation. J. Shanghai Jiaotong Univ. (Sci.) 20, 535–539 (2015). https://doi.org/10.1007/s12204-015-1618-7

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-015-1618-7

Keywords

CLC number

Document code

Navigation