A Novel Framework to Process the Quantity and Quality of User Behavior Data in Recommender Systems

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9658)

Abstract

Recommender system has become one of the most popular techniques to cope with the information overload problem. In the past years many algorithms have been proposed to obtain accurate recommendations. Such methods usually put all the collected user data into learning models without a careful consideration of the quantity and quality of individual user feedbacks. Yet in real applications, different types of users tend to represent preferences and opinions in various ways, thus resulting in user data with radically diverse quantity and quality. This characteristic of data influences the performance of recommendations. However, little attention has been devoted to the management of quantity and quality for user data in recommender systems. In this paper, we propose a generic framework to seamlessly exploit different pre-processing and recommendation approaches for ratings of different users. More specifically, we first classify users into groups based on the quantity and quality of their behavior data. In order to handle the user groups diversely, we further propose several data pre-processing strategies. Subsequently, we present a novel transfer latent factor model (TLMF) to transfer learnt models between groups. Finally, we conduct extensive experiments on a large data set and demonstrate the effectiveness of our proposed framework.

Keywords

Recommender system Quantity and quality Pre-processing Transfer learning 

References

  1. 1.
    Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 17(6), 734–749 (2005)CrossRefGoogle Scholar
  2. 2.
    Amatriain, X., Pujol, J.M., Oliver, N.: I like it… I like it not: evaluating user ratings noise in recommender systems. In: Houben, G.-J., McCalla, G., Pianesi, F., Zancanaro, M. (eds.) UMAP 2009. LNCS, vol. 5535, pp. 247–258. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  3. 3.
    Amatriain, X., Pujol, J.M., Tintarev, N., Oliver, N.: Rate it again: increasing recommendation accuracy by user re-rating. In: International ACM Conference on Recommender Systems, pp. 173–180 (2009)Google Scholar
  4. 4.
    Amatriain, X.: Mining large streams of user data for personalized recommendations. ACM SIGKDD Explorations Newsletter, vol. 14(2), pp. 37–48 (2013)Google Scholar
  5. 5.
    Bellogin, A., Said, A., de Vries, A.P.: The magic barrier of recommender systems – no magic, just ratings. In: Dimitrova, V., Kuflik, T., Chin, D., Ricci, F., Dolog, P., Houben, G.-J. (eds.) UMAP 2014. LNCS, vol. 8538, pp. 25–36. Springer, Heidelberg (2014)Google Scholar
  6. 6.
    Chang, S., Harper, F.M., Terveen, L.: Using groups of items to bootstrap new users in recommender systems. In: ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 1258–1269 (2015)Google Scholar
  7. 7.
    Ekstrand, M.D., Ludwig, M., Konstan, J.A., Riedl, J.: Rethinking the recommender research ecosystem: reproducibility, openness, and LensKit. In: ACM Conference on Recommender Systems, pp. 133–140 (2011)Google Scholar
  8. 8.
    Herlocker, J.L., Konstan, J.A., Terveen, L.G., Riedl, J.: Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst. 22(1), 5–53 (2004)CrossRefGoogle Scholar
  9. 9.
    Hussein, T., Linder, T., Gaulke, W., Ziegler, J.: Hybreed: a software framework for developing context-aware hybrid recommender systems. User Model. User-Adap. Inter. 24(1–2), 121–174 (2014)CrossRefGoogle Scholar
  10. 10.
    Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer 8, 30–37 (2009)CrossRefGoogle Scholar
  11. 11.
    Li, B., Chen, L., Zhu, X., et al.: Noisy but non-malicious user detection in social recommender systems. World Wide Web J. 16(5–6), 677–699 (2013)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Liu, N.N., Meng, X., Liu, C., Yang, Q.: Wisdom of the better few: cold start recommendation via representative based rating elicitation. In: ACM Conference on Recommender Systems, pp. 37–44 (2011)Google Scholar
  13. 13.
    O’Mahony, M.P., Hurley, N.J., Silvestre, G.: Detecting noise in recommender system databases. In: International Conference on Intelligent User Interfaces, pp. 109–115 (2006)Google Scholar
  14. 14.
    Pham, H.X., Jung, J.J.: Preference-based user rating correction process for interactive recommendation systems. Multimedia Tools Appl. 65(1), 119–132 (2013)CrossRefGoogle Scholar
  15. 15.
    Rashid, A.M., Karypis, G., Riedl, J.: Learning preferences of new users in recommender systems: an information theoretic approach. ACM SIGKDD Explorations Newsletter, vol. 10(2), pp. 90–100 (2008)Google Scholar
  16. 16.
    Rendle, S., Gantner, Z., Freudenthaler, C., Schmidt-Thieme, L.: Fast context-aware recommendations with factorization machines. In: International Conference on Research and Development in Information Retrieval, pp. 635–644 (2011)Google Scholar
  17. 17.
    Sarwar, B., Karypis, G., Konstan, J.A., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: International ACM Conference on World Wide Web, pp. 285–295 (2001)Google Scholar
  18. 18.
    Schelter, S., Boden, C., Schenck, M., Alexandrov, A., Markl, V.: Distributed matrix factorization with map-reduce using a series of broadcast-joins. In: International ACM Conference on Recommender Systems, pp. 281–284 (2013)Google Scholar
  19. 19.
    Yu, P., Lin, L., Wang, F., Wang, J., Wang, M.: Improving recommendations with collaborative factors. In: Li, F., Li, G., Hwang, S.-W., Yao, B., Zhang, Z. (eds.) WAIM 2014. LNCS, vol. 8485, pp. 30–33. Springer, Heidelberg (2014)Google Scholar
  20. 20.
    Zhuang, Y., Chin, W.S., Juan, Y.C., Lin, C.J.: A fast parallel SGD for matrix factorization in shared memory systems. In: International ACM Conference on Recommender Systems, pp. 249–256 (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.College of Computer Science and TechnologyZhejiang UniversityHangzhouChina
  2. 2.China Information Technology Security Evaluation CenterBeijingChina

Personalised recommendations