Skip to main content
Log in

Online role mining for context-aware mobile service recommendation

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Finding and recommending suitable services for mobile devices are increasingly important due to the popularity of mobile Internet. While recent research has attempted to use role-based approaches to recommend services, role discovery is still an ongoing research topic. Using role-based approaches, popular mobile services can be recommended to other members in the same role group in a context- dependent manner. This paper proposes several role mining algorithms, to suit different application requirements, that automatically group users according to their interests and habits dynamically. Most importantly, we propose an online role mining algorithm that can discover role patterns efficiently and incrementally. Finally, we present a complete, question-based framework that can efficiently perform role mining for context-aware service recommendation in a mobile environment—where a device may not be always connected to the server and/or scalability of the role mining algorithm running on the server is critical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28

Similar content being viewed by others

Reference

  1. Adomavicius G, Tuzhilin A (2011) Context-aware recommender systems. In: Ricci F, Rokach L, Shapira B, Kantor PB (eds) Recommender systems handbook. Springer, p 217–253

  2. Aich S, Mondal S, Sural S, Majumdar AK (2009) Role based access control with spatiotemporal context for mobile applications. Trans Comput Sci 4:177–199

    Google Scholar 

  3. Biddle BJ (1979) Role theory: expectations, identities, and behaviors. Academic Press, New York

    Google Scholar 

  4. Cao H, Bao T, Yang Q, Chen E, Tian J (2010) An effective approach for mining mobile user habits. In: CIKM. p 1677–1680

  5. Chen A (2005) Context-aware collaborative filtering system: predicting the user’s preferences in ubiquitous computing. In: CHI Extended Abstracts. p 1110–1111

  6. Cheverst K, Mitchell K, Davies N (2002) Exploring context-aware information push. Pers Ubiquit Comput 6(4):276–281

    Article  Google Scholar 

  7. Ene A, Horne WG, Milosavljevic N, Rao P, Schreiber R, Tarjan RE (2008) Fast exact and heuristic methods for role minimization problems. In: SACMAT. p 1–10

  8. Fogg BJ, Eckles D (2007) The behavior chain for online participation: how successful web services structure persuasion. In: PERSUASIVE. p 199–209

  9. Frank M, Buhmann JM, Basin DA (2010) On the definition of role mining. In: SACMAT. p 35–44

  10. Frank M, Streich AP, Basin DA, Buhmann JM (2009) A probabilistic approach to hybrid role mining. In: ACM conference on computer and communications security. p 101–111

  11. Fukazawa Y, Naganuma T, Fujii K, Kurakake S (2006) Construction and use of role-ontology for task-based service navigation system. In: International semantic web conference. p 806–819

  12. Geerts F, Goethals B, Mielikäinen T (2004) Tiling databases. In: Discovery science. p 278–289

  13. Guo X, Zheng B, Ishikawa Y, Gao Y (2011) Direction-based surrounder queries for mobile recommendations. VLDB J 20(5):743–766

    Article  Google Scholar 

  14. Kulkarni D, Tripathi A Context-aware role-based access control in pervasive computing systems. In: Ray I, Li N (eds) SACMAT. p 113–122. ACM

  15. Liu DR, Tsai PY, Chiu PH (2011) Personalized recommendation of popular blog articles for mobile applications. Inf Sci 181(9):1552–1572

    Article  Google Scholar 

  16. Masolo C, Vieu L, Bottazzi E, Catenacci C, Ferrario R, Gangemi A, Guarino N (2004) Social roles and their descriptions. In: KR. p 267–277

  17. Orlin JB (1977) Contentment in graph theory: covering graphs with cliques. Indag Math Proc 80(5):406–424

    Article  MATH  MathSciNet  Google Scholar 

  18. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput Archit Lett 29(2):38–47

    Article  Google Scholar 

  19. Su X, Khoshgoftaar TM (2009) A survey of collaborative filtering techniques. Adv. Artif Intell 2009

  20. Sunagawa E, Kozaki K, Kitamura Y, Mizoguchi R (2004) Organizing role-concepts in ontology development environment: Hozo. In: Hozo, AI technical report (Artificial Intelligence Research Group, I. S. I. R., Osaka Univ, p 2004

  21. Vaidya J, Atluri V, Guo Q, Guo Q (2007) The role mining problem: finding a minimal descriptive set of roles. In: SACMAT. p 175–184

  22. Varshney U (2012) An approach for smart artifacts for mobile advertising. In: DESRIST. p 147–151

  23. Wang J, Zeng C, He C, Hong L, Zhou L, Wong RK, Tian J (2012) Context-aware role mining for mobile service recommendation. In: SAC. p 173–178

  24. Wong RK, Chau HL, Lochovsky FH (1997) A data model and semantics of objects with dynamic roles. In: ICDE. p 402–411

  25. Wong RK, Chu VW, Hao T, Wang J (2012) Context-aware service recommendation for moving connected devices. In: International conference on connected vehicles and expo (ICCVE)

  26. Wörndl W, Schulze F, Schlichter J Context-aware recommender systems in mobile scenarios. http://www11.in.tum.de/forschung/projekte/cars/

  27. Yang G (2004) The complexity of mining maximal frequent itemsets and maximal frequent patterns. In: KDD. p 344–353

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raymond K. Wong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wong, R.K., Chu, V.W. & Hao, T. Online role mining for context-aware mobile service recommendation. Pers Ubiquit Comput 18, 1029–1046 (2014). https://doi.org/10.1007/s00779-013-0717-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-013-0717-4

Keywords

Navigation