Skip to main content

2016 | OriginalPaper | Buchkapitel

Locality-Sensitive Linear Bandit Model for Online Social Recommendation

verfasst von : Tong Zhao, Irwin King

Erschienen in: Neural Information Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recommender systems provide personalized suggestions by learning users’ preference based on their historical feedback. To alleviate the heavy relying on historical data, several online recommendation methods are recently proposed and have shown the effectiveness in solving data sparsity and cold start problems in recommender systems. However, existing online recommendation methods neglect the use of social connections among users, which has been proven as an effective way to improve recommendation accuracy in offline settings. In this paper, we investigate how to leverage social connections to improve online recommendation performance. In particular, we formulate the online social recommendation task as a contextual bandit problem and propose a Locality-sensitive Linear Bandit (LS.Lin) method to solve it. The proposed model incorporates users’ local social relations into a linear contextual bandit model and is capable to deal with the dynamic changes of user preference and the network structure. We provide a theoretical analysis to the proposed LS.Lin method and then demonstrate its improved performance for online social recommendation in empirical studies compared with baseline methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abbasi-Yadkori, Y., Pal, D., Szepesvari, C.: Improved algorithms for linear stochastic bandits. In: NIPS (2011) Abbasi-Yadkori, Y., Pal, D., Szepesvari, C.: Improved algorithms for linear stochastic bandits. In: NIPS (2011)
2.
Zurück zum Zitat Agarwal, D., Chen, B.-C., Elango, P.: Explore/exploit schemes for web content optimization. In: ICDM (2009) Agarwal, D., Chen, B.-C., Elango, P.: Explore/exploit schemes for web content optimization. In: ICDM (2009)
3.
Zurück zum Zitat Audibert, J.-Y., Munos, R., Szepesvari, C.: Exploration-exploitation tradeoff using variance estimates in multi-armed bandits. Theoret. Comput. Sci. 410(19), 1876–1902 (2009)MathSciNetCrossRefMATH Audibert, J.-Y., Munos, R., Szepesvari, C.: Exploration-exploitation tradeoff using variance estimates in multi-armed bandits. Theoret. Comput. Sci. 410(19), 1876–1902 (2009)MathSciNetCrossRefMATH
4.
Zurück zum Zitat Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47, 235–256 (2002)CrossRefMATH Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47, 235–256 (2002)CrossRefMATH
5.
6.
Zurück zum Zitat Bubeck, S., Cesa-Bianchi, N.: Regret analysis of stochastic and nonstochastic multi-armed bandit problems. Found. Trends Mach. Learn. 5, 1–122 (2012)CrossRefMATH Bubeck, S., Cesa-Bianchi, N.: Regret analysis of stochastic and nonstochastic multi-armed bandit problems. Found. Trends Mach. Learn. 5, 1–122 (2012)CrossRefMATH
7.
Zurück zum Zitat Buccapatnam, S., Eryilmaz, A., Shroff, N.B.: Multi-armed bandits in the presence of side observations in social networks. OSU Tech. rep. (2013) Buccapatnam, S., Eryilmaz, A., Shroff, N.B.: Multi-armed bandits in the presence of side observations in social networks. OSU Tech. rep. (2013)
8.
Zurück zum Zitat Cantador, I., Brusilovsky, P., Kuflik, T.: 2nd workshop on information heterogeneity and fusion in recommender systems (hetrec 2011). In: Recsys (2011) Cantador, I., Brusilovsky, P., Kuflik, T.: 2nd workshop on information heterogeneity and fusion in recommender systems (hetrec 2011). In: Recsys (2011)
9.
Zurück zum Zitat Cesa-Bianchi, N., Gentile, C., Zappella, G.: A gang of bandits. In: NIPS (2013) Cesa-Bianchi, N., Gentile, C., Zappella, G.: A gang of bandits. In: NIPS (2013)
10.
Zurück zum Zitat Chu, W., Li, L., Reyzin, L., Schapire, R.E.: Contextual bandits with linear payoff functions. In: AISTAS (2011) Chu, W., Li, L., Reyzin, L., Schapire, R.E.: Contextual bandits with linear payoff functions. In: AISTAS (2011)
11.
Zurück zum Zitat Fang, H., Bao, Y., Zhang, J.: Leveraging decomposed trust in probabilistic matrix factorization for effective recommendation. In: AAAI (2014) Fang, H., Bao, Y., Zhang, J.: Leveraging decomposed trust in probabilistic matrix factorization for effective recommendation. In: AAAI (2014)
12.
Zurück zum Zitat Fang, M., Tao, D.: Networked bandits with disjoint linear payoffs. In: KDD (2014) Fang, M., Tao, D.: Networked bandits with disjoint linear payoffs. In: KDD (2014)
13.
Zurück zum Zitat Gai, Y., Krishnamachari, B., Jain, R.: Combinatorial network optimization with unknown variables: multi-armed bandits with linear rewards and individual observations. TON 20(5), 1466–1478 (2012) Gai, Y., Krishnamachari, B., Jain, R.: Combinatorial network optimization with unknown variables: multi-armed bandits with linear rewards and individual observations. TON 20(5), 1466–1478 (2012)
14.
Zurück zum Zitat Gentile, C., Li, S., Zappella, G.: Online clustering of bandits. In: ICML (2014) Gentile, C., Li, S., Zappella, G.: Online clustering of bandits. In: ICML (2014)
15.
Zurück zum Zitat Guo, G., Zhang, J., Yorke-Smith, N.: Trustsvd: collaborative filtering with both the explicit and implicit influence of user trust and of item ratings. In: AAAI (2015) Guo, G., Zhang, J., Yorke-Smith, N.: Trustsvd: collaborative filtering with both the explicit and implicit influence of user trust and of item ratings. In: AAAI (2015)
16.
Zurück zum Zitat Hu, G.-N., Dai, X.-Y., Song, Y., Huang, S.-J., Chen, J.-J.: A synthetic approach for recommendation: combining ratings, social relations, and reviews. In: IJCAI (2015) Hu, G.-N., Dai, X.-Y., Song, Y., Huang, S.-J., Chen, J.-J.: A synthetic approach for recommendation: combining ratings, social relations, and reviews. In: IJCAI (2015)
17.
Zurück zum Zitat Hu, L., Sun, A., Liu, Y.: Your neighbors affect your ratings: on geographical neighborhood influence to rating prediction. In: SIGIR (2014) Hu, L., Sun, A., Liu, Y.: Your neighbors affect your ratings: on geographical neighborhood influence to rating prediction. In: SIGIR (2014)
18.
Zurück zum Zitat Koren, Y.: Factorization meets the neighborhood: a multifaceted collaborative filtering model. In: KDD (2008) Koren, Y.: Factorization meets the neighborhood: a multifaceted collaborative filtering model. In: KDD (2008)
19.
Zurück zum Zitat Lacerda, A., Santos, R.L., Veloso, A., Ziviani, N.: Improving daily deals recommendation using explore-then-exploit strategies. Inf. Retr. 18(2), 95–122 (2015)CrossRef Lacerda, A., Santos, R.L., Veloso, A., Ziviani, N.: Improving daily deals recommendation using explore-then-exploit strategies. Inf. Retr. 18(2), 95–122 (2015)CrossRef
20.
Zurück zum Zitat Li, L., Chu, W., Langford, J., Schapire, R.E.: A contextual-bandit approach to personalized news article recommendation. In: WWW (2010) Li, L., Chu, W., Langford, J., Schapire, R.E.: A contextual-bandit approach to personalized news article recommendation. In: WWW (2010)
21.
Zurück zum Zitat Ma, H., Yang, H., Lyu, M.R., King, I.: Sorec: social recommendation using probabilistic matrix factorization. In: CIKM Ma, H., Yang, H., Lyu, M.R., King, I.: Sorec: social recommendation using probabilistic matrix factorization. In: CIKM
22.
Zurück zum Zitat Ma, H., Zhou, D., Liu, C., Lyu, M.R., King, I.: Recommender systems with social regularization. In: WSDM (2011) Ma, H., Zhou, D., Liu, C., Lyu, M.R., King, I.: Recommender systems with social regularization. In: WSDM (2011)
23.
Zurück zum Zitat Nguyen, T.T., Lauw, H.W.: Dynamic clustering of contextual multi-armed bandits. In: CIKM (2014) Nguyen, T.T., Lauw, H.W.: Dynamic clustering of contextual multi-armed bandits. In: CIKM (2014)
24.
Zurück zum Zitat Noel, J., Sanner, S., Tran, K., Christen, P., Xie, L., Bonilla, E.V., Abbasnejad, E., Penna, N.D.: New objective functions for social collaborative filtering. In: WWW (2012) Noel, J., Sanner, S., Tran, K., Christen, P., Xie, L., Bonilla, E.V., Abbasnejad, E., Penna, N.D.: New objective functions for social collaborative filtering. In: WWW (2012)
25.
Zurück zum Zitat Pandey, S., Olston, C.: Handling advertisements of unknown quality in search advertising. In: NIPS (2006) Pandey, S., Olston, C.: Handling advertisements of unknown quality in search advertising. In: NIPS (2006)
26.
Zurück zum Zitat Radlinski, F., Kleinberg, R., Joachims, T.: Learning diverse rankings with multi-armed bandits. In: ICML (2008) Radlinski, F., Kleinberg, R., Joachims, T.: Learning diverse rankings with multi-armed bandits. In: ICML (2008)
27.
Zurück zum Zitat Shen, Y., Jin, R.: Learning personal + social latent factor model for social recommendation. In: Proceedings of SIGKDD, pp. 1303–1311 (2012) Shen, Y., Jin, R.: Learning personal + social latent factor model for social recommendation. In: Proceedings of SIGKDD, pp. 1303–1311 (2012)
28.
Zurück zum Zitat Slivkins, A.: Multi-armed bandits on implicit metric spaces. In: NIPS (2011) Slivkins, A.: Multi-armed bandits on implicit metric spaces. In: NIPS (2011)
29.
Zurück zum Zitat Tang, L., Jiang, Y., Li, L., Zeng, C., Li, T.: Personalized recommendation via parameter-free contextual bandits (2015) Tang, L., Jiang, Y., Li, L., Zeng, C., Li, T.: Personalized recommendation via parameter-free contextual bandits (2015)
30.
Zurück zum Zitat Zhao, T., Li, C., Li, M., Ding, Q., Li, L.: Social recommendation incorporating topic mining and social trust analysis. In: CIKM (2013) Zhao, T., Li, C., Li, M., Ding, Q., Li, L.: Social recommendation incorporating topic mining and social trust analysis. In: CIKM (2013)
31.
Zurück zum Zitat Zhao, T., McAuley, J.J., King, I.: Leveraging social connections to improve personalized ranking for collaborative filtering. In: CIKM (2014) Zhao, T., McAuley, J.J., King, I.: Leveraging social connections to improve personalized ranking for collaborative filtering. In: CIKM (2014)
Metadaten
Titel
Locality-Sensitive Linear Bandit Model for Online Social Recommendation
verfasst von
Tong Zhao
Irwin King
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-46687-3_9