SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Computing in Social Networks:
Building Recommendation
Systems on Social Data
Outlook
Introduction
Recommender Systems
Examples of recommender systems
Challenges with recommendation research
Social networks and recommendations
Show case of experimental work on:
Trust-aware recommendations
Privacy preserving recommendations
Diversity and opinions
Conclusion
NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
2
Personalization and recommendations
Problem:
• Information overload…
Personalization and Profiles
• Users want to get personalized experience and at the same time don’t
want to share a lot of their personal information.
Recommendation systems
• Referred to as a range of algorithms which suggest a collection of items
to users, based on the knowledge of their profiles or previous
interactions.
Recommendation systems types:
• Collaborative filtering (User-based)
• Content-based filtering (Item-based)
• Hybrid filtering (Mix of users and content)
NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
3
NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
4
Applications of
Recommendation Systems
Important Challenges in Recommendation
Research
1. Explaining the recommendations
It increases the trust of users as they know what is the basis
of the suggestions
2. Preserving the user privacy
How to make good recommendations without ignoring user
privacy
3. Diversity and novelty of recommendations
Recommenders suggest similar stuff to what you have seen,
it is important to get
5NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Social networks
Social networks [Wasserman et al,
1994]
• Focus of fields such as
behavioral, marketing, economics,
etc.
Relationships types
• Interactions, social relations
Explicit relationships
• Relations in online social networks
like in facebook, linkedin, etc).
Implicit relationships
• Computed based on users
behavior. For instance rating
movies, music, etc.
6NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Image: https://www.facebook.com/notes/facebook-
engineering/visualizing-friendships/
Benefits of using social networks
for recommendations
• Take advantage of social network structure:
• Trust, social and structural Influence, transitivity, etc.
• Resilient against fraud, spam and fake accounts
• Identity and connections of the people on a social
network helps on dealing with bad guys
• Cold start problem
• System always has people to suggest (as long as they
are connected to the social network)
7NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Experimental work with trust and
recommendations
• Extracting trust networks from
• Getting better reach to items and users for improved
guessing of items to suggest.
• Using trust (networks) to improve accuracy of
recommendations generated
• Accurate suggestions of movies to watch, people to
follow, etc.
8NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Visualization of Trust Relations in
Ciao Dataset
9NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
In Nima Dokoohaki, Shahab Mokarizadeh, Mihhail Matskin, Ramona Bunea.
Correlating Trust and Privacy in Recommender Systems,
Special Issue on Web Intelligence and Personalization on Social Media,
Web Intelligence and Agent Systems An International Journal. IOS Press, 2014.
(submitted for review)
Trust networks and recommendations:
Data: Ratings Profiles to Trust Networks
10NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Trust networks and recommendations:
Impact of Trust Metric on Generated
Networks Structure
11NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Generated Trust Networks for Top-10 Trustworthy Users
(n= 5, m= 5): Without T-index
Generated Trust Networks for Top-10 Trustworthy
Users (n= 5, m=5): With T-index (= 100)
Soude Fazeli, Alireza Zarghami, Nima Dokoohaki, Mihhail Matskin,
Mechanizing Social Trust-Aware Recommenders with T-index Augmented Trustworthiness,
In proceedings of the 7th International Conference on Trust, Privacy & Security in Digital Business (Trustbus 2010)
Trust networks and recommendations:
Prediction accuracy against the variations
of Trustworthiness and Neighborhood size
12NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Soude Fazeli, Alireza Zarghami, Nima Dokoohaki, Mihhail Matskin,
Elevating Prediction Accuracy in Trust-aware Collaborative Filtering Recommenders through T-index Metric and TopTrustee lists,
In the Journal of Emerging Technologies in Web Intelligence (JETWI),
Special Issue On Web Personalization, Reputation and Recommender Systems, 2010.
Trust networks and recommendations
Rating Prediction Accuracy against network
(neighborhood) size
13NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Influence of search range on item coverage and prediction accuracy for Epinions dataset.
Stefan Magureanu, Nima Dokoohaki, Shahab Mokarizadeh, Mihhail Matskin,
Epidemic Trust-Based Recommender Systems ,
In proceedings of 2012 ASE/IEEE International Social Computing Conference
(SocialCom2012)
Experimental work with
Privacy and recommendations
• Proposing for software architectures that improve privacy of
recommendations
• How much data should the system use, can we control
this amount ?
• Can we use enough data and still get decent
suggestions ?
14NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Privacy and recommendations:
Component Architectures for Preserving
Privacy during Computations
15NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Nima Dokoohaki, Cihan Kaleli, Huseyin Polat and Mihhail Matskin,
Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender
Systems, The Second International Conference on Social Informatics (SocInfo 10)
Ramona Bunea, Shahab Mokarizadeh, Nima Dokoohaki and Mihhail Matskin,
Exploiting Dynamic Privacy in Socially Regularized Recommenders,
PinSoDa: Privacy in Social Data, in conjunction with the 11th IEEE International Conference on Data Mining (ICDM 2012)
NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
16
Privacy and recommendations:
Comparing performance of recommendations generated
Ramona Bunea, Shahab Mokarizadeh, Nima Dokoohaki and Mihhail Matskin,
Exploiting Dynamic Privacy in Socially Regularized Recommenders,
PinSoDa: Privacy in Social Data, in conjunction with the 11th IEEE International Conference on Data Mining (ICDM 2012)
Experimental work with diversity and
opinions recommendations
• How to diversify the recommendations
• What models can be proposed to give better summary
of reviews
• How to improve the recommendations of opinions in terms
of accuracy and scalability
• What models can be proposed to find more similar
people to read their Tweets.
17NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Data: From Review Profiles to Topic models
18NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Recommending Summarized Reviews:
Comparing Customer Ratings and estimated Sentiments
19NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
Ralf Krestel, Nima Dokoohaki
Diversifying Review Rankings, Special issue on Big Social Data Analytics,
Elsevier Journal of Neural Networks, 2014. Submitted for review.
Diversifying Summarized Reviews:
Comparing Recency of Summarization
Strategy Comparing LDA and LM
20NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
21
Recommending Tweets:
Visualizing variations of topics for #wikileaks
and #eurozone tweets, 2011
Extended results from: Nima Dokoohaki, Mihhail Matskin,
Mining Divergent Opinion Trust Networks through Latent Dirichlet Allocation,
In proceedings of 2012 IEEE/ACM International Conference on Social Network Analysis and Mining (ASONAM 2012)
Recommending Users:
Link Prediction on inferred trust relations,
tweets from 2009
22NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN
AUROC vs Number of Topics (Cosine)AUROC vs Number of Topics (KLD)
Extended results from: Nima Dokoohaki, Mihhail Matskin,
Mining Divergent Opinion Trust Networks through Latent Dirichlet Allocation,
In proceedings of 2012 IEEE/ACM International Conference on Social Network Analysis and Mining
(ASONAM 2012)
Conclusion
• This trail of research and education will continue under the
trends of data science and big data.
• KTH and other European institutions are planning to
design and offer study programs on data science and
analytics to students, hopefully very soon…
• Thank you!
24NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL
RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT,
STOCKHOLM, SWEDEN

Weitere ähnliche Inhalte

Andere mochten auch

Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systemsguest77b0cd12
 
Google Tech Talk on Social Recommendation
Google Tech Talk on Social RecommendationGoogle Tech Talk on Social Recommendation
Google Tech Talk on Social RecommendationDan Carroll
 
TurKit: A Toolkit for Human Computation Algorithms
TurKit: A Toolkit for Human Computation AlgorithmsTurKit: A Toolkit for Human Computation Algorithms
TurKit: A Toolkit for Human Computation AlgorithmsGreg Little
 
CrowdSearcher. Reactive and multiplatform Crowdsourcing. keynote speech at DB...
CrowdSearcher. Reactive and multiplatform Crowdsourcing. keynote speech at DB...CrowdSearcher. Reactive and multiplatform Crowdsourcing. keynote speech at DB...
CrowdSearcher. Reactive and multiplatform Crowdsourcing. keynote speech at DB...Search Computing
 
Fundchange and Koodonation Workshop Slides - Nov 23, 2011
Fundchange and Koodonation Workshop Slides - Nov 23, 2011Fundchange and Koodonation Workshop Slides - Nov 23, 2011
Fundchange and Koodonation Workshop Slides - Nov 23, 2011Ideavibes | Paul Dombowsky
 
Volunteer Anywhere
Volunteer AnywhereVolunteer Anywhere
Volunteer AnywhereHelpFromHome
 
Social media recommendation based on people and tags (final)
Social media recommendation based on people and tags (final)Social media recommendation based on people and tags (final)
Social media recommendation based on people and tags (final)es712
 
Social Recommendation
Social RecommendationSocial Recommendation
Social Recommendationgu wendong
 
RSWEB 2013: A research platform for social recommendation
RSWEB 2013: A research platform for social recommendationRSWEB 2013: A research platform for social recommendation
RSWEB 2013: A research platform for social recommendationAmit Sharma
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risksosuhaibany
 
Building Social Networks
Building Social NetworksBuilding Social Networks
Building Social Networksnyccamp
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptographyAmir Neziri
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 
It Only Takes a Minute
It Only Takes a MinuteIt Only Takes a Minute
It Only Takes a Minuteelliottofhook
 
Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.Matt Charney
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part IMaksim Djackov
 
FITC - Bootstrap Unleashed
FITC - Bootstrap UnleashedFITC - Bootstrap Unleashed
FITC - Bootstrap UnleashedRami Sayar
 
(Practical) Beyond Responsive Web Design (WordCamp Miami 2011)
(Practical) Beyond Responsive Web Design (WordCamp Miami 2011)(Practical) Beyond Responsive Web Design (WordCamp Miami 2011)
(Practical) Beyond Responsive Web Design (WordCamp Miami 2011)arborwebsolutions
 
Social journalism: Community building through social networks
Social journalism: Community building through social networksSocial journalism: Community building through social networks
Social journalism: Community building through social networksJD Lasica
 
Responsive Web Design - Introduction & Workflow Overview
Responsive Web Design - Introduction & Workflow OverviewResponsive Web Design - Introduction & Workflow Overview
Responsive Web Design - Introduction & Workflow OverviewAidan Foster
 

Andere mochten auch (20)

Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systems
 
Google Tech Talk on Social Recommendation
Google Tech Talk on Social RecommendationGoogle Tech Talk on Social Recommendation
Google Tech Talk on Social Recommendation
 
TurKit: A Toolkit for Human Computation Algorithms
TurKit: A Toolkit for Human Computation AlgorithmsTurKit: A Toolkit for Human Computation Algorithms
TurKit: A Toolkit for Human Computation Algorithms
 
CrowdSearcher. Reactive and multiplatform Crowdsourcing. keynote speech at DB...
CrowdSearcher. Reactive and multiplatform Crowdsourcing. keynote speech at DB...CrowdSearcher. Reactive and multiplatform Crowdsourcing. keynote speech at DB...
CrowdSearcher. Reactive and multiplatform Crowdsourcing. keynote speech at DB...
 
Fundchange and Koodonation Workshop Slides - Nov 23, 2011
Fundchange and Koodonation Workshop Slides - Nov 23, 2011Fundchange and Koodonation Workshop Slides - Nov 23, 2011
Fundchange and Koodonation Workshop Slides - Nov 23, 2011
 
Volunteer Anywhere
Volunteer AnywhereVolunteer Anywhere
Volunteer Anywhere
 
Social media recommendation based on people and tags (final)
Social media recommendation based on people and tags (final)Social media recommendation based on people and tags (final)
Social media recommendation based on people and tags (final)
 
Social Recommendation
Social RecommendationSocial Recommendation
Social Recommendation
 
RSWEB 2013: A research platform for social recommendation
RSWEB 2013: A research platform for social recommendationRSWEB 2013: A research platform for social recommendation
RSWEB 2013: A research platform for social recommendation
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risks
 
Building Social Networks
Building Social NetworksBuilding Social Networks
Building Social Networks
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
It Only Takes a Minute
It Only Takes a MinuteIt Only Takes a Minute
It Only Takes a Minute
 
Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part I
 
FITC - Bootstrap Unleashed
FITC - Bootstrap UnleashedFITC - Bootstrap Unleashed
FITC - Bootstrap Unleashed
 
(Practical) Beyond Responsive Web Design (WordCamp Miami 2011)
(Practical) Beyond Responsive Web Design (WordCamp Miami 2011)(Practical) Beyond Responsive Web Design (WordCamp Miami 2011)
(Practical) Beyond Responsive Web Design (WordCamp Miami 2011)
 
Social journalism: Community building through social networks
Social journalism: Community building through social networksSocial journalism: Community building through social networks
Social journalism: Community building through social networks
 
Responsive Web Design - Introduction & Workflow Overview
Responsive Web Design - Introduction & Workflow OverviewResponsive Web Design - Introduction & Workflow Overview
Responsive Web Design - Introduction & Workflow Overview
 

Ähnlich wie Building Recommendation Systems on Social Data @KTH - FutureFriday - March 2014

Short CfP #DISC2016
Short CfP #DISC2016Short CfP #DISC2016
Short CfP #DISC2016Han Woo PARK
 
Final call for #DISC2016
Final call for #DISC2016Final call for #DISC2016
Final call for #DISC2016Kyujin Jung
 
Distributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of EverythingDistributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of EverythingLiming Zhu
 
Big social data analytics - social network analysis
Big social data analytics - social network analysis Big social data analytics - social network analysis
Big social data analytics - social network analysis Jari Jussila
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...Florence Hudson
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionMichael Zimmer
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-decke-SIDES.eu
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2ifi8106tlu
 
Influencing the MOOC agenda - analysis of #MOOC Twitter Data
Influencing the MOOC agenda - analysis of #MOOC Twitter Data  Influencing the MOOC agenda - analysis of #MOOC Twitter Data
Influencing the MOOC agenda - analysis of #MOOC Twitter Data Mairéad Nic Giolla Mhichíl
 
Quantum Mechanics meet Information Search and Retrieval – The QUARTZ Project
Quantum Mechanics meet Information Search and Retrieval – The QUARTZ ProjectQuantum Mechanics meet Information Search and Retrieval – The QUARTZ Project
Quantum Mechanics meet Information Search and Retrieval – The QUARTZ ProjectIngo Frommholz
 
ESRC Research Methods Festival NSMNSS presentation
ESRC Research Methods Festival NSMNSS presentationESRC Research Methods Festival NSMNSS presentation
ESRC Research Methods Festival NSMNSS presentationKandy Woodfield
 
Computational methods for intelligent matchmaking for knowledge work
Computational methods for intelligent matchmaking for knowledge workComputational methods for intelligent matchmaking for knowledge work
Computational methods for intelligent matchmaking for knowledge workJari Jussila
 
Global Computing: an Analysis of Trust and Wireless Communications
Global Computing: an Analysis of Trust and Wireless CommunicationsGlobal Computing: an Analysis of Trust and Wireless Communications
Global Computing: an Analysis of Trust and Wireless CommunicationsNicola Mezzetti
 
The challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in researchThe challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in researchKirsten Thompson
 
Social Media Research at Comms Service Providers
Social Media Research at Comms Service ProvidersSocial Media Research at Comms Service Providers
Social Media Research at Comms Service ProvidersDavid Strom
 
acatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBacatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBJaina Hirai
 
Market Research in the Mobile World 2010
Market Research in the Mobile World 2010Market Research in the Mobile World 2010
Market Research in the Mobile World 2010Merlien Institute
 
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...Cataldo Musto
 

Ähnlich wie Building Recommendation Systems on Social Data @KTH - FutureFriday - March 2014 (20)

Short CfP #DISC2016
Short CfP #DISC2016Short CfP #DISC2016
Short CfP #DISC2016
 
Final call for #DISC2016
Final call for #DISC2016Final call for #DISC2016
Final call for #DISC2016
 
Distributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of EverythingDistributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of Everything
 
Big social data analytics - social network analysis
Big social data analytics - social network analysis Big social data analytics - social network analysis
Big social data analytics - social network analysis
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in Action
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
 
Influencing the MOOC agenda - analysis of #MOOC Twitter Data
Influencing the MOOC agenda - analysis of #MOOC Twitter Data  Influencing the MOOC agenda - analysis of #MOOC Twitter Data
Influencing the MOOC agenda - analysis of #MOOC Twitter Data
 
Quantum Mechanics meet Information Search and Retrieval – The QUARTZ Project
Quantum Mechanics meet Information Search and Retrieval – The QUARTZ ProjectQuantum Mechanics meet Information Search and Retrieval – The QUARTZ Project
Quantum Mechanics meet Information Search and Retrieval – The QUARTZ Project
 
ESRC Research Methods Festival NSMNSS presentation
ESRC Research Methods Festival NSMNSS presentationESRC Research Methods Festival NSMNSS presentation
ESRC Research Methods Festival NSMNSS presentation
 
Computational methods for intelligent matchmaking for knowledge work
Computational methods for intelligent matchmaking for knowledge workComputational methods for intelligent matchmaking for knowledge work
Computational methods for intelligent matchmaking for knowledge work
 
Global Computing: an Analysis of Trust and Wireless Communications
Global Computing: an Analysis of Trust and Wireless CommunicationsGlobal Computing: an Analysis of Trust and Wireless Communications
Global Computing: an Analysis of Trust and Wireless Communications
 
The challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in researchThe challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in research
 
Social Media Research at Comms Service Providers
Social Media Research at Comms Service ProvidersSocial Media Research at Comms Service Providers
Social Media Research at Comms Service Providers
 
Cook social network innovation
Cook   social network innovationCook   social network innovation
Cook social network innovation
 
acatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBacatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEB
 
Market Research in the Mobile World 2010
Market Research in the Mobile World 2010Market Research in the Mobile World 2010
Market Research in the Mobile World 2010
 
Sport && Wellness Hackathon
Sport && Wellness  HackathonSport && Wellness  Hackathon
Sport && Wellness Hackathon
 
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
 

Kürzlich hochgeladen

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Kürzlich hochgeladen (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Building Recommendation Systems on Social Data @KTH - FutureFriday - March 2014

  • 1. Computing in Social Networks: Building Recommendation Systems on Social Data
  • 2. Outlook Introduction Recommender Systems Examples of recommender systems Challenges with recommendation research Social networks and recommendations Show case of experimental work on: Trust-aware recommendations Privacy preserving recommendations Diversity and opinions Conclusion NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN 2
  • 3. Personalization and recommendations Problem: • Information overload… Personalization and Profiles • Users want to get personalized experience and at the same time don’t want to share a lot of their personal information. Recommendation systems • Referred to as a range of algorithms which suggest a collection of items to users, based on the knowledge of their profiles or previous interactions. Recommendation systems types: • Collaborative filtering (User-based) • Content-based filtering (Item-based) • Hybrid filtering (Mix of users and content) NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN 3
  • 4. NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN 4 Applications of Recommendation Systems
  • 5. Important Challenges in Recommendation Research 1. Explaining the recommendations It increases the trust of users as they know what is the basis of the suggestions 2. Preserving the user privacy How to make good recommendations without ignoring user privacy 3. Diversity and novelty of recommendations Recommenders suggest similar stuff to what you have seen, it is important to get 5NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN
  • 6. Social networks Social networks [Wasserman et al, 1994] • Focus of fields such as behavioral, marketing, economics, etc. Relationships types • Interactions, social relations Explicit relationships • Relations in online social networks like in facebook, linkedin, etc). Implicit relationships • Computed based on users behavior. For instance rating movies, music, etc. 6NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN Image: https://www.facebook.com/notes/facebook- engineering/visualizing-friendships/
  • 7. Benefits of using social networks for recommendations • Take advantage of social network structure: • Trust, social and structural Influence, transitivity, etc. • Resilient against fraud, spam and fake accounts • Identity and connections of the people on a social network helps on dealing with bad guys • Cold start problem • System always has people to suggest (as long as they are connected to the social network) 7NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN
  • 8. Experimental work with trust and recommendations • Extracting trust networks from • Getting better reach to items and users for improved guessing of items to suggest. • Using trust (networks) to improve accuracy of recommendations generated • Accurate suggestions of movies to watch, people to follow, etc. 8NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN
  • 9. Visualization of Trust Relations in Ciao Dataset 9NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN In Nima Dokoohaki, Shahab Mokarizadeh, Mihhail Matskin, Ramona Bunea. Correlating Trust and Privacy in Recommender Systems, Special Issue on Web Intelligence and Personalization on Social Media, Web Intelligence and Agent Systems An International Journal. IOS Press, 2014. (submitted for review)
  • 10. Trust networks and recommendations: Data: Ratings Profiles to Trust Networks 10NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN
  • 11. Trust networks and recommendations: Impact of Trust Metric on Generated Networks Structure 11NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN Generated Trust Networks for Top-10 Trustworthy Users (n= 5, m= 5): Without T-index Generated Trust Networks for Top-10 Trustworthy Users (n= 5, m=5): With T-index (= 100) Soude Fazeli, Alireza Zarghami, Nima Dokoohaki, Mihhail Matskin, Mechanizing Social Trust-Aware Recommenders with T-index Augmented Trustworthiness, In proceedings of the 7th International Conference on Trust, Privacy & Security in Digital Business (Trustbus 2010)
  • 12. Trust networks and recommendations: Prediction accuracy against the variations of Trustworthiness and Neighborhood size 12NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN Soude Fazeli, Alireza Zarghami, Nima Dokoohaki, Mihhail Matskin, Elevating Prediction Accuracy in Trust-aware Collaborative Filtering Recommenders through T-index Metric and TopTrustee lists, In the Journal of Emerging Technologies in Web Intelligence (JETWI), Special Issue On Web Personalization, Reputation and Recommender Systems, 2010.
  • 13. Trust networks and recommendations Rating Prediction Accuracy against network (neighborhood) size 13NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN Influence of search range on item coverage and prediction accuracy for Epinions dataset. Stefan Magureanu, Nima Dokoohaki, Shahab Mokarizadeh, Mihhail Matskin, Epidemic Trust-Based Recommender Systems , In proceedings of 2012 ASE/IEEE International Social Computing Conference (SocialCom2012)
  • 14. Experimental work with Privacy and recommendations • Proposing for software architectures that improve privacy of recommendations • How much data should the system use, can we control this amount ? • Can we use enough data and still get decent suggestions ? 14NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN
  • 15. Privacy and recommendations: Component Architectures for Preserving Privacy during Computations 15NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN Nima Dokoohaki, Cihan Kaleli, Huseyin Polat and Mihhail Matskin, Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender Systems, The Second International Conference on Social Informatics (SocInfo 10) Ramona Bunea, Shahab Mokarizadeh, Nima Dokoohaki and Mihhail Matskin, Exploiting Dynamic Privacy in Socially Regularized Recommenders, PinSoDa: Privacy in Social Data, in conjunction with the 11th IEEE International Conference on Data Mining (ICDM 2012)
  • 16. NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN 16 Privacy and recommendations: Comparing performance of recommendations generated Ramona Bunea, Shahab Mokarizadeh, Nima Dokoohaki and Mihhail Matskin, Exploiting Dynamic Privacy in Socially Regularized Recommenders, PinSoDa: Privacy in Social Data, in conjunction with the 11th IEEE International Conference on Data Mining (ICDM 2012)
  • 17. Experimental work with diversity and opinions recommendations • How to diversify the recommendations • What models can be proposed to give better summary of reviews • How to improve the recommendations of opinions in terms of accuracy and scalability • What models can be proposed to find more similar people to read their Tweets. 17NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN
  • 18. Data: From Review Profiles to Topic models 18NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN
  • 19. Recommending Summarized Reviews: Comparing Customer Ratings and estimated Sentiments 19NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN Ralf Krestel, Nima Dokoohaki Diversifying Review Rankings, Special issue on Big Social Data Analytics, Elsevier Journal of Neural Networks, 2014. Submitted for review.
  • 20. Diversifying Summarized Reviews: Comparing Recency of Summarization Strategy Comparing LDA and LM 20NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN
  • 21. NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN 21 Recommending Tweets: Visualizing variations of topics for #wikileaks and #eurozone tweets, 2011 Extended results from: Nima Dokoohaki, Mihhail Matskin, Mining Divergent Opinion Trust Networks through Latent Dirichlet Allocation, In proceedings of 2012 IEEE/ACM International Conference on Social Network Analysis and Mining (ASONAM 2012)
  • 22. Recommending Users: Link Prediction on inferred trust relations, tweets from 2009 22NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN AUROC vs Number of Topics (Cosine)AUROC vs Number of Topics (KLD) Extended results from: Nima Dokoohaki, Mihhail Matskin, Mining Divergent Opinion Trust Networks through Latent Dirichlet Allocation, In proceedings of 2012 IEEE/ACM International Conference on Social Network Analysis and Mining (ASONAM 2012)
  • 23. Conclusion • This trail of research and education will continue under the trends of data science and big data. • KTH and other European institutions are planning to design and offer study programs on data science and analytics to students, hopefully very soon… • Thank you! 24NIMA DOKOOHAKI, NIMAD@KTH.SE POSTDOCTORAL RESEARCHER SEMINAR @ FUTURE FRIDAY 2014 KTH/ICT, STOCKHOLM, SWEDEN

Hinweis der Redaktion

  1. 30 minutes Would be 15 slides + 5 minutes questions I guess Image CC: https://www.flickr.com/photos/daniel_iversen/5440728466/sizes/m/in/photostream/
  2. https://www.flickr.com/photos/daviderickson/5579493777/sizes/o/in/photostream/ https://www.flickr.com/photos/daviderickson/5580079906/sizes/o/in/photostream/ https://www.flickr.com/photos/42696116@N00/3979783546/in/photoli https://www.flickr.com/photos/stevegarfield/
  3. Social network of Google+ Image: http://www.flickr.com/photos/ajc1/6260304760/
  4. For the sake of simplicity, we display only users(displayed as nodes) and their connections (trust relationships) to top-10 trustworthy users. As mentioned, each cluster is described as a group of like-minded users in terms of trust. It is shown that the number of common users between clusters increases which enables users of different clusters to find each other easier. In our case, more users form divergent areas of users’ interests, presented as clusters, can be accessible.
  5. Results have been partially competable with Neil Lathia’s work
  6. ROC curve for Pearson (left) and Kullback-Leibler (right) Variable: social network size