SlideShare a Scribd company logo
1 of 40
Laboratory
         for
     Web Science
       (LWS)

University of Applied Sciences
         Switzerland
      http://lws.ffhs.ch
    Follow @blattnerma
                                 , Dr. Marcel Blattner
Laboratory
         for
     Web Science
       (LWS)

University of Applied Sciences
         Switzerland
      http://lws.ffhs.ch
    Follow @blattnerma
                                 , Dr. Marcel Blattner
Recommendation systems in the scope of opinion
            formation: a model



        Dr. Marcel Blattner, Laboratory for Web Science
          University of Applied Sciences Switzerland

   Dr. Matus Medo, Physics Department, University of Fribourg
               University of Fribourg Switzerland


                                                                , Dr. Marcel Blattner
Motivation




     , Dr. Marcel Blattner
Motivation

Real world recommender system data are the
result of complex processes. Social interactions
play a major role.




                                                   , Dr. Marcel Blattner
Motivation

Real world recommender system data are the
result of complex processes. Social interactions
play a major role.


How can we model those mechanisms to reproduce
observed data (opinions) in recommendation
systems?




                                                   , Dr. Marcel Blattner
Motivation

Real world recommender system data are the
result of complex processes. Social interactions
play a major role.


How can we model those mechanisms to reproduce
observed data (opinions) in recommendation
systems?

How can we benefit from such a model?

                                                   , Dr. Marcel Blattner
ts are always ’bound’ on used       To highlight various aspects of B-Rank, a to
 ty to obtain similar results for                                  The Aim
                                     Fig.(1) is introduced. For simplicity all links be
                                     jects and users are equally weighted wi = 1 8i.
 mpared to ZLZ-II, is achieved
 result highlights the fact, that
              The model should
   personality. From real world




                                                 objects



                                                                     users
 igher diversity is positive cor-
n general [22]. However, bipartite
              generate user
 re in off-line user-object data
                experiments and
  raw robust conclusions.
Z-II algorithm was proposed
 reached a comparable perfor-        Figure 1: Toy net to illustrate B-Rank. Circles
Rank in the movielens dataset.       hyperedges (users), squares are hypervertices
ning parameter l . B-Rank in         jects. The votes are illustrated as links betwe
 nd therefore easier to imple-       and users.

may increase improvements               First, some general aspects are discussed, se
e presented basic B-Rank al-         shown, how all aspects are well captured by th
 eight matrix W . This will be       algorithm.
 per. Another extension is to           Case A: huge audience in common. Intui
pagation (indirect connections       objects a and b are similar to each other, when
                                                                             , Dr. Marcel Blattner
ts are always ’bound’ on used       To highlight various aspects of B-Rank, a to
 ty to obtain similar results for                                  The Aim
                                     Fig.(1) is introduced. For simplicity all links be
                                     jects and users are equally weighted wi = 1 8i.
 mpared to ZLZ-II, is achieved
 result highlights the fact, that
              The model should
   personality. From real world




                                                 objects



                                                                     users
 igher diversity is positive cor-
n general [22]. However, bipartite
              generate user
 re in off-line user-object data
                experiments and
  raw robust conclusions.
Z-II algorithm was proposed
 reached a comparable perfor-        Figure 1: Toy net to illustrate B-Rank. Circles
Rank in the movielens dataset.       hyperedges (users), squares are hypervertices
ning parameter l . B-Rank in         jects. The votes are illustrated as links betwe
 nd therefore easier to imple-       and users.

may increase improvements               First, some general aspects are discussed, se
e presented basic B-Rank al-         shown, how all aspects are well captured by th
 eight matrix W . This will be       algorithm.
 per. Another extension is to           Case A: huge audience in common. Intui
pagation (indirect connections       objects a and b are similar to each other, when
                                                                             , Dr. Marcel Blattner
ts are always ’bound’ on used       To highlight various aspects of B-Rank, a to
 ty to obtain similar results for                                  The Aim
                                     Fig.(1) is introduced. For simplicity all links be
                                     jects and users are equally weighted wi = 1 8i.
 mpared to ZLZ-II, is achieved
 result highlights the fact, that
              The model should
   personality. From real world




                                                 objects



                                                                     users
 igher diversity is positive cor-
n general [22]. However, bipartite
              generate user
 re in off-line user-object data
                experiments and
  raw robust conclusions.
Z-II algorithm was proposed
 reached a comparable perfor-        Figure 1: Toy net to illustrate B-Rank. Circles
Rank in the movielens dataset.       hyperedgesWe trysquares are hypervertices
                                                 (users), to understand
ning parameter l . B-Rank in         jects. The these data as a as links betwe
                                                votes are illustrated result
 nd therefore easier to imple-       and users.
                                                of social processes.
may increase improvements               First, some general aspects are discussed, se
e presented basic B-Rank al-         shown, how all aspects are well captured by th
 eight matrix W . This will be       algorithm.
 per. Another extension is to           Case A: huge audience in common. Intui
pagation (indirect connections       objects a and b are similar to each other, when
                                                                             , Dr. Marcel Blattner
The Model
Model Assumptions
       (I):

                      Objects generate anticipation
                               distributions.
                    (IIA - intrinsic item anticipation)
The Model
Model Assumptions
       (I):

                                       Objects generate anticipation
                                                distributions.
                                     (IIA - intrinsic item anticipation)


                                   Individuals will invest resources only,
                                     if their anticipation exceed some
                                                  threshold.




                    anticipation
                     threshold
The Model
Model Assumptions
       (I):

                                           Objects generate anticipation
                                                    distributions.
                                         (IIA - intrinsic item anticipation)


                                       Individuals will invest resources only,
                                         if their anticipation exceed some
    Potential                                         threshold.
    Adopters                Adopters




                    anticipation
                     threshold
The Model
Model Assumptions
       (I):

                                           Objects generate anticipation
                                                    distributions.
                                         (IIA - intrinsic item anticipation)


                                       Individuals will invest resources only,
                                         if their anticipation exceed some
    Potential                                         threshold.
    Adopters                Adopters

                                          Potential adopters are able to
                                               become adopters
                                                        or
                    anticipation                      deniers
                     threshold
The Model
Model Assumptions
       (II):
                                   The shift from a potential
                                adopter to an adopter is caused
                                 by information exchange on a
                                     network with a specific
                                            topology.
     Potential
                     Adopters
                                      (Influence Network)
     Adopters




                 anticipation
                  threshold




                                                             , Dr. Marcel Blattner
The Model
Model Assumptions
       (II):
                                                     The shift from a potential
                                                  adopter to an adopter is caused
                                                   by information exchange on a
                                                       network with a specific
                                                              topology.
      Potential
                        Adopters
                                                        (Influence Network)
      Adopters




                    anticipation
                     threshold




                               adopter

                              potential adopter

                               denier


 Influence Network                                                              , Dr. Marcel Blattner
The Model
Model Assumptions
       (II):
                                                     The shift from a potential
                                                  adopter to an adopter is caused
                                                   by information exchange on a
                                                       network with a specific
                                                              topology.
      Potential
                        Adopters
                                                        (Influence Network)
      Adopters




                    anticipation
                     threshold




                               adopter            Possible transitions:
                              potential adopter

                               denier


 Influence Network                                                              , Dr. Marcel Blattner
The Model
Model Assumptions
       (II):
                                                     The shift from a potential
                                                  adopter to an adopter is caused
                                                   by information exchange on a
                                                       network with a specific
                                                              topology.
      Potential
                        Adopters
                                                        (Influence Network)
      Adopters




                    anticipation
                     threshold




                               adopter            Possible transitions:
                              potential adopter

                               denier


 Influence Network                                                              , Dr. Marcel Blattner
The Model
Model Assumptions
       (II):
                                                     The shift from a potential
                                                  adopter to an adopter is caused
                                                   by information exchange on a
                                                       network with a specific
                                                              topology.
      Potential
                        Adopters
                                                        (Influence Network)
      Adopters




                    anticipation
                     threshold




                               adopter            Possible transitions:
                              potential adopter

                               denier


 Influence Network                                                              , Dr. Marcel Blattner
The Model
Mathematical
formulation
  IIA-Shift                  Potential
                                             Adopters
                             Adopters



                                         anticipation
                                          threshold




                   (1   )
   ˆ           ⇥j
   fij = fij +
               kj




                                               , Dr. Marcel Blattner
The Model
Mathematical
formulation
  IIA-Shift                                         Potential
                                                                    Adopters
                                                    Adopters



                                                                anticipation
                                                                 threshold




                         (1   )
         ˆ           ⇥j
         fij = fij +
                     kj
                                   , fij 2 fi 2 N (µi , )



 Intrinsic
   Item
Anticipation

                                                                      , Dr. Marcel Blattner
The Model
Mathematical
formulation
  IIA-Shift                                                 Potential
                                                                            Adopters
                                                            Adopters



                                                                        anticipation
                Neighbors, who                                           threshold
                already adopted



                                 (1   )
         ˆ           ⇥j
         fij = fij +
                     kj
                                           , fij 2 fi 2 N (µi , )



 Intrinsic
   Item
Anticipation

                                                                              , Dr. Marcel Blattner
The Model
Mathematical
formulation
  IIA-Shift                                                 Potential
                                                                            Adopters
                                                            Adopters



                                                                        anticipation
                Neighbors, who                                           threshold
                already adopted



                                 (1   )
         ˆ           ⇥j
         fij = fij +
                     kj
                                           , fij 2 fi 2 N (µi , )



 Intrinsic
   Item           Total # of
Anticipation      neighbors

                                                                              , Dr. Marcel Blattner
The Model
Mathematical
formulation
  IIA-Shift                                                 Potential
                                                                            Adopters
                                                            Adopters



                                                                        anticipation
                Neighbors, who                                           threshold
                already adopted                Trust



                                 (1   )
         ˆ           ⇥j
         fij = fij +
                     kj
                                           , fij 2 fi 2 N (µi , )



 Intrinsic
   Item           Total # of
Anticipation      neighbors

                                                                              , Dr. Marcel Blattner
The Model
Mathematical
formulation
  IIA-Shift                                                 Potential
                                                                            Adopters
                                                            Adopters



                                                                        anticipation
  Shifted       Neighbors, who                                           threshold
   Item         already adopted                Trust
Anticipation


                                 (1   )
         ˆ           ⇥j
         fij = fij +
                     kj
                                           , fij 2 fi 2 N (µi , )



 Intrinsic
   Item           Total # of
Anticipation      neighbors

                                                                              , Dr. Marcel Blattner
The Model
Mathematical
formulation
  IIA-Shift                                                 Potential
                                                                                  Adopters
                                                            Adopters



                                                                             anticipation
  Shifted       Neighbors, who                                                threshold
   Item         already adopted                Trust
Anticipation


                                 (1   )
         ˆ           ⇥j
         fij = fij +
                     kj
                                           , fij 2 fi 2 N (µi , )

                                              ˆ
                                              fij                       adopter



 Intrinsic
   Item           Total # of
                                              ˆ
                                              fij <                     denier
Anticipation      neighbors

                                                                                   , Dr. Marcel Blattner
The Model
       Simulation of                                  Algorithm 1 RecSysMod algorithm. P contains the con-

     dynamics for a set                               figuration parameter for the network.      is the Anticipation
                                                      Threshold and denotes the trust. O 2 N is the number of
                                                      objects to simulate. G(N, E) is the network. N is the set of
         of objects                                   nodes and E is the set of edges.
                                                       1: procedure RecSysMod I(P, , , O)
                                                       2:    G(N, E)      GenNetwork(P)
                                                       3:    for all Objects in O do
                                                       4:        generate distribution fi from N (µi , )
                                                       5:        for each node j 2 N in G do
                                                       6:           draw fij from fi
                                                       7:           if fij < then
                                                       8:               jstate    S
                                                       9:           else
                                                      10:               jstate    A
                                                      11:            end if
Contour plot for and ⇢ = ⇥j /kj . Num-                12:        end for
 the plot quantify the shift in the IAA as            13:        repeat
of and ⇢.                                             14:            for all j with jstate = S AND ⇥j > 0 do
                                                                                     h i(1 )
                                                                         ˆ            ⇥
                                                      15:               fij    fij + jkj
uence-Network IN(P) with a fixed network topol-        16:                 ˆ
                                                                       if fij < then
 law, Erd˝s-R´nyi, or another). P refers to a
          o   e                                       17:                  jstate   D
 priate parameters for the Influence-Network in        18:              else
ke network type, number of nodes, etc.). The          19:                  jstate   A
opology is not a↵ected by the dynamical pro-          20:              end if
 on propagation) taking place on it. We justify       21:          end for
cenario by assuming that the time scale of the        22:       until |{j|jstate = S AND ⇥j > 0}| = 0
ange is much longer then the time scale 1 of opin-    23:    end for
 g in the network. Each node in the Influence-         24: end procedure
 responds to an individual. For each individual
 n unbiased Intrinsic-Item-Anticipation fij from                                                                      , Dr. Marcel Blattner
ed probability distribution fi . At each time step,
Distribution Landscape
  Simulation of
dynamics for a set
    of objects




                                      , Dr. Marcel Blattner
Figure 4: Fit of the MovieLens attendance dis-

Figure 2: Skewness of the attendance distributions
                                                               tribution with trust
                                                               threshold                                      Results
                                                                                          = 0.50, critical anticipation
                                                                             = 0.6, anticipation distribution variance
as a function of trust and the critical anticipation              = 0.25, and power law network with exponent
threshold for Erd˝s-R´ny networks with 500 nodes
                    o  e                                         = 2.25, 943 nodes, and 1682 simulated objects.
and 300 simulated items.




 Figure 4: Fit of the MovieLens attendance dis-                Figure 5: Fit of the Netflix attendance distribution
 tribution with trust     = 0.50, critical anticipation        with trust    = 0.52, critical anticipation threshold
Figure 3: Skewness of the attendance distributions
 threshold   = 0.6, anticipation distribution variance           = 0.72, anticipation distribution variance = 0.27,
as a function of trust law network with exponent
    = 0.25, and power and the critical anticipation            and power law network with exponent = 2.2, 480189
threshold943 for power-law networks with 500 nodes
   = 2.25,   nodes, and 1682 simulated objects.                nodes, and 17770 simulated objects.
and 300 simulated items.


                MovieLens                                                             Netflix
                                                                                                Ru
   Fitting real data We fit real world recommender data         ditions for the first movers a0 =    f (x)dx, s(0) = 1 a(0),
from MovieLens, Netflix and Lastfm with results reported        and d(0) = 0. In the following we use the bra-ket nota-
in Fig. (4), Fig. (5), Fig. (6), Fig. (7), and Tab. (1), re-   tion hxi to represent the average of a quantity x. Standard
spectively. The real and simulated distributions are com-      methods can now be used to arrive at2
pared using Kullback-Leibler (KL) divergence [29]. We re-
port the mean, median, maximum, and minimum of the                                      (⌧ hki) 1 exp(t/⌧ )
                                                                        a(t) =                                           1
                                                                                                                             .   (7)
simulated and real attendance distributions. Trust , antic-                    (↵ + ) [exp(t/⌧ ) 1] + (⌧ hki a0 )
ipation threshold , and anticipation distribution variance     Here ⌧ is the time scale of the propagation which is defined
  are reported in figure captions. We also compare the aver-    as
                                                                                                                     , Dr. Marcel Blattner

aged mean degree, maximum degree, minimum degree, and
Figure 6: Fit of the Lastfm attendance distribution
                with trust = 0.4, critical anticipation threshold =                          Table 2: Mean, minimum, maximum degree, clus-

                                                                                                                                           Results
                0.8, anticipation distribution variance = 0.24, and                          tering coe cient C, and estimated exponent of the
                real Lastfm user friendship network with 1892 nodes                          real (LFM1) and simulated (LFM2) social network
                and 17632 simulated objects.                                                 for the Lastfm data set.
                                                                                                                                                                 D        KL
                                                                                                                                                                 ML       0.0
                                                               D       KL        Med        Mean            Max        Min                                       NF       0.0
                                                               ML      0.046    27/26       59/60         583/485       1/1                                      LFM1     0.0
                                                               NF      0.030   561/561    5654/5837    232944/193424   3/16                                      LFM2     0.0
                                                               LFM1    0.05      1/1       5.3/5.2        611/503       1/1
                                                               LFM2    0.028     1/1       5.3/5.8        611/547       1/1                                    Table 1: Si
                                                                                                                                                               Netflix, LF
                                                              Table 1: Simulation results. ML: Movielens, NF:
                                                              Netflix, LFM1: Lastfm with real network, LFM2:
                                                                                                                                                               Lastfm wit
                                                              Lastfm with simulated network, KL: Kullback-                                                     Leibler div
                                                              Leibler divergence, Med: Median, Mean, Max:                                                      maximal at
                                                              maximal attendance (data/simulated), Min: mini-                                                  mal attenda
                                                              mal attendance (data/simulated).
                                                                                                                                                                 D        hki
                                                               D       hki     kmin   kmax             C
                                                                                                                                                                 LFM1     13.
                                                               LFM1    13.4     1      119    2.3    0.186
                                                               LFM2    12.0     1      118    2.25    0.06                                                       LFM2     12.
                 Figure 7: Fit of the Lastfm attendance distribution
gure 6: Fit of the Lastfm attendance distribution                              Figure 8: 6: Fit of the Lastfm attendance distribution
                                                                                  Figure Log-log plot of real (red) and simulated
                 with anticipation0.6, critical= anticipation Mean, minimum,(blue) social network degree distribution P (k) for =
th trust = 0.4, criticaltrust    = threshold          Table 2: threshold          with trust = 0.4, critical anticipation threshold
                                                                                 maximum degree, clus-                                                         Table 2: M
, anticipation distributionanticipation distribution tering coe cient C, and estimatedanticipation distribution variance cumulative
                    = 0.8, variance = 0.24, and        variance = 0.24,        the Lastfm data of the Inset: plot of the = 0.24, and
                                                                                  0.8, exponent set.                                                           tering coe
 l Lastfm user friendship network network with exponent = 2.25, 1892
                 and power law    with 1892 nodes     real (LFM1) and simulated (LFM2) social user friendship network with 1892 nodes
                                                                               degreeLastfm network
                                                                                  real distribution.                                                           real (LFM1
d 17632 simulated objects. 17632 simulated objects. the Lastfm data set.
                 nodes and                            for                         and 17632 simulated objects.                                                 for the Last

                                                                                             We emphasize that Eq.(10) is valuable in predicting users’
                suming a(0) = a0     0, we can neglect the dynamics of d(t)
                                                                                             behavior of a recommender system in an early stage.
                to obtain
                                              ⌦       ↵   !
                                                  2
                                              k
                                 ˙
                                 ⌦(t) =
                                              hki
                                                          1 ⌦(t).                            5. DISCUSSION

                            LastFM
                                                                                      Social influence and our peers are known to form and in-
                In addition, Eq. (4) yields                                        fluence many of our opinions and, ultimately, decisions. We
                                                                  )                propose here a simple model which is based on heteroge-
                               ak (t) = k(1 ak (t))⌦(t)
                               ˙
                                                                            (9)    neous agent expectations, a social network, and a formalized
                               sk (t) = (↵ + )k(1 ak (t))⌦(t)
                               ˙                                                   social influence mechanism. We analyze the model by nu-
                                                                                   merical simulations and by master equation approach which
                 Neglecting terms of order a2 (t) and summing the solution
                                               k                                   is particularly suitable to describe the initial phase of the
                 of ak (t) over P (k), we get a result for the early spreading     social “contagion”. The proposed model is able to generate
                 stage
                                         ⇣
gure 7: Fit of the Lastfm attendance distribution         Figure ⌘ Log-log plot of a wide range of di↵erent attendance distributions, includ-
                                                                  8:               real (red) and simulated
th trust                      a(t) = a(0) 1 + ⌧ exp(t/⌧ ) 1 social network degree distribution P in for
             = 0.6, critical anticipation threshold       (blue) ,         (10)    ing those observed (k) popular real systems (Netflix, Lastfm,
                                         ⌦ 2     0.24,         ⇤                   and Movielens). In addition, we showed that these patterns
= 0.8, anticipation distribution variance ↵= ⇥ ⌦ ↵ the Lastfm data set. Inset: plot of the cumulative
d power law networkthe timescale ⌧ = =k / 1892 k
                 with with exponent        2.25, (     2
                                                           hki) . The obtained
                                                          degree distribution.     are emergent Fit of theof the dynamics and not imposed
                                                                                      Figure 7: properties Lastfm attendance distribution                          Figure 8: L
des and 17632 simulated objects. in the early stage of the opinion spreading
                 time scale ⌧ valid                                                bywith trust the = 0.6, critical anticipationparticular
                                                                                       topology of     underlying social network. Of threshold                     (blue) socia
                                                                                                                                                          , Dr. Marcel Blattner
                 is clearly dominated by the network heterogeneity. This re-       interest 0.8, anticipation distribution variance social
                                                                                         = is the case of Lastfm where the underlying = 0.24,                      the Lastfm
                                                              We emphasize that Eq.(10) is valuable in predicting users’
Results

      D      KL       Med      Mean         Max        Min
      ML
      D      0.046
               KL    27/26
                        Med    59/60
                                  Mean    583/485Max 1/1 Min
      NF
      ML     0.030 561/561 5654/5837 232944/193424 3/16 1/1
               0.046   27/26      59/60        583/485
      LFM1
      NF     0.05
               0.030 1/1
                      561/561 5.3/5.2
                                5654/5837 611/503      1/1
                                           232944/193424 3/16
      LFM2   0.028    1/1     5.3/5.8     611/547      1/1
      LFM1 0.05        1/1        5.3/5.2       611/503     1/1
     Table 1: Simulation results. 5.3/5.8Movielens, NF:
      LFM2 0.028       1/1         ML:          611/547     1/1
     Netflix, LFM1: Lastfm with real network, LFM2:
     Lastfm 1: Simulation results. ML: Movielens, NF:
     Table with simulated network, KL: Kullback-
     Leibler divergence, Med: with real Mean, Max:
     Netflix, LFM1: Lastfm Median, network, LFM2:
     Lastfm with simulated network, KL: Kullback-
     maximal attendance (data/simulated), Min: mini-
     Leibler divergence, Med: Median, Mean, Max:
     mal attendance (data/simulated).
     maximal attendance (data/simulated), Min: mini-
     D       hki kmin kmax        C
     mal attendance (data/simulated).
      LFM1   13.4    1    119   2.3    0.186
      LFM2   12.0    1    118   2.25    0.06
on
       D        hki kmin kmax               C
 =   Table 2: Mean, minimum, maximum0.186
       LFM1 13.4        1     119    2.3    degree, clus-
nd   tering coe 12.0
       LFM2             1     118   2.25 0.06
                 cient C, and estimated exponent of the
 n
es   real (LFM1) and simulated (LFM2) social network
=     Table 2: Mean, minimum, maximum degree, clus-
     for the Lastfm data set.
 d   tering coe cient C, and estimated exponent of the
es   real (LFM1) and simulated (LFM2) social network
     for the Lastfm data set.



                                                                       , Dr. Marcel Blattner
Mathematical analysis

Coupled differential equations                   Coupled differential equations
   for k-compartments                             (mean field approximation)
                                         9                                                9
 ak (t) = ksk (t)⌦
 ˙                                       >
                                         =       a(t) = < k > s(t)a(t),
                                                 ˙                                        >
                                                                                          =
  ˙
 dk (t) = ↵ksk (t)⌦                               ˙
                                                 d(t) = ↵ < k > s(t)a(t),
                                         >
                                         ;                                                >
                                                                                          ;
 sk (t) =
 ˙                 (↵ + )ksk (t)⌦                s(t) =
                                                 ˙        (↵ + ) < k > s(t)a(t)

          P
              k   P (k)(k 1)ak
 ⌦=
                    <k>

      Z                       Z
  =           f (x)dx,   ↵=           f (x)dx,     =      (1/k)1
                                  l



                                                                            , Dr. Marcel Blattner
Mathematical analysis - Results



Coupled differential equations                      Coupled differential equations
   for k-compartments                                (mean field approximation)

               ⇣                               ⌘                   (⌧ hki) 1 exp(t/⌧ )
a(t) = a(0) 1 + ⌧              exp(t/⌧ )   1       a(t) =                                          1
                                                          (↵ + ) [exp(t/⌧ ) 1] + (⌧ hki a0 )

         ⌦     2
                   ↵
           k                                                                  1
⌧=                                                 ⌧ = (a0 ↵ hki + hki)
   [ (hk 2 i           hki)]




                                                                                         , Dr. Marcel Blattner
Use cases?




      , Dr. Marcel Blattner
Use cases?



1. First step for a data generator, useful to test
new methods and algorithms




                                                     , Dr. Marcel Blattner
Use cases?



1. First step for a data generator, useful to test
new methods and algorithms


2. Especially useful when you have a friendship-network
(like in the LastFM case) to extrapolate
future data topologies.




                                                     , Dr. Marcel Blattner
Future work




        , Dr. Marcel Blattner
Future work



Expand the proposed model to generate ratings
within a predefined scale (like 5-star)




                                                , Dr. Marcel Blattner
Future work



Expand the proposed model to generate ratings
within a predefined scale (like 5-star)


Work out use cases and show the benefit of
the proposed a model




                                                , Dr. Marcel Blattner
...this is the end my friend...




Questions?




                               , Dr. Marcel Blattner

More Related Content

What's hot

PCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face RecognitionPCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face Recognitionijtsrd
 
Machine Learning for Dummies (without mathematics)
Machine Learning for Dummies (without mathematics)Machine Learning for Dummies (without mathematics)
Machine Learning for Dummies (without mathematics)ActiveEon
 
IRJET- CARES (Computerized Avatar for Rhetorical & Emotional Supervision)
IRJET- CARES (Computerized Avatar for Rhetorical & Emotional Supervision)IRJET- CARES (Computerized Avatar for Rhetorical & Emotional Supervision)
IRJET- CARES (Computerized Avatar for Rhetorical & Emotional Supervision)IRJET Journal
 
“Introducing Machine Learning and How to Teach Machines to See,” a Presentati...
“Introducing Machine Learning and How to Teach Machines to See,” a Presentati...“Introducing Machine Learning and How to Teach Machines to See,” a Presentati...
“Introducing Machine Learning and How to Teach Machines to See,” a Presentati...Edge AI and Vision Alliance
 
Facial expression recognition
Facial expression recognitionFacial expression recognition
Facial expression recognitionElyesMiri
 
An Extensive Review on Generative Adversarial Networks GAN’s
An Extensive Review on Generative Adversarial Networks GAN’sAn Extensive Review on Generative Adversarial Networks GAN’s
An Extensive Review on Generative Adversarial Networks GAN’sijtsrd
 
Inverse Modeling for Cognitive Science "in the Wild"
Inverse Modeling for Cognitive Science "in the Wild"Inverse Modeling for Cognitive Science "in the Wild"
Inverse Modeling for Cognitive Science "in the Wild"Aalto University
 
Facial Expression Recognition via Python
Facial Expression Recognition via PythonFacial Expression Recognition via Python
Facial Expression Recognition via PythonSaurav Gupta
 
Deep learning Introduction and Basics
Deep learning  Introduction and BasicsDeep learning  Introduction and Basics
Deep learning Introduction and BasicsNitin Mishra
 
A Friendly Introduction to Machine Learning
A Friendly Introduction to Machine LearningA Friendly Introduction to Machine Learning
A Friendly Introduction to Machine LearningHaptik
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningNandita Naik
 

What's hot (17)

PCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face RecognitionPCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face Recognition
 
A018110108
A018110108A018110108
A018110108
 
Machine Learning for Dummies (without mathematics)
Machine Learning for Dummies (without mathematics)Machine Learning for Dummies (without mathematics)
Machine Learning for Dummies (without mathematics)
 
IRJET- CARES (Computerized Avatar for Rhetorical & Emotional Supervision)
IRJET- CARES (Computerized Avatar for Rhetorical & Emotional Supervision)IRJET- CARES (Computerized Avatar for Rhetorical & Emotional Supervision)
IRJET- CARES (Computerized Avatar for Rhetorical & Emotional Supervision)
 
“Introducing Machine Learning and How to Teach Machines to See,” a Presentati...
“Introducing Machine Learning and How to Teach Machines to See,” a Presentati...“Introducing Machine Learning and How to Teach Machines to See,” a Presentati...
“Introducing Machine Learning and How to Teach Machines to See,” a Presentati...
 
Facial expression recognition
Facial expression recognitionFacial expression recognition
Facial expression recognition
 
Fashion AI
Fashion AIFashion AI
Fashion AI
 
395 404
395 404395 404
395 404
 
An Extensive Review on Generative Adversarial Networks GAN’s
An Extensive Review on Generative Adversarial Networks GAN’sAn Extensive Review on Generative Adversarial Networks GAN’s
An Extensive Review on Generative Adversarial Networks GAN’s
 
Inverse Modeling for Cognitive Science "in the Wild"
Inverse Modeling for Cognitive Science "in the Wild"Inverse Modeling for Cognitive Science "in the Wild"
Inverse Modeling for Cognitive Science "in the Wild"
 
Facial Expression Recognition via Python
Facial Expression Recognition via PythonFacial Expression Recognition via Python
Facial Expression Recognition via Python
 
AAMAS 2014 - Montali - Verification of Data-Aware Multiagent Systems
AAMAS 2014 - Montali - Verification of Data-Aware Multiagent SystemsAAMAS 2014 - Montali - Verification of Data-Aware Multiagent Systems
AAMAS 2014 - Montali - Verification of Data-Aware Multiagent Systems
 
Poster
PosterPoster
Poster
 
Deep learning Introduction and Basics
Deep learning  Introduction and BasicsDeep learning  Introduction and Basics
Deep learning Introduction and Basics
 
A Friendly Introduction to Machine Learning
A Friendly Introduction to Machine LearningA Friendly Introduction to Machine Learning
A Friendly Introduction to Machine Learning
 
ThesisProposal
ThesisProposalThesisProposal
ThesisProposal
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 

Viewers also liked

Big Data and HR - Talk @SwissHR Congress
Big Data and HR - Talk @SwissHR CongressBig Data and HR - Talk @SwissHR Congress
Big Data and HR - Talk @SwissHR CongressMarcel Blattner, PhD
 
The Hawaii Humane Society’s Microchip Madness Month in July
The Hawaii Humane Society’s Microchip Madness Month in July The Hawaii Humane Society’s Microchip Madness Month in July
The Hawaii Humane Society’s Microchip Madness Month in July Dr Ronald H Kienitz DO
 
Research Reveals Which Conditions Can Be Managed for Reduced Costs
Research Reveals Which Conditions Can Be Managed for Reduced CostsResearch Reveals Which Conditions Can Be Managed for Reduced Costs
Research Reveals Which Conditions Can Be Managed for Reduced CostsDr Ronald H Kienitz DO
 
Lean Product Development
Lean Product DevelopmentLean Product Development
Lean Product DevelopmentHaris Aghadi
 
Witches & Fairies
Witches & FairiesWitches & Fairies
Witches & FairiesCoreyPmc1
 
Corey Ashe-Bradford's Visual Resume
Corey Ashe-Bradford's Visual ResumeCorey Ashe-Bradford's Visual Resume
Corey Ashe-Bradford's Visual ResumeCoreyPmc1
 
Cms booklet
Cms bookletCms booklet
Cms bookletkdnpu
 
MXNet talk @useR!2016
MXNet talk @useR!2016MXNet talk @useR!2016
MXNet talk @useR!2016Qiang Kou
 
Cụm danh từ danh từ chung- copy
Cụm danh từ   danh từ chung- copyCụm danh từ   danh từ chung- copy
Cụm danh từ danh từ chung- copyfreebie456
 
Talk Big Data Conference Munich - Data Science needs real Data Scientists.
Talk Big Data Conference Munich - Data Science needs real Data Scientists. Talk Big Data Conference Munich - Data Science needs real Data Scientists.
Talk Big Data Conference Munich - Data Science needs real Data Scientists. Marcel Blattner, PhD
 
Coopersmith para escolares
Coopersmith para escolaresCoopersmith para escolares
Coopersmith para escolaresDiana Requena
 
STyson CV Projects through 9-2012
STyson CV Projects through 9-2012STyson CV Projects through 9-2012
STyson CV Projects through 9-2012Sandra Tyson
 
Demand Side Management of a Smart Grid
Demand Side Management of a Smart GridDemand Side Management of a Smart Grid
Demand Side Management of a Smart GridMirza Abdul Waris
 

Viewers also liked (20)

Big Data and HR - Talk @SwissHR Congress
Big Data and HR - Talk @SwissHR CongressBig Data and HR - Talk @SwissHR Congress
Big Data and HR - Talk @SwissHR Congress
 
The Hawaii Humane Society’s Microchip Madness Month in July
The Hawaii Humane Society’s Microchip Madness Month in July The Hawaii Humane Society’s Microchip Madness Month in July
The Hawaii Humane Society’s Microchip Madness Month in July
 
Psv
PsvPsv
Psv
 
Research Reveals Which Conditions Can Be Managed for Reduced Costs
Research Reveals Which Conditions Can Be Managed for Reduced CostsResearch Reveals Which Conditions Can Be Managed for Reduced Costs
Research Reveals Which Conditions Can Be Managed for Reduced Costs
 
Placement Brochure
Placement BrochurePlacement Brochure
Placement Brochure
 
Lean Product Development
Lean Product DevelopmentLean Product Development
Lean Product Development
 
Earbleed
EarbleedEarbleed
Earbleed
 
Witches & Fairies
Witches & FairiesWitches & Fairies
Witches & Fairies
 
Lesson
LessonLesson
Lesson
 
Corey Ashe-Bradford's Visual Resume
Corey Ashe-Bradford's Visual ResumeCorey Ashe-Bradford's Visual Resume
Corey Ashe-Bradford's Visual Resume
 
Cms booklet
Cms bookletCms booklet
Cms booklet
 
MXNet talk @useR!2016
MXNet talk @useR!2016MXNet talk @useR!2016
MXNet talk @useR!2016
 
Cụm danh từ danh từ chung- copy
Cụm danh từ   danh từ chung- copyCụm danh từ   danh từ chung- copy
Cụm danh từ danh từ chung- copy
 
marketing
marketingmarketing
marketing
 
Talk Big Data Conference Munich - Data Science needs real Data Scientists.
Talk Big Data Conference Munich - Data Science needs real Data Scientists. Talk Big Data Conference Munich - Data Science needs real Data Scientists.
Talk Big Data Conference Munich - Data Science needs real Data Scientists.
 
Affix Scaffolding Brochure
Affix Scaffolding BrochureAffix Scaffolding Brochure
Affix Scaffolding Brochure
 
Coopersmith para escolares
Coopersmith para escolaresCoopersmith para escolares
Coopersmith para escolares
 
STyson CV Projects through 9-2012
STyson CV Projects through 9-2012STyson CV Projects through 9-2012
STyson CV Projects through 9-2012
 
4 vs consulting &amp; trainings business plan
4 vs consulting &amp; trainings   business plan4 vs consulting &amp; trainings   business plan
4 vs consulting &amp; trainings business plan
 
Demand Side Management of a Smart Grid
Demand Side Management of a Smart GridDemand Side Management of a Smart Grid
Demand Side Management of a Smart Grid
 

Similar to Recommendation systems in the scope of opinion formation: a model

Partial Object Detection in Inclined Weather Conditions
Partial Object Detection in Inclined Weather ConditionsPartial Object Detection in Inclined Weather Conditions
Partial Object Detection in Inclined Weather ConditionsIRJET Journal
 
IRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet ArchitectureIRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet ArchitectureIRJET Journal
 
GROUPING OBJECTS BASED ON THEIR APPEARANCE
GROUPING OBJECTS BASED ON THEIR APPEARANCEGROUPING OBJECTS BASED ON THEIR APPEARANCE
GROUPING OBJECTS BASED ON THEIR APPEARANCEijaia
 
SP1: Exploratory Network Analysis with Gephi
SP1: Exploratory Network Analysis with GephiSP1: Exploratory Network Analysis with Gephi
SP1: Exploratory Network Analysis with GephiJohn Breslin
 
最近の研究情勢についていくために - Deep Learningを中心に -
最近の研究情勢についていくために - Deep Learningを中心に - 最近の研究情勢についていくために - Deep Learningを中心に -
最近の研究情勢についていくために - Deep Learningを中心に - Hiroshi Fukui
 
Scene Description From Images To Sentences
Scene Description From Images To SentencesScene Description From Images To Sentences
Scene Description From Images To SentencesIRJET Journal
 
ArtificialIntelligenceInObjectDetection-Report.pdf
ArtificialIntelligenceInObjectDetection-Report.pdfArtificialIntelligenceInObjectDetection-Report.pdf
ArtificialIntelligenceInObjectDetection-Report.pdfAbishek86232
 
Relational Database & Database Management System
Relational Database & Database Management SystemRelational Database & Database Management System
Relational Database & Database Management SystemNimrakhan89
 
Image Classification and Annotation Using Deep Learning
Image Classification and Annotation Using Deep LearningImage Classification and Annotation Using Deep Learning
Image Classification and Annotation Using Deep LearningIRJET Journal
 
IRJET - Direct Me-Nevigation for Blind People
IRJET -  	  Direct Me-Nevigation for Blind PeopleIRJET -  	  Direct Me-Nevigation for Blind People
IRJET - Direct Me-Nevigation for Blind PeopleIRJET Journal
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionIJCSIS Research Publications
 
Gephi icwsm-tutorial
Gephi icwsm-tutorialGephi icwsm-tutorial
Gephi icwsm-tutorialcsedays
 
Advances In Collaborative Filtering
Advances In Collaborative FilteringAdvances In Collaborative Filtering
Advances In Collaborative FilteringScott Donald
 
System for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveySystem for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveyIRJET Journal
 
LAK13 linkedup tutorial_evaluation_framework
LAK13 linkedup tutorial_evaluation_frameworkLAK13 linkedup tutorial_evaluation_framework
LAK13 linkedup tutorial_evaluation_frameworkHendrik Drachsler
 
An application of artificial intelligent neural network and discriminant anal...
An application of artificial intelligent neural network and discriminant anal...An application of artificial intelligent neural network and discriminant anal...
An application of artificial intelligent neural network and discriminant anal...Alexander Decker
 
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...ijscai
 
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...ijscai
 

Similar to Recommendation systems in the scope of opinion formation: a model (20)

Partial Object Detection in Inclined Weather Conditions
Partial Object Detection in Inclined Weather ConditionsPartial Object Detection in Inclined Weather Conditions
Partial Object Detection in Inclined Weather Conditions
 
IRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet ArchitectureIRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet Architecture
 
GROUPING OBJECTS BASED ON THEIR APPEARANCE
GROUPING OBJECTS BASED ON THEIR APPEARANCEGROUPING OBJECTS BASED ON THEIR APPEARANCE
GROUPING OBJECTS BASED ON THEIR APPEARANCE
 
SP1: Exploratory Network Analysis with Gephi
SP1: Exploratory Network Analysis with GephiSP1: Exploratory Network Analysis with Gephi
SP1: Exploratory Network Analysis with Gephi
 
最近の研究情勢についていくために - Deep Learningを中心に -
最近の研究情勢についていくために - Deep Learningを中心に - 最近の研究情勢についていくために - Deep Learningを中心に -
最近の研究情勢についていくために - Deep Learningを中心に -
 
Causality in complex networks
Causality in complex networksCausality in complex networks
Causality in complex networks
 
Scene Description From Images To Sentences
Scene Description From Images To SentencesScene Description From Images To Sentences
Scene Description From Images To Sentences
 
ArtificialIntelligenceInObjectDetection-Report.pdf
ArtificialIntelligenceInObjectDetection-Report.pdfArtificialIntelligenceInObjectDetection-Report.pdf
ArtificialIntelligenceInObjectDetection-Report.pdf
 
Relational Database & Database Management System
Relational Database & Database Management SystemRelational Database & Database Management System
Relational Database & Database Management System
 
Image Classification and Annotation Using Deep Learning
Image Classification and Annotation Using Deep LearningImage Classification and Annotation Using Deep Learning
Image Classification and Annotation Using Deep Learning
 
IRJET - Direct Me-Nevigation for Blind People
IRJET -  	  Direct Me-Nevigation for Blind PeopleIRJET -  	  Direct Me-Nevigation for Blind People
IRJET - Direct Me-Nevigation for Blind People
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware Detection
 
Gephi icwsm-tutorial
Gephi icwsm-tutorialGephi icwsm-tutorial
Gephi icwsm-tutorial
 
Advances In Collaborative Filtering
Advances In Collaborative FilteringAdvances In Collaborative Filtering
Advances In Collaborative Filtering
 
System for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveySystem for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A Survey
 
Qwertyui
QwertyuiQwertyui
Qwertyui
 
LAK13 linkedup tutorial_evaluation_framework
LAK13 linkedup tutorial_evaluation_frameworkLAK13 linkedup tutorial_evaluation_framework
LAK13 linkedup tutorial_evaluation_framework
 
An application of artificial intelligent neural network and discriminant anal...
An application of artificial intelligent neural network and discriminant anal...An application of artificial intelligent neural network and discriminant anal...
An application of artificial intelligent neural network and discriminant anal...
 
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
 
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Recommendation systems in the scope of opinion formation: a model

  • 1. Laboratory for Web Science (LWS) University of Applied Sciences Switzerland http://lws.ffhs.ch Follow @blattnerma , Dr. Marcel Blattner
  • 2. Laboratory for Web Science (LWS) University of Applied Sciences Switzerland http://lws.ffhs.ch Follow @blattnerma , Dr. Marcel Blattner
  • 3. Recommendation systems in the scope of opinion formation: a model Dr. Marcel Blattner, Laboratory for Web Science University of Applied Sciences Switzerland Dr. Matus Medo, Physics Department, University of Fribourg University of Fribourg Switzerland , Dr. Marcel Blattner
  • 4. Motivation , Dr. Marcel Blattner
  • 5. Motivation Real world recommender system data are the result of complex processes. Social interactions play a major role. , Dr. Marcel Blattner
  • 6. Motivation Real world recommender system data are the result of complex processes. Social interactions play a major role. How can we model those mechanisms to reproduce observed data (opinions) in recommendation systems? , Dr. Marcel Blattner
  • 7. Motivation Real world recommender system data are the result of complex processes. Social interactions play a major role. How can we model those mechanisms to reproduce observed data (opinions) in recommendation systems? How can we benefit from such a model? , Dr. Marcel Blattner
  • 8. ts are always ’bound’ on used To highlight various aspects of B-Rank, a to ty to obtain similar results for The Aim Fig.(1) is introduced. For simplicity all links be jects and users are equally weighted wi = 1 8i. mpared to ZLZ-II, is achieved result highlights the fact, that The model should personality. From real world objects users igher diversity is positive cor- n general [22]. However, bipartite generate user re in off-line user-object data experiments and raw robust conclusions. Z-II algorithm was proposed reached a comparable perfor- Figure 1: Toy net to illustrate B-Rank. Circles Rank in the movielens dataset. hyperedges (users), squares are hypervertices ning parameter l . B-Rank in jects. The votes are illustrated as links betwe nd therefore easier to imple- and users. may increase improvements First, some general aspects are discussed, se e presented basic B-Rank al- shown, how all aspects are well captured by th eight matrix W . This will be algorithm. per. Another extension is to Case A: huge audience in common. Intui pagation (indirect connections objects a and b are similar to each other, when , Dr. Marcel Blattner
  • 9. ts are always ’bound’ on used To highlight various aspects of B-Rank, a to ty to obtain similar results for The Aim Fig.(1) is introduced. For simplicity all links be jects and users are equally weighted wi = 1 8i. mpared to ZLZ-II, is achieved result highlights the fact, that The model should personality. From real world objects users igher diversity is positive cor- n general [22]. However, bipartite generate user re in off-line user-object data experiments and raw robust conclusions. Z-II algorithm was proposed reached a comparable perfor- Figure 1: Toy net to illustrate B-Rank. Circles Rank in the movielens dataset. hyperedges (users), squares are hypervertices ning parameter l . B-Rank in jects. The votes are illustrated as links betwe nd therefore easier to imple- and users. may increase improvements First, some general aspects are discussed, se e presented basic B-Rank al- shown, how all aspects are well captured by th eight matrix W . This will be algorithm. per. Another extension is to Case A: huge audience in common. Intui pagation (indirect connections objects a and b are similar to each other, when , Dr. Marcel Blattner
  • 10. ts are always ’bound’ on used To highlight various aspects of B-Rank, a to ty to obtain similar results for The Aim Fig.(1) is introduced. For simplicity all links be jects and users are equally weighted wi = 1 8i. mpared to ZLZ-II, is achieved result highlights the fact, that The model should personality. From real world objects users igher diversity is positive cor- n general [22]. However, bipartite generate user re in off-line user-object data experiments and raw robust conclusions. Z-II algorithm was proposed reached a comparable perfor- Figure 1: Toy net to illustrate B-Rank. Circles Rank in the movielens dataset. hyperedgesWe trysquares are hypervertices (users), to understand ning parameter l . B-Rank in jects. The these data as a as links betwe votes are illustrated result nd therefore easier to imple- and users. of social processes. may increase improvements First, some general aspects are discussed, se e presented basic B-Rank al- shown, how all aspects are well captured by th eight matrix W . This will be algorithm. per. Another extension is to Case A: huge audience in common. Intui pagation (indirect connections objects a and b are similar to each other, when , Dr. Marcel Blattner
  • 11. The Model Model Assumptions (I): Objects generate anticipation distributions. (IIA - intrinsic item anticipation)
  • 12. The Model Model Assumptions (I): Objects generate anticipation distributions. (IIA - intrinsic item anticipation) Individuals will invest resources only, if their anticipation exceed some threshold. anticipation threshold
  • 13. The Model Model Assumptions (I): Objects generate anticipation distributions. (IIA - intrinsic item anticipation) Individuals will invest resources only, if their anticipation exceed some Potential threshold. Adopters Adopters anticipation threshold
  • 14. The Model Model Assumptions (I): Objects generate anticipation distributions. (IIA - intrinsic item anticipation) Individuals will invest resources only, if their anticipation exceed some Potential threshold. Adopters Adopters Potential adopters are able to become adopters or anticipation deniers threshold
  • 15. The Model Model Assumptions (II): The shift from a potential adopter to an adopter is caused by information exchange on a network with a specific topology. Potential Adopters (Influence Network) Adopters anticipation threshold , Dr. Marcel Blattner
  • 16. The Model Model Assumptions (II): The shift from a potential adopter to an adopter is caused by information exchange on a network with a specific topology. Potential Adopters (Influence Network) Adopters anticipation threshold adopter potential adopter denier Influence Network , Dr. Marcel Blattner
  • 17. The Model Model Assumptions (II): The shift from a potential adopter to an adopter is caused by information exchange on a network with a specific topology. Potential Adopters (Influence Network) Adopters anticipation threshold adopter Possible transitions: potential adopter denier Influence Network , Dr. Marcel Blattner
  • 18. The Model Model Assumptions (II): The shift from a potential adopter to an adopter is caused by information exchange on a network with a specific topology. Potential Adopters (Influence Network) Adopters anticipation threshold adopter Possible transitions: potential adopter denier Influence Network , Dr. Marcel Blattner
  • 19. The Model Model Assumptions (II): The shift from a potential adopter to an adopter is caused by information exchange on a network with a specific topology. Potential Adopters (Influence Network) Adopters anticipation threshold adopter Possible transitions: potential adopter denier Influence Network , Dr. Marcel Blattner
  • 20. The Model Mathematical formulation IIA-Shift Potential Adopters Adopters anticipation threshold  (1 ) ˆ ⇥j fij = fij + kj , Dr. Marcel Blattner
  • 21. The Model Mathematical formulation IIA-Shift Potential Adopters Adopters anticipation threshold  (1 ) ˆ ⇥j fij = fij + kj , fij 2 fi 2 N (µi , ) Intrinsic Item Anticipation , Dr. Marcel Blattner
  • 22. The Model Mathematical formulation IIA-Shift Potential Adopters Adopters anticipation Neighbors, who threshold already adopted  (1 ) ˆ ⇥j fij = fij + kj , fij 2 fi 2 N (µi , ) Intrinsic Item Anticipation , Dr. Marcel Blattner
  • 23. The Model Mathematical formulation IIA-Shift Potential Adopters Adopters anticipation Neighbors, who threshold already adopted  (1 ) ˆ ⇥j fij = fij + kj , fij 2 fi 2 N (µi , ) Intrinsic Item Total # of Anticipation neighbors , Dr. Marcel Blattner
  • 24. The Model Mathematical formulation IIA-Shift Potential Adopters Adopters anticipation Neighbors, who threshold already adopted Trust  (1 ) ˆ ⇥j fij = fij + kj , fij 2 fi 2 N (µi , ) Intrinsic Item Total # of Anticipation neighbors , Dr. Marcel Blattner
  • 25. The Model Mathematical formulation IIA-Shift Potential Adopters Adopters anticipation Shifted Neighbors, who threshold Item already adopted Trust Anticipation  (1 ) ˆ ⇥j fij = fij + kj , fij 2 fi 2 N (µi , ) Intrinsic Item Total # of Anticipation neighbors , Dr. Marcel Blattner
  • 26. The Model Mathematical formulation IIA-Shift Potential Adopters Adopters anticipation Shifted Neighbors, who threshold Item already adopted Trust Anticipation  (1 ) ˆ ⇥j fij = fij + kj , fij 2 fi 2 N (µi , ) ˆ fij adopter Intrinsic Item Total # of ˆ fij < denier Anticipation neighbors , Dr. Marcel Blattner
  • 27. The Model Simulation of Algorithm 1 RecSysMod algorithm. P contains the con- dynamics for a set figuration parameter for the network. is the Anticipation Threshold and denotes the trust. O 2 N is the number of objects to simulate. G(N, E) is the network. N is the set of of objects nodes and E is the set of edges. 1: procedure RecSysMod I(P, , , O) 2: G(N, E) GenNetwork(P) 3: for all Objects in O do 4: generate distribution fi from N (µi , ) 5: for each node j 2 N in G do 6: draw fij from fi 7: if fij < then 8: jstate S 9: else 10: jstate A 11: end if Contour plot for and ⇢ = ⇥j /kj . Num- 12: end for the plot quantify the shift in the IAA as 13: repeat of and ⇢. 14: for all j with jstate = S AND ⇥j > 0 do h i(1 ) ˆ ⇥ 15: fij fij + jkj uence-Network IN(P) with a fixed network topol- 16: ˆ if fij < then law, Erd˝s-R´nyi, or another). P refers to a o e 17: jstate D priate parameters for the Influence-Network in 18: else ke network type, number of nodes, etc.). The 19: jstate A opology is not a↵ected by the dynamical pro- 20: end if on propagation) taking place on it. We justify 21: end for cenario by assuming that the time scale of the 22: until |{j|jstate = S AND ⇥j > 0}| = 0 ange is much longer then the time scale 1 of opin- 23: end for g in the network. Each node in the Influence- 24: end procedure responds to an individual. For each individual n unbiased Intrinsic-Item-Anticipation fij from , Dr. Marcel Blattner ed probability distribution fi . At each time step,
  • 28. Distribution Landscape Simulation of dynamics for a set of objects , Dr. Marcel Blattner
  • 29. Figure 4: Fit of the MovieLens attendance dis- Figure 2: Skewness of the attendance distributions tribution with trust threshold Results = 0.50, critical anticipation = 0.6, anticipation distribution variance as a function of trust and the critical anticipation = 0.25, and power law network with exponent threshold for Erd˝s-R´ny networks with 500 nodes o e = 2.25, 943 nodes, and 1682 simulated objects. and 300 simulated items. Figure 4: Fit of the MovieLens attendance dis- Figure 5: Fit of the Netflix attendance distribution tribution with trust = 0.50, critical anticipation with trust = 0.52, critical anticipation threshold Figure 3: Skewness of the attendance distributions threshold = 0.6, anticipation distribution variance = 0.72, anticipation distribution variance = 0.27, as a function of trust law network with exponent = 0.25, and power and the critical anticipation and power law network with exponent = 2.2, 480189 threshold943 for power-law networks with 500 nodes = 2.25, nodes, and 1682 simulated objects. nodes, and 17770 simulated objects. and 300 simulated items. MovieLens Netflix Ru Fitting real data We fit real world recommender data ditions for the first movers a0 = f (x)dx, s(0) = 1 a(0), from MovieLens, Netflix and Lastfm with results reported and d(0) = 0. In the following we use the bra-ket nota- in Fig. (4), Fig. (5), Fig. (6), Fig. (7), and Tab. (1), re- tion hxi to represent the average of a quantity x. Standard spectively. The real and simulated distributions are com- methods can now be used to arrive at2 pared using Kullback-Leibler (KL) divergence [29]. We re- port the mean, median, maximum, and minimum of the (⌧ hki) 1 exp(t/⌧ ) a(t) = 1 . (7) simulated and real attendance distributions. Trust , antic- (↵ + ) [exp(t/⌧ ) 1] + (⌧ hki a0 ) ipation threshold , and anticipation distribution variance Here ⌧ is the time scale of the propagation which is defined are reported in figure captions. We also compare the aver- as , Dr. Marcel Blattner aged mean degree, maximum degree, minimum degree, and
  • 30. Figure 6: Fit of the Lastfm attendance distribution with trust = 0.4, critical anticipation threshold = Table 2: Mean, minimum, maximum degree, clus- Results 0.8, anticipation distribution variance = 0.24, and tering coe cient C, and estimated exponent of the real Lastfm user friendship network with 1892 nodes real (LFM1) and simulated (LFM2) social network and 17632 simulated objects. for the Lastfm data set. D KL ML 0.0 D KL Med Mean Max Min NF 0.0 ML 0.046 27/26 59/60 583/485 1/1 LFM1 0.0 NF 0.030 561/561 5654/5837 232944/193424 3/16 LFM2 0.0 LFM1 0.05 1/1 5.3/5.2 611/503 1/1 LFM2 0.028 1/1 5.3/5.8 611/547 1/1 Table 1: Si Netflix, LF Table 1: Simulation results. ML: Movielens, NF: Netflix, LFM1: Lastfm with real network, LFM2: Lastfm wit Lastfm with simulated network, KL: Kullback- Leibler div Leibler divergence, Med: Median, Mean, Max: maximal at maximal attendance (data/simulated), Min: mini- mal attenda mal attendance (data/simulated). D hki D hki kmin kmax C LFM1 13. LFM1 13.4 1 119 2.3 0.186 LFM2 12.0 1 118 2.25 0.06 LFM2 12. Figure 7: Fit of the Lastfm attendance distribution gure 6: Fit of the Lastfm attendance distribution Figure 8: 6: Fit of the Lastfm attendance distribution Figure Log-log plot of real (red) and simulated with anticipation0.6, critical= anticipation Mean, minimum,(blue) social network degree distribution P (k) for = th trust = 0.4, criticaltrust = threshold Table 2: threshold with trust = 0.4, critical anticipation threshold maximum degree, clus- Table 2: M , anticipation distributionanticipation distribution tering coe cient C, and estimatedanticipation distribution variance cumulative = 0.8, variance = 0.24, and variance = 0.24, the Lastfm data of the Inset: plot of the = 0.24, and 0.8, exponent set. tering coe l Lastfm user friendship network network with exponent = 2.25, 1892 and power law with 1892 nodes real (LFM1) and simulated (LFM2) social user friendship network with 1892 nodes degreeLastfm network real distribution. real (LFM1 d 17632 simulated objects. 17632 simulated objects. the Lastfm data set. nodes and for and 17632 simulated objects. for the Last We emphasize that Eq.(10) is valuable in predicting users’ suming a(0) = a0 0, we can neglect the dynamics of d(t) behavior of a recommender system in an early stage. to obtain ⌦ ↵ ! 2 k ˙ ⌦(t) = hki 1 ⌦(t). 5. DISCUSSION LastFM Social influence and our peers are known to form and in- In addition, Eq. (4) yields fluence many of our opinions and, ultimately, decisions. We ) propose here a simple model which is based on heteroge- ak (t) = k(1 ak (t))⌦(t) ˙ (9) neous agent expectations, a social network, and a formalized sk (t) = (↵ + )k(1 ak (t))⌦(t) ˙ social influence mechanism. We analyze the model by nu- merical simulations and by master equation approach which Neglecting terms of order a2 (t) and summing the solution k is particularly suitable to describe the initial phase of the of ak (t) over P (k), we get a result for the early spreading social “contagion”. The proposed model is able to generate stage ⇣ gure 7: Fit of the Lastfm attendance distribution Figure ⌘ Log-log plot of a wide range of di↵erent attendance distributions, includ- 8: real (red) and simulated th trust a(t) = a(0) 1 + ⌧ exp(t/⌧ ) 1 social network degree distribution P in for = 0.6, critical anticipation threshold (blue) , (10) ing those observed (k) popular real systems (Netflix, Lastfm, ⌦ 2 0.24, ⇤ and Movielens). In addition, we showed that these patterns = 0.8, anticipation distribution variance ↵= ⇥ ⌦ ↵ the Lastfm data set. Inset: plot of the cumulative d power law networkthe timescale ⌧ = =k / 1892 k with with exponent 2.25, ( 2 hki) . The obtained degree distribution. are emergent Fit of theof the dynamics and not imposed Figure 7: properties Lastfm attendance distribution Figure 8: L des and 17632 simulated objects. in the early stage of the opinion spreading time scale ⌧ valid bywith trust the = 0.6, critical anticipationparticular topology of underlying social network. Of threshold (blue) socia , Dr. Marcel Blattner is clearly dominated by the network heterogeneity. This re- interest 0.8, anticipation distribution variance social = is the case of Lastfm where the underlying = 0.24, the Lastfm We emphasize that Eq.(10) is valuable in predicting users’
  • 31. Results D KL Med Mean Max Min ML D 0.046 KL 27/26 Med 59/60 Mean 583/485Max 1/1 Min NF ML 0.030 561/561 5654/5837 232944/193424 3/16 1/1 0.046 27/26 59/60 583/485 LFM1 NF 0.05 0.030 1/1 561/561 5.3/5.2 5654/5837 611/503 1/1 232944/193424 3/16 LFM2 0.028 1/1 5.3/5.8 611/547 1/1 LFM1 0.05 1/1 5.3/5.2 611/503 1/1 Table 1: Simulation results. 5.3/5.8Movielens, NF: LFM2 0.028 1/1 ML: 611/547 1/1 Netflix, LFM1: Lastfm with real network, LFM2: Lastfm 1: Simulation results. ML: Movielens, NF: Table with simulated network, KL: Kullback- Leibler divergence, Med: with real Mean, Max: Netflix, LFM1: Lastfm Median, network, LFM2: Lastfm with simulated network, KL: Kullback- maximal attendance (data/simulated), Min: mini- Leibler divergence, Med: Median, Mean, Max: mal attendance (data/simulated). maximal attendance (data/simulated), Min: mini- D hki kmin kmax C mal attendance (data/simulated). LFM1 13.4 1 119 2.3 0.186 LFM2 12.0 1 118 2.25 0.06 on D hki kmin kmax C = Table 2: Mean, minimum, maximum0.186 LFM1 13.4 1 119 2.3 degree, clus- nd tering coe 12.0 LFM2 1 118 2.25 0.06 cient C, and estimated exponent of the n es real (LFM1) and simulated (LFM2) social network = Table 2: Mean, minimum, maximum degree, clus- for the Lastfm data set. d tering coe cient C, and estimated exponent of the es real (LFM1) and simulated (LFM2) social network for the Lastfm data set. , Dr. Marcel Blattner
  • 32. Mathematical analysis Coupled differential equations Coupled differential equations for k-compartments (mean field approximation) 9 9 ak (t) = ksk (t)⌦ ˙ > = a(t) = < k > s(t)a(t), ˙ > = ˙ dk (t) = ↵ksk (t)⌦ ˙ d(t) = ↵ < k > s(t)a(t), > ; > ; sk (t) = ˙ (↵ + )ksk (t)⌦ s(t) = ˙ (↵ + ) < k > s(t)a(t) P k P (k)(k 1)ak ⌦= <k> Z Z = f (x)dx, ↵= f (x)dx, = (1/k)1 l , Dr. Marcel Blattner
  • 33. Mathematical analysis - Results Coupled differential equations Coupled differential equations for k-compartments (mean field approximation) ⇣ ⌘ (⌧ hki) 1 exp(t/⌧ ) a(t) = a(0) 1 + ⌧ exp(t/⌧ ) 1 a(t) = 1 (↵ + ) [exp(t/⌧ ) 1] + (⌧ hki a0 ) ⌦ 2 ↵ k 1 ⌧= ⌧ = (a0 ↵ hki + hki) [ (hk 2 i hki)] , Dr. Marcel Blattner
  • 34. Use cases? , Dr. Marcel Blattner
  • 35. Use cases? 1. First step for a data generator, useful to test new methods and algorithms , Dr. Marcel Blattner
  • 36. Use cases? 1. First step for a data generator, useful to test new methods and algorithms 2. Especially useful when you have a friendship-network (like in the LastFM case) to extrapolate future data topologies. , Dr. Marcel Blattner
  • 37. Future work , Dr. Marcel Blattner
  • 38. Future work Expand the proposed model to generate ratings within a predefined scale (like 5-star) , Dr. Marcel Blattner
  • 39. Future work Expand the proposed model to generate ratings within a predefined scale (like 5-star) Work out use cases and show the benefit of the proposed a model , Dr. Marcel Blattner
  • 40. ...this is the end my friend... Questions? , Dr. Marcel Blattner

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. Want to generate real world recommendation data (user-object data)\n
  7. Want to generate real world recommendation data (user-object data)\n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n