当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

《电子商务 E-business》阅读文献:a content-based approach to tag recommendation

资源类别:文库,文档格式:PDF,文档页数:6,文件大小:630.59KB,团购合买
点击下载完整版文档(PDF)

A Content-Based Method to Enhance Tag Recommendation* Yu-Ta Lu, Shoou-I Yu, Tsung-Chieh Chang, Jane Yung-jen HsI Department of Computer Science and Information Engineering National Taiwan University (b94063, b94065, r96008, yjhsu]@csientu.edu.tw Abstract Tag information is useful in many aspects. One aspect is Tagging has become a primary tool for users to that tags help describe the content in a page, revealing its se- organize and share digital content on many social mantic meaning. They not only emphasize the key terms of media sites. In addition tag information has been a page but also contain some additional information that is shown to enhance capabilities of existing search not present in the page text Bischoff et al, 20081. Another engines. However, many resources on the web facet is that tags may be useful for search. This includes per- still lack tag information. This paper proposes sonal archive administration, where people use tags to search a content-based approach to tag recommendation for documents in their collection, and possibly web search. which can be applied to webpages with or without Even though the issue that whether tags enhances web search prior tag information. While social bookmarking has been a subject of debate for some time, tags undeniably service such as Delicious! enables users to share provide good information for documents they annotate annotated bookmarks, tag recommendation is avail- Despite the advantages tags have, tags are not truly helpful able only for pages with tags specified by other in the current web, caused by the fact that most documents, or users. Our proposed approach is motivated by the webpages, contain little or no tag information. Some social observation that similar webpages tend to have the bookmarking websites such as Delicious provide tag infor- same tags. Each webpage can therefore share the mation for pages annotated by users. However, the number of tags they own with similar webpages. The propaga- pages being tagged is still too small to have a big impact on tion of a tag depends on its weight in the originat- current search engines [Heymann et aL., 2008a]. According ng webpage and the similarity between the send- to the estimation of Heymann et al., 2008al, there are about ing and receiving webpages. The similarity metric 30 to 50 million unique URLs posted publicly on Delicious between two webpages is defined as a linear com and the number of total posts is only a small portion of the bination of four cosine similarities, taking into ac web, which has at least billions of webpages. To make mat count both tag information and page content. Ex- ters worse. even if a url is bookmarked on delicious. the eriments using data crawled from delicious show URL may not have enough tag information, because the to- hat the proposed method is effective in populatin tal number of tags annotating a URL follows the power rule untagged webpages with the correct tags Figure 1 is drawn using data from a subset of our dataset 685 418 URLs crawled from Delicious. 94% of the urls 1 Introduction have less than 50 total tags, meaning that even if the url is bookmarked, there is still a high probability that it has very The phenomenal rise of social media in recent years has en- few tags. One solution to deal with the scarcity of tags on the abled an average person from being mere content readers to web is to develop an automatic tag annotating mechanism that content publishers. People share a variety of media contents helps make tag information more available. Unfortunately with their friends or the general public on social media sites. on Delicious, tag recommendation is available only for pages Tagging is commonly used on these sites to add comments with tags specified by other users. Therefore, for those web- about the media content, or to help organize and retrieve rele- pages with absolutely no tag information, a new tag annot- vant items. Tagging associates a resource with a set of words, tion method must be used which represent the semantic concepts activated by the re- This paper proposes a method for content-based tag recom- source at the cognitive level. While categorization is a pri- mendation that can be applied to webpages with or without marily subjective decision process, tagging is a social index prior tag information. The recommended tags for a webpage can be used not only as recommendations to users but also to "This research was supl automatically annotate the page. Our method first introduces ence Council NSC 97-2815-C-002-106/107-E NSC97-2622-E-002- the idea of tag/term coverage, which is an entropy-based met o10-CC2, and Ministry of Education in Taiwan 97RO1O8. ric describing how fully the tags/terms represent the anno- delicious. com tated document. Terms here refer to the words in the page 2064

A Content-Based Method to Enhance Tag Recommendation∗ Yu-Ta Lu, Shoou-I Yu, Tsung-Chieh Chang, Jane Yung-jen Hsu Department of Computer Science and Information Engineering National Taiwan University {b94063, b94065, r96008, yjhsu}@csie.ntu.edu.tw Abstract Tagging has become a primary tool for users to organize and share digital content on many social media sites. In addition, tag information has been shown to enhance capabilities of existing search engines. However, many resources on the web still lack tag information. This paper proposes a content-based approach to tag recommendation which can be applied to webpages with or without prior tag information. While social bookmarking service such as Delicious1 enables users to share annotated bookmarks, tag recommendation is avail￾able only for pages with tags specified by other users. Our proposed approach is motivated by the observation that similar webpages tend to have the same tags. Each webpage can therefore share the tags they own with similar webpages. The propaga￾tion of a tag depends on its weight in the originat￾ing webpage and the similarity between the send￾ing and receiving webpages. The similarity metric between two webpages is defined as a linear com￾bination of four cosine similarities, taking into ac￾count both tag information and page content. Ex￾periments using data crawled from Delicious show that the proposed method is effective in populating untagged webpages with the correct tags. 1 Introduction The phenomenal rise of social media in recent years has en￾abled an average person from being mere content readers to content publishers. People share a variety of media contents with their friends or the general public on social media sites. Tagging is commonly used on these sites to add comments about the media content, or to help organize and retrieve rele￾vant items. Tagging associates a resource with a set of words, which represent the semantic concepts activated by the re￾source at the cognitive level. While categorization is a pri￾marily subjective decision process, tagging is a social index￾ing process. ∗This research was supported by grants from the National Sci￾ence Council NSC 97-2815-C-002-106/107-E, NSC97-2622-E-002- 010-CC2, and Ministry of Education in Taiwan 97R0108. 1 delicious.com Tag information is useful in many aspects. One aspect is that tags help describe the content in a page, revealing its se￾mantic meaning. They not only emphasize the key terms of a page but also contain some additional information that is not present in the page text [Bischoff et al., 2008]. Another facet is that tags may be useful for search. This includes per￾sonal archive administration, where people use tags to search for documents in their collection, and possibly web search. Even though the issue that whether tags enhances web search has been a subject of debate for some time, tags undeniably provide good information for documents they annotate. Despite the advantages tags have, tags are not truly helpful in the current web, caused by the fact that most documents, or webpages, contain little or no tag information. Some social bookmarking websites such as Delicious provide tag infor￾mation for pages annotated by users. However, the number of pages being tagged is still too small to have a big impact on current search engines [Heymann et al., 2008a]. According to the estimation of [Heymann et al., 2008a], there are about 30 to 50 million unique URLs posted publicly on Delicious and the number of total posts is only a small portion of the web, which has at least billions of webpages. To make mat￾ters worse, even if a URL is bookmarked on Delicious, the URL may not have enough tag information, because the to￾tal number of tags annotating a URL follows the power rule. Figure 1 is drawn using data from a subset of our dataset: 685,418 URLs crawled from Delicious. 94% of the URLs have less than 50 total tags, meaning that even if the URL is bookmarked, there is still a high probability that it has very few tags. One solution to deal with the scarcity of tags on the web is to develop an automatic tag annotating mechanism that helps make tag information more available. Unfortunately, on Delicious, tag recommendation is available only for pages with tags specified by other users. Therefore, for those web￾pages with absolutely no tag information, a new tag annota￾tion method must be used. This paper proposes a method for content-based tag recom￾mendation that can be applied to webpages with or without prior tag information. The recommended tags for a webpage can be used not only as recommendations to users but also to automatically annotate the page. Our method first introduces the idea of tag/term coverage, which is an entropy-based met￾ric describing how fully the tags/terms represent the anno￾tated document. Terms here refer to the words in the page 2064

provided a simple taxonomy of tagging systems to analyze and distinguish these tagg stems from different kinds of websites by distinct facets. Golder and Huberman [2006]an- alyzed the dynamics of collaborative tagging systems, includ- ing user activity, tag frequencies, and bursts of popularity in resources From the aspect of information retrieval [Salton and McGill, 1986], tags bring new information to items over original contents [Bischoff et aL., 2008], and therefore tags can enhance capabilities of existing search engines to find out relevant documents [Heymann et aL., 2008a]. Bao et al. [2007 proposed iterative algorithms integrating tags into web search for better ranking results. Furthermore, tag types re- oo flect what distinctions are important to taggers. Bischoff et al. Number of Total Ta [2008] refined the scheme presented by Golder and Huber- man 2006] by classifying tags into 8 categories and exhibit Figure 1: Power Law: The number of total tags versus the ing tag type distributions across different tagging systems and number of webpages having that many total tags web anchor texts(or link labels). From comparing categories of tags with query logs and user study, they showed that most content of the document. The basic idea is that the better represents the same attributes as searching behavior in most its tag/term set. Exploiting the notion of tag/term coverage, cases we propose a similarity metric between two documents based Although tags are helpful to improve search results and di de documents, people on average annotate resources with on the tags and terms of both documents. Using the vector only a small number of tags Bischoff et al, 2008]. Tag space model, we represent each document with two vectors: recommendation, one of the emerging research topics in tag- a tag vector and a term vector. When calculating the similarity ng, can reduce people's tagging effort and encourage them score, other than the intuitive method of computing the cosine to use more tags to reduce the problem. Xu et al. [2006] similarity between the two tag vectors and the two content vectors of the pair of documents, we also take into account proposed the criteria for better tag recommendations, includ. the cosine similarity be ween the tag vector of one document nary results only. Jaschke et al. aschke et al., 2007) in- metric of the two documents thus consists of a weighted sum duced the Folk Rank hich computes a t of four components, with the weight of each component de- specific ranking of the elements in a folksonomy, and pending on the tag/term coverage of each document. Finally, Tuzhilin, 2005/ ve filtering algorithms [Adomavicius and feated collaborativ using the similarity metric, we allow each document to prop- In terms of content-based tag recommendation, Heymann agate, or to share the tags it owns to other similar documents. et al. [2008b) formulated the problem into a supervised learn- After the propagation step, the tags that have a higher weiyi and problem. Using page text, anchor text, surrounding hosts and available tag information as training data, Heymann et al. We used tag data crawled from one of the largest social trained a classifier for each tag they wanted to predict. Even bookmarking sites, Delicious. Since users on Delicious can though they can achieve high precision using this method add bookmarks along with some descriptive tags into their the time required to train the classifiers for each tag becomes own collection, this site contains an enormous number of substantial when the number of distinct tags increases. In the bookmarks and each of which contains a different number same paper, Heymann et al. achieved good results in expand of tags. We also crawled the webpages corresponding to each ing the tag set of documents with little tag information using bookmark, which serves as the page content of the webpage association rules We analyzed the tag information of the dataset and tested our method using cross validation and through a user study. The 3 Methodology results show that our proposed method is effective in populat- 3.1 notations ing untagged webpages with the correct tags. Before diving into the notations, we first define the termi 2 Related work nology used in this paper. A URL is described by the annotated by the users and the terms which are words on the In the era of web 2.0, websites allow users to contribute their webpage corresponding to the URL. The words webpages and contents, and annotate them with a freely chosen set of key- documents that appeared in the previous paragraphs ar words under the tagging system built by each website. Mika all referred to as URL. The three words, URL, tags and [2005] represented semantic social networks in the form of will be used throughout the text a tripartite model which is consisted of actors(users),con Let u be the set of all URLs. Let T be the set of all tags cepts(tags), and instances(resources). Marlow et al. [2006] For a URL uE U, let Tag(u) be the set of tags that annotate

Figure 1: Power Law: The number of total tags versus the number of webpages having that many total tags. content of the document. The basic idea is that the better the tag/term coverage of a document, the more we can trust its tag/term set. Exploiting the notion of tag/term coverage, we propose a similarity metric between two documents based on the tags and terms of both documents. Using the vector space model, we represent each document with two vectors: a tag vector and a term vector. When calculating the similarity score, other than the intuitive method of computing the cosine similarity between the two tag vectors and the two content vectors of the pair of documents, we also take into account the cosine similarity between the tag vector of one document and the term vector of the other document. The similarity metric of the two documents thus consists of a weighted sum of four components, with the weight of each component de￾pending on the tag/term coverage of each document. Finally, using the similarity metric, we allow each document to prop￾agate, or to share the tags it owns to other similar documents. After the propagation step, the tags that have a higher weight in a document is viewed as a trustworthy tag and thus may be a good candidate for tag recommendation. We used tag data crawled from one of the largest social bookmarking sites, Delicious. Since users on Delicious can add bookmarks along with some descriptive tags into their own collection, this site contains an enormous number of bookmarks and each of which contains a different number of tags. We also crawled the webpages corresponding to each bookmark, which serves as the page content of the webpage. We analyzed the tag information of the dataset and tested our method using cross validation and through a user study. The results show that our proposed method is effective in populat￾ing untagged webpages with the correct tags. 2 Related Work In the era of web 2.0, websites allow users to contribute their contents, and annotate them with a freely chosen set of key￾words under the tagging system built by each website. Mika [2005] represented semantic social networks in the form of a tripartite model which is consisted of actors (users), con￾cepts (tags), and instances (resources). Marlow et al. [2006] provided a simple taxonomy of tagging systems to analyze and distinguish these tagging systems from different kinds of websites by distinct facets. Golder and Huberman [2006] an￾alyzed the dynamics of collaborative tagging systems, includ￾ing user activity, tag frequencies, and bursts of popularity in resources. From the aspect of information retrieval [Salton and McGill, 1986], tags bring new information to items over original contents [Bischoff et al., 2008], and therefore tags can enhance capabilities of existing search engines to find out relevant documents [Heymann et al., 2008a]. Bao et al. [2007] proposed iterative algorithms integrating tags into web search for better ranking results. Furthermore, tag types re- flect what distinctions are important to taggers. Bischoff et al. [2008] refined the scheme presented by Golder and Huber￾man [2006] by classifying tags into 8 categories and exhibit￾ing tag type distributions across different tagging systems and web anchor texts (or link labels). From comparing categories of tags with query logs and user study, they showed that most of the tags can be used for search, and that tagging behavior represents the same attributes as searching behavior in most cases. Although tags are helpful to improve search results and di￾vide documents, people on average annotate resources with only a small number of tags [Bischoff et al., 2008]. Tag recommendation, one of the emerging research topics in tag￾ging, can reduce people’s tagging effort and encourage them to use more tags to reduce the problem. Xu et al. [2006] proposed the criteria for better tag recommendations, includ￾ing content-based methods and temporal issue, but prelimi￾nary results only. Jaschke ¨ et al. [Jaschke ¨ et al., 2007] in￾troduced the FolkRank algorithm, which computes a topic￾specific ranking of the elements in a folksonomy, and de￾feated collaborative filtering algorithms [Adomavicius and Tuzhilin, 2005]. In terms of content-based tag recommendation, Heymann et al. [2008b] formulated the problem into a supervised learn￾ing problem. Using page text, anchor text, surrounding hosts and available tag information as training data, Heymann et al. trained a classifier for each tag they wanted to predict. Even though they can achieve high precision using this method, the time required to train the classifiers for each tag becomes substantial when the number of distinct tags increases. In the same paper, Heymann et al. achieved good results in expand￾ing the tag set of documents with little tag information using association rules. 3 Methodology 3.1 Notations Before diving into the notations, we first define the termi￾nology used in this paper. A URL is described by the tags annotated by the users and the terms which are words on the webpage corresponding to the URL. The words webpages and documents that appeared in the previous paragraphs are now all referred to as URL. The three words, URL, tags and terms will be used throughout the text. Let U be the set of all URLs. Let T be the set of all tags. For a URL u ∈ U, let T ag(u) be the set of tags that annotate 2065

u and let Term(u) be the set of terms that are in the webpage tag coverage formula. Since the total number of tags given to orresponding to URL u. Something important to point out a URL follows the power law, we take the logarithm of the is that for all terms y E Term(u), Vu E U but y f T is number of total tags of a UrL to shrink the difference be removed, or in other words, all terms not in the set T are tween frequently tagged and infrequently tagged URLs. Tag removed. Therefore the set of all terms is a subset of T. Using coverage TCt()of a URL I E U captures the information the vector space model, where each dimension corresponds above and is computed as follows to a tag, each URL u∈ U can thus be represented by two TO(u)= Normaliz(∑(P(u,)×Tst(x)×log∑F(m,x) vectors of equal dimensions, a tag vector vu and a term vector vu. Each dimension holds the number of times a tag/term appears in the URL The values are normalized so that TCt(u)E [0, 1]. The We use Ft(u, r)to denote the number of times tagTE T case is the same for the term coverage TCm(u) for a URL u appears in the URL u E U, which is stored in uu, and 3.3 Similarity between Two URLs m(u, y) to denote term frequency y E T in u, which is stored in Tum. We also use P(u, r) to denote the normal- We utilize the two vectors, vur and Tum, of the URLs to ized Ft(u, r) compute similarity between each pair of URLs. We use the F(,x) cosine similarity metric to calculate the similarity between Pt(a, r) u∈U,x∈T two vectors. The cosine similarity of two vectors u and u FtO CosSim(u, U), is defined as follows P(u, r)can also be viewed as the probability of tag z ap- aring in URL u. Pm(u, y), the normalized Fm(u, y), is CosSim(,t)=s7 computed in the same way Since each URL is represented by two vectors, the similarity 3.2 Tag/Term Coverage of two Urls should consist of four cosine similarities. The linear combination of the four cosine similarity between two Tag/Term Significance Not all tags carry the same amount of information, thus the tag/term significance metric wishes vectors then becomes the similarity between two URLs.The to capture the amount of information a tag/term holds. We weight of each cosine similarity is decided according to the explain the concept using tags as an example, and the case is tag coverage and term coverage of each URL respectively similar for terms. Tags that appear only in a specific group Considering tag coverage as a factor is reasonable, because of URLs carry more information than those tags that appear the tag vector of a URL that has high tag coverage is more n a wide range of URLs, thus the former tags should have descriptive of the URL than the tag vector of the URL having poor tag coverage. The same case applies for taking term to the idF in the tf-ide (Term Frequency-Inverse Docu- coverage into consideration. The similarity is calculated as ment Frequency)metric [Salton and McGill, 1986], in which terms that appear in fewer documents are given more weigh. Sim(u, w)=TCt(u)x TCt(u)x Cos Sim(Tu,, tu,) Tags with higher tag significance scores are important be cause these tags help describe the URLs they annotate in a +TCm(a)×TC(u)× CasSim(可wm,m2) more accurate wa +TC(u)×TCm(u)× Cos Sim(可,7mn) We use the entropy of a tag to evaluate its tag signifi- +TCm(u)×TCm(u)×Cosm(可un,7mn) cance score. Tags with higher entropy have lower tag signifi ance scores. The entropy Entropy (r) and tag significance u,U∈U St(r)of a tag z are defined as follows Due to sparsity issues when calculating Entropy(r)=->P(u, r)x log(Pt(u, r) Cos Sim(可n,可x), we used PLSA Hofmann,1999 dimensions of the term vectors since the term vectors are TSt(z)=1-Normalized (Entropy( r)),TET extremely sparse, the reduction of dimensions will make The values are normalized so that TSt()E [0, 1. Entropy the vector less sparse, thus making the results of the cosine Entropym(y) and term significance TSm(y) of a term y is imilarity more accurate calculated in the same way. 3.4 Tag Propagation Now that we have the similarity for any two URLs, we can Tag/term Coverage of a url Tag coverage of a url de- calculate the propagated weight of a tag for a URL. We u fines how well a URL can be represented by the tags annotat- the term propagation because a URL gives another URL a tag ng it. The tags that have low tag significance cannot as fully if they are similar. In the following text, we will refer to the Moreover, the url that has few tags certainly cannot be well URL receiving the tag as the receiver, and the URL providing represented by its tags, for these tags, annotated by only a the tag as the provider wrongly describe the URL and thus are not trusty. Therefore The tag propagation formula consists of three parts.The few users, may contain a high ratio of inay ppropriate tags that rst part is the similarity between two URLS. It is intuitive we include the total number of tags given to a URl in the that the more similar the two URLs are, the more weight the 066

u and let T erm(u) be the set of terms that are in the webpage corresponding to URL u. Something important to point out is that for all terms y ∈ T erm(u), ∀u ∈ U but y /∈ T is removed, or in other words, all terms not in the set T are removed. Therefore the set of all terms is a subset of T. Using the vector space model, where each dimension corresponds to a tag, each URL u ∈ U can thus be represented by two vectors of equal dimensions, a tag vector →−v ut and a term vector →−v um. Each dimension holds the number of times a tag/term appears in the URL. We use Ft(u, x) to denote the number of times tag x ∈ T appears in the URL u ∈ U, which is stored in →−v ut , and Fm(u, y) to denote term frequency y ∈ T in u, which is stored in →−v um. We also use Pt(u, x) to denote the normal￾ized Ft(u, x): Pt(u, x) = Ft(u, x) x∈T Ft(u, x ) , u ∈ U, x ∈ T Pt(u, x) can also be viewed as the probability of tag x ap￾pearing in URL u. Pm(u, y), the normalized Fm(u, y), is computed in the same way. 3.2 Tag/Term Coverage Tag/Term Significance Not all tags carry the same amount of information, thus the tag/term significance metric wishes to capture the amount of information a tag/term holds. We explain the concept using tags as an example, and the case is similar for terms. Tags that appear only in a specific group of URLs carry more information than those tags that appear in a wide range of URLs, thus the former tags should have higher tag significance than the latter tags. This is analogous to the IDF in the TF-IDF (Term Frequency-Inverse Docu￾ment Frequency) metric [Salton and McGill, 1986], in which terms that appear in fewer documents are given more weight. Tags with higher tag significance scores are important be￾cause these tags help describe the URLs they annotate in a more accurate way. We use the entropy of a tag to evaluate its tag signifi- cance score. Tags with higher entropy have lower tag signifi- cance scores. The entropy Entropyt(x ) and tag significance T St(x) of a tag x are defined as follows: Entropyt(x ) = − u∈U Pt(u, x ) × log(Pt(u, x )) TSt(x ) = 1 − Normalized(Entropyt(x )) , x ∈ T The values are normalized so that TSt(x ) ∈ [0 , 1 ]. Entropy Entropym(y) and term significance TS m(y) of a term y is calculated in the same way. Tag/Term Coverage of a URL Tag coverage of a URL de- fines how well a URL can be represented by the tags annotat￾ing it. The tags that have low tag significance cannot as fully represent a URL as the tags having high tag significance do. Moreover, the URL that has few tags certainly cannot be well represented by its tags, for these tags, annotated by only a few users, may contain a high ratio of inappropriate tags that wrongly describe the URL and thus are not trusty. Therefore we include the total number of tags given to a URL in the tag coverage formula. Since the total number of tags given to a URL follows the power law, we take the logarithm of the number of total tags of a URL to shrink the difference be￾tween frequently tagged and infrequently tagged URLs. Tag coverage TC t(u) of a URL u ∈ U captures the information above and is computed as follows: TC t (u) =Normalized( X x∈T (Pt (u, x) × TSt (x) × log X x∈T Ft (u, x ))) The values are normalized so that TC t(u) ∈ [0 , 1 ]. The case is the same for the term coverage TC m(u) for a URL u. 3.3 Similarity between Two URLs We utilize the two vectors, →−v ut and →−v um, of the URLs to compute similarity between each pair of URLs. We use the cosine similarity metric to calculate the similarity between two vectors. The cosine similarity of two vectors →−u and →−v , CosSim( →−u ,→−v ), is defined as follows: CosSim( →−u ,→−v ) = →−u · →−v →−u →−v  Since each URL is represented by two vectors, the similarity of two URLs should consist of four cosine similarities. The linear combination of the four cosine similarity between two vectors then becomes the similarity between two URLs. The weight of each cosine similarity is decided according to the tag coverage and term coverage of each URL respectively. Considering tag coverage as a factor is reasonable, because the tag vector of a URL that has high tag coverage is more descriptive of the URL than the tag vector of the URL having poor tag coverage. The same case applies for taking term coverage into consideration. The similarity is calculated as follows: Sim(u, w) = TC t(u) × TC t(w) × CosSim( →−v ut ,→−v wt ) + TC m(u) × TC t(w) × CosSim( →−v um ,→−v wt ) + TC t(u) × TC m(w) × CosSim( →−v ut ,→−v wm ) + TC m(u) × TC m(w) × CosSim( →−v um ,→−v wm ) u, w ∈ U Due to sparsity issues when calculating CosSim( →−v um ,→−v xm ), we used PLSA [Hofmann, 1999], which is a dimension reduction algorithm, to lower the dimensions of the term vectors. Since the term vectors are extremely sparse, the reduction of dimensions will make the vector less sparse, thus making the results of the cosine similarity more accurate. 3.4 Tag Propagation Now that we have the similarity for any two URLs, we can calculate the propagated weight of a tag for a URL. We use the term propagation because a URL gives another URL a tag if they are similar. In the following text, we will refer to the URL receiving the tag as the receiver, and the URL providing the tag as the provider. The tag propagation formula consists of three parts. The first part is the similarity between two URLs. It is intuitive that the more similar the two URLs are, the more weight the 2066

provider will give to the receiver. The second part is the prob- to 10 distinct tags for each webpage based on the ground truth ability of the tag appearing in the provider. The third part dataset, any URL annotated with fewer than 50 tags by all takes into consideration how trustworthy the provider is. We users were removed from the set. In other words, the thresh- use the total number of tags given to a URl to estimate the old is set at 50 so that most documents have more than 10 extent the provider can be trusted. URLS with more total tags distinct tags as the ground truth annotated can be trusted more. Therefore the formula is as However, given that most users tend to specify just a lim follows ited number of tags, many URLs have insufficient tag infor- mation even with the above filtering in place. In order to re- duce the problem, the association rule algorithm [Agrawal et Prop(u, x)=2Sim(u, w)X Pt(u, a)x log> f(u, 1)al., 1993] has been adopted to expand the tag set of a URL. u∈U Experiments in (Heymann et aL., 2008b] showed that associ u∈U,x∈T ation rules may improve recall of single tag queries of URLs Atter we have the propagated weight of each tag in a URL, less than 3 and confidence 0.9, an average of 8.16 tags were dded to each URL. One may wonder whether this expansion rank the list of tags to be recommended according to these is reasonable, as adding associated tags may be"corrupting ags propagated weight. That is, the tag r with the highest the ground truth set. We will discuss this problem in the next Prop(u, r)is ranked at the first place in the list and is there fore the best candidate for recommendation, and the tag that Section. has second highest propagated weight is ranked second and to their term information. We crawled the page contents of so on. Note that for a URL already having prior tag infor- the remaining URLs, ignoring files that were dead links or mation, the recommended tags may include the tags that are not in the original set of tags annotating the URL. These er were not plain text. As the ability to deal with image con- tent is beyond the scope of tra tags work as the supplements to the maybe insufficient tag number of images but few terms will be ignored for now, information of the url even though it may be relatively easy for people to tag these ages. The number 4 Evaluation the HTML tags are removed. Any URL with fewer than In order to evaluate the proposed content-based tag recom- or more than 100, 000 terms in the corresponding content is mendation method, we performed experiments for the ex eliminated from the dataset treme case, where the URLs requiring tag recommendation As both the number of tags and the number of terms asso- have no prior tag information ciated with each URL follow the power law, the majority of the crawled URLs are filtered out in the process. As a result 4.1 The dataset the filtering process netted 85, 230 URLS from the initial set. Our goal for this step is to construct a ground truth set re- Each URL in the final da taset has on average 1084. 33 total quired for evaluating our method tags, 99.97 distinct tags, 1043 total terms, and 364. 19 distinct First of all. we need to build a set of uRls with tag infor- terms. Bookmarks on the Delicious homepage. For each user who 4.2 Prediction Accuracy by Cross validation has bookmarked one of the popular bookmarks, his/her book- The first set of experiments look into the effectiveness of marks are added to the set of harvested URLs. For each new our system in propagating the accurate tags to the untagged RL, we look for previously unseen users who have book- URLs. In our 5-fold cross validation process, we removed marked this URL, and look into his/her bookmark list for new one-fifth of the URls tags, and treated the remaining in URLS. Using this process, we crawled a total of 1,049, 580 formation(tag information for 4 folds and all the term in URLS, and collected all the tags given by any user. The user formation) as input into our system. After the propagation information is ignored for now, but may be valuable for per- phase, the URLs that had their tags removed would be repop- onalized recommendations ulated with tags, and we compare the repopulated tags with The annotation frequency of each tag is computed by tal- the ground truth for precision. Since users usually do not lying the number of users who have annotated any URL in have the patience to annotate many tags for a URL, we only the set with the tag. The top 100,000 tags in terms of anno- calculated up to precision at 10. During the training process tation frequency are selected as the tag/term vocabulary set. the only parameter we had to select is the similarity threshold ten misspelled words(e.g. wednsday)or concatenated words an. All pairs of URLs with similarity less than e are removed We observed that tags with low annotation frequency are of- (e.g. onlinedesigntools), which are not the best candidates for results with the results from term PLSA, which calculates the tag recommendation. Consequently, any tag with annotation similarity between two URLs by calculating only the cosine frequency of 15 or less is removed from the dataset similarity between their respective term vectors. Note that the The number of tags associated with each URL varies dimensions of the term vectors in our method and term plsa widely. In this dataset, documents with a total of 50 tags have have already been reduced to 500 dimensions using PLSA. an average of 17.96 distinct tags with a standard deviation of The propagation method used in the term PLSA is the same 5.18 tags To ensure that our system is able to recommend up as the one used in our method. The results of our algorithm 067

provider will give to the receiver. The second part is the prob￾ability of the tag appearing in the provider. The third part takes into consideration how trustworthy the provider is. We use the total number of tags given to a URL to estimate the extent the provider can be trusted. URLs with more total tags annotated can be trusted more. Therefore, the formula is as follows: Prop(u, x ) = w∈U Sim(u, w) × Pt(w, x ) × log x∈T Ft(w, x ) u ∈ U,x ∈ T After we have the propagated weight of each tag in a URL, we can now recommend tags for this URL. For a URL u, we rank the list of tags to be recommended according to these tags’ propagated weight. That is, the tag x with the highest P rop(u, x) is ranked at the first place in the list and is there￾fore the best candidate for recommendation, and the tag that has second highest propagated weight is ranked second and so on. Note that for a URL already having prior tag infor￾mation, the recommended tags may include the tags that are not in the original set of tags annotating the URL. These ex￾tra tags work as the supplements to the maybe insufficient tag information of the URL. 4 Evaluation In order to evaluate the proposed content-based tag recom￾mendation method, we performed experiments for the ex￾treme case, where the URLs requiring tag recommendation have no prior tag information. 4.1 The Dataset Our goal for this step is to construct a ground truth set re￾quired for evaluating our method. First of all, we need to build a set of URLs with tag infor￾mation. The URL crawling process starts from the Popular Bookmarks on the Delicious homepage. For each user who has bookmarked one of the popular bookmarks, his/her book￾marks are added to the set of harvested URLs. For each new URL, we look for previously unseen users who have book￾marked this URL, and look into his/her bookmark list for new URLs. Using this process, we crawled a total of 1,049,580 URLs, and collected all the tags given by any user. The user information is ignored for now, but may be valuable for per￾sonalized recommendations. The annotation frequency of each tag is computed by tal￾lying the number of users who have annotated any URL in the set with the tag. The top 100,000 tags in terms of anno￾tation frequency are selected as the tag/term vocabulary set. We observed that tags with low annotation frequency are of￾ten misspelled words (e.g. wednsday) or concatenated words (e.g. onlinedesigntools), which are not the best candidates for tag recommendation. Consequently, any tag with annotation frequency of 15 or less is removed from the dataset. The number of tags associated with each URL varies widely. In this dataset, documents with a total of 50 tags have an average of 17.96 distinct tags with a standard deviation of 5.18 tags. To ensure that our system is able to recommend up to 10 distinct tags for each webpage based on the ground truth dataset, any URL annotated with fewer than 50 tags by all users were removed from the set. In other words, the thresh￾old is set at 50 so that most documents have more than 10 distinct tags as the ground truth. However, given that most users tend to specify just a lim￾ited number of tags, many URLs have insufficient tag infor￾mation even with the above filtering in place. In order to re￾duce the problem, the association rule algorithm [Agrawal et al., 1993] has been adopted to expand the tag set of a URL. Experiments in [Heymann et al., 2008b] showed that associ￾ation rules may improve recall of single tag queries of URLs with little tag information. By applying all rules of length less than 3 and confidence 0.9, an average of 8.16 tags were added to each URL. One may wonder whether this expansion is reasonable, as adding associated tags may be “corrupting” the ground truth set. We will discuss this problem in the next section. In the next step, all remaining URLs are filtered according to their term information. We crawled the page contents of the remaining URLs, ignoring files that were dead links or were not plain text. As the ability to deal with image con￾tent is beyond the scope of this research, URLs with a large number of images but few terms will be ignored for now, even though it may be relatively easy for people to tag these pages. The number of terms on each page is counted after the HTML tags are removed. Any URL with fewer than 50 or more than 100,000 terms in the corresponding content is eliminated from the dataset. As both the number of tags and the number of terms asso￾ciated with each URL follow the power law, the majority of the crawled URLs are filtered out in the process. As a result, the filtering process netted 85,230 URLs from the initial set. Each URL in the final da taset has on average 1084.33 total tags, 99.97 distinct tags, 1043 total terms, and 364.19 distinct terms. 4.2 Prediction Accuracy by Cross Validation The first set of experiments look into the effectiveness of our system in propagating the accurate tags to the untagged URLs. In our 5-fold cross validation process, we removed one-fifth of the URL’s tags, and treated the remaining in￾formation (tag information for 4 folds and all the term in￾formation) as input into our system. After the propagation phase, the URLs that had their tags removed would be repop￾ulated with tags, and we compare the repopulated tags with the ground truth for precision. Since users usually do not have the patience to annotate many tags for a URL, we only calculated up to precision at 10. During the training process, the only parameter we had to select is the similarity threshold . All pairs of URLs with similarity less than are removed and not used in propagation. In addition, we compared our results with the results from term PLSA, which calculates the similarity between two URLs by calculating only the cosine similarity between their respective term vectors. Note that the dimensions of the term vectors in our method and term PLSA have already been reduced to 500 dimensions using PLSA. The propagation method used in the term PLSA is the same as the one used in our method. The results of our algorithm 2067

Algorithm Ours 002069063059055 059056051 Ours 0040620.55051046 TTerm PLSA NA 0.560.50.470.42 Table 1: Cross Validation Results: Results of term PLSA and i 80/ our algorithm at different e threshold levels 70 are shown in Table 1 The precision is highest when E =0.02, with precision at I being 69% and precision at 5 being 59%. The precision at I for term PLSA is 56% and precision at 5 being 47%. We also compared precision at 5 of our algorithm with that of 5060708090100110 term PLSA in each fold. In all folds, our algorithm using e Cross validation Precision 5 ranging from 0.2 to 0.4, consistently achieved higher preci sion than term PLSA. Our results showed that the propose Figure 2: Cross Validation and User Study Precision: algorithm outperforms term PLSA. This is because our algo- sion from the two evaluation methods are not strongly rithm, in addition to calculating the term vector cosine simi- lated larity used in term PLSA, also takes into account the similar- ity between one URL's tag vector and the other URLs term recommended tags vector. In addition, it is worth noting that the lower the E sim- the users original recommended tags usually affect ilarity threshold, the better precision we are able to obtain n which tags to use Suchanek et Associated tags were added to the dataset due to the ob- al, 2008 ervation that the user-specified tag set is often incomplete a total of 19 e. all with computer science back lowever, this step could potentially be"corrupting"our ground, participated in the experiment outlined above on 31 dataset. Our experiments showed that 95.52% of the cor- randomly picked URLs from the testing set of the first fold of ectly guessed tags are original, and only 4.48% matches the cross validation, and we collected at least five responses for associated tags. Therefore, we can deduce that the effect of every URL. The system recommended tags for the 31 URls corruption, if any, would be minimal were obtained from the first fold of cross validation for the For the URLs that had unsatisfactory tagging results, we E=0.02 experiment. Results from our user study show that found that they can generally be attributed into three general 32% of the tags the participants provided matches the top five causes. The first cause happens when the url is a frequently tags the system recommends. 69.45% of the tags the system updated webpage, e.g. daily news, so the tags for that page recommended were also marked as relevant by the parti would only be relevant to the contents of the page at the time pant the page content was crawled. Another situation is when the After analyzing the results of the user study, we discov page contents of the webpage is relatively small com- ered that some webpages have more tags marked as irrelevant to the advertisements on the webpage. Advertisements than other webpages, which may be because the tags recom- relevant to the contents of the page, yet they would mended by the system were of poor quality. We would also severely distort the term vector on short webpages. Parsing like to know whether the webpages that did poorly in the user HTML tags to remove sidebar information may be a solution study also achieved a low accuracy in the cross validation ex to this problem, but a myriad of webpage and sidebar formats periment. Therefore, using the results from the cross valida- adds to the difficulty of implementing this solution. Finally, tion experiment, we calculated the precision at 5 for each of webpages talking about a relatively rare topic(for example, the 31 URLs, and the average precision is 70.97%, which is spinning pens)would have few similar webpages, thus result- remarkably similar to the results obtained from the user study ing in decreased relevance of recommended tags (69.45%0). Since the obtained average precisions were very similar, we would like to know whether there is any correla 3 Results of User Study tion between the precision of the URLs obtained from the two In the second set of experiments, we gathered data on the pre- methods of evaluation cision of system-recommended tags through an user study. Figure 2 is the scatter plot showing the precision obtained The user study was conducted as follows. A participant was from cross validation versus the precision obtained from th first shown a webpage and asked to view the contents of the user study. The correlation is found to be 0. 47. A low correla- page. Next, the participant was asked to key in some tags tion means that the same URL achieves different accuracies in that he/she will use to annotate the page. Once the participant different methods of evaluation. For those cases where a URL confirms that he/she has completed the above step, the sys- achieves better in the user study than the cross validation, we m will show the participant the five best recommended tags can conclude that the ground truth set is incomplete, because rovided by our algorithm and ask the participant to mark the there are still some relevant tags missing in the ground truth tags they deem irrelevant to the website. We allowed the par- set, causing the precision to drop. For the other case, where ticipant to apply tags to the webpage first before viewing the a URL achieves better in cross validation than the user study, 2068

Algorithm P@1 P@3 P@5 P@10 Ours 0.02 0.69 0.63 0.59 0.55 Ours 0.03 0.66 0.59 0.56 0.51 Ours 0.04 0.62 0.55 0.51 0.46 Term PLSA N/A 0.56 0.50 0.47 0.42 Table 1: Cross Validation Results: Results of term PLSA and our algorithm at different threshold levels. are shown in Table 1. The precision is highest when = 0.02, with precision at 1 being 69% and precision at 5 being 59%. The precision at 1 for term PLSA is 56% and precision at 5 being 47%. We also compared precision at 5 of our algorithm with that of term PLSA in each fold. In all folds, our algorithm, using ranging from 0.2 to 0.4, consistently achieved higher preci￾sion than term PLSA. Our results showed that the proposed algorithm outperforms term PLSA. This is because our algo￾rithm, in addition to calculating the term vector cosine simi￾larity used in term PLSA, also takes into account the similar￾ity between one URL’s tag vector and the other URL’s term vector. In addition, it is worth noting that the lower the sim￾ilarity threshold, the better precision we are able to obtain. Associated tags were added to the dataset due to the ob￾servation that the user-specified tag set is often incomplete. However, this step could potentially be “corrupting” our dataset. Our experiments showed that 95.52% of the cor￾rectly guessed tags are original, and only 4.48% matches the associated tags. Therefore, we can deduce that the effect of “corruption”, if any, would be minimal. For the URLs that had unsatisfactory tagging results, we found that they can generally be attributed into three general causes. The first cause happens when the URL is a frequently updated webpage, e.g. daily news, so the tags for that page would only be relevant to the contents of the page at the time the page content was crawled. Another situation is when the actual page contents of the webpage is relatively small com￾pared to the advertisements on the webpage. Advertisements are irrelevant to the contents of the page, yet they would severely distort the term vector on short webpages. Parsing HTML tags to remove sidebar information may be a solution to this problem, but a myriad of webpage and sidebar formats adds to the difficulty of implementing this solution. Finally, webpages talking about a relatively rare topic (for example, spinning pens) would have few similar webpages, thus result￾ing in decreased relevance of recommended tags. 4.3 Results of User Study In the second set of experiments, we gathered data on the pre￾cision of system-recommended tags through an user study. The user study was conducted as follows. A participant was first shown a webpage and asked to view the contents of the page. Next, the participant was asked to key in some tags that he/she will use to annotate the page. Once the participant confirms that he/she has completed the above step, the sys￾tem will show the participant the five best recommended tags provided by our algorithm and ask the participant to mark the tags they deem irrelevant to the website. We allowed the par￾ticipant to apply tags to the webpage first before viewing the Figure 2: Cross Validation and User Study Precision: Preci￾sion from the two evaluation methods are not strongly corre￾lated. recommended tags because recommended tags usually affect the user’s original intent on which tags to use [Suchanek et al., 2008]. A total of 19 people, all with computer science back￾ground, participated in the experiment outlined above on 31 randomly picked URLs from the testing set of the first fold of cross validation, and we collected at least five responses for every URL. The system recommended tags for the 31 URLs were obtained from the first fold of cross validation for the = 0.02 experiment. Results from our user study show that 32% of the tags the participants provided matches the top five tags the system recommends. 69.45% of the tags the system recommended were also marked as relevant by the partici￾pant. After analyzing the results of the user study, we discov￾ered that some webpages have more tags marked as irrelevant than other webpages, which may be because the tags recom￾mended by the system were of poor quality. We would also like to know whether the webpages that did poorly in the user study also achieved a low accuracy in the cross validation ex￾periment. Therefore, using the results from the cross valida￾tion experiment, we calculated the precision at 5 for each of the 31 URLs, and the average precision is 70.97%, which is remarkably similar to the results obtained from the user study (69.45%). Since the obtained average precisions were very similar, we would like to know whether there is any correla￾tion between the precision of the URLs obtained from the two methods of evaluation. Figure 2 is the scatter plot showing the precision obtained from cross validation versus the precision obtained from the user study. The correlation is found to be 0.47. A low correla￾tion means that the same URL achieves different accuracies in different methods of evaluation. For those cases where a URL achieves better in the user study than the cross validation, we can conclude that the ground truth set is incomplete, because there are still some relevant tags missing in the ground truth set, causing the precision to drop. For the other case, where a URL achieves better in cross validation than the user study, 2068

this means that our ground truth set has some noise. These earch using social annotations In www 07. proceed noise may come from personal preferences of users: a rele ings of the 16th international conference on World wide vant tag for one user may not be a relevant tag for another web, pages 501-510, 2007 Another reason may be irrelevant tags expanded by the asso- [Bischoff et aL. 2008) Kerstin Bischoff. Claudiu S. Firan ciation rules Wolfgang Nejdl, and Raluca Paiu. Can all tags be used 5 Conclusions and Future Work for search? In CIKM 08: Proceeding of the 17th ACM onference on Information and knowledge management, In this paper, we proposed a method for content-based tag pages193-202,2008 recommendation which can be applied to webpages with IGolder and Huberman, 2006 Scott A. Golder an without tags. Since there are many webpages on the web Bernardo A. Huberman. Usage patterns of collabo- without any tag information, we focused on trying to pop- rative tagging systems. Journal of Information Science, ulate tags for webpages with absolutely no tag information 32(2):198-208,2006 method is 59% when evaluated with 5 fold cross validation. [Heymann et al., 2008a] Paul Heymann, Georgia Koutrika, We also picked 31 webpages for user study, and 32%o of the and Hector Garcia-Molina. Can social bookmarking im- tags given by the participants matches the top 5 recommen- prove web search? In WSDM 08: Proceedings of the dations our method recommends. 69. 45% of the tags rec- international conference on Web search and web data min ommended by the our method is marked as relevant by the participants. The above results show that our method is ac- Heymann et al., 2008b] Paul Heymann, Daniel Ramage, for improvement. Some pages are inherently not suitable for 08: Proceedings of the 31st annual international ACM content-based recommendation, for example news webpages SIGIR conference on Research and development in infor dated everyday. Also, if we coul the more mation retrieval, pages 531-538, 2008 portant terms of the webpage, and not be affected by the [Hofmann, 1999) Thomas Hofmann. Probabilistic latent se- links or advertisements on the sides of the webpage, our pre- mantic indexing. In SIGIR cIsIon can Improve. annual international ACM SIGIR conference on Research Other than improving our precision, there is also a lot of oom for improvement in trying to recommend useful tags nd development in information retrieval, pages 50-57. he tags our method recommends are usually those popular tags, which sometimes are quite vague and not as informa- [Jaschke et aL, 2007] Robert Jaschke, Leandro Marinho tive as specific tags. Therefore one of the things we can do Andreas Hotho. Lars schmidt -Thieme and gerd Stumme. Tag recommendations in folksonomies. In PKDD 2007 the user or webpage. Popular tags tend to be more vague and Proceedings of the llth Eure an conference on Princi can be given to a variety of webpages, and not as popular ples and Practice of Knowledge Discovery in Databases, tags tend to be more descriptive and maybe more difficult to pages506-514,2007 recommend since it is only relevant to a smaller amount of Marlow et al, 2006] Cameron Marlow, Mor Naaman webpages. Another interesting future work is to recommend Danah Boyd, and Marc Davis. Ht06, tagging paper, tags with different types defined in [ Bischoff et al., 2008] taxonomy, flickr, academic article, to read. In HYPER Recommending tags with a variety of types: topic, time, lo- TEXT 06: Proceedings of the seventeenth conference on cation, usage/context and so on may help in providing more Hypertext and hypermedia, pages 31-40, 2006 useful information for webpages. And finally, since the users [ Mika, 2005] Peter Mika. Ontologies are us: A unified are the ones who are using the tags, therefore personalized model of social networks and semantics. In /SWC 05 content-based tag recommendation will be another interest- ing future work. Proceedings of the 4th International Semantic Web Con ference, volume 3729 of Lecture Notes in Computer Sci References ence 522-536,200 [Adomavicius and Tuzhilin, 2005] Gediminas Adomavicius Salton and McGill. 1986 Gerard Salton and Michael J. and Alexander Tuzhilin. Toward the next generation of McGill. Introduction to Modern Information Retrieval. McGraw-Hill, Inc. New York, NY, USA, 1986 recommender systems: A survey of the state-of-the-art and Ossible extensions. IEEE Transactions on knowledge and Suchanek et al, 2008] Fabian M. Suchanek, Milan Vo- Data Engineering, 17(6): 734-749, 2005 jnovic, and Dinan Gunawardena. Social tags: meaning AGrawal et aL., 1993] Rakesh Agrawal, Tomasz Imieliniski, and suggestions. In CIKM 08: Proceeding of the 17th and arun Swami. Mining association rules between sets ACM conference on Information and knowledge manage- of items in large databases. In SIGMOD 93: Proceedings ment, pages 223-232, 2008 of the 1993 ACM SIGMOD international conference on [Xu et al., 2006 Zhichen Xu, Yun Fu, Jianchang Mao, and Management of data, pages 207-216, 1993 Difu Su. Towards the semantic web: Collaborative tag [Bao et al, 2007] Shenghua Bao, Xiaoyuan Wu, Ben Fei, suggestions. In Proceedings of the Collaborative web tag- uirong Xue. Zhong Su, and Yong Yu ging workshop at www 2006, Edinburgh, Scotland, 2006 069

this means that our ground truth set has some noise. These noise may come from personal preferences of users: a rele￾vant tag for one user may not be a relevant tag for another. Another reason may be irrelevant tags expanded by the asso￾ciation rules. 5 Conclusions and Future Work In this paper, we proposed a method for content-based tag recommendation which can be applied to webpages with or without tags. Since there are many webpages on the web without any tag information, we focused on trying to pop￾ulate tags for webpages with absolutely no tag information. Using data crawled from Delicious, the precision @ 5 of our method is 59% when evaluated with 5 fold cross validation. We also picked 31 webpages for user study, and 32% of the tags given by the participants matches the top 5 recommen￾dations our method recommends. 69.45% of the tags rec￾ommended by the our method is marked as relevant by the participants. The above results show that our method is ac￾ceptable in terms of precision, but there is still some room for improvement. Some pages are inherently not suitable for content-based recommendation, for example news webpages which are updated everyday. Also, if we could find the more important terms of the webpage, and not be affected by the links or advertisements on the sides of the webpage, our pre￾cision can improve. Other than improving our precision, there is also a lot of room for improvement in trying to recommend useful tags. The tags our method recommends are usually those popular tags, which sometimes are quite vague and not as informa￾tive as specific tags. Therefore one of the things we can do in the future is to recommend tags of different popularity to the user or webpage. Popular tags tend to be more vague and can be given to a variety of webpages, and not as popular tags tend to be more descriptive and maybe more difficult to recommend since it is only relevant to a smaller amount of webpages. Another interesting future work is to recommend tags with different types defined in [Bischoff et al., 2008]. Recommending tags with a variety of types: topic, time, lo￾cation, usage/context and so on may help in providing more useful information for webpages. And finally, since the users are the ones who are using the tags, therefore personalized content-based tag recommendation will be another interest￾ing future work. References [Adomavicius and Tuzhilin, 2005] Gediminas Adomavicius and Alexander Tuzhilin. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering, 17(6):734–749, 2005. [Agrawal et al., 1993] Rakesh Agrawal, Tomasz Imielinski, ´ and Arun Swami. Mining association rules between sets of items in large databases. In SIGMOD ’93: Proceedings of the 1993 ACM SIGMOD international conference on Management of data, pages 207–216, 1993. [Bao et al., 2007] Shenghua Bao, Xiaoyuan Wu, Ben Fei, Guirong Xue, Zhong Su, and Yong Yu. Optimizing web search using social annotations. In WWW ’07: Proceed￾ings of the 16th international conference on World wide web, pages 501–510, 2007. [Bischoff et al., 2008] Kerstin Bischoff, Claudiu S. Firan, Wolfgang Nejdl, and Raluca Paiu. Can all tags be used for search? In CIKM ’08: Proceeding of the 17th ACM conference on Information and knowledge management, pages 193–202, 2008. [Golder and Huberman, 2006] Scott A. Golder and Bernardo A. Huberman. Usage patterns of collabo￾rative tagging systems. Journal of Information Science, 32(2):198–208, 2006. [Heymann et al., 2008a] Paul Heymann, Georgia Koutrika, and Hector Garcia-Molina. Can social bookmarking im￾prove web search? In WSDM ’08: Proceedings of the international conference on Web search and web data min￾ing, pages 195–206, 2008. [Heymann et al., 2008b] Paul Heymann, Daniel Ramage, and Hector Garcia-Molina. Social tag prediction. In SIGIR ’08: Proceedings of the 31st annual international ACM SIGIR conference on Research and development in infor￾mation retrieval, pages 531–538, 2008. [Hofmann, 1999] Thomas Hofmann. Probabilistic latent se￾mantic indexing. In SIGIR ’99: Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, pages 50–57, 1999. [Jaschke ¨ et al., 2007] Robert Jaschke, Leandro Marinho, ¨ Andreas Hotho, Lars Schmidt-Thieme, and Gerd Stumme. Tag recommendations in folksonomies. In PKDD 2007: Proceedings of the 11th European conference on Princi￾ples and Practice of Knowledge Discovery in Databases, pages 506–514, 2007. [Marlow et al., 2006] Cameron Marlow, Mor Naaman, Danah Boyd, and Marc Davis. Ht06, tagging paper, taxonomy, flickr, academic article, to read. In HYPER￾TEXT ’06: Proceedings of the seventeenth conference on Hypertext and hypermedia, pages 31–40, 2006. [Mika, 2005] Peter Mika. Ontologies are us: A unified model of social networks and semantics. In ISWC ’05: Proceedings of the 4th International Semantic Web Con￾ference, volume 3729 of Lecture Notes in Computer Sci￾ence, pages 522–536, 2005. [Salton and McGill, 1986] Gerard Salton and Michael J. McGill. Introduction to Modern Information Retrieval. McGraw-Hill, Inc., New York, NY, USA, 1986. [Suchanek et al., 2008] Fabian M. Suchanek, Milan Vo￾jnovic, and Dinan Gunawardena. Social tags: meaning and suggestions. In CIKM ’08: Proceeding of the 17th ACM conference on Information and knowledge manage￾ment, pages 223–232, 2008. [Xu et al., 2006] Zhichen Xu, Yun Fu, Jianchang Mao, and Difu Su. Towards the semantic web: Collaborative tag suggestions. In Proceedings of the Collaborative web tag￾ging workshop at WWW 2006, Edinburgh, Scotland, 2006. 2069

点击下载完整版文档(PDF)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
已到末页,全文结束
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有