{"id":317303,"date":"2016-11-07T12:09:54","date_gmt":"2016-11-07T20:09:54","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&p=317303"},"modified":"2018-10-16T20:07:52","modified_gmt":"2018-10-17T03:07:52","slug":"trust-based-recommendation-systems-axiomatic-approach","status":"publish","type":"msr-research-item","link":"https:\/\/www.microsoft.com\/en-us\/research\/publication\/trust-based-recommendation-systems-axiomatic-approach\/","title":{"rendered":"Trust-based Recommendation Systems: An Axiomatic Approach"},"content":{"rendered":"
High-quality, personalized recommendations are a key fea-
\nture in many online systems. Since these systems often have
\nexplicit knowledge of social network structures, the recom-
\nmendations may incorporate this information. This paper
\nfocuses on networks which represent trust and recommen-
\ndations which incorporate trust relationships. The goal of
\na trust-based recommendation system is to generate per-
\nsonalized recommendations from known opinions and trust
\nrelationships.
\nIn analogy to prior work on voting and ranking systems,
\nwe use the axiomatic approach from the theory of social
\nchoice. We develop an natural set of five axioms which we
\ndesire any recommendation system exhibit. Then we show
\nthat no system can simultaneously satisfy all these axioms.
\nWe also exhibit systems which satisfy any four of the five
\naxioms. Next we consider ways of weakening the axioms,
\nwhich can lead to a unique recommendation system based on
\nrandom walks. We consider other recommendation systems
\n(personal page rank, majority of majorities, and min cut)
\nand search for alternative axiomatizations which uniquely
\ncharacterize these systems.
\nFinally, we determine which of these systems are incen-
\ntive compatible. This is an important property for systems
\ndeployed in a monetized environment: groups of agents in-
\nterested in manipulating recommendations to make others
\nshare their opinion have nothing to gain from lying about
\ntheir votes or their trust links.<\/p>\n","protected":false},"excerpt":{"rendered":"
High-quality, personalized recommendations are a key fea- ture in many online systems. Since these systems often have explicit knowledge of social network structures, the recom- mendations may incorporate this information. This paper focuses on networks which represent trust and recommen- dations which incorporate trust relationships. The goal of a trust-based recommendation system is to generate […]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"msr-content-type":[3],"msr-research-highlight":[],"research-area":[13561],"msr-publication-type":[193716],"msr-product-type":[],"msr-focus-area":[],"msr-platform":[],"msr-download-source":[],"msr-locale":[268875],"msr-post-option":[],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-317303","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-algorithms","msr-locale-en_us"],"msr_publishername":"WWW 2008","msr_edition":"Proceedings of the 17th international conference on World Wide Web (WWW)","msr_affiliation":"","msr_published_date":"2008-04-21","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"","msr_pages_string":"199-208","msr_chapter":"","msr_isbn":"","msr_journal":"","msr_volume":"","msr_number":"","msr_editors":"","msr_series":"","msr_issue":"","msr_organization":"","msr_how_published":"","msr_notes":"","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"459534","msr_publicationurl":"","msr_doi":"","msr_publication_uploader":[{"type":"file","title":"trust-based-recommendation-systems-an-axiomatic-approach","viewUrl":"https:\/\/www.microsoft.com\/en-us\/research\/uploads\/prod\/2016\/11\/Trust-based-Recommendation-Systems-An-Axiomatic-Approach.pdf","id":459534,"label_id":0}],"msr_related_uploader":"","msr_attachments":[],"msr-author-ordering":[{"type":"text","value":"Reid Andersen","user_id":0,"rest_url":false},{"type":"user_nicename","value":"borgs","user_id":31278,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=borgs"},{"type":"user_nicename","value":"jchayes","user_id":32200,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=jchayes"},{"type":"text","value":"Uriel Feige","user_id":0,"rest_url":false},{"type":"text","value":"Abraham Flaxman","user_id":0,"rest_url":false},{"type":"user_nicename","value":"adum","user_id":30834,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=adum"},{"type":"text","value":"Vahab Mirrokni","user_id":0,"rest_url":false},{"type":"text","value":"Moshe Tennenholtz","user_id":0,"rest_url":false}],"msr_impact_theme":[],"msr_research_lab":[],"msr_event":[],"msr_group":[],"msr_project":[],"publication":[],"video":[],"download":[],"msr_publication_type":"inproceedings","related_content":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/317303"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/317303\/revisions"}],"predecessor-version":[{"id":523034,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/317303\/revisions\/523034"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=317303"}],"wp:term":[{"taxonomy":"msr-content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-content-type?post=317303"},{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=317303"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=317303"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=317303"},{"taxonomy":"msr-product-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-product-type?post=317303"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=317303"},{"taxonomy":"msr-platform","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-platform?post=317303"},{"taxonomy":"msr-download-source","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-download-source?post=317303"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=317303"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=317303"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=317303"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=317303"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=317303"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=317303"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=317303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}