<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Improving the Recommendation of Given Names by Using Contextual Information</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Marcos Aurelio Domingues</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ricardo Marcondes Marcacini</string-name>
          <email>ricardo.marcacini@ufms.br</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Solange Oliveira Rezende</string-name>
          <email>solange@icmc.usp.br</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gustavo E. A. P. A. Batista</string-name>
          <email>gbatista@icmc.usp.br</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Federal University of Mato Grosso do Sul Tr</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Mathematics and Computer Science</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Sa~o Paulo Av. Trabalhador Sa~o-Carlense</institution>
          ,
          <addr-line>400, Cx. Postal 668, 13560-970, Sa~o Carlos, SP</addr-line>
          ,
          <country country="BR">Brazil</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>es Lagoas</institution>
          ,
          <addr-line>MS</addr-line>
          ,
          <country country="BR">Brazil</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The people who have to choose a given name, know how challenging it is to nd a suitable name that ts the social context, the language, the cultural background, and especially, the personal taste. For example, future parents end up browsing through several lists of given names in order to choose a name for their unborn child. A recommender system can help a person in this task by recommending given names which are of interest to the user. In this paper, we exploit contextual information (e.g., time and location) in two state-of-the-art recommender systems for the task of recommending given names. The empirical results have shown that we can improve the recommendation of given names by using contextual information.</p>
      </abstract>
      <kwd-group>
        <kwd>Given Names</kwd>
        <kwd>Recommender Systems</kwd>
        <kwd>Item-based Collaborative Filtering</kwd>
        <kwd>Association Rules</kwd>
        <kwd>Contextual Information</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The task of nding a suitable name for an unborn child is not so easy. Future
parents usually face many books or web sites, listing given names, in order to nd
a suitable name for their child. Here, a suitable name is represented by a given
name which satis es a set of factors such as the social context, the language,
the cultural background, and especially, the personal taste. Although this task
is relevant in practice, little research has been performed on the analysis and
application of interrelations among given names from a recommender system
perspective. A recommender system is an information ltering technology which
can be used to output an ordered list of items (e.g., given names) that are likely
to be of interest to the user [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>
        In di erent scenarios, recommender systems are subject to scienti c research,
as, for example, recommending products [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], mobile applications [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], places of
interest [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], movies [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], music [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In this paper, we exploit two state-of-the-art
recommender systems for the task of recommending given names. In addition, we
also incorporate contextual information (e.g., time and location) in such systems
in order to capture tendencies in choosing given names and, thus, to improve
the recommendations.
      </p>
      <p>The paper is organized as follows: In Section 2 we present some work related
to the recommendation of given names. In Section 3 we describe the two
state-ofthe-art recommender systems used in this work and an approach to incorporate
contextual information in these systems. We present our empirical evaluation in
Section 4. We discuss the data set, the pre-processing of the data, the
experimental setup and evaluation metric, and the empirical results. In Section 5 we
show our contribution to the 15th Discovery Challenge: Recommending Given
Names. In Section 6 we present nal remarks.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        In this section, we present some work related to the recommendation of given
names. A search engine and recommender system for given name is described
in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. This system, called Nameling 3, can be used by users to nd a suitable
given name. For example, the user enters a given name and obtains a browsable
list of names.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], the authors analyze the co-occurence of names from the Nameling
system. They show how basic approaches from the eld of social network analysis
and information retrieval can be applied for discovering relations among names.
In [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], a recommendation method for given names, based on co-occurence within
Wikipedia4, is proposed. The method, called preferential PageRank, is a
modi cation of the well known PageRank algorithm [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. There, the preferential
PageRank method is evaluated by using a data set from the Nameling system.
      </p>
      <p>
        An empirical evaluation comparing the preferential PageRank method against
some state-of-the-art recommender systems, for the task of recommending given
names, is presented in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. By using a data set from the Nameling system,
the authors compare the user-based collaborative ltering [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], the item-based
collaborative ltering [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], the weighted matrix factorization method [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], the
most popular recommendation approach (that recommends the most popular
names), and the random approach (that recommends names randomly) against
the preferential PageRank method [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The results show that the preferential
PageRank method provides good performance in terms of prediction accuracy
as well as runtime complexity.
      </p>
      <p>Our contribution for the Nameling system consists in exploiting the
contextual information (i.e., the month and the city) contained in the data from the
system to capture tendencies in choosing given names, and, thus, to improve the
recommendations. Our proposal will be described in the next sections.
3 http://nameling.net/
4 http://www.wikipedia.org/</p>
    </sec>
    <sec id="sec-3">
      <title>Recommender Systems</title>
      <p>
        A recommender system for the web is an information ltering technology which
can be used to predict preference ratings of items (e.g., movies, music, books,
news, images, web pages, given names, etc) not currently rated by the user [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ],
and/or to output a set of items/recommendations that are likely to be of interest
to the user [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>We focus our work on the task of selecting the top-N items/recommendations
which are of interest to a user. We formalize this task as follows:
Let p be the number of users U = fu1; u2; :::; upg and q the number of all
possible items that can be recommended I = fi1; i2; :::; iqg. Now, let j be
the number of historical sessions in a web site S = fs1; s2; :::; sj g. Each
session s = hu; Isi is a tuple de ned by a user u 2 U and a set of
accessed items Is I. The set S is used to build a top-N recommendation
model M .</p>
      <p>Given an active session sa de ned by an active user ua and a set of
observable items O I, the recommendation model M uses the set O
to identify the interest of the user ua and recommend N items from the
set of items/recommendations R, such that R I and R \ O = ?, that
are believed to be the top preferences of the user ua.</p>
      <p>In this section, we present two state-of-the-art recommender systems:
Itembased Collaborative Filtering and Association Rules based. In this work we use
these systems for recommending given names. In addition, we present an
approach which is used to incorporate contextual information in the two
state-ofthe-art systems in order to generate context-aware recommendations.
3.1</p>
      <sec id="sec-3-1">
        <title>Item-Based Collaborative Filtering</title>
        <p>
          The Item-based Collaborative Filtering technique analyzes items to identify
relations among them [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Here, the recommendation model M is a matrix
representing the similarities between all the pairs of items, according to a given
similarity metric. An abstract representation of a similarity matrix is shown in
Table 1. Each item i 2 I is an accessed item, for example, a given name.
        </p>
        <p>
          According to [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], the properties of the model and consequently the e
ectiveness of this recommendation algorithm depend on the method used to calculate
the similarity among the items. To calculate the similarity between pairs of
items, for example, i1 and i2, we rst isolate the users who have rated both of
these items, and then, we apply a metric on the ratings to compute the similarity
sim(i1; i2) between i1 and i2. Metrics to measure the similarity between pairs of
items are cosine angle, Pearson's correlation and adjusted cosine angle. In this
paper, we use the cosine angle metric, de ned as
simc;O =
        </p>
        <p>Pi2Kc\O sim(c; i)</p>
        <p>Pi2Kc sim(c; i)</p>
        <p>;
sim(i1; i2) = cos( !i1 ; !i2 ) =</p>
        <p>!i1 : !i2
! ! ;
jj i1 jj jj i2 jj
where !i1 and !i2 are rating vectors with as many positions as existing users in
the set U . The operator \." denotes the dot-product of the two vectors. In our
case, the rating vectors are binary. The value 1 means that the users accessed
the respective item. The value 0 has the opposite meaning.</p>
        <p>Once we obtain the recommendation model, we can generate the
recommendations. Given an active session sa containing a user ua and its set of observable
items O I, the model generates the N recommendations as follows. First, we
identify the set of candidate items for recommendation C by selecting from the
model all items i 2= O. Then, for each candidate item c 2 C, we calculate its
similarity to the set O as
where Kc is a set with the k most similar items (the nearest neighbors) to the
candidate item c.</p>
        <p>Finally, we select the top-N candidate items with the highest similarity to
the set O and recommend them to the user ua.
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Association Rules Based</title>
        <p>
          A recommendation model M based on association rules is a set of rules. Each
rule m has the form m : X ! Y , where X I and Y I are sets of items
and X \ Y = ?. Here, we generate association rules with one single item in the
consequent of the rule [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], i.e., Y is a singleton set. Each association rule is
characterized by two metrics: support and con dence [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].
        </p>
        <p>The support of a rule in a set of sessions S is de ned as
support(X ! Y ) = jX [ Y j ;
jSj
where jX [ Y j is the number of sessions in S that contain all items in X [ Y and
jSj is the number of sessions in S.</p>
        <p>The con dence of a rule is the proportion of the number of sessions which
contain X [ Y with respect to number of sessions that contain X, and can be
formulated as
(1)
(2)
(3)
R = fconsequent(m)jm 2 M and antecedent(m)</p>
        <p>O
and consequent(m) 2= Og:
(5)
con dence(X ! Y ) = jX [ Y j :
jXj</p>
        <p>
          Discovering all association rules from a set of sessions S consists in
generating all rules whose support and con dence are greater than or equal to the
corresponding minimal thresholds, called minsup and minconf. The classical
algorithm for discovering association rules is Apriori [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].
        </p>
        <p>
          To build the recommendation model M using association rules, the set of
sessions S is used as input to an association rules algorithm to generate a set
of rules. Once we have the model, we can make recommendations, R, to a new
session. Given an active session sa containing a user ua and its set of observable
items O, we build the set R as follows [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]:
        </p>
        <p>To obtain the top-N recommendations, we select from R the N distinct
recommendations corresponding to the rules with the highest con dence values.
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>The Weight Post-Filtering Approach</title>
        <p>
          There are many de nitions of context in the literature depending on the eld
of application and the available customer data [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. For example, in [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ], context
is de ned as any information that can be used to characterize an item. In this
paper, we use time and location (i.e., month and city) as context to identify
tendencies in the choice of a given name to improve the recommendations.
        </p>
        <p>
          To incorporate contextual information in the previous recommender systems,
we have extended the Weight Post-Filtering (PoF) approach, proposed in [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ],
for the task of item recommendation. The original approach was proposed for
rating prediction [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ].
        </p>
        <p>The Weight PoF approach rst ignores the contextual information in the data
(in our case, the month and the city from each access) and applies a traditional
algorithm (e.g., Item-based Collaborative Filtering or Association Rules based)
to build the recommendation model. Then, it computes the probabilities of user's
access items under a given context. The probability Pc(u; i) that a user u accesses
an item i under the context c can be computed as follows
(4)
(6)
Pc(u; i) =</p>
        <p>N umc(u; i)
N um(u; i)
;
where N umc(u; i) is the number of users that, like the user u, also accessed the
item i under the context c; and N um(u; i) is the total number of users that
accessed the item i.</p>
        <p>The score of the items computed by using the previous recommender
systems are multiplied by the probabilities Pc(u; i), incorporating context into the
recommendations and improving the performance of the recommender systems.
Finally, the items are reordered and the top-N items are recommended to the
user.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Empirical Evaluation</title>
      <p>In this section, we empirically evaluate the recommender systems, presented in
Section 3, in the task of recommending given names.
4.1</p>
      <sec id="sec-4-1">
        <title>Data Set</title>
        <p>
          The empirical evaluation is carried out using an usage data set from Nameling.
According to [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], Nameling is a search engine and a recommender system for
given names. In this system, the user enters a given name and obtains a browsable
list of recommended names, called \namelings ".
        </p>
        <p>The data set is derived from the Nameling query logs, ranging from March
6th, 2012 to February 12th, 2013. It contains 515,848 accesses from 60,922
users to 20,714 di erent items (i.e., given names). There are ve types of
accesses/activities5:
1. ENTER SEARCH: The user enters a name directly into the Nameling's
search eld;
2. LINK SEARCH: The user follows a link on some result page;
3. LINK CATEGORY SEARCH: Wherever available, names are
categorized according to the corresponding Wikipedia articles;
4. NAME DETAILS: Users can get some detailed information for a name;
5. ADD FAVORITE: Users can maintain a list of favorite names.</p>
        <p>Additionally, for each access there are a timestamp and a proxy for the user's
geographic location (i.e., country code, province, city, latitude and longitude)
which is obtained by using the MaxMind's GeoLite City data base6.</p>
        <p>As part of the data set, there is also a list of known names7 containing all
names which are currently known in the Nameling web site. As we will see in
Section 4.3, all names that occur in the evaluation data set are contained in this
list of names.
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Pre-processing of the Data Set</title>
        <p>
          Before running the experiments, we pre-processed the data set by replacing
invalid names and removing singleton sessions, as described below:
5 We use the terms access and activity interchangeably.
6 http://www.maxmind.com/
7 http://www.kde.cs.uni-kassel.de/nameling/dumps
Replacing invalid names: In real-world data sets, it is common to nd several
variations of a name, for example, spelling variations due to typographical
errors (like \Richard" and \Ricahrd") and di erences in punctuation marks
(like \O'Reilly" and \O Reilly"). Considering the existence of a reference
list with valid names, we can use string comparison measures to replace an
invalid name by the nearest valid name, thus believing that we are correcting
a name typed incorrectly. Thus, in the data pre-processing step, we use the
list of known names, described in the previous section, and apply the
JaroWinkler measure [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] for detection and replacement of invalid names. For
this purpose, it is necessary rst to de ne the Jaro (j) measure between two
strings w1 e w2 (Equation 7):
where h is the number of matching characters and t represents the number
of transpositions. The matching between two characters c1 and c2, with
c1 2 w1 and c2 2 w2 occurs when c1 = c2 and they are not further than
max(jw21j;jw2j) 1. The number of transpositions is obtained by considering
di erent orders for matching characters. The Jaro-Winkler (jw) is based on
the Jaro measure, according to Equation 8, in which l(w1; w2) represents the
length of common pre x at the start of the string up to a maximum of 4
characters.
To carry out the experiments, we use a Perl script8 to split the data set in
training and test sets.
        </p>
        <p>The script selects some users with at least ve di erent names for the test set.
Then, for each test user, it withholds the last two entered names for evaluation.
8 http://www.kde.cs.uni-kassel.de/nameling/dumps/process_activitylog.pl
To withhold the last two entered names, the script uses the following rules. For
each test user, the script selects for evaluation the last two names which had
directly been entered into the Nameling's search eld (i.e., ENTER SEARCH
access) and which are also contained in the list of known names. The script only
considers those names which were not previously added as a favorite name by the
test user (i.e., ADD FAVORITE access). Finally, the script removes the accesses
after the names for evaluation and keeps in the test set only users with at least
three accesses. The remaining users in the data set are used as training set.</p>
        <p>
          To evaluate the recommender systems, we compute the metric Mean Average
Precision (MAP) [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]. For each test user, the metric takes the left out evaluation
names and compute the precision at the respective position in the ordered list
of recommended names. These precision values are rst averaged per test user
and than in total to obtain the nal score. Here, we use a Perl script9 to
compute the MAP@1000 which means that only the rst 1,000 positions of a list of
recommendations are considered.
        </p>
        <p>With respect to the recommendation algorithms, we use the Item-based
Collaborative Filtering and the Association Rules based, which were described in
Section 3. In the Item-based Collaborative Filtering, the top-N
recommendations are generated based on their 1, 5, 10, 15 and 20 most similar items (i.e.,
the 1, 5, 10, 15 and 20 nearest neighbors). In the Association Rules based
algorithm, the recommendation models are built using a minimum support value
determined to generate around 10,000; 50,000 and 100,000 rules. The minimum
con dence values are de ned as being the support value of the one thousandth
most frequent item in the training set. This allows the generation of at least 1,000
rules without antecedent that can be used by default, in the case that no other
rule applies. Here, as the left out names for evaluation are only names which had
been directly entered into the Nameling's search eld (i.e., ENTER SEARCH
access), we have selected only this type of access from the training set to build
the recommendation models.</p>
        <p>Finally, we use the month and the city from the accesses as contextual
information in the Weight PoF approach, as described in Section 3.3. Such
information can capture tendencies of names in a given city, in a given month. The
month is obtained from the timestamp of the access. We obtain the city by using
the proxy for the user's geographic location provided with the data set.
4.4</p>
      </sec>
      <sec id="sec-4-3">
        <title>Empirical Results</title>
        <p>We start by comparing the Item-based Collaborative Filtering technique (CF)
against its contextual version that makes use of the Weight PoF approach
(CFPoF). In Table 2, we see that the values of MAP@1000 decrease when we
increase the number of neighbors. This fact occurs because when we increase the
number of neighbors, less similar items are used to generate the
recommendations. Comparing the CF-PoF against the CF, we see an improvement of the
9 http://www.kde.cs.uni-kassel.de/nameling/dumps/evaluate_recommender.pl
K-neighbors
K = 1
K = 5
K = 10
K = 15
K = 20</p>
        <p>In Table 3, we can see that the di erence between the Association Rules
based algorithm (AR) and its, respective, contextual version (AR-PoF) is quite
small. In this case, the AR-PoF algorithm provides gains of MAP@1000 around
2.4%.</p>
        <p>We also compare the results between both Tables 2 and 3. We see that
the AR-PoF recommender system with 10,000 rules provides the best value for
MAP@1000, i.e., 0.0343. If we compare this value against the one provided by
the best recommender system in Table 2, the CF-PoF with K = 1, we see a
gain of 246.5%. Besides, our Association Rules based algorithms are quite fast.
We measured the computational time to build the recommendation model and
generate the 1,000 recommendations. In our experimental scenario, we used an
Intel Core i7 Ivy Bridge with a CPU clock rate of 3.4 GHZ, 32 GB of main
memory, and running the Debian Linux operating system. To build a
recommendation model, the algorithms take around 26 seconds (10,000 rules) to 2
minutes (100,000 rules). Here, the top-1000 recommendations are generated in
approximately 1 second.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>The 15th Discovery Challenge: Recommending Given</title>
    </sec>
    <sec id="sec-6">
      <title>Names</title>
      <p>After analyzing the results presented in Section 4.4, we applied our best scenario
to the data set from the 15th Discovery Challenge: Recommending Given Names.</p>
      <p>We pre-processed the data set, selected only names entered into the
Nameling's search eld, and then ran the algorithm which provided the best MAP@1000,
i.e., the AR-PoF algorithm with about 10,000 association rules. With this
scenario, our Labic team obtained a score of 0.0379 in the nal leaderboard.
6</p>
    </sec>
    <sec id="sec-7">
      <title>Final Remarks</title>
      <p>Although the task of recommending given names is relevant in practice, little
research has been performed on the perspective of recommender systems. In
this paper, we exploited two state-of-the-art recommender systems in the task
of recommending given names. In addition, we also incorporated contextual
information in such systems to capture tendencies in choosing given names and,
thus, to improve the recommendations. Although the gains obtained by using the
Weight PoF approach are small, the results of our empirical evaluation present
evidences that we can improve the recommendation of given names by using
contextual information.</p>
      <p>There are some directions to be explored in future research. For example,
other pre-processing tasks can be applied on the data set in order to improve the
quality of the data. We can also try other context-aware recommender systems
in the task of recommending given names [26, 27]. On the other hand, we can
also combine the two state-of-the-art recommenders, presented in this paper, in
a hybrid algorithm.</p>
      <p>Acknowledgments. This work was supported by the grants 2010/20564-8,
2011/19850-9, 2012/13830-9, 2012/07295-3, S~ao Paulo Research Foundation
(FAPESP).
26. Adomavicius, G., Sankaranarayanan, R., Sen, S., Tuzhilin, A.: Incorporating
contextual information in recommender systems using a multidimensional approach.</p>
      <p>ACM Transactions on Information Systems 23(1) (2005) 103{145
27. Domingues, M.A., Jorge, A.M., Soares, C.: Dimensions as virtual items: Improving
the predictive ability of top-n recommender systems. Information Processing &amp;
Management 49(3) (2013) 698{720</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Resnick</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varian</surname>
            ,
            <given-names>H.R.</given-names>
          </string-name>
          :
          <article-title>Recommender systems</article-title>
          .
          <source>Communications of the ACM</source>
          <volume>40</volume>
          (
          <issue>3</issue>
          ) (
          <year>1997</year>
          )
          <volume>56</volume>
          {
          <fpage>58</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Ricci</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rokach</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shapira</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kantor</surname>
          </string-name>
          , P.B., eds.
          <source>: Recommender Systems Handbook</source>
          . Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Linden</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , York, J.: Amazon.
          <article-title>com recommendations: Item-to-item collaborative ltering</article-title>
          .
          <source>IEEE Internet Computing</source>
          <volume>7</volume>
          (
          <issue>1</issue>
          ) (
          <year>2003</year>
          )
          <volume>76</volume>
          {
          <fpage>80</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Karatzoglou</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baltrunas</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Church</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , Bohmer, M.:
          <article-title>Climbing the app wall: enabling mobile app discovery through context-aware recommendations</article-title>
          .
          <source>In: Proceedings of the 21st ACM international conference on Information and knowledge management</source>
          .
          <source>CIKM '12</source>
          , New York, NY, USA, ACM (
          <year>2012</year>
          )
          <volume>2527</volume>
          {
          <fpage>2530</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Baltrunas</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ludwig</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peer</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricci</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Context-aware places of interest recommendations for mobile users</article-title>
          . In Marcus, A., ed.:
          <article-title>Design, User Experience, and Usability</article-title>
          . Theory, Methods,
          <source>Tools and Practice. Volume 6769 of Lecture Notes in Computer Science</source>
          . Springer Berlin Heidelberg (
          <year>2011</year>
          )
          <volume>531</volume>
          {
          <fpage>540</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Ko</surname>
            ,
            <given-names>S.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Choi</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eom</surname>
            ,
            <given-names>H.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cha</surname>
            ,
            <given-names>J.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cho</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
          </string-name>
          , L.,
          <string-name>
            <surname>Han</surname>
            ,
            <given-names>Y.S.:</given-names>
          </string-name>
          <article-title>A smart movie recommendation system</article-title>
          . In Smith,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Salvendy</surname>
          </string-name>
          , G., eds.:
          <article-title>Human Interface and the Management of Information. Interacting with Information</article-title>
          . Volume
          <volume>6771</volume>
          of Lecture Notes in Computer Science. Springer Berlin Heidelberg (
          <year>2011</year>
          )
          <volume>558</volume>
          {
          <fpage>566</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Domingues</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gouyon</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jorge</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leal</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vinagre</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lemos</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sordo</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Combining usage and content in an online recommendation system for music in the long tail</article-title>
          .
          <source>International Journal of Multimedia Information Retrieval</source>
          <volume>2</volume>
          (
          <issue>1</issue>
          ) (
          <year>2013</year>
          )
          <volume>3</volume>
          {
          <fpage>13</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Mitzla</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stumme</surname>
          </string-name>
          , G.:
          <article-title>Namelings: discover given name relatedness based on data from the social web</article-title>
          .
          <source>In: Proceedings of the 4th international conference on Social Informatics. SocInfo'12</source>
          , Berlin, Heidelberg, Springer-Verlag (
          <year>2012</year>
          )
          <volume>531</volume>
          {
          <fpage>534</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Mitzla</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stumme</surname>
          </string-name>
          , G.:
          <article-title>Onomastics 2.0 - the power of social co-occurrences (</article-title>
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Mitzla</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stumme</surname>
          </string-name>
          , G.:
          <article-title>Relatedness of given names</article-title>
          .
          <source>Human Journal</source>
          <volume>1</volume>
          (
          <issue>4</issue>
          ) (
          <year>2012</year>
          )
          <volume>205</volume>
          {
          <fpage>217</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Brin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Page</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>The anatomy of a large-scale hypertextual web search engine</article-title>
          .
          <source>Computer Networks and ISDN Systems</source>
          <volume>30</volume>
          (
          <issue>1-7</issue>
          ) (
          <year>1998</year>
          )
          <volume>107</volume>
          {
          <fpage>117</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Mitzla</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stumme</surname>
          </string-name>
          , G.:
          <article-title>Recommending given names (</article-title>
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khoshgoftaar</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>A survey of collaborative ltering techniques</article-title>
          .
          <source>Advances in Arti cial Intelligence</source>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Sarwar</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karypis</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Konstan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Riedl</surname>
          </string-name>
          , J.:
          <article-title>Item-based collaborative ltering recommendation algorithms</article-title>
          .
          <source>In: WWW'01: Proceedings of the Tenth International Conference on World Wide Web</source>
          , New York, NY, USA, ACM (
          <year>2001</year>
          )
          <volume>285</volume>
          {
          <fpage>295</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koren</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Volinsky</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Collaborative ltering for implicit feedback datasets</article-title>
          .
          <source>In: Eighth IEEE International Conference on Data Mining (ICDM'08)</source>
          . (
          <year>2008</year>
          )
          <volume>263</volume>
          {
          <fpage>272</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Breese</surname>
            ,
            <given-names>J.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heckerman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kadie</surname>
            ,
            <given-names>C.M.</given-names>
          </string-name>
          :
          <article-title>Empirical analysis of predictive algorithms for collaborative ltering</article-title>
          .
          <source>In: Proceedings of the Fourteenth Conference on Uncertainty in Arti cial Intelligence</source>
          .
          <article-title>(</article-title>
          <year>1998</year>
          )
          <volume>43</volume>
          {
          <fpage>52</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Deshpande</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karypis</surname>
          </string-name>
          , G.:
          <article-title>Item-based top-n recommendation algorithms</article-title>
          .
          <source>ACM Transaction on Information System</source>
          <volume>22</volume>
          (
          <issue>1</issue>
          ) (
          <year>2004</year>
          )
          <volume>143</volume>
          {
          <fpage>177</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Jorge</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alves</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Azevedo</surname>
            ,
            <given-names>P.J.:</given-names>
          </string-name>
          <article-title>Recommendation with association rules: A web mining application</article-title>
          .
          <source>In: Proceedings of Information Society (IS-2002): Data Mining and Warehouses</source>
          , Ljubljana, Slovenia (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Agrawal</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srikant</surname>
          </string-name>
          , R.:
          <article-title>Fast algorithms for mining association rules</article-title>
          .
          <source>In: Proceedings of Twentieth International Conference on Very Large Data Bases</source>
          . (
          <year>1994</year>
          )
          <volume>487</volume>
          {
          <fpage>499</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Dey</surname>
            ,
            <given-names>A.K.</given-names>
          </string-name>
          :
          <article-title>Understanding and using context</article-title>
          .
          <source>Personal Ubiquitous Computing</source>
          <volume>5</volume>
          (
          <issue>1</issue>
          ) (
          <year>2001</year>
          ) 4{
          <fpage>7</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Panniello</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gorgoglione</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Incorporating context into recommender systems: an empirical comparison of context-based approaches</article-title>
          .
          <source>Electronic Commerce Research</source>
          <volume>12</volume>
          (
          <issue>1</issue>
          ) (
          <year>2012</year>
          )
          <volume>1</volume>
          {
          <fpage>30</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Winkler</surname>
          </string-name>
          , W.E.:
          <article-title>Methods for evaluating and creating data quality</article-title>
          .
          <source>Information Systems</source>
          <volume>29</volume>
          (
          <issue>7</issue>
          ) (
          <year>2004</year>
          )
          <volume>531</volume>
          {
          <fpage>550</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Christen</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A comparison of personal name matching: Techniques and practical issues</article-title>
          .
          <source>In: Proceedings of the Sixth IEEE International Conference on Data Mining - Workshops</source>
          , Washington, DC, USA, IEEE Computer Society (
          <year>2006</year>
          )
          <volume>290</volume>
          {
          <fpage>294</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Domingues</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Soares</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jorge</surname>
            ,
            <given-names>A.M.:</given-names>
          </string-name>
          <article-title>An empyrical study on the impact of singleton web accesses on the accuracy of recommender systems</article-title>
          .
          <source>In: Proceedings of the SBIA 2008 First Workshop on Web and Text Intelligence (WTI 08)</source>
          , Salvador, Bahia, Brazil (
          <year>2008</year>
          )
          <volume>43</volume>
          {
          <fpage>50</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Voorhees</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , of Standards,
          <string-name>
            <surname>N.I.</surname>
          </string-name>
          , (US), T.:
          <article-title>TREC: Experiment and evaluation in information retrieval</article-title>
          . Volume
          <volume>63</volume>
          . MIT Press Cambridge (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>