<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Improving Agent Group Homogeneity Over Time</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Pasquale De Meo</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Catania</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Messina</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>University of Reggio Calabria</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>37</fpage>
      <lpage>42</lpage>
      <abstract>
        <p>-In social communities the composition of thematic groups varies over time due to changes occurring in users' behaviors. To study the time evolution of such a process, we design a conceptual framework exploiting a distributed algorithm driving group formation. The results of tests carried out on real data extracted by the social network CIAO, show as groups formed by combining similarity and trust measures are i) more time-stable, independently by the weight of the trust component, and ii) more time-homogeneous, independently by the presence of uncorrelated random agents' behaviors affecting the similarity component.</p>
      </abstract>
      <kwd-group>
        <kwd>Homogeneity</kwd>
        <kwd>Similarity</kwd>
        <kwd>Social Communities</kwd>
        <kwd>Trust</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Many online communities include thematic groups [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and
many studies investigated on the users motivations to join
with groups [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], as well as the impact of their growth [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and failure [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Important issues in forming groups
require to an agent of selecting those groups able to satisfy
its expectation [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]–[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and, in a complementary way, the
members of a group search to accept only new agents able
to improve their utility. Many studies present algorithms
effective in driving such group formation processes (e.g., by
using diffusion processes [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]) by analyzing i) the group
evolution in terms of surviving or failure and ii) the reasons
for which an agent will join with/left a group. Many of such
studies assume that groups should be formed by like-minded
members. To this aim, many measures exist to evaluate the
similarity degree among the groups members (e.g., based
on the number of affiliations to groups [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], member/group
interests [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], individual preferences [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and so on).
      </p>
      <p>
        In such a context, the aptitude of a group to retain its
members (i.e., time stability) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] is a major factor for
its survival or extinction. The evolution of these groups is,
in the most part of the cases, driven only by the mutual
similarity criterion [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], although it has evident limitations.
Indeed, the problem of recommending groups to a potential
member usually relies only on the mutual similarity between
the profile features of a candidate at the timet and the interests
of a group. When such interests vary in a relatively short time
frame then groups selected at the time t could not be the best
choice at the time t + Δt.
      </p>
      <p>
        Based on data of the social network CIAO [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], we verified
as the mutual similarity alone does not ensure the group
homogeneity over time. In particular, when uncorrelated (e.g.,
random) users’ behavior aspects assume a relevant weight.
Consequently, we investigated on improving the time-stability
of the group homogeneity in terms of similarity. In this
respect, recent studies on group formation processes consider
trust [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]–[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] to increase the level of the group member’s
engagement over time and avoiding the group failure [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
However, all the approaches reviewed in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] do not face the
problem of combining similarity with trust.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]–[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] we proposed to integrate similarity and trust
in a unique measure to form groups and finding those most
suitable for joining with. In this paper, we extended this
work to study how changes occurring in the similarity and
trust measures impact on the groups formation over time. To
test this approach, we used a new conceptual framework by
means of which we verified, always by using the data of the
social network CIAO, that groups formed by considering both
similarity and trust have higher time-stable homogeneity, in
terms of similarity, than groups formed by adopting the only
similarity criterion. This result is valid also when both the
weight assigned to the trust component is low or random (i.e.,
“uncorrelated”) behavior components considered in computing
the similarity have a relevant weight. We assume that this
behavior is mainly due to the effect of trust in balancing
potential incongruence of the similarity measures. Besides, we
found as the function used to aggregate similarity and trust
measures is not fundamental. Therefore, for a good trade-off
between the need of producing accurate results and that of
having an easy interpretation model, we aggregated similarity
and trust by simply computing their weighted sum, as in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>The remaining of the paper is structured as follows: in
Section II we present the related literature, in Section III the
adopted reference scenario is introduced, while in Section IV
deal with the similarity and trust measures computation.
Sections V and VI illustrate the A2G algorithm and our conceptual
framework. Section VII describes the experimental campaign,
discuss its results and, finally, conclusions ends the paper.</p>
    </sec>
    <sec id="sec-2">
      <title>II. RELATED WORK</title>
      <p>
        In the group formation the common identity and bond
theory [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] identifies as main mechanisms to join with a group
(i) the strong personal ties and (ii)) the shared interests with
other group members. Differently, in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] the authors applied
the community detection algorithms to identify clusters into
OSNs and comparing their structural features with user-defined
communities. A study on the group affiliation mechanisms is
presented in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], where in two different kind of networks the
authors noted as the act to join with a group can be modeled
in terms of new ideas spreading for both the networks.
      </p>
      <p>
        Kairam et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] compared the growth processes in which user u, whereas an administrator agent ag assists a group g.
groups attract new members in presence/absence of social ties The agents knowledge representation, the agent tasks and our
with existing/any group members. Their main finding is that definitions of similarity and trust will be introduced below.
more a group is highly clustered and more likely it grows for
a diffusion process. It is in accord with [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], where 500,000 A. The agents’ knowledge representation
Facebook groups created in an 8-day period were monitored Interests and preferences of each owner (i.e., u, g) are taken
for 3 months after which the most part of groups were inactive. into account by the associated agent a ∈ A and stored into its
The analysis of [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] highlighted that group survival depends profile pa consisting of (i) interests, (ii) behaviors, (iii) access
on the social capital brought by group founders and of their modes and (iv) trust levels, as follows:
behavior. Differently from us, any of the papers above explored Interests: The interest of the agent a in a category x is a
the homogeneity of such groups to verify if they result time- function Ia(x) : A × X → [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] ∈ R computed as the overall
stable homogeneous in terms of similarity. ratio of reviews for items belonging to x. More formally, Ia(x)
      </p>
      <p>
        Homogeneous processes are defined as those whose pa- is expressed by Ia(x) = |{ra,i : i ∈ x}|/|ra|, where ra is
rameters are time-stable with respect to some measure. Usual the review history of a, and we denote by ra,i each review
group formation processes do not assure that properties like contained in ra and referred to an item i.
to similarity, social identity and so on, will be time-stable. Behaviors: The behavior field informs us about the
activConversely, some affiliation recommendation [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] processes ities admitted or not within a group. It is assumed to be a
suggest to an OSN user only time-stable groups. From a statement of the form “The average rating of items is greater
wide experimentation involving Social Identity and Cohesion than 3.0” and so on. Targets (e.g., average rating, frequency
theories on more Twitter datasets, the authors of [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] verified of posts, etc.) and goals (e.g., discriminating thresholds) of
that groups based on the users’ social identity and formed by the statements depend on the specific considered community.
users interested in a great variety of topics are less cohesive Therefore, let b be a behavior (e.g., performed by a user,
over time in presence of transient events. admitted into a group) and let B = {b1, b2, . . . , bp} be a
      </p>
      <p>
        A flexible framework in which group affiliation is treated given a set of behaviors. We assume to dispose of a function
as an event impacting on user’s preferences is proposed and ζa(b) : A × B → {True, False} which takes an agent a ∈ A
validated in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], where a probabilistic framework provides and a behavior b ∈ B and checks whether the behavior b
to model the individual preferences when he/she joins with matches with the a’s past behaviors. The set of behaviors
a group. In other words, it affiliates to a group those users associated with an agent a will be defined as Ba, i.e., we
maintaining a high similarity level into the group over time set Ba = {ζa(b)| b ∈ B}.
and keeping homogeneous the group under this point of view. Access modes: An access mode identifies a modality for
In this scenario, we note as friendships and time-homogeneity accessing/allowing the access to a group, arbitrarily set by
of their relationships strictly depend by the mutual trust among the agent owner, like to open, closed or secret, and let L be
individuals. Differently, in the literature the most part of the a list specifying such accessing modes. More in general, we
proposals to form time-stable groups consider it as a problem supposed that a function M : A → L is available to associate
essentially involving some form of similarity among users. an agent a ∈ A with a mode l ∈ L for accessing to a group.
      </p>
      <p>
        Among the cited contributions, only [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] indirectly refers to This components of the user profiles can be considered as fully
trust, in the mean derived by the social theories [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], while the random, and not correlated with the other components.
other consider some form of similarity as the unique criteria Trust levels: We suppose that an asymmetric trust function
to form possible time-stable homogeneous groups. returning how much an agent j perceives another agent k as
trustworthy is available (i.e., in general if j trusts k it does
III. THE REFERENCE FRAMEWORK SCENARIO not mean that k trusts h too, tj→k 6= tk→j ). Trust levels
are assigned during the agent interactions and mostly depend
on the specific community. For instance, in CIAO everyone
can explicitly declare the own trust about each other member.
      </p>
      <p>Similarly, the trust perceived by an agent au with respect to a
group g of agents can be defined as tau→g =</p>
      <p>
        Our framework involves a community C = hA, Gi, where
A and G are the sets of agents and groups active in C. Let
I a set of available items, each one belonging to a specific
category x, belonging to the set of categories X 1, that in C
can be reviewed by each agent a ∈ A with an integer in
the range [
        <xref ref-type="bibr" rid="ref5">0, 5</xref>
        ]. Moreover, let ra,i be the generic review of
an item i ∈ I released by a, which consists of: (i) a rating
assigned to i by a; (ii) a category x ∈ X associated with
i; (iii) a numerical score specifying the helpfulness2 of ra,i;
(iv) a timestamp. Finally, we denote by ra the set of reviews
associated with a, called review history, and by R the set of
all the review history in C. In such a scenario, we assume to
adopt a multi-agent platform where, each agent au assists a
X tau→av /|g|.
      </p>
      <p>v∈g</p>
      <p>Note that for a group g: (i) its administrator sets the admitted
behaviors access modalities (denoted as Mg); (ii) the interest
for a category x ∈ X is computed as the average of the
interests of its agent members for x that are stored in their
profiles; (iii) how the members of g perceive as trustworthy
an agent au is computed as tg→au =</p>
      <p>X tav→au /|g|.
av∈g
1The set of categories associated with C only depends by the goals of C
2The helpfulness is a measures of the utility of the rating of a review is An agent updates its profile when an action involving
useful in making a decision and it is computed as the average of the scores. information stored therein is performed. More precisely:
B. The agents’ tasks
• After each performed action, an agent au updates in av). Usually, reliability can assume values ranging in [0..1] ∈
its profile the interests and the boolean values of the R and the higher relau→av , the higher the perception of the
involved behavioral variables. Similarly, an agent ag in reliability of av by au. Note that reliability is an asymmetric
its profile updates the behavioral variables every time the measure. The second trust component, named reputation and
administrator of g changes the associated rules. Besides, denoted it by repa in the interval [0..1] ∈ R, is a global
each time that the preferred access modes change then measure of the trust perceived by the whole community about
the associated agent updates its profile. each other agent. The reputation is computed by averaging all
• When u expresses his/her evaluation about another user the reliability values relau→av for each av ∈ A.</p>
      <p>v then au updates the trust measure. The two trust components are joined in a unique value to
We also assume that a Distributed Directory Facilitator compute the trust au about av as tau→av = αau · relau→av +
agent (DDF) supports the other agents in C with an Agent (1−αau )·repav , where αau ∈ [0..1] ∈ R is set by au to weight
Indexing Service and a Communication Layer enabling the the relevance it assigns to the first trust term with respect to the
agent message exchange. second one. Note that trust is an asymmetric measure because
in the formulation it takes into account the reliability. Besides,
IV. SIMILARITY AND TRUST each time a reliability value is updated by au, it sends the new
value to the DF that, in turn, returns a reputation value to au</p>
      <p>
        To investigate the time-stability of groups in terms of when it needs to compute a trust measure.
sciomnsiliadreirtya,gbeyntsm’ esaimnsilaorfititehseamndodtreulstprreelvaitoiounslsyhippsre,saesnftoeldl,owwse. As defined in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], compactness is a measure combining
trust and similarity, say γau→av , able to exploit importance
given to the mutual similarity with respect to the mutual trust.
      </p>
      <p>A. Similarity measure We model this level of importance by the coefficient W s,</p>
      <p>
        Let su,v be the measure of similarity between the profiles ranging in [0..1] ∈ R and, consequently, we define γau→av as
of agents au and av computed as a weighted mean of the γau→av = W s · sau,av + (1 − W s) · tau→av . Remember that
contributions of interests (cI ), behaviors (cB) and access trust is an asymmetric measure γu→v 6= γv→u.
modes (cM ) normalized in [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ]. More formally, In Table I the meaning of the symbols is reported.
sau,av = (wI · cI + wB · cB + wM · cM )/(wI + wB + wM )
where wI , wB, wM ∈ [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] ∈ R are system weights for the
contributes cI , cB and cM , in turn, are computed as follows:
• cI is based on the average difference between the interest
values of au and av for each category x ∈ X :
cI = 1 − X |Iau (x) − Iav (x)|/|X |
      </p>
      <p>c∈C
• cB is computed on the average difference between the
boolean variables contained in Bau and Bav . This
difference is 0/1 if the two corresponding variables are
equal/different.
• cA is set to 1/0 if Mau is equal/different to Mau .</p>
      <p>The similarity su,g between an agent and a group is
computed in the same manner described above, simply by
substituting av with ag.</p>
      <sec id="sec-2-1">
        <title>B. Trust and compactness measures</title>
        <p>
          We view trust as two terms specifying how much an
agent trusts another agent, and how much the community
perceives an agent as trustworthy. A feedback mechanism
usually allows each agent to record its satisfaction for its
interactions with other agents in order to compute/update
its trust measures [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]–[
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] based on the concept of social
capital [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]. In fact, a high rate of positive interactions means
that an agent can receive an advantage to interact with another
agent and, therefore, trust should increase/decrease in presence
of positive/negative interactions. The first component, known
in the trust theory as reliability, represents the satisfaction of
au about av, i.e. relau→av , and can specify several types of
trust relationships (e.g., the honesty, the dependability or, as in
this work, how much au is satisfied by the services provided by
        </p>
        <p>In this section the algorithm (A2G), enabling user agents to
select the groups to join with, is presented.</p>
        <p>Let G = {g1, g2, . . . , gn} be the groups of C, with |G| =
n. Moreover, let kMaAuX be the upper bound ranging in [0, n]
which specifies the number of groups au desires to join with
and reasonably it will be kMAXau &lt;&lt; n. In the following, for
convenience, the notation kMAX will be used instead of kMaAuX.</p>
        <p>Algorithm A2G selects kMAX groups having the largest value
of compactness of au vs the joined groups. We assume
that au continues to receive the whole benefit from all the
K ⊆ G groups which it is joined with, so that the overall
received benefit in joining with all the K groups, in term
of compactness, is given by X γu→gi . Finding the subset
K? ⊆ G producing the best begnie∈fiKt for au under the constraint
|K?| = kMAX is equivalent to solve an optimization problem.
In this work, we assume that each user agent au is unable
to know, in advance, the compactness of all groups in G.
Furthermore, we assume that: (i) au is able to sample m
random groups from G; (ii) au will record into an internal
cache, denoted as H the profiles of the groups au joined with
in the past; (iii) m is the number of the group agents that at
each epoch must be contacted by au. Algorithm 1 describes
the steps au performs to find the kMAX groups it can join with,
while the Algorithm 2 runs on the group agent. In particular,
it is assumed that (i) the size of each group g ∈ G is ≤ than
a threshold nMAX; (ii) nMAX is fixed by the group administrator;
(iii) each agent ag stores into an internal cache the profiles of
the agents who joined with g;</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>VI. THE PROPOSED COMPUTATIONAL FRAMEWORK</title>
      <p>In our framework, a community is associated with a
temporal dataset of events consisting of a matrix EM , where
each row represents an event containing a timestamp, an agent
identifiers and the event attributes. An events can be an action
performed by an agent or an external event changing the state
of the community. Furthermore, we assume that a (non
timevarying) matrix T M of trust relationships is available, where
each row is a pair of agent IDs (au, av) representing a trust
relationship among agent au and agent av. Moreover,
A2GComp and A2G-Sim are two versions of the algorithm A2G. In
the former the compactness γ is computed by setting W s &lt; 1
(i.e., it is driven by similarity and trust) and for the latter
W s = 1 (i.e., it is driven only by similarity).</p>
      <p>
        The framework provides the weights wI and W s in the
range [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] ∈ R influencing the A2G algorithm results. wI
represents the weight assigned to the agent interest, while
1 − wI is divided between wB, representing the weight
assigned to the agents behavior (see Section IV), and wM .
cM is set as random not being into the original dataset.
The lower the value of wI , the higher the incidence of the
component cM in computing the similarity, in other words
cM is an “uncorrelated component”. Furthermore, the higher
the value of W s, the lower the impact of the trust relationship
in computing the compactness γ.
      </p>
      <p>In this perspective, the M AC (Mean Average Compactness)
and M AS (Mean Average Similarity) measures have been
used to perform experiments, in dependence of wI and W s.
end
return S
Data: au: an agent, H the current set of groups of au, m: an integer
in [0, n], kMAX: the number of groups au can join with
Result: The new set S of groups of au
Y = a set of m random groups extracted from DF; Z = H [ Y ;
for (g ∈ Z) {au sends a message to ag and let pg be the profile of g};
S = the set of kMAX groups of Z with the highest compactness values;
for (g ∈ S) do
if (g ∈/ H) then {au sends a join request with its profile to ag};
else {au left g};</p>
      <sec id="sec-3-1">
        <title>Algorithm 1: The User Agent Task</title>
        <p>Data: r: an agent which has asked to join with the group, K, the set of
agents in g
for (au ∈ K) do {ag sends a message to au};
for (au ∈ K [{r}) do {Compute γg→u};
Let π = Pui∈g Puj∈g γui→uj ∀hui, uji ∈ g and let S = ∅;
|g|2
for (u ∈ K [{r}) do {if (γg→u ≥ π) {S = S [{u}}};
Let TopS be the set of top-nMAX users in S;
if (r ∈ S) {ag accepts the join request of r};
for (u ∈ K ∧ u 6∈ S) do {ag deletes u from g};</p>
      </sec>
      <sec id="sec-3-2">
        <title>Algorithm 2: The Group Agent Task</title>
        <p>M AC(wI , W s) =
M AS(wI , W s) =</p>
        <p>Pg∈G ACg</p>
        <p>|G|
Pg∈G ASg
|G|</p>
        <p>ACg =
ASg =</p>
        <p>P
P
x,y∈g,x6=y γx→y .</p>
        <p>|g|</p>
        <p>(1)
x,y∈g,x6=y sx→y .</p>
        <p>|g|
(2)</p>
        <p>
          More in detail, ACg (resp., ASg) is defined as the
Average Compactness (resp., Average Similarity), similarly to the
average dissimilarity commonly exploited in Clustering
Analysis [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ], since a group g can be viewed as a cluster of agents.
Note that M AC is computed in the training phase of the
A2GComp algorithm (i.e. it only drives group formation), while
M AS is computed in the test phase. Therefore measuring the
variation of M AS can be useful to verify the homogeneity, in
terms of similarity, of the groups formed in the training phase.
        </p>
        <sec id="sec-3-2-1">
          <title>A. Experimental approach and main parameters</title>
          <p>We considered the time-variation of the average similarity
of the groups in two different cases: (i) (Comp) Groups
formed by the A2G-Comp algorithm are driven by
compactness (W s &lt; 1). (ii) (Sim) Groups formed by the A2G-Sim
algorithm are driven by the similarity criterion (W s = 1).</p>
          <p>The computation of the measures are performed by
following the steps described below: (i) Rows of the matrix EM
are arranged in an increasing order, basing on the database
timestamp. (ii) The matrix EM is divided into a number of
time-windows of equal size. The first time-window is for the
training set and the remaining for the tests. (iii) The trust
network is built by loading the matrix T M and for all. (iv)
The training is performed by executing the algorithm
A2GComp (resp. A2G-Sim) on the first time-window, in order
to form groups of agents. (v) The training is stopped when
“stable” values of M AC for A2G-Comp (M AS for
A2GSim) are reach, i.e. the difference between two steps is less
than a given threshold (in our case it was 5%). (vi) Data of
the remaining time-windows is loaded in sequence for each of
them and M AS is computed without executing the algorithm
A2G, such that group composition remains the same as in the
end of the training phase. This technique allows us to study the
variation of M AS due to the addition of events representing
the execution of some further actions by the agents.
0.94
0.92
0.9
S 0.88
A
M0.86
0.84
0.82
0.8
0.94
0.92
0.9
S 0.88
A
M0.86
0.84
0.82
0.8</p>
          <p>Quartiles
Median
Quartiles</p>
          <p>Median</p>
          <p>
            Experiments exploited the described framework on a dataset
extracted from the social network CIAO [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ]3 referred to
12, 375 users and consisting of two matrices (i.e., EM, T M ).
Rows of matrix EM have the form {userID, productID,
categoryID, rating, helpfulness, timestamp}, where categoryID
is the commercial category of the item identified byproductID
which received the rating by the reviewer identified byuserID,
and helpfulness represents the level of satisfaction of the
other member for that rating (it has not been used in our
experiments). Table VII contains the parameters used to carry
out the experiments. The training set is made by the first
10, 000 events. The software used for the experiments can be
downloaded at https://github.com/fmes/simU2G.
          </p>
          <p>3Data used in our experiments are publicly available at http://www.public.
asu.edu/∼jtang20/datasetcode/truststudy.htm
Quartiles
Median
Quartiles</p>
          <p>Median
0.1
0.2
0.3
0.4
0.6
0.7
0.8</p>
          <p>0.9
0.5
WI
Fig. 3. MAS vs parameter wI achieved by the A2G-Sim (Ws = 0.1).
0.1
0.2
0.3
0.4
0.6
0.7
0.8</p>
          <p>0.9
0.5
WI</p>
          <p>Experiments were performed by varying weights wI and
W s in the range [0.1 − 0.9]. Figures 1 and 2 report the
execution of A2G-Comp for wI = 0.1 and wI = 0.5 and
W s in the range [0.1 − 0.9]. In Figure 1 the values of the
M AS are relevant also when the weight of the trust component
is low (i.e., W s &gt; 0.5). In particular, values of MAS are
larger than 0.8 (e.g., median is 0.82 for W s = 0.8), giving
a good time-stability with a visible bias around the median
value, if compared to the results shown in Figure 2, on which
the uncorrelated component starts to assume a less significant
weight. Figures 3-4 show the results for the 1st, 2nd, and 3rd
quartile, minimum and maximum values of M AS computed
after the training for the remaining time windows. Figure 3
shows the behavior of A2G-Sim for different values of wI ,
while Figure 4 represents the different values of M AS for
A2G-Comp with W s = 0.5. From these Figures we note
that the lower the value of wI , the lower the value of overall
similarity at the end of the test for A2G-Sim (Figure 3), while
for A2G-Comp the values of M AS are higher of about 10%.
This first set of results say us of driving groups formation
by compactness when the weight wM is of at least 25% to
obtain homogeneous time-stable groups in terms of average
similarity.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>VIII. CONCLUSIONS</title>
      <p>The experimental study has been conducted with a
distributed algorithm for groups formation, named A2G, which
exploits the compactness measure, i.e. a combination of
similarity and trust. The experimental approach of the conceptual
framework permits to employ different combination of
similarity and trust.</p>
      <p>Obtained results have shown that forming groups on the
basis of users’ similarity will lead to form time-stable
homogeneous groups if the weight of the uncorrelated behavioral
components is marginal. Nevertheless, when group formation
is driven by compactness (i.e., by combining similarity and
trust) then groups result time-stable homogeneous even if
the uncorrelated components included in the computation of
similarity are relevant. Therefore, trust relationships will help
to improve the level of resilience, in terms of similarity, also
in presence of behavioral components which are not strongly
linked with the others. Interestingly, even when the weight
assigned to the trust relationship in the computation of
compactness is very low, group formation driven by compactness
will lead to a number of groups having a higher level of
timestability with respect the similarity measure.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kraut</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Fiore</surname>
          </string-name>
          , “
          <article-title>The role of founders in building online groups,”</article-title>
          <source>in Proc. 17th ACM Conf. CSCW</source>
          <year>2014</year>
          . ACM Press,
          <year>2014</year>
          , pp.
          <fpage>722</fpage>
          -
          <lpage>732</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Grabowicz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Aiello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Eguiluz</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Jaimes</surname>
          </string-name>
          , “
          <article-title>Distinguishing topical and social groups based on common identity and bond theory,”</article-title>
          <source>in Proc. of the ACM Int. Conf. WSDM 2013. ACM</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>627</fpage>
          -
          <lpage>636</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>L.</given-names>
            <surname>Backstrom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Huttenlocher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kleinberg</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Lan</surname>
          </string-name>
          , “Group Formation in Large Social Networks: Membership, Growth, and Evolution,”
          <source>in Proc. 12th ACM SIGKDD Int. Conf</source>
          . ACM Press,
          <year>2006</year>
          , pp.
          <fpage>44</fpage>
          -
          <lpage>54</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kairam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Leskovec</surname>
          </string-name>
          , “
          <article-title>The life and death of online groups: Predicting group growth and longevity</article-title>
          ,”
          <source>in Proc. 5th ACM int. conf. WSDM</source>
          <year>2012</year>
          . ACM Press,
          <year>2012</year>
          , pp.
          <fpage>673</fpage>
          -
          <lpage>682</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Chang</surname>
          </string-name>
          , “
          <article-title>Combinational collaborative filtering for personalized community rrecommendation,”</article-title>
          <source>in Proc. of the ACM Int. Conf. SIGKDD'08. ACM</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>115</fpage>
          -
          <lpage>123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gorla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lathia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Robertson</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          , “
          <article-title>Probabilistic group recommendation via information iatching</article-title>
          ,”
          <source>in Proc. of the Int. Conf. WWW'13</source>
          . ACM Press,
          <year>2013</year>
          , pp.
          <fpage>495</fpage>
          -
          <lpage>504</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vasuki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Natarajan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Savas</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Dhillon</surname>
          </string-name>
          , “
          <article-title>Scalable affiliation recommendation using auxiliary networks</article-title>
          ,
          <source>” ACM Trans. on Intelligent Systems and Technology</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>1</issue>
          , p.
          <fpage>3</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Comi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Fotia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Messina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pappalardo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. M. L.</given-names>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>Supporting knowledge sharing in heterogeneous social network thematic groups,” in Complex, Intelligent,</article-title>
          and
          <source>Software Intensive Systems (CISIS)</source>
          ,
          <source>2015 Ninth International Conference on. IEEE</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>480</fpage>
          -
          <lpage>485</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>L.</given-names>
            <surname>Backstrom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Huttenlocher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kleinberg</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Lan</surname>
          </string-name>
          , “
          <article-title>Group formation in large social networks: membership, growth</article-title>
          , and evolution,”
          <source>in Proc. 12th ACM Int. Conf. SIGKDD'06. ACM</source>
          ,
          <year>2006</year>
          , pp.
          <fpage>44</fpage>
          -
          <lpage>54</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Mislove</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Marcon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. P.</given-names>
            <surname>Gummadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Druschel</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Bhattacharjee</surname>
          </string-name>
          , “
          <article-title>Measurement and analysis of online social networks,”</article-title>
          <source>in Proc. 7th ACM Conf. SIGCOMM'07. ACM</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.</given-names>
            <surname>Lortie</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Guitton</surname>
          </string-name>
          , “
          <article-title>Looking similar promotes group stability in a game-based virtual community,” GAMES FOR HEALTH: Research</article-title>
          , Development, and
          <source>Clinical Appl.</source>
          , vol.
          <volume>1</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>274</fpage>
          -
          <lpage>278</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Gao</surname>
          </string-name>
          , and H. Liu, “
          <article-title>Exploiting local and global social context for recommendation,”</article-title>
          <source>in Proc. of the Int. Joint Conf. IJCAI'13</source>
          . AAAI Press,
          <year>2013</year>
          , pp.
          <fpage>2712</fpage>
          -
          <lpage>2718</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          , “
          <article-title>Trust measures for competitive agents</article-title>
          ,
          <source>” Knowledge-based Systems (KBS)</source>
          , vol.
          <volume>28</volume>
          , no.
          <issue>46</issue>
          , pp.
          <fpage>38</fpage>
          -
          <lpage>46</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci and G. M. L. Sarne</surname>
          </string-name>
          ´, “
          <article-title>Matching users with groups in social networks,” in Intelligent Distributed Computing VII</article-title>
          . Springer,
          <year>2014</year>
          , pp.
          <fpage>45</fpage>
          -
          <lpage>54</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Comi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Fotia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Messina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Sarne</surname>
          </string-name>
          ´, “Grouptrust:
          <article-title>Finding trust-based group structures in social communities</article-title>
          ,” in
          <source>International Symposium on Intelligent and Distributed Computing</source>
          . Springer,
          <year>2016</year>
          , pp.
          <fpage>143</fpage>
          -
          <lpage>152</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>W.</given-names>
            <surname>Sherchan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nepal</surname>
          </string-name>
          , and C. Paris, “
          <article-title>A survey of trust in social networks</article-title>
          ,
          <source>” ACM Computing Surveys</source>
          , vol.
          <volume>45</volume>
          , no.
          <issue>4</issue>
          , p.
          <fpage>47</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Ferrara</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rosaci</surname>
            , and
            <given-names>G. M. L.</given-names>
          </string-name>
          <string-name>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>Trust and compactness in social network groups,” Cybernetics</article-title>
          , IEEE Transactions on, vol.
          <volume>45</volume>
          , no.
          <issue>2</issue>
          ,
          <string-name>
            <surname>Feb</surname>
          </string-name>
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Comi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Fotia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Messina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pappalardo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. M. L.</given-names>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>Forming homogeneous classes for e-learning in a social network scenario,” in Intelligent Distributed Computing IX</article-title>
          . Springer,
          <year>2016</year>
          , pp.
          <fpage>131</fpage>
          -
          <lpage>141</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Ferrara</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rosaci</surname>
            , and
            <given-names>G. M. L.</given-names>
          </string-name>
          <string-name>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>How to improve group homogeneity in online social networks</article-title>
          ,
          <source>” in Proceedings of the 14th Workshop</source>
          from “Objects to Agents”,
          <source>WOA</source>
          <year>2013</year>
          ,
          <article-title>ser</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>1099</volume>
          .
          <string-name>
            <surname>CEUR-WS</surname>
          </string-name>
          ,
          <year>2013</year>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>77</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Messina</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rosaci</surname>
          </string-name>
          , and
          <string-name>
            <surname>G. M. L.</surname>
          </string-name>
          <article-title>Sarne´, “Improving the compactness in social network thematic groups by exploiting a multidimensional user-to-group matching algorithm,” in Intelligent Networking and Collaborative Systems (INCoS</article-title>
          ),
          <source>2014 International Conference on. IEEE</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>64</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Prentice</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and J.</given-names>
            <surname>Lightdale</surname>
          </string-name>
          , “
          <article-title>Asymmetries in attachments to groups and to their members: Distinguishing between common-identity and common-bond groups,” Personality and Social Psychology Bulletin</article-title>
          , vol.
          <volume>20</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>484</fpage>
          -
          <lpage>493</lpage>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>H.</given-names>
            <surname>Purohit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ruan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fuhry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Parthasarathy</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Sheth</surname>
          </string-name>
          , “
          <article-title>On the role of social identity and cohesion in characterizing online social communities</article-title>
          ,
          <source>” arXiv preprint arXiv:1212.0141</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J.</given-names>
            <surname>Nahapiet</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Ghoshal</surname>
          </string-name>
          , “
          <article-title>Social capital, intellectual capital, and the organizational advantage,” Academy management review</article-title>
          , vol.
          <volume>23</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>242</fpage>
          -
          <lpage>266</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>T. DuBois</surname>
          </string-name>
          , J. Golbeck,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Srinivasan</surname>
          </string-name>
          , “
          <article-title>Predicting trust and distrust in social networks,”</article-title>
          <source>in PASSAT'11 IEEE 3rd Int. Conf. on and SocialCom'11 IEEE 3rd Int. Conf. IEEE</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>418</fpage>
          -
          <lpage>424</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>H.</given-names>
            <surname>Liu</surname>
          </string-name>
          , E. Lim,
          <string-name>
            <given-names>H. W.</given-names>
            <surname>Lauw</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Le</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Srivastava</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kim</surname>
          </string-name>
          , “
          <article-title>Predicting trusts among users of online communities: an epinions case study,”</article-title>
          <source>in Proc. 9th ACM conf. on E. com. ACM</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>310</fpage>
          -
          <lpage>319</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Messina</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rosaci</surname>
            , and
            <given-names>G. M. L.</given-names>
          </string-name>
          <string-name>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>Recommending users in social networks by integrating local and global reputation</article-title>
          ,
          <source>” in International Conference on Internet and Distributed Computing Systems</source>
          . Springer,
          <year>2014</year>
          , pp.
          <fpage>437</fpage>
          -
          <lpage>446</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Adler</surname>
          </string-name>
          and S.-W. Kwon, “
          <article-title>Social capital: Prospects for a new concept,” Academy management review</article-title>
          , vol.
          <volume>27</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>40</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Pearson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Zylkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Schwaber</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. E.</given-names>
            <surname>Gonye</surname>
          </string-name>
          , “
          <article-title>Quantitative evaluation of clustering results using computational negative controls,”</article-title>
          <source>in Proc. of the 2004 SIAM International Conference on Data Mining</source>
          ,
          <year>2004</year>
          , pp.
          <fpage>188</fpage>
          -
          <lpage>199</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>