=Paper= {{Paper |id=Vol-532/paper-8 |storemode=property |title=Spreading Activation Approach to Tag-aware Recommenders: Modeling Similarity on Multidimensional Networks |pdfUrl=https://ceur-ws.org/Vol-532/paper8.pdf |volume=Vol-532 }} ==Spreading Activation Approach to Tag-aware Recommenders: Modeling Similarity on Multidimensional Networks== https://ceur-ws.org/Vol-532/paper8.pdf
                 Spreading Activation Approach to
                    Tag-aware Recommenders:
          Modeling Similarity on Multidimensional Networks
        Alexander Troussov                                   Denis Parra                             Peter Brusilovsky
            IBM, Ireland                            University of Pittsburgh and                   University of Pittsburgh
      IBM Software Lab, Bld. 6,                   CNGL at Trinity College Dublin                  135 North Bellefield Ave.,
     Mulhuddart, Dublin 15, Ireland             135 North Bellefield Ave., Pittsburgh,           Pittsburgh, PA 15260, USA
          +353-1-815 1906                                 PA 15260, USA                               +1 (412) 624 9404
       atrousso@ie.ibm.com                              +1 (412) 624 9403                        peterb@mail.sis.pitt.edu
                                                          dap89@pitt.edu

ABSTRACT                                                              were created for a bi-modal world of items and users (connected
                                                                      by rating incidents), social tagging systems present a more
Social tagging systems present a new challenge to the researchers     complicated world of users, items, and tags (connected by tagging
working on recommender systems. The presence of tags, which           incidents, also known as tagging instances). While some early
uncover the reasons of user interests to tagged items, opens a way    works attempted to treat the problem of recommendation in social
to increase the quality of recommendations. Yet, there is no          tagging systems in an “old way”, basically ignoring the tags, the
common agreement of how the power of tags can be harnessed for        majority of researchers in this new area argued that tags are vital
recommendation. In this paper we argue for the use of spreading       for successful recommendation in this new domain and called for
activation approach for building tag-aware recommender systems        tag-aware recommenders. They argued that on one hand, tags can
and suggest a specific version of this approach adapted to the        compensate the loss of ratings (which are not available in most
multidimensional nature of social tagging networks. We introduce      social tagging systems), while on the other hand, tags can make
the asymmetric measure of relevancy (proximity) of two nodes on       recommendation more precise because they provide not only the
a multidimensional network as a cumulative strength of                information of what items are of interest to a user, but also why
(weighted) multiple connections between two nodes, which              they are of interest [8,14,20,26].
includes paths and graph-structures connecting the nodes. This
metric is also applicable to measure relevancy of two sub-graphs.     Despite the common agreement that tags should be used as a
Spreading activation methods (SAM), which usually employ              successful recommender component of a social tagging system,
breadth first search, are an efficient way to define and compute      there is no agreement on how it should be done. As a result, a
such measure taking into account not only links constituent a path,   multitude of approaches emerged just over the last three years.
but the properties of nodes in the path such as node’s types and      Roughly, these approaches can be classified as an extension of
outdegree.                                                            either content-based or collaborative filtering approaches. The
                                                                      former group emphasizes connections between items and tags
We apply this notion of relevancy to measure similarity of            treating tags as an alternative (or additional) way to describe items
collaborative tagging systems users and present the results of        and establish a profile of user interests [9, 15]. The latter group
numerical simulation showing that spreading activation methods        emphasizes connections between users and tags to establish a
allow us to discriminate between diverse graph-structures             better similarity between users in a social tagging system [25, 26].
connecting users via resources and tags. We show that the results
of simulation are stable w.r.t. the variation of parameters of        We argue than inherently networked nature of social tagging
spreading activation algorithm used in our experiment.                systems calls for some alternative recommender approaches,
                                                                      which are not just simple extension of either content-based or
Categories and Subject Descriptors                                    collaborative technologies. A successful recommender approach
H.3.4 [Information Storage and Retrieval]: Systems and                for this new context should fully employ the complex network
Software – information networks; H.3.5 [Information Storage           structure of a typical social tagging system and use all kinds of
and Retrieval]: Online Information Services – data sharing.           links: user-tag, item-tag, user-item. We think that the most
                                                                      promising in this context is the spreading activation approach.
General Terms                                                         This approach has been originally developed in the field of
Algorithms, Measurement, Performance, Experimentation.                cognitive psychology [3] to model human brain and later explored
                                                                      in the context of information retrieval [7].
Keywords                                                              The power of spreading activation approach was recognized in the
Tagging, relevancy propagation, spreading activation, graph-
                                                                      area of recommenders and other personalized systems as well;
based mining, structural cohesion, CiteULike.
                                                                      however, so far these approaches form just a small minority. The
1. INTRODUCTION                                                       problem is that the traditional user-item universe does not provide
                                                                      a sufficiently rich network for spreading activation technology.
Social tagging systems introduced new challenges to the well-         Thus most of known recommenders based on spreading activation
established area of recommender systems. While the majority of        were built for context where an additional network can be formed
content based, collaborative, and hybrid recommender approaches       such as a hypertext network for Web page recommendation [17]
or a network of entities and concepts in semantically enriched         result of direct transfer of information retrieval ideas from
recommenders [4, 12, 18].                                              cognitive sciences to AI. In other domain, [27] created spreading
                                                                       activation models for trust propagation on the Web.
We believe that social tagging systems will provide a new
promising context as well as new challenges for recommenders           In [21] and [23] authors work with the notion of the relevancy of
based on spreading activation. What we consider as the main            ontological concepts to a free text. They propagate relevancy of
challenge is the multidimensional nature of a typical social           the concepts explicitly mentioned in a document to other
tagging network. Almost all existing applications of spreading         ontological concepts using a spreading activation algorithm. Their
activation for personalization and recommendation operated in          algorithm works in such a way, that after short number of iteration
relatively homogeneous kinds of networks with 1-2 kinds of             the topical foci of a cohesive coherent text become the most
nodes and one kind of links. In contrast, even a simplified social     activated concepts (even if they were not explicitly mentioned in
tagging network, where each tagging event is represented by a          the text).
group of three links (user-tag, item-tag, and user-item) includes
three types of nodes and three types of asymmetric links. This         In [22] authors summarize their experience in creating graph-
organization requires some more sophisticated spreading                based related item recommender for activity centric environment
activation approaches.                                                 on a Nepomuk Social Semantic Desktop [24]: relevancy of a
                                                                       “pile” of nodes representing resources and concepts is propagated
Our paper attempts to address this challenge by introducing the        to other nodes. Authors in [22] conclude that as a graph-mining
asymmetric measure of relevancy (proximity) of two nodes on a          technique, spreading activation combines fuzzy clustering and soft
multidimensional network as a cumulative strength of (weighted)        inferencing, and therefore might be suitable for relevancy
multiple connections between two nodes which includes paths and        propagation. Propagation should lead to discovery of new nodes
graph-structures connecting the nodes. This metric is also             which have short length paths to many (if not all) nodes from the
applicable to measure relevancy of two sub-graphs. Spreading           initial set. In other words, newly discovered nodes should
activation methods, as breadth first search, is an efficient way to    minimize the “distance” to the initial set of nodes, i.e., nodes
define and compute such measure taking into account not only           which might be considered as potential centroids of strong
links constituent a path, but the properties of nodes in the path      clusters induced by the initial conditions. Since partitioning of the
such as node’s types and outdegree.                                    nodes according to these clusters is not needed, processing of
                                                                       polycentric queries [22] for related item recommendation could be
We apply this notion of relevancy to build a tag-aware approach        done using soft clustering methods. On the other hand, relevancy
to measure similarity between users in collaborative tagging           propagates through links. an alternative view on the related item
systems. The paper presents the results of a numerical simulation      recommendation is that newly discovered nodes must be
showing that spreading activation algorithms allow discriminating      connected to the initial conditions by particular types of directed
the degree of connectivity of users between certain graph-             links. Therefore, propagation of relevancy might be interpreted as
structures connecting users via resources and tags. We                 fuzzy inference.
demonstrate that the results of the simulation are stable w.r.t. the
variation of parameters of the spreading activation algorithm used     In [23], the authors go further in analyzing SAM as a very general
in our experiment.                                                     class of iterative algorithms for relevancy propagation, local
                                                                       search, relationship/association search, and computing of dynamic
The rest of the paper is organized as follows. In section 2 we first   local ranking. Authors indicate that the same iterative algorithms
provide a short overview of related work focusing on the use of        were used long before in numerical simulation in physics,
spreading activation methods (SAM) to propagating and                  mechanics, chemistry, and engineering sciences. Hence, the
redistributing relevancy. We also theorize about desired properties    algorithm is quite polymorphic: “Using the same iterative
of relevancy propagation on multidimensional network models of         algorithm, with one set of parameters one can emulate heat
Web. 2.0 data needed to create efficient and scalable                  transfer; with another set of parameters the same algorithm will
recommender systems.                                                   show us the behavior of oscillating strings”.
In section 3 we render a formal model of folksonomies (tripartite
hypergraph) as a multidimensional network with four types of           2.2 Spreading Activation in Recommender
nodes corresponding to users, resources, tags and instances of         Systems
tagging. In section 4 we present the results of numerical              Spreading activation approach as a technology for
simulation. Finally, section 5 describes the conclusions and future    recommendation in various kinds of networks belongs to a
work                                                                   broader group, which is typically referred to as graph-based
                                                                       approaches for recommendation. In addition to several recent
2. RELATED WORK                                                        papers mentioned in the introduction, which explicitly use
2.1 Overview of Relevancy Propagation Using                            spreading activation to build recommender systems, we can a few
Spreading Activation Methods                                           other examples of using various graph-based approaches. In [1],
In neurophysiology interactions between neurons are modeled by         the authors presented a theoretic approach where users are
way of activation which propagates from one neuron to another          modeled as nodes in a directed graph and the directed links
via connections called synapses to transmit information using          represent how representative is a user of another user's behavior.
chemical signals. The first spreading activation models were used      In [11], the authors use spreading activation to deal with the
in cognitive psychology to model these processes of memory             sparsity problem in collaborative filtering. They try to tackle the
retrieval [5, 3]. This framework was later exploited in Artificial     problem finding transitive relationships by comparing three
Intelligence as a processing framework for semantic networks and       different methods on a bipartite graph which represented
ontologies, and applied to Information Retrieval [2, 7, 19] as the     consumer-product interactions. Other interesting approach was the
one presented in [10], where the authors propose a constrained         but is probably much less important and is too coarse-grained
spreading activation algorithm having good results compared with       measurement compared to trust propagation.
a traditional memory-based approach over a small subset of the
Movie Lens data set. These approaches show the potential of            A final observation on relevancy propagation on multidimensional
spreading activation to be used on recommender systems, but they       networks: we don’t assume that all (or many) aspects of such
don't take into account the nature of multidimensional networks,       propagation can be properly understood in terms of paths. We
such as folksonomies derived from collaborative tagging systems,       assume that there might be structures (like network B on the Fig.
where different types of nodes, links and relationships can have a     1), which might significantly affect the relevancy propagation.
strong influence in the design of the algorithms.
                                                                       3. THE ALGORITHM
2.3 Propagating Relevancy on                                           The algorithm we used in our experiment in general follows [23]
                                                                       and employs iterative steps where activation is propagated
Multidimensional Web 2.0 Networks                                      between neighbor nodes. To facilitate comparison of activation
We focus on the applications of SAM to measure similarity              distributions on the same or different networks and to account for
between the users of collaborative tagging systems modeled as          dissipation of activation caused by list purging step in spreading
multidimensional networks. Indeed, we treat graph-based                activation, we introduce the step of normalization (calibration).
“similarity” of users as a particular case of “relevancy” of nodes
on multidimensional networks. In this subsection we provide            A multidimensional network can be modeled as a directed graph,
consideration on which properties of a generic class of spreading      which is a pair G = (V,E) where
activation algorithms are suitable methods for modeling relevancy      V – is the set of vertices vi
propagation.
                                                                       E – is the set of arcs ej
The general inspiration behind using graph-based methods to            init: E → V, is the mapping that provides initial nodes for arcs
model relevancy (energy, trust, risk, etc.) propagation on networks
is probably the same in many domains: the relevancy is treated as      term: E → V, is the mapping that provides terminal nodes for arcs
a kind of energy which might be “injected” into some nodes, and        imp – is importance value of arcs and nodes.
propagated through links to other nodes: “… the closer node x to       w – “weights”
the injection source s, and the more paths leading from s to x, the
higher the amount of energy flowing into x in general” [27].
Therefore, spreading activation methods (SAM), which usually           F(E) – is the “activation” real valued function
employ breadth-first search), are an efficient way to propagate        The algorithm has the following steps
relevancy. Since according [23] SAM is a broad class of
algorithms, the choice of algorithm’s parameters is crucial and can    Initialization
be done taking into account the nature of the target application.
                                                                            Sets the parameters of the algorithm, network, and initial
First of all, Web 2.0 data could be accurately modeled only by              F(E) as a list of non-zero valued nodes V n
multidimensional networks. For instance, formal model of a
folksonomy as tripartite hypergraph [13] converted to network          Iterations
representation, has four types of nodes: users, resources, tags,              a.        List Expansion.
instances of tagging. The shortest possible path between two                  b.        Recomputation: The value at each node in the list is
folksonomy users has the length four (for instance, user1- instance
of tagging1- tag - instance of tagging2 - user2). As compared to                        recomputed based on the values of the function on
trust propagation in heterogeneous networks, the amount of                              nodes which have links to the given node and types
relevancy flowing from one node to another should depend not
                                                                                        of connections.
only on types of links, but on properties on nodes in paths.
Connections via resources might be more important than                        c.        List Purging: We exclude the nodes with the values
connections through tags. In our future work we are going to                            less than a threshold.
exploit what [23] calls “the importance of nodes”, but one
                                                                              d.        Conditions Check To Break Iterations.
property of nodes which should significantly affect the
propagation, can be immediately inferred from the local topology       Normalization
of the network, namely from the number of outcoming links from                Linear scaling up or down the numerical values of the
a node. Ambiguous and top popular tags might be linked to big
number of tag instances and big number of users. Intuitively,                 activation level of all nodes in the list of activated nodes to
connections via such tags should provide less (if any) contribution           satisfy some conditions of activation conservation
to the similarity of users as compared to the connections through      Output
less popular tags.
                                                                              The list of nodes (value of the function after spread of
In [27], the authors assume that nodes with the higher shortest               activation) ranked according F values.
path distance from the injection source should be accorded less
trust in general. This property of trust propagation is probably not   Recomputation step is as follows:
applicable to propagating relevancy to measure similarity of
folksonomies users. Moreover, we suggest that for many                     We have the list of nodes Vn.
applications on multidimensional networks the length of the
shortest path might have positive correlation with the relevancy,          Input/Output Through Links Computation.
     –    For each node v we compute the input signal to each arc
          e, such that init(e)=v. This computation can be based on
          the value F(v), the outdegree of a node etc. For instance,
          if the node v has n outgoing arcs of the same type, each
          arc e might get input signal:
                I (e) = F(init(e)) ∙ (1 / outdegree(v) ^beta )
          where beta might be equal to 1. It could be also less
          than one, in which case the node v will propagate more
          activation to its neighbors than it has. (This might be
          fine for some applications).
     –    When the signal (“activation”) passes through a link e,
          the activation usually experiences decay by a factor
          w(e):
                        O (e) = I(e) ∙ w(e)
    Input/Output Of Node Activation
     –    Before the pulse, the node v has the activation level
          F(v).
     –    Through incoming links v get more activation:
                        Input(v) = Σ O(e)
          for all links e such that init(e) ∈Vn, term(e) = v.
     –         By dissipating the activation through outgoing
          links, the node v might lose activation:
                        Output(v) = Σ I(e)
          for all links e such that init(e) = v, term(e) ∈Vn
    Computation Of New Level Of Activation
                    Fnew(v) = F(v) + Input (v)
To apply spreading activation to measure “similarity” of two                 Figure 1. Three networks modeling instantiations of
nodes on a network, we put the initial activation 1.0 at the first                      collaborative tagging systems.
node, and measure the activation at the second node after certain
number of iterations.                                                  In [23], the authors view SAM in terms of graph-mining
                                                                       algorithms as a technique for soft clustering. The major
4. EXPERIMENTS                                                         parameters of SAM affecting “the scale” of the phenomena to be
To apply graph-based mining on web 2.0 data we model the data          discovered are signal decay and number of iterations (larger
by a multidimensional network (where nodes and links are typed,        number of iterations and low decay are needed to discover
and links are “weighted”).                                             “bigger” clusters). Since Web 2.0 applications are at the focus of
In our experiments we use three networks representing                  this paper, we run the experiments varying these two parameters.
instantiations of collaborative tagging systems. Each of these         Our target was to find regions of the parameters which allow us
networks has two actors (A1 and A2), two resources (R1 and R2),        consistently to capture structures like that on the Fig.1.
and four instances of tagging (I1, I2, I3 and I4). For instance, the   In this paper, we use SAM as a link analysis algorithm for local
network A on the figure 1 has the instance of tagging I1 with          ranking, in the same way as PageRank algorithm is used for
links to the actor A1, the resource R1, and the tag T; this sub-       global ranking [28]. The major difference between them is that
network shows that the actor A1 used the tag T for the resource        PageRank iteratively redistributes the relevancy measure which is
R1. Correspondingly, the links from the instance l2 show that the      initially set to each node of the network, while we use SAM to
actor A1 used the tag T for the resource R2. The instances I3 and      iteratively redistribute the relevancy measure (the activation) from
I4 show tagging for the user A2. The network A represents the          one (or more) nodes sometimes referred to as “seeds”.
situation where both actors used the same tag for both resources.
                                                                       Diameter of graphs B, and C is 6, with the number of iterations
In the implementation of our algorithm, each of these networks is      less than 6 the activation from a node on a network will not
modeled by a directed graph, where for each link we create two         necessarily reach all the nodes. The limit distribution (distribution
reciprocal arcs. In each experiment we set initial activation at the   of the activation after a number of iterations big enough),
node corresponding to the actor A1 and after several iterations of     produced by SAM, in general does not depend on the choice of
the algorithm we compute the “similarity” of actors A1 and A2          the initial seed. This behavior gives us the estimate that local
using the method described in 3.                                       ranking, which is highly sensitive to sub-graphs with the diameter
6, could be achieved when the activation will be redistributed on       5. CONCLUSIONS AND FUTURE WORK
such sub-graphs several times which amounts roughly to 12-48            Our paper argued for the use of spreading activation as a
iterations.                                                             recommendation mechanism in multidimensional networks
Our underlying common-sense assumption is that connectivity of          produced by collaborative tagging systems. We introduced the
A1 and A2 is bigger in the network A than in B and C; and that          new network-based asymmetric measure of relevancy of two
the connectivity of A1 and A2 in the network B is bigger than in        nodes on a multidimensional network and applied it to build a tag-
the network C. In other words, if we denote the final activation of     aware approach to measure similarity between users in
the node v in the network configuration X as x(v), we would             collaborative tagging systems. While it is just one of several
expect that sensible local ranking results should satisfy inequality:   possible ways to use spreading activation in collaborative tagging
                                                                        context, we consider it as the best way to start. As demonstrated
                                                                  (1)   by the stream of recent works, calculating similarity between
The shortest path between the nodes A1 and A2 equals to 4 in the        users is a component of the recommendation process where the
network A, and to 6 in networks B and C. So the first part of the       use of tags can provide a most valuable impact [25, 26].
inequality is easily achieved with any parameters of the algorithm      The results of our experiments show that our metrics can be used
(provided that the number of iterations is not less than 3). To         to differentiate activation levels on different network
investigate how the algorithm can discriminate between                  configurations and they also show a stable behavior when input
configurations B and C we introduce the network discrimination          parameters are changed. These results lead us to pass to the next
factor as                                                               step on our research on this bottom-up approach, which is to
                                                                        prove that our results are repeatable in large scale networks. We
                                                            (2)
                                                                        are currently running our experiments on real social network data
                                                                        that we have collected from the social bookmarking service
We computed the NDF ranging the number of iterations from 1 to
                                                                        CiteUlike.
50, and the decay factor from 0 to 1. Figure 2 shows the results,
where the X axis represents number of iterations, the Y axis the        In this paper we presented applications of spreading activation
decay factor, and the Z axis the network discrimination factor.         methods to local ranking on small networks. We didn’t prove yet
                                                                        that the same “good” properties hold true when the algorithm runs
                                                                        on massive networks. However, multidimensional networks which
                                                                        model web 2.0 data and processes usually exhibit small world
                                                                        phenomena properties, which include small average distance and
                                                                        clustering effect. According to [23] spreading activation might be
                                                                        considered as a method for soft clustering. Intuitive justification
                                                                        of the use of spreading activation for ranking is the same as for
                                                                        the PageRank algorithm [28]: a node can have a high rank if there
                                                                        are many nodes that point to it, or if there are some nodes that
                                                                        point to it and have a high rank. On each iteration strongly
                                                                        activated nodes continue to support the high level of activation of
                                                                        nodes to which they have outcoming links, while nodes which
                                                                        have little connection with strongly activated nodes eventually
                                                                        lose their activation. Therefore, even if constrained spread of
                                                                        activation from one node might in several iterations reach
                                                                        significant portion of the network (small average distance), strong
                                                                        level of activation will be supported mainly in strong clusters
                                                                        induced by the node.
   Figure 2. Results of the NDF experiment. Axis X shows
     iterations, axis Y decay values, and axis Z the NDF.               6. ACKNOWLEDGMENTS
                                                                        This material is based upon work supported by the National
The results in figure 2 show that we maximize the NDF when              Science Foundation under Grant No. 0840597. We also want to
running our spreading activation algorithm with a decay factor          thank Dr. Vincent Wade from the CNGL of the Trinity College
between 0.8 and 0.9, and 24 iterations. Additionally, the plot          Dublin for his support to work on this collaborative research.
shows stable results for our algorithm, which suggests that
selecting values in close ranges will not return unexpected or          Dr. Alexander Troussov's work was done in collaboration with
random activation values.                                               CNGL, which is funded under Science Foundation Ireland's CSET
                                                                        programme: Grant# 07/CE2/I1142.
We have shown that on small networks SAM might be used to
measure similarity between users. It is part of our future plans to     7. REFERENCES
show that on big multidimensional networks representing Web 2.0
                                                                        [1] Aggarwal, C. C., Wolf, J. L., Wu, K., and Yu, P. S. 1999.
data activation initiated at one of the nodes could be kept flowing
                                                                            Horting hatches an egg: a new graph-theoretic approach to
within strong clusters induced by the initial set of activated nodes
                                                                            collaborative filtering. In Proceedings of the Fifth ACM
(because of high degree of clustering); and therefore the results
                                                                            SIGKDD international Conference on Knowledge Discovery
could be generalized to real-world data.
                                                                            and Data Mining (San Diego, California, United States,
                                                                            August 15 - 18, 1999). KDD '99. ACM, New York, NY, 201-
                                                                            212. DOI= http://doi.acm.org/10.1145/312129.312230
[2] Aleman-Meza, B., Halaschek, C., Arpinar, I., & Sheth, A.              Proceedings of the 13th international conference on WWW,
    (2003). Context-Aware Semantic Association Ranking.                   May 17-20, 2004, New York, NY, USA, 374-383.
    Proceedings of SWDB'03, Berlin, Germany, 33-50.                  [17] Olston, C. and E. H. Chi 2003. "ScentTrails: Integrating
[3] Anderson, J., 1983. A Spreading Activation Theory of                  browsing and searching on the Web." ACM Transactions on
    Memory. Journal of Verbal learning and Verbal Behavior                Computer-Human Interaction 10(3): 177-197.
    1983, (22), 261-295.                                             [18] Sarini, M. and C. Strapparava 1998. Building a User Model
[4] Bier, E. A., S. K. Card, et al. 2008. Entity-Based                    for a Museum Exploration and Information-Providing
    Collaboration Tools for Intelligence Analysis. IEEE                   Adaptive System. Second Adaptive Hypertext and
    Symposium on Visual Analytics Science and Technology,                 Hypermedia Workshop at the Ninth ACM International
    VAST 2008, Columbus, Ohio, IEEE.                                      Hypertext Conference Hypertext'98, Pittsburgh, PA.
[5] Collins, A.M. & Loftus, E.F. 1975. A spreading-activation        [19] Schumacher, K., Sintek, M., Leo Sauermann 2008
    theory of semantic processing. Psychological Review. 1975             Combining Fact and Document Retrieval with Spreading
    Nov Vol 82(6), 407-428.                                               Activation for Semantic Desktop Search. The Semantic Web:
[6] Contractor, N. 2007. From Disasters to WoW: Using a Multi-            Research and Applications, 5th European Semantic Web
    theoretical, Multilevel Network Framework to Understand               Conference, ESWC 2008, Tenerife, Spain, June 1-5, 2008
    and Enable Communities. Retrieved March 8, 2009, from                 LNCS, Springer Verlag, Volume 5021/2008, 569-583
    http://www.friemel.com/asna/keynotes.php                         [20] Shepitsen, A., J. Gemmell, et al. 2008. Personalized
[7] Crestani, F. 1997. Application of Spreading Activation                recommendation in social tagging systems using hierarchical
    Techniques in Information Retrieval. Artificial Intelligence          clustering. the 2008 ACM conference on Recommender
    Review, 11(6), 453-482.                                               systems, RecSys '08 Lausanne, Switzerland, ACM.

[8] Dattolo, A., F. Ferrara, et al. 2009. Supporting Personalized    [21] Troussov, A., Judge, J., & Sogrin, M. 2007, December 13).
    User Concept Spaces and Recommendations for a                         IBM LanguageWare Miner for Multidimensional Socio-
    Publication Sharing System. 17th International Conference             Semantic Networks. Retrieved March 8, 2009, from
    on User Modeling, Adaptation, and Personalization (UMAP               http://www.alphaworks.ibm.com/tech/galaxy
    2009), Trento, Italy, Springer.                                  [22] Troussov, A., Judge, J., Sogrin, M., Bogdan, C., Edlund, H.,
[9] de Gemmis, M., P. Lops, et al. 2008. Integrating tags in a            & Sundblad, Y. 2008b. Navigating Networked Data using
    semantic content-based recommender. the 2008 ACM                      Polycentric Fuzzy Queries and the Pile UI Metaphor
    conference on Recommender systems, RecSys '08 Lausanne,               Navigation. Proceedings of the International SoNet
    Switzerland, ACM.                                                     Workshop, 5-12.

[10] Griffith, J., O'riordan, C., and Sorensen, H. 2006. A           [23] Troussov, A., Levner, E., Bogdan, C., Judge, J., Botvich, D.
     constrained spreading activation approach to collaborative           "Spread of Activation Methods", in Dynamic and Advanced
     filtering. pp. 766-773.                                              Data Mining for Progressing Technological Development, Y.
                                                                          Xiang and S. Ali (eds) IGI (to appear 2009).
[11] Huang, Z., Chen, H., and Zeng, D. 2004. Applying
     associative retrieval techniques to alleviate the sparsity      [24] Sauermann, L., Kiesel, M., Schumacher, K., & Bernardi, A.
     problem in collaborative filtering. ACM Trans. Inf. Syst. 22,        2009. Semantic Desktop. Social Semantic Web 2009: 337-
     1 (Jan. 2004), 116-142.                                              362

[12] Hussein, T. and J. Ziegler 2008. Adapting web sites by          [25] Tso-Sutter, K., L. Marinho, et al. 2008. Tag-aware
     spreading activation in ontologies. ReColl '08: Int. Workshop        recommender systems by fusion of collaborative filtering
     on Recommendation and Collaboration (in conjunction with             algorithms. the 2008 ACM symposium on Applied
     IUI 2008).                                                           computing, SAC '08, Fortaleza, Ceara, Brazil, ACM.

[13] Mika, P 2007. Ontologies are us: A unified model of social      [26] Zhao, S., N. Du, et al. 2008). Improved recommendation
     networks and semantics. J. Web Sem. 5(1): 5-1                        based on collaborative tagging behaviors. the 13th
                                                                          international conference on Intelligent user interfaces, IUI
[14] Nauerz, A., S. Pietschmann, et al. 2008. Using Collective            '08, Gran Canaria, Spain, ACM.
     Intelligence for Adaptive Navigation in Web Portals. 3rd
     International Workshop on Adaptation and Evolution in Web       [27] Ziegler, C.-N. and G. Lausen, 2004. Spreading activation
     Systems Engineering at 8th International Conference on Web           models for trust propagation. IEEE International Conference
     Engineering 2008, Yorktown Heights, New York, USA.                   on e-Technology, e-Commerce, and e-Service, IEEE
                                                                          Computer Society Press.
[15] Niwa, S., T. Doi, et al. 2006. Web Page Recommender
     System based on Folksonomy Mining for ITNG'06                   [28] Brin, S. and Page, L., 1998. The Anatomy of a Large-Scale
     Submissions. Third International Conference on Information           Hypertextual Web Search Engine. In: Seventh International
     Technology: New Generations, ITNG 2006.                              World-Wide Web Conference (WWW 1998), April 14-18,
                                                                          1998, Brisbane, Australia.
[16] Rocha, C, Schwabe, D., & Poggi de Aragao, M. 2004. A
     Hybrid Approach for Searching in the Semantic Web.