Mining Web Graphs

download Mining Web Graphs

of 14

Transcript of Mining Web Graphs

  • 8/18/2019 Mining Web Graphs

    1/14

    Mining Web Graphs for RecommendationsHao Ma, Irwin King,   Senior Member ,   IEEE , and Michael Rung-Tsong Lyu,  Fellow ,   IEEE 

    Abstract—As the exponential explosion of various contents generated on the Web,  Recommendation  techniques have become

    increasingly indispensable. Innumerable different kinds of recommendations are made on the Web every day, including movies, music,

    images, books recommendations, query suggestions, tags recommendations, etc. No matter what types of data sources are used for

    the recommendations, essentially these data sources can be modeled in the form of various types of graphs. In this paper, aiming at

    providing a general framework on mining Web graphs for recommendations, 1) we first propose a novel diffusion method which

    propagates similarities between different nodes and generates recommendations; 2) then we illustrate how to generalize different

    recommendation problems into our graph diffusion framework. The proposed framework can be utilized in many recommendation

    tasks on the World Wide Web, including query suggestions, tag recommendations, expert finding, image recommendations, image

    annotations, etc. The experimental analysis on large data sets shows the promising future of our work.

    Index Terms—Recommendation, diffusion, query suggestion, image recommendation.

    Ç

    1 INTRODUCTION

    WITH   the diverse and explosive growth of Webinformation, how to organize and utilize the informa-tion effectively and efficiently has become more and morecritical. This is especially important for Web 2.0 relatedapplications since user-generated information is morefreestyle and less structured, which increases the difficultiesin mining useful information from these data sources. Inorder to satisfy the information needs of Web users andimprove the user experience in many Web applications,Recommender Systems, have been well studied in academiaand widely deployed in industry.

    Typically, recommender systems are based on Collabora-tive Filtering   [14], [22], [25], [41], [46], [49], which is atechnique that automatically predicts the interest of anactive user by collecting rating information from othersimilar users or items. The underlying assumption of collaborative filtering is that the active user will preferthose items which other similar users prefer [38]. Based onthis simple but effective intuition, collaborative filtering has been widely employed in some large, well-known com-mercial systems, including product recommendation atAmazon,1 movie recommendation at Netflix,2 etc. Typicalcollaborative filtering algorithms require a user-item ratingmatrix which contains user-specific rating preferences to

    infer users’ characteristics. However, in most of the cases,rating data are always unavailable since information on theWeb is less structured and more diverse.

    Fortunately, on the Web, no matter what types of datasources are used for recommendations, in most cases, thesedata sources can be modeled in the form of various types of graphs. If we can design a general graph recommendationalgorithm, we can solve many recommendation problemson the Web. However, when designing such a frameworkfor recommendations on the Web, we still face severalchallenges that need to be addressed.

    The first challenge is that it is not easy to recommendlatent semantically relevant results to users. Take   QuerySuggestion   as an example, there are several outstandingissues that can potentially degrade the quality of therecommendations, which merit investigation. The first oneis the ambiguity which commonly exists in the naturallanguage. Queries containing ambiguous terms may con-fuse the algorithms which do not satisfy the informationneeds of users. Another consideration, as reported in [26]and [53], is that users tend to submit short queriesconsisting of only one or two terms under most circum-stances, and short queries are more likely to be ambiguous.Through the analysis of a commercial search engine’s querylogs recorded over three months in 2006, we observe that19.4 percent of Web queries are single term queries, andfurther 30.5 percent of Web queries contain only two terms.

    Third, in most cases, the reason why users perform a searchis because they have little or even no knowledge about thetopic they are searching for. In order to find satisfactoryanswers, users have to rephrase their queries constantly.

    The second challenge is how to take into account thepersonalization feature. Personalization is desirable formany scenarios where different users have differentinformation needs. As an example, Amazon.com has beenthe early adopter of personalization technology to recom-mend products to shoppers on its site, based upon theirprevious purchases. Amazon makes an extensive use of collaborative filtering in its personalization technology. The

    adoption of personalization will not only filter outirrelevant information to a person, but also provide morespecific information that is increasingly relevant to aperson’s interests.

    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 6, JUNE 2012 1051

    .   H. Ma is with The Chinese University of Hong Kong, Room 101, HSH Engineering Building, Shatin, N.T., Hong Kong.E-mail: [email protected].

    .   I. King and M.R. Lyu are with the Department of Computer Science andEngineering, The Chinese University of Hong Kong, Shatin, N.T., HongKong. E-mail: {king, lyu}@cse.cuhk.edu.hk.

     Manuscript received 15 Apr. 2009; revised 6 Apr. 2010; accepted 6 Aug. 2010; published online 23 Dec. 2010.For information on obtaining reprints of this article, please send e-mail to:[email protected], and reference IEEECS Log Number TKDE-2009-04-0350.Digital Object Identifier no. 10.1109/TKDE.2011.18.

    1. http://www.amazon.com.2. http://www.netflix.com.

    1041-4347/12/$31.00    2012 IEEE Published by the IEEE Computer Society

  • 8/18/2019 Mining Web Graphs

    2/14

    The last challenge is that it is time consuming andinefficient to design different recommendation algorithmsfor different recommendation tasks. Actually, most of theserecommendation problems have some common features,where a general framework is needed to unify therecommendation tasks on the Web. Moreover, most of existing methods are complicated and require to tune alarge number of parameters.

    In this paper, aiming at solving the problems analyzedabove, we propose a general framework for the recommen-dations on the Web. This framework is built upon the heatdiffusion on both undirected graphs and directed graphs,and has several advantages.

    1.   It is a general method, which can be utilized to manyrecommendation tasks on the Web.

    2.   It can provide latent semantically relevant results tothe original information need.

    3.   This model provides a natural treatment for perso-nalized recommendations.

    4.   The designed recommendation algorithm is scalableto very large data sets.

    The empirical analysis on several large scale data sets (AOLclickthrough data and Flickr image tags data) shows thatour proposed framework is effective and efficient forgenerating high-quality recommendations.

    The rest of the paper is organized as follows. We reviewrelated work in Section 2. Section 3 presents the diffusionmodels on both undirected graphs and directed graphs. InSection 4, we demonstrate the empirical analysis of ourmodels and recommendation algorithms on several diver-sified data sources. Finally, conclusion is given in Section 5.

    2 RELATED WORK

    Recommendation on the Web is a general term representinga specific type of information filtering technique thatattempts to present information items (queries, movies,images, books, Web pages, etc.) that are likely of interest tothe users. In this section, we review several work related torecommendation, including collaborative filtering, querysuggestion techniques, image recommendation methods,and clickthrough data analysis.

    2.1 Collaborative Filtering

    Two types of collaborative filtering approaches are widelystudied: neighborhood-based and model-based.

    The neighborhood-based approaches are the mostpopular prediction methods and are widely adopted incommercial collaborative filtering systems [37], [47]. Themost analyzed examples of neighborhood-based collabora-tive filtering include user-based approaches [7], [21] anditem-based approaches [15], [37], [50]. User-based ap-proaches predict the ratings of active users based on theratings of their similar users, and item-based approachespredict the ratings of active users based on the computedinformation of items similar to those chosen by the active

    user. User-based and item-based approaches often use thePearson Correlation Coefficient algorithm (PCC) [47] andthe Vector Space Similarity algorithm (VSS) [7] as thesimilarity computation methods. PCC-based collaborative

    filtering generally can achieve higher performance than theother popular algorithm VSS, since it considers thedifferences of user rating style.

    In the model-based approaches, training data sets areused to train a predefined model. Examples of model-basedapproaches include the clustering model [33], the aspectmodels [23], [24], [52] and the latent factor model [9]. Kohrsand Merialdo [33] presented an algorithm for collaborativefiltering based on hierarchical clustering, which tried to balance robustness and accuracy of predictions, especiallywhen few data were available. Hofmann [23] proposed analgorithm based on a generalization of probabilistic latentsemantic analysis to continuous-valued response variables.Recently, several matrix factorization methods [39], [40],[46], [48], [49], [54] have been proposed for collaborativefiltering. These methods all focus on fitting the user-itemrating matrix using low-rank approximations, and use it tomake further predictions. The premise behind a low-dimensional factor model is that there is only a smallnumber of factors influencing preferences, and that a user’s

    preference vector is determined by how each factor appliesto that user.

    Although collaborative filtering methods have beenextensively studied recently, most of these methods requirethe user-item rating matrix. However, on the Web, in mostof the cases, rating data are always unavailable sinceinformation on the Web is less structured and more diverse.Hence, collaborative filtering algorithms cannot be directlyapplied to most of the recommendation tasks on the Web,like query suggestion and image recommendation.

    2.2 Query Suggestion

    In order to recommend relevant queries to Web users, avaluable technique, query suggestion, has been employed by some prominent commercial search engines, such asYahoo!,3 Live Search,4  Ask,5 and   Google.6 However, due tocommercial reasons, a few public papers have been releasedto reveal the methods they adopt.

    The goal of query suggestion is similar to that of queryexpansion [11], [13], [56], [61], query substitution [31], andquery refinement [35], [57], which all focus on under-standing users’ search intentions and improving the queriessubmitted by users. Query suggestion is closely related toquery expansion or query substitution, which extends theoriginal query with new search terms to narrow down the

    scope of the search. But different from query expansion,query suggestion aims to suggest full queries that have beenformulated by previous users so that query integrity andcoherence are preserved in the suggested queries [18].Query refinement is another closely related notion, since theobjective of query refinement is interactively recommend-ing new queries related to a particular query.

    In [61], local (i.e., query-dependent documents) andglobal (i.e., the whole corpus) documents are employed inquery expansion by applying the measure of global analysisto the selection of query terms in local feedback. Althoughexperimental results show that this method is generally

    1052 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 6, JUNE 2012

    3. http://www.yahoo.com.4. http://www.live.com.5. http://www.ask.com.6. http://www.google.com.

  • 8/18/2019 Mining Web Graphs

    3/14

    more effective than global analysis, it performs worse thanthe query expansion method proposed in [13] based on userinteractions recorded in user logs. In another approachreported in [35], anchor texts are employed for the purposeof query refinement. This work is based on the observationthat Web queries and anchor texts are highly similar. Thesemethods employ different kinds of data sources (docu-ments, anchor texts, query logs, etc.) for suggesting queries.Since most of these methods are only designed for querysuggestions, the extensibility of these methods are verylimited. In [4] and [16], two query recommendationmethods based on clickthrough data are proposed. Themain disadvantage of these two algorithms is that theyignore the rich information embedded in the query-click bipartite graph,7 and consider only queries that appear inthe query logs, potentially losing the opportunity torecommend highly semantically related queries to users.Cao et al. [10] developed a context-aware query suggestionmethod by mining clickthrough and session data. This workfirst extracts some concepts from the clickthrough data by

     building clusters. Then, these concepts as well as the querysessions are employed to build a concept sequence suffixtree for query suggestion. Recently, Mei et al. proposed ageneral query suggestion method using hitting time on thequery-click bipartite graph in [42]. This method cangenerate semantically relevant queries to users’ informationneeds. The main advantage of this work is that it cansuggest some long tail queries (infrequent queries) to users.However, this is also the disadvantage of this approachsince sometimes it may accidentally rank the infrequentqueries highly in the results while potentially downgradesthe ranks of the most related queries.

    Actually, as reported in [42], several different rankingmethods using random walks can also be employed into thequery suggestion tasks on a query-URL bipartite graph,including PageRank [8], HITS [32], etc. PageRank is basically computing the stationary distribution of asmoothed Markov chain. Personalized PageRank gener-alizes PageRank by smoothing the Markov chain with aquery-specific jumping probability vector instead of auniform vector, thus, is often used for query-dependentranking [19], [20], [28]. HITS is an alternative query-dependent ranking algorithm which computes hub andauthority scores in an iterative way. In [12], the querysuggestion and the document retrieval problem are inter-preted using the Markov random walks, in which thequeries or documents with the largest probabilities after  t-step random walks are recommended to the users.

    2.3 Clickthrough Data Analysis

    In the field of clickthrough data analysis, the most commonusage is for optimizing Web search results or rankings [1],[29], [30], [55], [59]. In [59], Web search logs are utilized toeffectively organize the clusters of search results by1) learning “interesting aspects” of a topic and 2) generatingmore meaningful cluster labels. In [30], a ranking function islearned from the implicit feedback extracted from searchengine clickthrough data to provide personalized searchresults for users. Besides ranking, clickthrough data is also

    well studied in the query clustering problem [5], [60]. Queryclustering is a process used to discover frequently askedquestions or most popular topics on a search engine. Thisprocess is crucial for search engines based on question-answering [60]. Recently, clickthrough data has beenanalyzed and applied to several interesting research topics,such as Web query hierarchy building [51] and extraction of class attributes [44]. In [51], the proposed method consists of 

    two stages: generating candidate queries and determining“generalization/specialization” relations between thesequeries in a hierarchy. A typical relationship can belearning from clickthrough data is that “bmw” is a childof “car.” The method proposed in [44] can extract attributessuch as “capital city” and “President” for the class“Country,” or “cost,” “manufacturer” and “side effects”for the class “Drug.” The method initially relies on a smallset of linguistically motivated extraction patterns applied toeach entry from the query logs, then employs a series of Web-based precision-enhancement filters to refine and rankthe candidate attributes.

    2.4 Image RecommendationBesides query suggestion, another interesting recommenda-tion application on the Web is image recommendation.Image recommendation systems, like Photoree,8 focus onrecommending interesting images to Web users based onusers’ preference. Normally, these systems first ask users torate some images as they like or dislike, and thenrecommend images to the users based on the tastes of theusers. In the academia, a few tasks are proposed to solve theimage recommendation problems since this is a relativelynew field and analyzing the image contents is a challenge job. Recently, in [63], by employing the Flickr data set, Yang

    et al. proposed a context-based image search and recom-mendation method to improve the image search quality andrecommend related images and tags. However, since it is acontext-based method, the computational complexity isvery high and it cannot scale to large data sets. While in ourframework proposed in this paper, by diffusing on theimage-tag bipartite graph with one or more images, we canaccurately and efficiently suggest semantically relevantnonpersonalized or personalized images to the users.

    In general, comparing with previous work, our work isa general framework which can be effectively, efficiently,and naturally applied to most of the recommendation tasks

    on the Web.

    3 DIFFUSION ON  GRAPHS

    In this section, we first introduce a novel graph diffusionmodel based on heat diffusion. This model can be appliedto both undirected graphs and directed graphs. We thenpresent how to infer the parameter based on the graphstructure. Last, we analyze the computational complexity of our model.

    3.1 Heat Diffusion

    Heat diffusion is a physical phenomenon. In a medium,

    heat always flows from a position with high temperatureto a position with low temperature. Recently, heat

    MA ET AL.: MINING WEB GRAPHS FOR RECOMMENDATIONS 1053

    7. The query-click graph is a bipartite graph with queries on one side andclicked documents on the other. 8. http://www.photoree.com.

  • 8/18/2019 Mining Web Graphs

    4/14

    diffusion-based approaches have been successfully ap-plied in various domains such as classification anddimensionality reduction problems [6], [34], [36]. Laffertyand Lebanon [36] approximated the heat kernel for amultinomial family in a closed form, from which greatimprovements were obtained over the use of Gaussian orlinear kernels. In [34], Kondor and Lafferty proposed theuse of a discrete diffusion kernel for categorical data, and

    showed that the simple diffusion kernel on the hypercubecan result in good performance for such data. Belkin andNiyogi employed a heat kernel to construct the weight of a neighborhood graph, and apply it to a nonlineardimensionality reduction algorithm in [6]. In [62], Yanget al. proposed a ranking algorithm known as theDiffusionRank using heat diffusion process; simulationsshowed that it is very robust to Web spamming.

    In this paper, we use heat diffusion to model thesimilarity information propagation on Web graphs. InPhysics, the heat diffusion is always performed on ageometric manifold with initial conditions. However, it is

    very difficult to represent the Web as a regular geometrywith a known dimension. This motivates us to investigatethe heat flow on a graph. The graph is considered as anapproximation to the underlying manifold, and so the heatflow on the graph is considered as an approximation to theheat flow on the manifold.

    3.2 Diffusion on Undirected Graphs

    Consider an undirected graph   G ¼ ðV ; E Þ, where   V   is thevertex set, and V   ¼ fv1; v2; . . . ; vng. E  ¼ fðvi; v jÞ j there is anedge between vi  to v jg is the set of all edges. The edge  ðvi; v jÞis considered as a pipe that connects nodes  vi   and  v j. Thevalue f iðtÞ describes the heat at node  vi  at time t, beginning

    from an initial distribution of heat given by   f ið0Þ   at timezero.  f ðtÞ denotes the vector consisting of  f iðtÞ.

    We construct our model as follows: suppose, at time   t,each node i receives an amount M ði;j;t; tÞ of heat from itsneighbor  j  during a time period   t. The heat  M ði;j;t; tÞshould be proportional to the time period  t  and the heatdifference f  jðtÞ f iðtÞ. Moreover, the heat flows from node j   to node   i   through the pipe that connects nodes   i  and  j.Based on this consideration, we assume that  M ði;j;t; tÞ ¼ðf  jðtÞ f iðtÞÞt, where   is the thermal conductivity—theheat diffusion coefficient. As a result, the heat difference atnode i  between time t  þ t  and time  t  will be equal to the

    sum of the heat that it receives from all its neighbors. This isformulated as

    f iðt þ tÞ f iðtÞ

    t  ¼ 

    X j:ðv j;viÞ2E 

    ðf  jðtÞ f iðtÞÞ;   ð1Þ

    where E  is the set of edges. To find a closed form solution to(1), we express it in a matrix form

    f ðt þ tÞ f ðtÞ

    t  ¼ ðH DÞf ðtÞ;   ð2Þ

    where

    H ij  ¼1;   ðvi; v jÞ 2 E  or  ðv j; viÞ 2  E;0; i ¼  j;0;   otherwise;

    8<: ð3Þ

    and

    Dij  ¼  d ðviÞ; i ¼  j;

    0;   otherwise;

      ð4Þ

    where d ðviÞ is the degree of node  vi. From the definition, thematrix D  is a diagonal matrix.

    In order to generate a more generalized representation, we

    normalize all the entries in matricesH andD by the degree of each node. The matrices H and D can be modified to

    H ij  ¼1=d ðviÞ;   ðvi; v jÞ 2 E;0; i ¼  j;0;   otherwise;

    8<: ð5Þ

    and

    Dij ¼  1; i ¼  j;

    0;   otherwise:

      ð6Þ

    In the limit  t !  0, this becomes

    d dtf ðtÞ ¼ tðH DÞf ðtÞ:   ð7Þ

    Solving this differential equation, we have

    f ð1Þ ¼ eðHDÞf ð0Þ;   ð8Þ

    where   d ðvÞ   denotes the degree of the node   v, and   eðHDÞ

    could be extended as

    eðHDÞ ¼ I þ ðH DÞ þ2

    2! ðH DÞ2

    þ3

    3! ðH DÞ3 þ :

    ð9Þ

    The matrix eðHDÞ is called the diffusion kernel in the sensethat the heat diffusion process continues infinitely manytimes from the initial heat diffusion.

    In order to interpret (8) and the heat diffusion processmore intuitively, we construct a small undirected graphwith only five nodes as showed in Fig. 1a.

    Initially, at time zero, suppose node 1 is given 3 units of heat, and node 2 is given 2 units of heat; then the vector  f ð0Þequals ½3; 2; 0; 0; 0T. The entries in matrix  H D are

    H D ¼

    1 1 1 1 114

      1 0 0 0

    14   0   1 0 014

      0 0   1 014

      0 0 0   1

    0BBBB@ 1CCCCA:

    Without loss of generality, we set the thermal conduc-tivity   ¼  1, and vary time t  from 0 to 1 with a step of 0.05.The curve for the amount of heat at each node with time isshown in Fig. 1b. We can see that, as time passes, the heatsources nodes 1 and 2 will diffuse their heat to nodes 3, 4,and 5. The heat of nodes 3, 4, and 5 will increaserespectively, and the trends of their heat curves are thesame since these three nodes are symmetric in this graph.

    Another example is shown in Fig. 1c. Initially, at time

    zero, suppose node 1 is given 4 units of heat,then the vectorf ð0Þ  equals   ½4; 0; 0; 0T. The related heat curve is shown inFig. 1b. We can see that the node 2, the closest node to theheat source, gains more heat than other nodes. This also

    1054 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 6, JUNE 2012

  • 8/18/2019 Mining Web Graphs

    5/14

    indicates that if a node has more paths connected to the heatsource, it will potentially obtain more heat. This is a perfectproperty for recommending relevant nodes on a graph.

    3.3 Diffusion on Directed Graphs

    The above heat diffusion model is designed for undirectedgraphs, but in many situations, the Web graphs aredirected, especially in online recommender systems or

    knowledge sharing sites. Every user in knowledge sharingsites typically has a trust list. The users in the trust list caninfluence this user deeply. These relationships are directedsince user a  is in the trust list of user  b, but user b  might not be in the trust list of user a. At the same time, the extent of trust relations is different since user   ui   may trust user   u jwith trust score 1 while trust user  uk  only with trust score0.2. Hence, there are different weights associated with therelations. Based on this consideration, we modify the heatdiffusion model for the directed graphs as follows.

    Consider a directed graph G ¼ fV ; E ; W  g, where V   is thevertex set, and V   ¼ fv1; v2; . . . ; vng. W  ¼ fwij  j   where wij   isthe probability that edge ðvi; v jÞ existsg or the weight that isassociated with this edge.   E  ¼ fðvi; v jÞ j   there is an edgefrom v i   to v j  and wij  >  0g  is the set of all edges.

    On a directed graph   GðV ; E Þ, in the pipe   ðvi; v jÞ, heatflows only from   vi   to   v j. Suppose at time   t, each node   vireceives RH  ¼  RH ði;j;t; tÞ amount of heat from  v j duringa period of  t. We make three assumptions: 1)  RH  should be proportional to the time period   t; 2)   RH   should beproportional to the heat at node   v j; and 3)   RH   is zero if there is no link from   v j   to   vi. As a result,   vi   will receiveP

     j:ðv j;viÞ2E    jf  jðtÞt   amount of heat from all its neighbors

    that point to it.At the same time, node vi diffuses DH ði;t; tÞ amount of 

    heat to its subsequent nodes. We assume that

    1.   The heat DH ði;t; tÞ  should be proportional to thetime period  t.

    2.   The heat DH ði;t; tÞ  should be proportional to theheat at node vi.

    3.   Each node has the same ability to diffuse heat.4.   The heat DH ði;t; tÞ  should be proportional to the

    weight assigned between node vi  and its subsequentnodes. As a result, node  vi  will diffuse  wijf iðtÞt=

    Pk:ði;kÞ2E  wik amount of heat to each of its subsequent

    nodes   v j, and each   v j   should receive   wijf iðtÞt=Pk:ði;kÞ2E  wik amount of heat from node vi.

    Therefore,     j ¼  w ji=P

    k:ð j;kÞ2E  w jk. In the case that theoutdegree of node vi  equals zero, we assume that this nodewill not diffuse heat to others. To sum up, the heatdifference at node   vi   between time   t þ t   and   t   will beequal to the sum of the heat that it receives, deducted bywhat it diffuses. This is formulated as

    f iðt þ tÞ f iðtÞ

    t

    ¼     if iðtÞ þ X j:ðv j;viÞ2E 

    w ji

    Pk:ð j;kÞ2E 

     w jk

    f  jðtÞ0@ 1A;ð10Þ

    where    i   is a flag to identify whether node   vi   has anyoutlinks. Solving it, we obtain

    f ð1Þ ¼ eðHDÞf ð0Þ;   ð11Þ

    where

    H ij ¼w ji

    , Xk:ð j;kÞ2E 

    w jk;   ðv j; viÞ 2 E;

    0; i ¼  j;0;   otherwise;

    8>>><

    >>>:ð12Þ

    and

    Dij ¼   i; i ¼ j;

    0;   otherwise:

      ð13Þ

    3.4 Random Jump

    The heat can only propagate through the links that connectnodes in a given graph, but in fact, there are randomrelations among different nodes even if these nodes are notconnected. For an example, in the clickthrough data, peopleof different cultures, genders, ages, and environments, mayimplicitly link queries together, but we do not know theselatent relations. Another good example is the trust relationsin a social network. On online social network sites, usersalways explicitly state the trust relations to other users.Actually, there are some other implicit hidden trustrelations among these users that cannot be observed.Hence, to capture these relations, we propose to add auniform random relation among different nodes. Morespecifically, let   denote the probability that such phenom-ena happen, and   ð1   Þ   is the probability of taking a“random jump.” Without any prior knowledge, we setg ¼   1n1, where g   is a uniform stochastic distribution vector,1   is the vector of all ones, and   n   is the number of nodes.Based on the above consideration, we modify our model to

    f ð1Þ ¼ eRf ð0Þ;   R ¼   ðH DÞ þ ð1   Þg1T :   ð14Þ

    Following the setting of      in PageRank [17], [43], we set  ¼  0:85 in all of our experiments conducted in Section 4.

    MA ET AL.: MINING WEB GRAPHS FOR RECOMMENDATIONS 1055

    Fig. 1. Two simple heat diffusion examples on an undirected graph.(a) Example 1. (b) Curve of heat change with time. (c) Example 2.(d) Curve of heat change with time.

  • 8/18/2019 Mining Web Graphs

    6/14

    3.5 Complexity Analysis

    When the graph is very large, a direct computation of  eR isvery time consuming. We adopt its discrete approximationto compute the heat diffusion equation

    f ð1Þ ¼   I þ 

    P  R

    P f ð0Þ;   ð15Þ

    where   P    is a positive integer. In order to reduce thecomputational complexity, we introduce two techniques:1) since   f ð0Þ   is a vector, we iteratively calculate   ðI þP  RÞP f ð0Þ  by applying the operator  ðI þ  P  RÞ  to   f ð0Þ; 2) formatrix  R, we employ a data structure which only storesthe information of nonzero entries, since it is a very sparsematrix. Thus, supposing a graph is connected by  M  edges(relationships between nodes), the complexity of executingthe heat diffusion process is  OðP M Þ, which represents thenumber of iterations  P  multiplied by the number of edgesM    in a graph. In most cases,   P  ¼ 10   is enough forapproximating the heat diffusion equation. The complexityOðP M Þ   shows that our heat diffusion algorithm enjoysvery good performance in scalability since it is linear withrespect to the number of edges in the graph.

    However, since the size of Web information is very large,the graph built upon the Web information can becomeextremely large. Then, the complexity   OðP M Þ   is also toohigh, and the algorithm becomes time consuming andinefficient to get a solution. To overcome this difficulty, wefirst extract a subgraph starting from the heat sources.Given the heat sources, the subgraph is constructed byusing depth-first search in the original graph. The searchstops when the number of nodes is larger than a predefinednumber. Then, the diffusion processes will be performed onthis subgraph efficiently and effectively. Generally, it willnot decrease the qualities of the heat diffusion processessince the nodes too far away from the heat sources are

    normally not related to the sources.

    4 EMPIRICAL ANALYSIS

    In Section 3, we introduced our graph diffusion models forrecommendations. In this section, 1) we show how toconvert different Web data sources into correct graphs inour models; and 2) we conduct several experiments onquery suggestions, and image recommendations.9

    4.1 Query Suggestion

    Query Suggestion is a technique widely employed by

    commercial search engines to provide related queries to

    users’ information need. In this section, we demonstratehow our method can benefit the query suggestion, and howto mine latent semantically similar queries based on theusers’ information need.

    4.1.1 Data Collection 

    We construct our query suggestion graph based on theclickthrough data of the AOL search engine [45]. In total, thisdata set spans 3 months from 01 March, 2006 to 31 May, 2006.There are a total of 19,442,629 lines of clickthrough informa-

    tion, 4,802,520 unique queries, and 1,606,326 unique URLs.Clickthrough data record the activities of Web users,

    which reflect their interests and the latent semanticrelationships between users and queries as well as queriesand clicked Web documents. As shown in Table 1, eachline of clickthrough data contains the following informa-tion: a user ID (u), a query (q ) issued by the user, a URL (l)on which the user clicked, the rank (r) of that URL, and thetime (t) at which the query was submitted for search. Thus,the clickthrough data can be represented by a set of quintuples hu;q;l;r;ti. From a statistical point of view, thequery word set corresponding to a number of Web pages

    contains human knowledge on how the pages are relatedto their issued queries [55]. Thus, in this paper, we utilizethe relationships of queries and Web pages for theconstruction of the bipartite graph containing two typesof vertices   hq; li. The information regarding user ID, rankand calendar time is ignored.

    This data set is the raw data recorded by the searchengine, and contains a lot of noise which will potentiallyaffect the effectiveness of our query suggestion algorithm.Hence, we conduct a similar method employed in [59] toclean up the raw data. We filter the data by only keepingthose frequent, well formatted, English queries (queries

    which only contain characters “a,” “b,” . . . , “z,” and space).After cleaning and removing duplicates, we get totally2,019,265 unique queries and 915,771 unique URLs in ourdata collection. After the construction of the query-URL bipartite graph using this data collection procedure, weobserve that a total of 7,633,400 edges exist in the query-URL bipartite graph, which indicates that, on average, eachquery has 3.78 distinct clicks, and each URL is clicked by8.34 distinct queries.

    4.1.2 Graph Construction 

    For the query-URL bipartite graph, consider an undirected

     bipartite graph B ql  ¼ ðV ql; E qlÞ, where  V ql  ¼  Q [ L,  Q ¼ fq 1;q 2; . . . ; q ng, and   L ¼ fl1; l2; . . . ; l pg.   E ql  ¼ fðq i; l jÞj there is anedge from q i  to  l jg is the set of all edges. The edge ðq  j; lkÞ existsifandonlyifauser ui clicked a URL lk after issuing a query q  j.

    1056 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 6, JUNE 2012

    9. All the experiments are computed by a workstation consisting of twoIntel Xeon CPUs (2.5 GHz, Quad-Core) and 8 Giga memories. The operatingsystem is Windows Server 2003, 32-bit.

    TABLE 1Samples of Search Engine Clickthrough Data

  • 8/18/2019 Mining Web Graphs

    7/14

    See Fig. 2a for an example. The values on the edges in Fig. 2aspecify how many times a query is clicked on a URL.

    We cannot simply employ the bipartite graph extractedfrom the clickthrough data into the diffusion processessince this bipartite graph is an undirected graph, andcannot accurately interpret the relationships betweenqueries and URLs. Hence, we convert this bipartite graphinto Fig. 2b. In this converted graph, every undirected edgein the original bipartite graph is converted into two directededges. The weight on a directed query-URL edge isnormalized by the number of times that the query is issued,while the weight on a directed URL-query edge is normal-ized by the number of times that the URL is clicked.

    4.1.3 Query Suggestion Algorithm After the conversion of the graph, we can easily design thequery suggestion algorithm in Algorithm 1.

    Algorithm 1. Query Suggestion Algorithm1: A converted bipartite graph G ¼ ðV þ [ V ; E Þ consists

    of query set  V þ and URL set  V . The two directededges are weighted using the method introducedin previous section.

    2: Given a query  q   in  V þ, a subgraph is constructed byusing depth-first search in  G. The search stops whenthe number of queries is larger than a predefinednumber.

    3: As analyzed above, set    ¼  1, and without loss of generality, set the initial heat value of queryq f q ð0Þ ¼ 1  (the choice of initial heat value will notaffect the suggestion results). Start the diffusionprocess using

    f ð1Þ ¼ eRf ð0Þ.

    4: Output the Top-K queries with the largest values invector f ð1Þ  as the suggestions.

    4.1.4 Query Suggestion Results 

    We display the suggestion results of our algorithm andthose from Google,  Yahoo!,  Live Search,  and  AOL in Table 2.We call our algorithm DRec which means Recommenda-tions by Diffusion. In our algorithms, the parameter    is set

    to 1, and the size of the subgraph is set to 5,000. From thesuggestions, we can see that the query suggestionsgenerated by our method are generally as good as thosefrom commercial search engines. For some queries, oursuggestions are even better.

    In order to compare our method with other approaches,we create a set of 200 queries as the testing queries, coveringa wide range of topics, such as Computers, Arts, Business,and others. Some of the results generated by our DRecalgorithm are shown in Table 3.

    From the results, we observe that our recommendationalgorithm not only suggests queries which are literallysimilar to the test queries, but also provides latentsemantically relevant recommendations. For instance, if the test query is a technique, such as “java,” we recommend“virtual machine” and “sun microsystems.” The lattersuggestion is the company who owns the   Java Platform,and the former suggestion is a key feature of the   Javaprogramming language. They both have high latent seman-tic relations to the query “java.” If the test query is a human

    name, such as “michael jordan,” one of the most successfulNBA basketball player, the latent semantic suggestions are“nba,” “nike,” “jordan xi” (a model of Air Jordan shoes), and“air jordans,” All of the results show that our latent semanticquery suggestion algorithm has a promising future.

    Since the data set we use is different from the data setsthat these commercial search engines employ, it is difficultto quantitatively evaluate our results with those from thecommercial search engines objectively. Hence, we compareour DRec method with the baseline approaches usingSimRank [27], Forward Random Walk (FRW) [12], andBackward Random Walk (BRW) [12].

    In the method of SimRank, we use the query-URL bipartite graph to calculate the similarities between queries.Then, based on the similarities, we recommend the top-5similar queries to users. SimRank is based on the intuitionthat two queries are very similar if they link to a lot of similar URLs. On the other hand, two URLs are very similarif they are clicked as a result of several similar queries.Based on this intuition, in SimRank, we first calculate thesimilarities between URLs, then we compute the similaritiesfor queries based on the similarities of URLs. We iterativelyupdate the similarities until they converge.

    In FRW and BRW methods, we perform forward randomwalk and backward random walk starting from the querynode on the query-URL graph. After the random walks, weuse the top-ranked queries as the suggestions.

    Evaluating the quality of semantic relations is difficult, inparticular for the contents generated by users, as there are nolinguistic resources available. In this paper, we conduct botha manual evaluation by a panel of three human experts, andan automatic evaluation based on the ODP10 database.

    In the evaluation by human experts, the three experts arethree PhD students without any overlaps with the authors.They do not know which algorithms are tested. They arealso not allowed to communicate with each other during theevaluation process. We ask all the experts to rate the query

    suggestion results. We define a 6-point scale (0, 0.2, 0.4, 0.6,0.8, and 1) to measure the relevance between the testing

    MA ET AL.: MINING WEB GRAPHS FOR RECOMMENDATIONS 1057

    Fig. 2. Graph construction for query suggestion. (a) Query-URL bipartitegraph. (b) Converted query-URL bipartite graph.

    10. http://www.dmoz.org.

  • 8/18/2019 Mining Web Graphs

    8/14

    1058 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 6, JUNE 2012

    TABLE 2Query Suggestion Comparisons between DRec and Four Commercial Search Engines

  • 8/18/2019 Mining Web Graphs

    9/14

    queries and the suggested queries, in which 0 means“totally irrelevant” while 1 indicates “entirely relevant.”The average values of evaluation results are shown in Fig. 3.We observe that, when measuring the results by humanexperts, our DRec algorithm increases the accuracy for

    about 19.81, 13.0, and 7.5 percent comparing with theSimRank, BRW, and FRW algorithm, respectively.

    For the automatic evaluation, we utilize the ODPdatabase. ODP, also known as dmoz, is one of the largest,most comprehensive human-edited directories of the Web.In our experiment, we adopt the same method used in [3] toevaluate the quality of the suggested queries. When a usertypes a query in ODP, besides site matches, we can also findcategories matches in the form of paths between directories.Moreover, these categories are ordered by relevance. Forinstance, the query “Java” would provide the hierarchicalcategory “Computers : Programming : Languages : Java,”

    where “:” is used to separate different categories. One of theresults for “Virtual Machine” would be “Computers :Programming : Languages : Java : Implementations.”Hence, to measure how related two queries are, we canuse a notion of similarity between the correspondingcategories (as provided by ODP). In particular, we measurethe similarity between two categories D and D0 as the lengthof their longest common prefix   F ðD; D0Þ   divided by thelength of the longest path between   D   and   D0. Moreprecisely, denoting the length of a path with   jDj, thissimilarity is defined as   SimðD; D0Þ ¼ jFðD; D0Þj=maxfjDj;jD0jg. For instance, the similarity between the two queries

    above is   4=5   since they share the path “Computers :Programming : Languages : Java” and the longest one ismade of five directories. We have evaluated the similarity between two queries by measuring the similarity betweenthe most similar categories of the two queries, among the

    top five answers provided by ODP.As shown in Fig. 4, we observe that, when evaluating

    using ODP database, our proposed DRec algorithmincreasesthe suggestion accuracy for about 22.45, 11.9, and 7.5 percentcomparing with the SimRank, BRW, and FRW algorithm,respectively. This indicates again that our proposed querysuggestion algorithm is very effective. The major difference between our proposed heat diffusion model and randomwalk model is that heat diffusion model has the definitions of thermal conductivity and time frame. Heat will diffuse fromone node to another node based on thermal conductivity andtime frame step by step, which means heat diffusion is arelatively slow diffusion process. However, in the case of random walk, the diffusion from one node to its neighbors isdone immediately. Hence, in our model, after the diffusionprocess, the recommended items will preserve more in-formation of the original node. That is also why the resultsoutperform random walk models.

    4.1.5 Impact of Parameter  

    The parameter   plays an important role in our method. Itcontrols how fast heat will propagation on the graph.Hence, we also conduct experiments on evaluating theimpact of parameter . The evaluation results are shown inFig. 5. We can observe that the best     setting is 1. If we

    MA ET AL.: MINING WEB GRAPHS FOR RECOMMENDATIONS 1059

    Fig. 4. Accuracy comparisons measured by ODP.Fig. 3. Accuracy comparisons measured by experts.

    TABLE 3Examples of DRec Query Suggestion Results (k ¼  50)

  • 8/18/2019 Mining Web Graphs

    10/14

    choose relatively smaller thermal conductivity, the perfor-mance will drop since some relevant nodes cannot getenough heat. On the other hand, if we choose relativelylarger value of  , the performance will also decrease. This is

     because if the heat transfers very fast, some irrelevant nodeswill gain more heat, hence will hurt the performance.

    4.1.6 Impact of the Size of Subgraph 

    As mentioned in Section 3.5, due to the reason that Webgraphs are normally very huge, we will perform ouralgorithm on a subgraph extracted from the original graph.Hence, it is necessary to evaluate how the size of thissubgraph affects the recommendation accuracy. Fig. 6shows the performance changes with different subgraphsizes. We observe that when the size of the graph is verysmall, like 500, the performance of our algorithm is not verygood since this subgraph must ignore some very relevant

    nodes. When the size of subgraph is increasing, theperformance also increases. We also notice that theperformance on subgraph with size 5,000 is very close tothe performance with size 100,000. This indicates that thenodes that are far away from the query node are normallynot relevant with the query node.

    4.1.7 Efficiency Analysis 

    As analyzed in Section 3.5, our algorithm is very efficient,and can be applied to large data sets. Our algorithm hassimilar complexity with FRW and BRW methods. Thecomputation time for the query suggestion task of thesethree method (subgraph size is 5,000) is normally around0.10 seconds. However, SimRank is not very efficient sinceit has a high computational complexity. It takes more than15 minutes to compute a query suggestion task in ourdata set.

    4.2 Image Recommendation

    Finding effective and efficient methods to search andretrieve images on the Web has been a prevalent line of research for a long time [58]. The situation is even tougherin the research of  Image Recommendation. In this section, wepresent how to recommend related images to the givenimages using  Flickr  data set.

    4.2.1 Data Collection 

    We use Flickr, a popular image hosting Web site and onlinecommunity for users to share personal photographs, tag

    photographs, and communicate with other users. As of November 2007, it claims to host more than 2 billion images[2]. Hence, Flickr is an ideal source for the investigation of image-related research.

    With this Flickr data set, we can apply our recommenda-tion framework into several application areas, includingImage-to-Image Recommendation, Image-to-Tag Sugges-tion, Tag-to-Image Retrieval, and Tag-to-Tag Suggestion.In this section, we will only show the performance of ourmodel on the image-to-image recommendation application.

    For the research of image recommendation, via the FlickrAPI, we have crawled related information of 36,450,736images, which spans from January 1 2007 to December 312007. For each image, we record the following information:the user ID who submitted the image, the image ID, thetime when the image was uploaded, and the tags associatedwith the image. Totally, we find 807,008 unique users,5,362,213 unique tags and 322,935,565 edges (tag assign-ments) between images and tags.

    4.2.2 Image Recommendation 

    Basically, the graph construction for image recommenda-tion is similar to the one introduced in Section 4.1. The onlydifference is that here the nodes in bipartite graph areimages and tags, respectively. By using the similaralgorithm which is introduced in Algorithm 1, we can alsoprovide image recommendations. The recommendationresults are shown in Fig. 7.

    In Fig. 7, we perform three image recommendations. The

    first recommendation is based on the image shown in Fig. 7a,which is a picture taken from Grand Canyon, a national parkin the United States. Figs. 7b to 7f are the five recommenda-tions to this picture. We can observe that these recommenda-tions are all latent semantically related to the original picture.This shows the effectiveness and the promising future of ourDRec method. Figs. 7g and 7m are another two examples,with Fig. 7h-Fig. 7i and Fig. 7n-Fig. 7r as the recommenda-tions, respectively. The results also show very goodperformance of our approach, especially for Fig. 7g. TheChina Great Wall in this query photo is very dark and we canhardly recognize the object in the photo, while our methodstill can recommend very clear and related results to users,

    all of which are scenes from Great Wall.In order to evaluate the quality of our image recommen-

    dation results, we randomly selected 200 images andcompare the results generated by our DRec algorithm with

    1060 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 6, JUNE 2012

    Fig. 6. Impact of the size of subgraph ( ¼  1).Fig. 5. Impact of    (subgraph size is 5,000).

  • 8/18/2019 Mining Web Graphs

    11/14

    those generated by SimRank, FRW, and BRW approaches.All the results are evaluated by three experts using a 6-pointscale (0, 0.2, 0.4, 0.6, 0.8, and 1). From Fig. 8, we can observethat our DRec method consistently performs better thanSimRank, FRW, and BRW.

    If we use the tags instead of the images as the diffusionsources, then this problem turns to be the problem of tagrecommendations. Since the recommendation processes arethe same, we do not discuss the results in this paper.

    4.2.3 Personalized Image Recommendation 

    Personalization is becoming more and more important inmany applications since it is the best way to understanddifferent information needs from different users.

    Actually, our method can be easily extended to thepersonalized image recommendations. In the query sug-gestions conducted in Section 4.1 and image suggestions

    performed in this section, we only employ one node (eithera query or an imag e) as the heat source. In thepersonalized image recommendations, we can set all theimages submitted by a specified user as the heat sources,and then start the diffusion process. This ensures that thesuggested images are of interests of this user.

    In order to evaluate the quality of our personalizedimage recommendation method, we create 10 groups:Given1, Given2,   . . . , and Given10, where Given1 means inthis group, all the users only submitted 1 images. We thenrandomly select 50 users from the user list for each group,hence totally we have 500 users. For each of these users, westart the diffusion processes once with the submittedimages as the heat sources. After generating the results,we ask three experts to rate these recommendations. Weagain define a 6-point scale (0, 0.2, 0.4, 0.6, 0.8, and 1) tomeasure the relevance between the testing images and thesuggested images, in which 0 means “totally irrelevant”while 1 indicates “entirely relevant.” The average values of evaluation results for each group are reported in Fig. 9. We

    MA ET AL.: MINING WEB GRAPHS FOR RECOMMENDATIONS 1061

    Fig. 8. Accuracy comparisons measured by experts in imagerecommendation. Fig. 9. Accuracy of personalized image recommendations.

    Fig. 7. Examples for image recommendations. (a) Seed image 1. (b) Suggestion 1. (c) Suggestion 2. (d) Suggestion 3. (e) Suggestion 4.(f) Suggestion 5. (g) Seed image 2. (h) Suggestion 1. (i) Suggestion 2. (j) Suggestion 3. (k) Suggestion 4. (l) Suggestion 5. (m) Seed image 3.(n) Suggestion 1. (o) Suggestion 2. (p) Suggestion 3. (q) Suggestion 4. (r) Suggestion 5.

  • 8/18/2019 Mining Web Graphs

    12/14

    can observe that our method generally produces highquality results, and as the number of images increases, therecommendation quality also increases.

    5 CONCLUSION

    In this paper, we present a novel framework for recom-mendations on large scale Web graphs using heat diffusion.This is a general framework which can basically be adaptedto most of the Web graphs for the recommendation tasks,such as query suggestions, image recommendations, perso-nalized recommendations, etc. The generated suggestionsare semantically related to the inputs. The experimentalanalysis on several large scale Web data sources shows thepromising future of this approach.

    6 FUTURE  WORK

    6.1 Search Results Improvement

    In Table 2, we list the heat values of the suggested queries.These values not only can be used in query suggestions, butalso are very informative in the advertisement whencustomers bid for query terms. Actually, since the diffu-sions are between all the nodes in the graph (including thenodes representing queries and the nodes representingURLs), all the URLs also have heat values. Hence, it is easyto infer that, for a given query, after the diffusion process,the heat values of URLs represent the relatedness to theoriginal query, which can also be employed as the rankingof these URLs. This ranking actually is the wisdom of thecrowd since it is based on the query-URL click data, which

    reflects the intelligent judgements of the Web users.The Top-5 Web sites given the queries “sony,” “camera,”“microsoft,” and “chocolate” are shown in Table 4. Forexample, the ranking order for “sony” is different from allof the results retrieved by those four commercial searchengines (which we do not list here due to the spacelimitation). If this order is incorporated into the originalresults, the search results can be greatly improved sincethey are the representations of the implicit votes of all thesearch users. In the future, we plan to compare this rankingmethod with other previous Web search results rankingapproaches, like [59], [64].

    6.2 Social RecommendationSince our model is quite general, we can apply it to morecomplicated graphs and applications, such as   SocialRecommendation problem. Recently, as the explosive growth

    of Web 2.0 applications, social-based applications gain lotsof traffics on the Web. Social recommendation, whichproduces recommendations by incorporating users’ socialnetwork information, is becoming to be an indispensablefeature for the next generation of Web applications.

    The social recommendation problem includes two

    different data sources, which are social network and user-item relation matrices. An example is shown in Fig. 10a. Wecan see that in the social network graph, there are trustscores between different users, while in the user-itemrelation matrix, binary relations connect users and items.We can convert these two graphs into a single andconsistent one, as shown in Fig. 10b.

    With the constructed graph, for each user (heat source),we can start the diffusion process and then recommend theTop-N items to this user. In fact, during the diffusionprocess on the graph as shown in Fig. 10b, there are twopossible ways to diffuse heat from users to items. The firstroute is within the user-item bipartite graph, which

    captures the intuition that similar users will purchase (orview) similar items. The second route is passing through thesocial network graph, which reflects the social interactionsand influences between users. Hence, our DRec diffusionmethod naturally fuses these two data sources together forsocial recommendations. We plan to conduct this socialrecommendation research in the future.

    ACKNOWLEDGMENTS

    The work described in this paper was fully supported bytwo grants from the Research Grants Council of the HongKong Special Administrative Region, China (Projects Nos.

    CUHK 412808 and CUHK 415409) and a grant from the

    1062 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 6, JUNE 2012

    TABLE 4Search Results Improvement

    Fig. 10. Example for social recommendation. (a) Social network anduser-item relations. (b) Converted graph.

  • 8/18/2019 Mining Web Graphs

    13/14

    Guangdong Province International Collaboration Scheme(Project No. 2009B050700044). The authors also would liketo thank the reviewers and editor for their helpfulcomments.

    REFERENCES[1] E. Agichtein, E. Brill, and S. Dumais, “Improving Web Search

    Ranking by Incorporating User Behavior Information,”  SIGIR ’07:Proc. 29th Ann. Int’l ACM SIGIR Conf. Research and Development inInformation Retrieval,  pp. 19-26, 2006.

    [2]   E. Auchard, “Flickr to Map the World’s Latest Photo Hotspots,”Proc. Reuters, 2007.

    [3]   R. TiberiBaeza-Yates and A. Tiberi, “Extracting Semantic Relationsfrom Query Logs,”  KDD ’07: Proc. 13th ACM SIGKDD Int’l Conf.Knowledge Discovery and Data Mining,  pp. 76-85, 2007.

    [4]   R.A. Baeza-Yates, C.A. Hurtado, and M. Mendoza, “QueryRecommendation Using Query Logs in Search Engines,”   Proc.Current Trends in Database Technology (EDBT) Workshops,  pp. 588-596, 2004.

    [5]   D. Beeferman and A. Berger, “Agglomerative Clustering of aSearch Engine Query Log,”  KDD ’00: Proc. Sixth ACM SIGKDDInt’l Conf. Knowledge Discovery and Data Mining,   pp. 407-416,2000.

    [6]   M. Belkin and P. Niyogi, “Laplacian Eigenmaps for Dimension-ality Reduction and Data Representation,”   Neural Computation,vol. 15, no. 6, pp. 1373-1396, 2003.

    [7]   J.S. Breese, D. Heckerman, and C. Kadie, “Empirical Analysis of Predictive Algorithms for Collaborative Filtering,” Proc. 14th Conf.Uncertainty in Artificial Intelligence (UAI),  1998.

    [8]   S. Brin and L. Page, “The Anatomy of a Large-Scale HypertextualWeb Search Engine,” Computer Networks and ISDN Systems, vol. 30,nos. 1-7, pp. 107-117, 1998.

    [9]   J. Canny, “Collaborative Filtering with Privacy via FactorAnalysis,”   SIGIR ’07: Proc. 25th Ann. Int’l ACM SIGIR Conf.Research and Development in Information Retrieval, pp. 238-245, 2002.

    [10]   H. Cao, D. Jiang, J. Pei, Q. He, Z. Liao, E. Chen, and H. Li,“Context-Aware Query Suggestion by Mining Click-Through andSession Data,”   KDD ’08: Proc. 14th ACM SIGKDD Int’l Conf.Knowledge Discovery and Data Mining,  pp. 875-883, 2008.

    [11]   P.A. Chirita, C.S. Firan, and W. Nejdl, “Personalized QueryExpansion for the Web,”   SIGIR ’07: Proc. 30th Ann. Int’l ACMSIGIR Conf. Research and Development in Information Retrieval, pp. 7-14, 2007.

    [12]   N. Craswell and M. Szummer, “Random Walks on the ClickGraph,” SIGIR ’07: Proc. 30th Ann. Int’l ACM SIGIR Conf. Researchand Development in Information Retrieval,  pp. 239-246, 2007.

    [13]   H. Cui, J.-R. Wen, J.-Y. Nie, and W.-Y. Ma, “Query Expansion byMining User Logs,” IEEE Trans. Knowledge Data Eng., vol. 15, no. 4,pp. 829-839, July/Aug. 2003.

    [14]   A.S. Das, M. Datar, A. Garg, and S. Rajaram, “Google NewsPersonalization: Scalable Online Collaborative Filtering,”   WWW ’07: Proc. 16th Int’l Conf. World Wide Web,  pp. 271-280, 2007.

    [15]   M. Deshpande and G. Karypis, “Item-Based Top-n Recommenda-tion,”  ACM Trans. Information Systems,  vol. 22, no. 1, pp. 143-177,

    2004.[16]   G. Dupret and M. Mendoza, “Automatic Query RecommendationUsing Click-Through Data,”  Proc. Int’l Federation for InformationProcessing, Professional Practice in Artificial Intelligence (IFIP PPAI),pp. 303-312, 2006.

    [17]   N. Eiron, K.S. McCurley, and J.A. Tomlin, “Ranking the WebFrontier,” WWW ’04: Proc. 13th Int’l Conf. World Wide Web,  pp. 309-318, 2004.

    [18]   W. Gao, C. Niu, J.-Y. Nie, M. Zhou, J. Hu, K.-F. Wong, and H.-W.Hon, “Cross-Lingual Query Suggestion Using Query Logs of Different Languages,” SIGIR ’07: Proc. 30th Ann. Int’l ACM SIGIRConf. Research and Development in Information Retrieval, pp. 463-470,2007.

    [19]   T. Haveliwala, A. Kamvar, and G. Jeh, “An Analytical Comparisonof Approaches to Personalizing Pagerank,” technical report, 2003.

    [20]   T.H. Haveliwala, “Topic-Sensitive Pagerank,”   WWW ’04: Proc.

    11th Int’l Conf. World Wide Web,  pp. 517-526, 2002.[21]   J.L. Herlocker, J.A. Konstan, A. Borchers, and J. Riedl, “AnAlgorithmic Framework for Performing Collaborative Filtering,”SIGIR ’99: Proc. 22nd Ann. Int’l ACM SIGIR Conf. Research andDevelopment in Information Retrieval,  pp. 230-237, 1999.

    [22]   J.L. Herlocker, J.A. Konstan, L.G. Terveen, and J.T. Riedl,“Evaluating Collaborative Filtering Recommender Systems,”

     ACM Trans. Information Systems,  vol. 22, no. 1, pp. 5-53, 2004.[23]   T. Hofmann, “Collaborative Filtering via Gaussian Probabilistic

    Latent Semantic Analysis,”  SIGIR ’03: Proc. 26th Ann. Int’l ACMSIGIR Conf. Research and Development in Information Retrieval,pp. 259-266, 2003.

    [24]   T. Hofmann, “Latent Semantic Models for Collaborative Filter-ing,”  ACM Trans. Information Systems,   vol. 22, no. 1, pp. 89-115,2004.

    [25]   Z. Huang, H. Chen, and D. Zeng, “Applying Associative RetrievalTechniques to Alleviate the Sparsity Problem in CollaborativeFiltering,” ACM Trans. Information Systems, vol. 22, no. 1, pp. 116-142, 2004.

    [26]   B.J. Jansen, A. Spink, J. Bateman, and T. Saracevic, “Real LifeInformation Retrieval: A Study of User Queries on the Web,” ACMSIGIR Forum,  vol. 32, no. 1, pp. 5-17, 1998.

    [27]   G. Jeh and J. Widom, “Simrank: A Measure of Structural-ContextSimilarity,”   KDD ’02: Proc. Eighth ACM SIGKDD Int’l Conf.Knowledge Discovery and Data Mining,  pp. 538-543, 2002.

    [28]   G. Jeh and J. Widom, “Scaling Personalized Web Search,” WWW ’04: Proc. 12th Int’l Conf. World Wide Web,  pp. 271-279, 2003.

    [29]   T. Joachims, “Optimizing Search Engines Using ClickthroughData,”  KDD ’02: Proc. Eighth ACM SIGKDD Int’l Conf. KnowledgeDiscovery and Data Mining,  pp. 133-142, 2002.

    [30]   T. Joachims and F. Radlinski, “Search Engines that Learn fromImplicit Feedback,” Computer, vol. 40, no. 8, pp. 34-40, 2007.

    [31]   R. Jones, B. Rey, O. Madani, and W. Greiner, “Generating QuerySubstitutions,” WWW ’06: Proc. 15th Int’l Conf. World Wide Web,pp. 387-396, 2006.

    [32]   J.M. Kleinberg, “Authoritative Sources in a Hyperlinked Environ-ment,”  J. ACM, vol. 46, no. 5, pp. 604-632, 1999.

    [33]   A. Kohrs and B. Merialdo, “Clustering for Collaborative FilteringApplications,”   Proc. Computational Intelligence for Modelling, Con-trol and Automation (CIMCA),  1999.

    [34]   R.I. Kondor and J.D. Lafferty, “Diffusion Kernels on Graphs andOther Discrete Input Spaces,”   ICML ’02: Proc. 19th Int’l Conf.

     Machine Learning,  pp. 315-322, 2002.[35]   R. Kraft and J. Zien, “Mining Anchor Text for Query

    Refinement,”   WWW ’04: Proc 13th Int’l Conf. World Wide Web,

    pp. 666-674, 2004.[36]   J.D. Lafferty and G. Lebanon, “Diffusion Kernels on StatisticalManifolds,”   J. Machine Learning Research,   vol. 6, pp. 129-163,2005.

    [37]   G. Linden, B. Smith, and J. York, “Amazon.com Recommenda-tions: Item-to-Item Collaborative Filtering,” IEEE Internet Comput-ing, vol. 7, no. 1, pp. 76-80, Jan./Feb. 2003.

    [38]   H. Ma, I. King, and M.R. Lyu, “Effective Missing DataPrediction for Collaborative Filtering,”   SIGIR ’07: Proc. 30th

     Ann. Int’l ACM SIGIR Conf. Research and Development inInformation Retrieval,   pp. 39-46, 2007.

    [39]   H. Ma, I. King, and M.R. Lyu, “Learning to Recommend withSocial Trust Ensemble,”   SIGIR ’09: Proc. 32nd Ann. Int’l ACMSIGIR Conf. Research and Development in Information Retrieval,pp. 203-210, 2009.

    [40]   H. Ma, H. Yang, M.R. Lyu, and I. King, “SoRec: Social

    Recommendation Using Probabilistic Matrix Factorization,” CIKM’08: Proc. 17th ACM Conf. Information and Knowledge Management,pp. 931-940, 2008.

    [41]   B. Marlin, “Modeling User Rating Profiles for CollaborativeFiltering,”  Advances in Neural Information Processing Systems 16,S. Thrun, L. Saul, and B. Schölkopf, eds., MIT Press, 2004.

    [42]   Q. Mei, D. Zhou, and K. Church, “Query Suggestion Using HittingTime,”  CIKM ’08: Proc. 17th ACM Conf. Information and Knowledge

     Management, pp. 469-477, 2008.[43]   L. Page, S. Brin, R. Motwani, and T. Winograd, “The Pagerank

    Citation Ranking: Bringing Order to the Web,” Technical ReportPaper SIDL-WP-1999-0120 (Version of 11/11/1999), 1999.

    [44]   M. Pasca and B.V. Durme, “What You Seek Is What You Get:Extraction of Class Attributes from Query Logs,”   IJCAI ’07: Proc.20th Int’l Joint Conf. Artifical Intelligence,  pp. 2832-2837, 2007.

    [45]   G. Pass, A. Chowdhury, and C. Torgeson, “A Picture of Search,”Proc. First Int’l Conf. Scalable Information Systems,  June 2006.[46]   J.D.M. Rennie and N. Srebro, “Fast Maximum Margin Matrix

    Factorization for Collaborative Prediction,”  ICML ’05: Proc. 22ndInt’l Conf. Machine Learning,  2005.

    MA ET AL.: MINING WEB GRAPHS FOR RECOMMENDATIONS 1063

  • 8/18/2019 Mining Web Graphs

    14/14

    [47]   P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. Riedl,“Grouplens: An Open Architecture for Collaborative Filtering of Netnews,”   CSCW ’94: Proc. ACM Conf. Computer SupportedCooperative Work, 1994.

    [48]   R. Salakhutdinov and A. Mnih, “Bayesian Probabilistic MatrixFactorization Using Markov Chain Monte Carlo,”  ICML ’05: Proc.25th Int’l Conf. Machine Learning,  2008.

    [49]  R. Salakhutdinov and A. Mnih, “Probabilistic Matrix Factoriza-tion,”   Advances in Neural Information Processing Systems,   vol. 20,pp. 1257-1264, 2008.

    [50]   B. Sarwar, G. Karypis, J. Konstan, and J. Reidl, “Item-BasedCollaborative Filtering Recommendation Algorithms,” WWW ’01:Proc. 10th Int’l Conf. World Wide Web,  pp. 285-295, 2001.

    [51]   D. Shen, M. Qin, W. Chen, Q. Yang, and Z. Chen, “Mining WebQuery Hierarchies from Clickthrough Data,” AAAI ’07: Proc. 22ndNat’l Conf. Artificial Intelligence,  pp. 341-346, 2007.

    [52]   L. Si and R. Jin, “Flexible Mixture Model for CollaborativeFiltering,” ICML ’03: Proc. 20th Int’l Conf. Machine Learning,  2003.

    [53]   C. Silverstein, M.R. Henzinger, H. Marais, and M. Moricz,“Analysis of a Very Large Web Search Engine Query Log,”

     ACM SIGIR Forum, vol. 33, no. 1, pp. 6-12, 1999.[54]   N. Srebro and T. Jaakkola, “Weighted Low-Rank Approxima-

    tions,” ICML ’03: Proc. 20th Int’l Conf. Machine Learning,  pp. 720-727, 2003.

    [55]   J.-T. Sun, D. Shen, H.-J. Zeng, Q. Yang, Y. Lu, and Z. Chen, “Web-Page Summarization Using Clickthrough Data,”  SIGIR ’05: Proc.

    28th Ann. Int’l ACM SIGIR Conf. Research and Development inInformation Retrieval,  pp. 194-201, 2005.

    [56]   M. Theobald, R. Schenkel, and G. Weikum, “Efficient and Self-Tuning Incremental Query Expansion for Top-k Query Proces-sing,” SIGIR ’05: Proc. 28th Ann. Int’l ACM SIGIR Conf. Research andDevelopment in Information Retrieval,  pp. 242-249, 2005.

    [57]   B. Vélez, R. Weiss, M.A. Sheldon, and D.K. Gifford, “Fast andEffective Query Refinement,” ACM SIGIR Forum, vol. 31(SI) pp. 6-15, 1997.

    [58]   L. von Ahn and L. Dabbish, “Labeling Images with a ComputerGame,”  CHI ’04: Proc. SIGCHI Conf. Human Factors in ComputingSystems,  pp. 319-326, 2004.

    [59]   X. Wang and C. Zhai, “Learn from Web Search Logs to OrganizeSearch Results,” SIGIR ’07: Proc. 30th Ann. Int’l ACM SIGIR Conf.Research and Development in Information Retrieval,  pp. 87-94, 2007.

    [60]   J.-R. Wen, J.-Y. Nie, and H. Zhang, “Query Clustering using UserLogs,”   ACM Trans. Information Systems,  vol. 20, no. 1, pp. 59-81,2002.

    [61]   J. Xu and W.B. Croft, “Query Expansion using Local and GlobalDocument Analysis,” SIGIR ’07: Proc. 19th Ann. Int’l ACM SIGIRConf. Research and Development in Information Retrieval,   pp. 4-11,1996.

    [62]   H. Yang, I. King, and M.R. Lyu, “DiffusionRank: A PossiblePenicillin for Web Spamming,”  SIGIR ’07: Proc. 30th Ann. Int’l

     ACM SIGIR Conf. Research and Development in Information Retrieval,pp. 431-438, 2007.

    [63]   Y.-H. Yang, P.-T. Wu, C.-W. Lee, K.-H. Lin, W.H. Hsu, and H.Chen, “ContextSeer: Context Search and Recommendation atQuery Time for Shared Consumer Photos,”  Proc. 16th ACM Int’lConf. Multimedia,  pp. 199-208, 2008.

    [64]   B. Zhang, H. Li, Y. Liu, L. Ji, W. Xi, W. Fan, Z. Chen, and W.-Y.

    Ma, “Improving Web Search Results Using Affinity Graph,” SIGIR’05: Proc. 30th Ann. Int’l ACM SIGIR Conf. Research and Developmentin Information Retrieval,  pp. 504-511, 2005.

    Hao Ma   received the BEng and MEng degreesin the School of Information Science andEngineering from Central South University in2002 and 2005, respectively, and the PhDdegree from the Computer Science and Engi-neering Department, The Chinese University ofHong Kong (CUHK) in 2010. He worked as asystem engineer at Intel Shanghai before he

     joined CUHK as a PhD student in November2006. His research interests include information

    retrieval, data mining, machine learning, social network analysis,recommender systems, human computation, and social media analysis.

    Irwin King   received the BSc degree in en-gineering and applied science from the Califor-nia Institute of Technology, Pasadena and theMSc and PhD degrees in computer science fromthe University of Southern California, Los An-geles. Currently, he is with the Chinese Uni-versity of Hong Kong. His research interestsinclude machine learning, web intelligence,social computing, data mining, and multimediainformation processing. In these research areas,

    he has more 200 technical publications in journals and conferences. Inaddition, he has contributed more than 20 book chapters and editedvolumes. Moreover, he has more than 30 research and applied grants.One notable patented system he has developed is the VeriGuideSystem, which detects similar sentences and performs readabilityanalysis of text-based documents in both English and in Chinese topromote academic integrity and honesty. He is an associate editor of theIEEE Transactions on Neural Networks (TNN)  and IEEE Computational Intelligence Magazine (CIM) . He is a member of the editorial boards ofthe Open Information Systems Journal,  Journal of Nonlinear Analysis and Applied Mathematics,  and  Neural Information ProcessingCLetters and Reviews Journal (NIP-LR) . He has also served as special issueguest editor for   Neurocomputing ,   International Journal of Intelligent Computing and Cybernetics (IJICC) ,  Journal of Intelligent Information Systems (JIIS) , and  International Journal of Computational Intelligent Research (IJCIR) . Currently, he is serving the Neural Network Technical

    Committee (NNTC) and the Data Mining Technical Committee under theIEEE Computational Intelligence Society (formerly the IEEE NeuralNetwork Society). He is a senior member of the IEEE and a member ofthe ACM, International Neural Network Society (INNS), and AsianPacific Neural Network Assembly (APNNA). He is also a member of theBoard of Governors of INNS and a vice-president and governing boardmember of APNNA.

    Michael Rung-Tsong Lyu   received the BSdegree in electrical engineering from NationalTaiwan University, Taipei, China, in 1981, theMS degree in computer engineering from theUniversity of California, Santa Barbara, in 1985,and the PhD degree in computer science fromthe University of California, Los Angeles, in

    1988. He was with the Jet Propulsion Labora-tory as a technical staff member from 1988 to1990. From 1990 to 1992, he was with the

    Department of Electrical and Computer Engineering, The University ofIowa, as an assistant professor. From 1992 to 1995, he was amember of the technical staff in the applied research area of BellCommunications Research (Bellcore), Morristown, New Jersey. From1995 to 1997, he was a research member of the technical staff at BellLaboratories, Murray Hill, New Jersey. In 1998, he joined The ChineseUniversity of Hong Kong, where he is now a professor in theDepartment of Computer Science and Engineering. He is also afounder and director of the Video over InternEt and Wireless (VIEW)Technologies Laboratory. He has published 330 refereed journal andconference papers in these areas. He was the editor of two bookvolumes:  Software Fault Tolerance  (New York: Wiley, 1995) and   The Handbook of Software Reliability Engineering   (Piscataway, N.J.: IEEE

    and New York: McGraw-Hill, 1996). He initiated the First InternationalSymposium on Software Reliability Engineering (ISSRE) in 1990. Hewas the program chair for ISSRE 1996 and general chair for ISSRE2001. He was also PRDC 1999 program cochair, WWW10 programcochair, SRDS 2005 program cochair, PRDC 2005 general cochair,ICEBE 2007 program cochair, and SCC 2010 program cochair. He willbe the general chair for DSN 2011 in Hong Kong. He was on theeditorial boards of the   IEEE Transactions on Knowledge and Data Engineering ,   IEEE Transactions on Reliability ,   Journal of Information Science and Engineering,  and   Wiley Software Testing, Verification and Reliability Journal . His research interests include software reliabilityengineering, distributed systems, fault-tolerant computing, mobile andsensor networks, Web technologies, multimedia information proces-sing and retrieval, and machine learning. He is an IEEE fellow, anAAAS fellow, and a croucher senior research fellow. He was alsonamed by the IEEE Reliability Society as the 2010 Engineer of the

    Year.

    1064 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 6, JUNE 2012