skip to main content
10.1145/223904.223931acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article
Free Access

Social information filtering: algorithms for automating “word of mouth”

Published:01 May 1995Publication History
First page image

References

  1. 1.{1 cacm} Special Issue on Information Filtering, Communications of the ACM, Vol. 35, No. 12, December 1992.Google ScholarGoogle Scholar
  2. 2.{2 latent} Scott Deerweester, Susan Dumais, George Furnas, Thomas Landauer, Richard Harshman, ``Indexing by Latent Semantic Analysis'', Journal of the American Society for Information Science, Vol. 41, No. 1, 1990, pp. 391--407.Google ScholarGoogle ScholarCross RefCross Ref
  3. 3.{3 tapistry} David Goldberg, David Nichols, Brian M. Oki and Douglas Terry, ``Using Collaborative Filtering to Weave an Information Tapestry'', Communications of the ACM, Vol. 35, No. 12, December 1992, pp. 61--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.{4 grouplens} Paul Resnick, Neophytos Iacovou, Mitesh Sushak, Peter Bergstrom, John Riedl, ``GroupLens: An Open Architecture for Collaborative Filtering of Netnews'', to be published in the Proceedings of the CSCW 1994 conference, October 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.{5 rich} Elaine Rich, ``User Modeling via Stereotypes'', Cognitive Science, Vol. 3, pp. 335-366, 1979.Google ScholarGoogle ScholarCross RefCross Ref
  6. 6.{6 behave} Robert Rosenthal and Ralph Rosnow, ``Essentials of Behavioral Research: Methods and Data and Analysis'', McGraw Hill, second edition, 1991.Google ScholarGoogle Scholar
  7. 7.{7 shard} Upendra Shardanand, ``Social Information Filtering for Music Recommendation'', MIT EECS M. Eng. thesis, also TR-94-04, Learning and Common Sense Group, MIT Media Laboratory, 1994.Google ScholarGoogle Scholar

Index Terms

  1. Social information filtering: algorithms for automating “word of mouth”

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader

                HTML Format

                View this article in HTML Format .

                View HTML Format