Mobile Services Recommendation

  • Shuiguang DengEmail author
  • Hongyue Wu
  • Jianwei Yin
Part of the Advanced Topics in Science and Technology in China book series (ATSTC, volume 58)


The overwhelming amount of services makes it difficult for users to find appropriate services to meet their functional and non-functional requirements. Therefore, the service recommendation technique becomes an important role in helping using services. Besides the typical methods driven by service properties, some external information can also be introduced to improve the recommendation of mobile services. This chapter proposes three different recommendation approaches that consider users’ context, trust and social information respectively to improve the recommendation quality.


  1. 1.
    N. Thio, S. Karunasekera, Web service recommendation based on client-side performance estimation. Aust. Softw. Eng. Conf. 81–89 (2007)Google Scholar
  2. 2.
    M.B. Blak, M.F. Nowlan, A web service recommender system using enhanced syntactical matching. IEEE Int. Conf. Web Serv 575–582 (2007)Google Scholar
  3. 3.
    V. Srinivasan et al., Mobileminer: mining your frequent patterns on your phone, in Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM, 2014), pp. 389–400,
  4. 4.
    C. Davidsson, S. Moritz, Utilizing implicit feedback and context to recommend mobile applications from first use, in Proceedings of the 2011 Workshop on Context-awareness in Retrieval and Recommendation (ACM, 2011), pp. 19–22,
  5. 5.
    N. Natarajan, D. Shin, I.S. Dhillon, Which app will you use next? Collaborative filtering with interactional context, in Proceedings of the 7th ACM Conference on Recommender Systems (ACM, 2013), pp. 201–208,
  6. 6.
    L. Shao, J. Zhang, Y. Wei et al., Personalized QoS prediction for web services via collaborative filtering. IEEE Int. Conf. Web Serv. 439–446 (2007)Google Scholar
  7. 7.
    Y. Jiang, J. Liu, M. Tang, An effective web service recommendation method based on personalized collaborative filtering. IEEE Int. Conf.Web Serv. 211–218 (2011)Google Scholar
  8. 8.
    J. Golbeck, Computing and applying trust in web-based social networks. Ph.D Thesis, University of Maryland (2005)Google Scholar
  9. 9.
    P. Massa, P. Avesani, Trust metrics in recommender systems. in Computing with Social Trust, ed. by J. Golbeck (Springer, 2009)Google Scholar
  10. 10.
    H. Ma, I. King, M. Lyu, Learning to recommend with explicit and implicit social relation. ACM Trans. Intell. Syst. Technol. 2(3), 29–48 (2011)Google Scholar
  11. 11.
    M. Jamali, M. Ester, A matrix factorization technique with trust propagation for recommendation in social networks, in Proceeding of ACM Conference on Recommender Systems (2010), pp. 135–142Google Scholar
  12. 12.
    A.K. Dey, Understanding and using context. Personal Ubiquitous Comput 5 (1), 4–7 (2001).
  13. 13.
    N. Landwehr, M. Hall, E. Frank, Logistic model trees. Machine Learn. 59(1), 161–205 (2005).
  14. 14.
    J.R. Quinlan, C4. 5: Programs for Machine Learning (Elsevier, 2014)Google Scholar
  15. 15.
    H. Yu, C. Hsieh, S. Si, I. Dhillon, Parallel matrix factorization for recommender systems. Knowl. Inf. Syst. 41(3), 793–819 (2014)CrossRefGoogle Scholar
  16. 16.
    P. Avesani, P. Massa, R. Tiella, Moleskiing it: a trust-aware recommender system for ski mountaineering. Int. J. Infonomics 20(35), 1–19 (2005)Google Scholar
  17. 17.
    P. Massa, P. Avesani, Trust-aware recommender systems, in Proceeding of ACM Conference on Recommender Systems (2007), pp. 17–24Google Scholar
  18. 18.
    S. Deng, L. Huang, J. Wu, Z. Wu, Trust-based personalized service recommendation: a network perspective. J. Comput. Sci. Technol. 29(1), 69–80 (2014)CrossRefGoogle Scholar
  19. 19.
    A. Mnih, R. Salakhutdinov, Probabilistic matrix factorization, in Proceeding of Advances in Neural Information Processing Systems (2007), pp. 1257–1264Google Scholar
  20. 20.
    R. Salakhutdinov, A. Mnih, G. Hinton, Restricted Boltzmann machines for collaborative filtering, in Proceeding of International Conference on Machine Learning (2007), pp. 791–798Google Scholar
  21. 21.
    Z. Zhou, W. Wang, L. Wang, Community detection based on an improved modularity, in Pattern Recognition (Springer, Berlin Heidelberg, 2012)Google Scholar
  22. 22.
  23. 23.
    S. Roweis, L. Saul, Nonlinear dimensionality reduction by locally linear embedding. Science 290(5500), 2323–2326 (2000)CrossRefGoogle Scholar
  24. 24.
    J. Wang, Local tangent space alignment, in Geometric Structure of High-Dimensional Data and Dimensionality Reduction, ed. by J. Wang (Springer, 2011)Google Scholar
  25. 25.
    M. Belkin, P. Niyog, Laplacian eigenmaps for dimensionality reduction and data representation. Neural Comput. 15(6), 1373–1396 (2003)CrossRefGoogle Scholar
  26. 26.
    M. Balasubramanian, E. Schwartz, The isomap algorithm and topological stability. Science 295(5552), 7–7 (2002)CrossRefGoogle Scholar
  27. 27.
    Q. Gu, J. Zhou, C. Ding, Collaborative filtering: weighted nonnegative matrix factorization incorporating user and item graphs, in Proceeding of SIAM International Conference on Data Mining (2010), pp. 199–210Google Scholar
  28. 28.
    P. Victor, M. Cock, C. Cornelis, Trust and recommendations, in Recommender Systems Handbook, ed. by P. Kantor, L. Rokach, F. Ricci, B. Shapira (Springer, 2011)Google Scholar
  29. 29.
    P. Massa, P. Avesani, Trust metrics on controversial users: balancing between Tyranny of the majority. Int. J. Semant. Web Inf. Syst. 3(1), 39–64 (2007)CrossRefGoogle Scholar

Copyright information

© Zhejiang University Press and Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.College of Computer Science and TechnologyZhejiang UniversityHuangzhouChina
  2. 2.College of Intelligence and ComputingTianjin UniversityTianjinChina

Personalised recommendations