{"_id":"mRta6ZoanQF5htcex","bibbaseid":"jang-faloutsos-kim-kang-ha-pintrustfasttrustpropagationexploitingpositiveimplicitandnegativeinformation-2016","author_short":["Jang, M.","Faloutsos, C.","Kim, S.","Kang, U","Ha, J."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Min-Hee"],"propositions":[],"lastnames":["Jang"],"suffixes":[]},{"firstnames":["Christos"],"propositions":[],"lastnames":["Faloutsos"],"suffixes":[]},{"firstnames":["Sang-Wook"],"propositions":[],"lastnames":["Kim"],"suffixes":[]},{"firstnames":["U"],"propositions":[],"lastnames":["Kang"],"suffixes":[]},{"firstnames":["Jiwoon"],"propositions":[],"lastnames":["Ha"],"suffixes":[]}],"editor":[{"firstnames":["Snehasis"],"propositions":[],"lastnames":["Mukhopadhyay"],"suffixes":[]},{"firstnames":["ChengXiang"],"propositions":[],"lastnames":["Zhai"],"suffixes":[]},{"firstnames":["Elisa"],"propositions":[],"lastnames":["Bertino"],"suffixes":[]},{"firstnames":["Fabio"],"propositions":[],"lastnames":["Crestani"],"suffixes":[]},{"firstnames":["Javed"],"propositions":[],"lastnames":["Mostafa"],"suffixes":[]},{"firstnames":["Jie"],"propositions":[],"lastnames":["Tang"],"suffixes":[]},{"firstnames":["Luo"],"propositions":[],"lastnames":["Si"],"suffixes":[]},{"firstnames":["Xiaofang"],"propositions":[],"lastnames":["Zhou"],"suffixes":[]},{"firstnames":["Yi"],"propositions":[],"lastnames":["Chang"],"suffixes":[]},{"firstnames":["Yunyao"],"propositions":[],"lastnames":["Li"],"suffixes":[]},{"firstnames":["Parikshit"],"propositions":[],"lastnames":["Sondhi"],"suffixes":[]}],"title":"PIN-TRUST: Fast Trust Propagation Exploiting Positive, Implicit, and Negative Information","booktitle":"Proceedings of the 25th ACM International Conference on Information and Knowledge Management, CIKM 2016, Indianapolis, IN, USA, October 24-28, 2016","pages":"629–638","publisher":"ACM","year":"2016","url":"https://doi.org/10.1145/2983323.2983753","doi":"10.1145/2983323.2983753","timestamp":"Thu, 13 Aug 2020 18:13:41 +0200","biburl":"https://dblp.org/rec/conf/cikm/JangFKKH16.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/cikm/JangFKKH16,\n author = {Min{-}Hee Jang and\n Christos Faloutsos and\n Sang{-}Wook Kim and\n U Kang and\n Jiwoon Ha},\n editor = {Snehasis Mukhopadhyay and\n ChengXiang Zhai and\n Elisa Bertino and\n Fabio Crestani and\n Javed Mostafa and\n Jie Tang and\n Luo Si and\n Xiaofang Zhou and\n Yi Chang and\n Yunyao Li and\n Parikshit Sondhi},\n title = {{PIN-TRUST:} Fast Trust Propagation Exploiting Positive, Implicit,\n and Negative Information},\n booktitle = {Proceedings of the 25th {ACM} International Conference on Information\n and Knowledge Management, {CIKM} 2016, Indianapolis, IN, USA, October\n 24-28, 2016},\n pages = {629--638},\n publisher = {{ACM}},\n year = {2016},\n url = {https://doi.org/10.1145/2983323.2983753},\n doi = {10.1145/2983323.2983753},\n timestamp = {Thu, 13 Aug 2020 18:13:41 +0200},\n biburl = {https://dblp.org/rec/conf/cikm/JangFKKH16.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Jang, M.","Faloutsos, C.","Kim, S.","Kang, U","Ha, J."],"editor_short":["Mukhopadhyay, S.","Zhai, C.","Bertino, E.","Crestani, F.","Mostafa, J.","Tang, J.","Si, L.","Zhou, X.","Chang, Y.","Li, Y.","Sondhi, P."],"key":"DBLP:conf/cikm/JangFKKH16","id":"DBLP:conf/cikm/JangFKKH16","bibbaseid":"jang-faloutsos-kim-kang-ha-pintrustfasttrustpropagationexploitingpositiveimplicitandnegativeinformation-2016","role":"author","urls":{"Paper":"https://doi.org/10.1145/2983323.2983753"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/f/CFaloutsos.bib","dataSources":["zM4wMHSu34vjmb6Cm"],"keywords":[],"search_terms":["pin","trust","fast","trust","propagation","exploiting","positive","implicit","negative","information","jang","faloutsos","kim","kang","ha"],"title":"PIN-TRUST: Fast Trust Propagation Exploiting Positive, Implicit, and Negative Information","year":2016}