skip to main content
article

PocketLens: Toward a personal recommender system

Published:01 July 2004Publication History
Skip Abstract Section

Abstract

Recommender systems using collaborative filtering are a popular technique for reducing information overload and finding products to purchase. One limitation of current recommenders is that they are not portable. They can only run on large computers connected to the Internet. A second limitation is that they require the user to trust the owner of the recommender with personal preference data. Personal recommenders hold the promise of delivering high quality recommendations on palmtop computers, even when disconnected from the Internet. Further, they can protect the user's privacy by storing personal information locally, or by sharing it in encrypted form. In this article we present the new PocketLens collaborative filtering algorithm along with five peer-to-peer architectures for finding neighbors. We evaluate the architectures and algorithms in a series of offline experiments. These experiments show that Pocketlens can run on connected servers, on usually connected workstations, or on occasionally connected portable devices, and produce recommendations that are as good as the best published algorithms to date.

References

  1. Ackerman, M. S., Cranor, L. F., and Reagle, J. 1999. Privacy in e-commerce: Examining user scenarios and privacy preferences. In ACM Conference on Electronic Commerce. 1--8.]] Google ScholarGoogle Scholar
  2. Aggarwal, C., Wolf, J., Wu, K., and Yu, P. 1999. Horting hatches an egg: A new graph-theoretic approach to collaborative filtering. In Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 201--212.]] Google ScholarGoogle Scholar
  3. Anderson, D. P., Cobb, J., Korpela, E., Lebofsky, M., and Werthimer, D. 2002. Seti@home: An experiment in public-resource computing. Comm. ACM 45, 11 (November), 56--61.]] Google ScholarGoogle Scholar
  4. AP. 2002. New shopping technology could breed supermarket class system. San Jose Mercury News (November 10).]]Google ScholarGoogle Scholar
  5. Billsus, D. and Pazzani, M. J. 1998. Learning collaborative information filters. In Proceedings of the 15th International Conference on Machine Learning. Morgan Kaufmann, San Francisco, CA, 46--54.]] Google ScholarGoogle Scholar
  6. Bouch, A., Kuchinsky, A., and Bhatti, N. 2002. Quality is in the eye of the beholder: Meeting users' requirements for internet quality of service. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systms. ACM Press, 297--304.]] Google ScholarGoogle Scholar
  7. Breese, J. S., Heckerman, D., and Kadie, C. 1998. Empirical analysis of predictive algorithms for collaborative filtering. In Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence (UAI-98). 43--52.]] Google ScholarGoogle Scholar
  8. Canny, J. 2002a. Collaborative filtering with privacy. In IEEE Symposium on Security and Privacy. 45--57.]] Google ScholarGoogle Scholar
  9. Canny, J. 2002b. Collaborative filtering with privacy: To appear. In IEEE Conference on Security and Privacy.]] Google ScholarGoogle Scholar
  10. Canny, J. 2002c. Collaborative filtering with privacy via factor analysis. In Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval.]] Google ScholarGoogle Scholar
  11. Chavez, A. and Maes, P. 1996. Kasbah: An agent marketplace for buying and selling goods. In the First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM'96). Practical Application Company, London, UK, 75--90.]]Google ScholarGoogle Scholar
  12. Chen, Y., Edler, J., Goldberg, A., Gottlieb, A., Sobti, S., and Yianilos, P. 1999. A prototype implementation of archival intermemory. In Proceedings of the Fourth ACM International Conference on Digital Libraries.]] Google ScholarGoogle Scholar
  13. Clarke, I., Hong, T. W., Miller, S. G., Sandberg, O., and Wiley, B. 2002. Protecting free expression online with freenet. IEEE Internet Computing. 6, 1 (January), 40--49.]] Google ScholarGoogle Scholar
  14. Claypool, M., Le, P., Waseda, M., and Brown, D. 2001. Implicit interest indicators. In Proceedings of the ACM Intelligent User Interfaces Conference (IUI).]] Google ScholarGoogle Scholar
  15. Clymer, A. 2003. Troops risk identity theft after burglary. New York Times (January 12).]]Google ScholarGoogle Scholar
  16. Cramer, R., Gennaro, R., and Schoenmakers, B. 1997. A secure and optimally efficient multi-authority election scheme. Lecture Notes in Computer Science 1233, 103--118.]] Google ScholarGoogle Scholar
  17. Dabek, F., Kaashoek, M. F., Karger, D., Morris, R., and Stoica, I. 2001. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01). Chateau Lake Louise, Banff, Canada.]] Google ScholarGoogle Scholar
  18. Devore, J. L. 1995. Probability and Statistics for Engineering and the Sciences, fourth edition Duxbury Press.]]Google ScholarGoogle Scholar
  19. Dingledine, R., Freedman, M. J., and Molnar, D. 2001. The free haven project: Distributed anonymous storage service. Lecture Notes in Computer Science 2009.]] Google ScholarGoogle Scholar
  20. Druschel, P. and Rowstron, A. 2001. PAST: A large-scale, persistent peer-to-peer storage utility. In Proceedings of HOTOS. 75--80.]] Google ScholarGoogle Scholar
  21. Foner, L. 1999. Political artifacts and personal privacy: The yenta multi-agent distributed matchmaking system. Ph.D. thesis, Massachusetts Institute of Technology.]] Google ScholarGoogle Scholar
  22. Foner, L. N. 1996. A multi-agent referral system for matchmaking. Proceedings of the Second International Conference on Multi-Agent System (ICMAS-96).]]Google ScholarGoogle Scholar
  23. Freedman, M. J. and Morris, R. 2002. Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002). Washington, D.C.]] Google ScholarGoogle Scholar
  24. Friedman, E. and Resnick, P. 1999. The social cost of cheap pseudonyms. Journal of Economics and Management Strategy, 10, 2 (August), 173--199.]]Google ScholarGoogle Scholar
  25. Gnutella. Gnutella website http://gnutella.wego.com.]]Google ScholarGoogle Scholar
  26. Goecks, J. and Shavlik, J. 2002. Learning users' interests by unobtrusively observing their normal behavior. In Proceedings of the ACM Intelligent User Interfaces Conference (IUI).]] Google ScholarGoogle Scholar
  27. Goldschlag, D., Reed, M., and Syverson, P. 1999. Onion routing for anonymous and private internet connections. Comm. ACM 42, 2 (February), 39--41.]] Google ScholarGoogle Scholar
  28. Good, N., Schafer, B., Konstan, J., Borchers, A., Sarwar, B., Herlocker, J., and Riedl, J. 1999. Combining collaborative filtering with personal agents for better recommendations. In Proceedings of the 1999 Conference of the American Association of Artificial Intelligence (AAAI-99).]] Google ScholarGoogle Scholar
  29. Hansell, S. 2002. Privacy policy on web shifts as profits ebb. New York Times (April 11).]]Google ScholarGoogle Scholar
  30. Herlocker, J., Konstan, J., Borchers, A., and Riedl, J. 1999. An algorithmic framework for performing collaborative filtering. In Proceedings of the 1999 Conference on Research and Development in Information Retrieval (SIGIR-99).]] Google ScholarGoogle Scholar
  31. Jovanovic, M. A. 2001. Modelling large peer-to-peer networks and a case study of gnutella. M.S. thesis, University of Cincinnati.]]Google ScholarGoogle Scholar
  32. Karger, D., Lehman, E., Leighton, T., Levine, M., Lewin, D., and Panigrahy, R. 1997. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web. In ACM Symposium on Theory of Computing. 654--663.]] Google ScholarGoogle Scholar
  33. Karypis, G. 2001. Evaluation of item-based top-n recommendation algorithms. In Proceedings of the 10th Conference of Information and Knowledge Management.]] Google ScholarGoogle Scholar
  34. Kubiatowicz, J., Bindel, D., Chen, Y., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., and Zhao, B. 2000. Oceanstore: An architecture for global-scale persistent storage. In Proceedings of ACM ASPLOS. ACM.]] Google ScholarGoogle Scholar
  35. Lyman, P. and Varian, H. 2000. How much information? http://www.sims.berkeley.edu/how-much-info.]]Google ScholarGoogle Scholar
  36. Maes, P. 1994. Agents that reduce work and information overload. Comm. ACM 37, 7 (July), 30--40.]] Google ScholarGoogle Scholar
  37. Maes, P. and Kozierok, R. 1993. Learning interface agents. In Proceedings of AAAI-93 and IAAI-93. AAAI Press; Menlo Park, CA, USA.]]Google ScholarGoogle Scholar
  38. Miller, B., Riedl, J., and Konstan, J. 2002. From Usenet to CoWebs: Interacting with Social Information Systems. Springer Verlag, Chapter Experiences in Applying Collaborative Filtering to a Social Information System.]]Google ScholarGoogle Scholar
  39. Minar, N. 1998. Designing an ecology of distributed agents. M.S. thesis, MIT.]]Google ScholarGoogle Scholar
  40. Minar, N., Gray, M., Roup, O., Krikorian, R., and Maes, P. 1999. Hive: Distributed agents for networking things. In First International Symposium on Agent Systems and Applications (ASA'99)/Third International Symposium on Mobile Agents (MA'99). Palm Springs, CA, USA.]] Google ScholarGoogle Scholar
  41. Mobasher, B., Cooley, R., and Srivastava, J. 2000. Automatic personalization based on Web usage mining. Comm. ACM 43, 8, 142--151.]] Google ScholarGoogle Scholar
  42. Mobasher, B., Dai, H., and Tao, M. 2002. Discovery and evaluation of aggregate usage profiles for web personalization. Data Mining and Knowledge Discovery 6, 61--82.]] Google ScholarGoogle Scholar
  43. Morita, M. and Shinoda, Y. 1994. Information filtering based on user behavior analysis and best match text retrieval. In Proceedings of the 17th International Conference on Research and Development in Information Retrieval. SIGIR 94, W. Croft and C. van Rijsbergen, Eds. Springer-Verlag; Berlin, Germany, 48.]] Google ScholarGoogle Scholar
  44. Moukas, A. and Zacharia, G. 1997. Evolving a multi-agent information filtering solution in amalthaea. In Proceedings of Autonomous Agents 97.]] Google ScholarGoogle Scholar
  45. Neumann, P. G. 1995. Computer Related Risks. Addison Wesley.]] Google ScholarGoogle Scholar
  46. Pedersen, T. 1991. A threshold cryptosystem without a trusted party. In Advances in Cryptology - EUROCRYPT'91 Lecture Notes in Computer Science, D. W. Davies, Ed. Vol. 547. Springer-Verlag, 522--526.]]Google ScholarGoogle Scholar
  47. Ratnasamy, S., Francis, P., Handley, M., Karp, R., and Shenker, S. 2001. A scalable content addressable network. In Proceedings of ACM SIGCOMM 2001.]] Google ScholarGoogle Scholar
  48. Resnick, P., Iacovou, N., Sushak, M., Bergstrom, P., and Riedl, J. 1994. Grouplens: An open architecture for collaborative filtering of netnews. In Proceedings of CSCW 1994. ACM SIG Computer Supported Cooperative Work.]] Google ScholarGoogle Scholar
  49. Ripeanu, M., Foster, I., and Iamnitchi, A. 2002. Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Comput. J. 6, 1.]] Google ScholarGoogle Scholar
  50. Rowstron, A. and Druschel, P. 2001a. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. Lecture Notes in Computer Science 2218.]] Google ScholarGoogle Scholar
  51. Rowstron, A. I. T. and Druschel, P. 2001b. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Symposium on Operating Systems Principles. 188--201.]] Google ScholarGoogle Scholar
  52. Sarwar, B., Konstan, J., Borchers, A., Herlocker, J., Miller, B., and Riedl, J. 1998. Using filtering agents to improve prediction quality in the grouplens research collaborative filtering system. In Proceedings of the 1998 Conference on Computer Supported Cooperative Work.]] Google ScholarGoogle Scholar
  53. Sarwar, B., Konstan, J., and Riedl, J. 2001. Internet Commerce and Software Agents: Cases, Technologies, and Opportunities. Idea Group, Chapter Distributed Recommender Systems: New Opportunities for Internet Commerce, Idea Group Publishing, Hershey, PA.]]Google ScholarGoogle Scholar
  54. Sarwar, B. M., Karypis, G., Konstan, J. A., and Riedl, J. 2000a. Analysis of recommender algorithms for e-commerce. In ACM E-Commerce 2000. 158--167.]] Google ScholarGoogle Scholar
  55. Sarwar, B. M., Karypis, G., Konstan, J. A., and Riedl, J. 2000b. Application of dimensionality reduction in recommender system---a case study. In ACM WebKDD 2000 Web Mining for E-Commerce Workshop.]]Google ScholarGoogle Scholar
  56. Sarwar, B. M., Karypis, G., Konstan, J. A., and Riedl, J. 2001. Item-based collaborative filtering recommendation algorithms. In Proceedings of the 10th International World Wide Web Conference (WWW10). Hong Kong.]] Google ScholarGoogle Scholar
  57. Shardanand, U. and Maes, P. 1995. Social information filtering: Algorithms for automating 'word of mouth'. In Human Factors in Computing Systems CHI '95 Conference Proceedings. 210--217.]] Google ScholarGoogle Scholar
  58. Sheth, B. and Maes, P. 1993. Evolving agents for personalized information filtering. In Proceedings of 9th IEEE Conference on Artificial Intelligence for Applications. IEEE Computer Society Press; Los Alamitos, CA, USA.]]Google ScholarGoogle Scholar
  59. Shirkey, C. 2001. Peer-to-Peer, Harnessing the Power of Disruptive Technologies. O'Reilly and Associates, Chapter Listening to Napster.]]Google ScholarGoogle Scholar
  60. Stoica, I., Morris, R., Karger, D., Kaashoek, F., and Balakrishnan, H. 2001. Chord: A scalable Peer-To-Peer lookup service for internet applications. In Proceedings of the 2001 ACM SIGCOMM Conference. 149--160.]] Google ScholarGoogle Scholar
  61. Terveen, L., Hill, W., Amento, B., McDonald, D., and Creter, J. 1997. Phoaks: A system for sharing recommendations. Comm. ACM 40, 3 (Mar.), 59--62.]] Google ScholarGoogle Scholar
  62. Ungar, L. and Foster, D. 1998. Clustering methods for collaborative filtering. In Proceedings of the Workshop on Recommendation Systems. AAAI Press, Menlo Park California.]]Google ScholarGoogle Scholar
  63. Waldman, M. and Mazi, D. 2001. Tangler: a censorship-resistant publishing system based on document entanglements. In ACM Conference on Computer and Communications Security. 126--135.]] Google ScholarGoogle Scholar
  64. Waldman, M., Rubin, A. D., and Cranor, L. F. 2000. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proceedings of the 9th USENIX Security Symposium. 59--72.]] Google ScholarGoogle Scholar
  65. Whelan, C. 2002. How consumers can strike back if their identity has been stolen. Wall Street Journal (August 21).]]Google ScholarGoogle Scholar
  66. Wingfield, N. and Pereira, J. December, 2002. Amazon uses faux suggestions to promote new clothing store. Wall Street Journal (December 4).]]Google ScholarGoogle Scholar

Index Terms

  1. PocketLens: Toward a personal recommender system

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader