Systems and methods for making recommendations using model-based collaborative filtering with user communities and items collections

ABSTRACT

Massively scalable, memory and model-based techniques are an important approach for practical large-scale collaborative filtering. We describe a massively scalable, model-based recommender system and method that extends the collaborative filtering techniques by explicitly incorporating these types of user and item knowledge. In addition, we extend the Expectation-Maximization algorithm for learning the conditional probabilities in the model to coherently accommodate time-varying training data.

COPYRIGHT NOTICE

©2002-2003 Strands, Inc. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the U.S. Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. 37 CFR §1.71(d).

TECHNICAL FIELD

This invention pertains to systems and methods for making recommendations using model-based collaborative filtering with user communities and items collections.

BACKGROUND

It has become a cliché that attention, not content, is the scarce resource in any internet market model. Search engines are imperfect means for dealing with attention scarcity since they require that a user has reasoned enough about the items to which he or she would like to devote attention to have attached some type of descriptive keywords. Recommender engines seek to replace the need for user reasoning by inferring a user's interests and preferences implicitly or explicitly and recommending appropriate content items for display to and attention by the user.

Exactly how a recommender engine infers a user's interests and preferences remains an active research topic linked to the broader problem of understanding in machine learning. In the last two years, as large-scale web applications have incorporated recommendation technology, these areas in machine learning evolve to include problems in data-center scale, massively concurrent computation. At the same time, the sophistication of recommender architectures increased to include model-based representations for knowledge used by the recommender, and in particular models that shape recommendations based on the social networks and other relationships between users as well as a prior specified or learned relationships between items, including complementary or substitute relationships.

In accordance with these recent trends, we describe systems and methods for making recommendations using model-based collaborative filtering with user communities and item collections that is suited to data-center scale, massively concurrent computations.

BRIEF DRAWINGS DESCRIPTION

FIG. 1( a) is a user-item-factor graph.

FIG. 1( b) is a item-item-factor graph.

FIG. 2 is an embodiment of a data model including user communities and items collections for use in a system and method for making recommendations.

FIG. 3 is an embodiment of a data model including user communities and items collections for use in a system and method for making recommendations.

FIG. 4 is an embodiment of a system and method for making recommendations.

DETAILED DESCRIPTION

Additional aspects and advantages of this invention will be apparent from the following detailed description of preferred embodiments, which proceeds with reference to the accompanying drawings.

We begin by a brief review of memory-based systems and a more detailed description of model-based systems and methods. We end with a description of adaptive model-based systems and methods that compute time-varying conditional probabilities.

A Formal Description of the Recommendation Problem

Tripartite graph

_(USF) shown in FIG. 1( a) models matching users to items. The square nodes

={u₁, u₂, . . . , u_(M)} represent users and the round nodes

={s₁, s₂, . . . , s_(N)} represent items. In this context, a user may be a physical person. A user may also be a computing entity that will use the recommended content items for further processing. Two or more users may form a cluster or group having a common property, characteristic, or attribute. Similarly, an item may be any good or service. Two or more items may form a cluster or group having a common property, characteristic, or attribute. The common property, characteristic, or attribute of an item group may be connected to a user or a cluster of users. For example, a recommender engine may recommend books to a user based on books purchased by other users having similar book purchasing histories.

The function c(u; τ) represents a vector of measured user interests over the categories

for user u at time instant τ. Similarly, the function a(s; τ) represents a vector of item attributes

for item s at time instant τ. The edge weights h(u, s; τ) are measured data that in some way indicate the interest user u has in item s at time instant τ. Frequently h(u, s; n) is visitation data but may be other data, such as purchasing history. For expressive simplicity, we will ordinarily omit the time index τ unless it is required to clarify the discussion.

The octagonal nodes

={z₁, z₂, . . . , z_(K)} in the

_(USF) graph are factors in an underlying model for the relationship between user interests and items. Intuition suggests that the value of recommendations traces to the existence of a model that represents a useful clustering or grouping of users and items. Clustering provides a principled means for addressing the collaborative filtering problem of identifying items of interest to other users whose interests are related to the user's, and for identifying items related to items known to be of interest to a user.

Modeling the relationship between user interests and items may involve one or two types of collaborative filtering algorithms. Memory-based algorithms consider the graph

_(US) without the octagonal factor nodes in

_(USF) of FIG. 1( a) essentially to fit nearest-neighbor regressions to the high-dimension data. In contrast, model-based algorithms propose that solutions for the recommender problem actually exist on a lower-dimensional manifold represented by the octagonal nodes.

Memory-Based Algorithms

As defined above, a memory-based algorithm fits the raw data used to train the algorithm with some form of nearest-neighbor regression that relates items and users in a way that has utility for making recommendations. One significant class of these systems can be represented by the non-linear form

X=f(h(u ₁ ,s ₁), . . . ,h(u _(M) ,s _(N)),c(u ₁), . . . ,c(u _(M)),a(s ₁), . . . ,a(s _(N)),X)   (1)

where X is an appropriate set of relational measures. This form can be interpreted as an embedding of the recommender problem as fixed-point problem in an |U|+|S | dimension data space.

Implicit Classification Via Linear Embeddings

The embedding approach seeks to represent the strength of the affinities between users and items by distances in a metric space. High affinities correspond to smaller distances so that users and items are implicitly classified into groupings of users close to items and groupings of items close to users. A linear convex embedding may be generalized as

$\begin{matrix} \begin{matrix} {X = {{{\begin{bmatrix} 0 & H_{US} \\ H_{SU} & 0 \end{bmatrix}\begin{bmatrix} X_{UU} & X_{US} \\ X_{SU} & X_{SS} \end{bmatrix}}{\sum\limits_{n = 1}^{M + N}\; X_{mn}}} = 1}} \\ {= {HX}} \end{matrix} & (2) \end{matrix}$

where H is matrix representation for the weights, with submatrices H_(US) and H_(SU) such that h_(US;mn)=h(u_(m), s_(n)) and h_(SU;mn)=h(s_(n), u_(m)). The desired affinity measures describing the affinity of user u_(m) for items s₁, . . . , s_(N) is the m-th row of the submatrix X_(US). Similarly, the desired measures describing the affinity of users u₁, . . . , u_(M) for item s_(n) is the n-th row of the submatrix X_(SU). The submatrices X_(UU)=H_(US)X_(SU) and X_(SS)=H_(SU)X_(US) are user-user and item-item affinities, respectively.

If a non-zero X exists that satisfies (2) for a given H, it provides a basis for building the item-item companion graph

_(UU) shown in FIG. 1( b). There are a number of ways that the edge weights h′(s₁, s_(N)) representing the similarities of the item nodes s_(l) and s_(n) in the graph can be computed. One straightforward solution is to consider h(u_(m), s_(n)) and h(s_(n), u_(m)) to be proportional to the strength of the relationship between item u_(m) and s_(n), and the relationship between s_(n) and u_(m), respectively. Then we can let the strength of the relationship between s_(l) and s_(m), as

${h^{\prime}\left( {s_{l},s_{n}} \right)} = {\sum\limits_{m = 1}^{M}\; {{h\left( {s_{l},u_{m}} \right)}{h\left( {u_{m},s_{n}} \right)}}}$

so the entire set of relationships can be represented in matrix form as V=H_(SU)H_(US). The affinity of s_(l) and s_(n) then satisfies

X _(SS) =H′X _(SS) =H _(SU) H _(US) X _(SS)

which can be derived directly from (2) since

$X = {{\begin{bmatrix} {H_{US}H_{SU}} & 0 \\ 0 & {H_{SU}H_{US}} \end{bmatrix}X} = {H^{2}X}}$

In memory-based recommenders, the proposed embedding does not exist for an arbitrary weighted bipartite graph

_(US). In fact, an embedding in which X has rank greater than 1 exists for a weighted bipartite g_(US) if and only if the adjacency matrix has a defective eigenvalue. This is because H has the decomposition

$H = {{Y\begin{bmatrix} {{\lambda_{1}I} + T_{1}} & \cdots & 0 \\ \vdots & ⋰ & \vdots \\ 0 & \cdots & {{\lambda_{k}I} + T_{k}} \end{bmatrix}}Y^{- 1}}$

where the Y is a non-singular matrix, λ₁, . . . , λ_(k) and T₁, . . . , T_(k) are upper-triangular submatrices with 0's on the diagonal. In addition, the rank of the null-space of T_(i) is equal to the number of independent eigenvectors of H associated with eigenvalue λ_(i). Now, if λ₁=1 is a non-defective eigenvalue with algebraic multiplicity greater than 1, T_(i)=0.

Q is a real, orthogonal matrix and Λ is a diagonal matrix with the eigenvalues of H on the diagonal. The form (2) implies that W has the single eigenvalue “1” so that Λ=I and

H=QIQ^(T) =I

Now, an arbitrary defective H can be expressed as

H=Y[I+T]Y ⁻¹ =I+YTY⁻¹

where Y is non-singular and T is block upper-triangular with “0”'s on the diagonal. The rank of the null-space is equal to the number of independent eigenvectors of H. If H is non-defective, which includes the symmetric case, T must be the 0 matrix and we see again that H=1.

Now on the other hand, if H is defective, from (2) we have (H−I)X=0 and we see that

YTY⁻¹X=0

where the rank of the null-space of T is less than N+M. For an X to exist that satisfies the embedding (2), there must exist a graph

_(US) with the singular adjacency matrix H−I. This is simply the original graph

_(US) with a self-edge having weight −1 added to each node. The graph

_(US) is no longer bipartite, but it still has a bipartite quality: If there is no edge between two distinct nodes in

_(US), there is no edge between two nodes in

_(US). Various structural properties in

_(US) can result in a singular adjacency matrix H=I. For the matrix X to be non-zero and the proposed embedding to exist, H must have properties that correspond to strong assumptions on users' preferences.

The Adsorption Algorithm

The linear embedding (2) of the recommendation problem establishes a structural isomorphism between solutions to the embedding problem and the solutions generated by adsorption algorithm for some recommenders. In a generalized approach, the recommender associates vectors p_(c) (u_(m)) and p_(A) (s_(n)) representing probability distributions Pr(c; u_(m)) and Pr(a; s_(n)) over

and

respectively, with the vectors c(u_(m)) and a(s_(n)) such that

$\begin{matrix} {\begin{matrix} {P = {{{\begin{bmatrix} 0 & H_{US} \\ H_{SU} & 0 \end{bmatrix}\begin{bmatrix} P_{UA} & P_{UC} \\ P_{SA} & P_{SC} \end{bmatrix}}{\sum\limits_{n = 1}^{{} + {}}\; P_{mn}}} = 1}} \\ {= {HP}} \end{matrix}{where}{P_{UA} = {{\begin{bmatrix} {p_{A}^{T}\left( u_{1} \right)} \\ \vdots \\ {p_{A}^{T}\left( u_{M} \right)} \end{bmatrix}\mspace{14mu} P_{UC}} = \begin{bmatrix} {p_{C}^{T}\left( u_{1} \right)} \\ \vdots \\ {p_{C}^{T}\left( u_{M} \right)} \end{bmatrix}}}P_{SA} = {{\begin{bmatrix} {p_{\Lambda}^{T}\left( s_{1} \right)} \\ \vdots \\ {p_{\Lambda}^{T}\left( s_{N} \right)} \end{bmatrix}\mspace{14mu} P_{SC}} = \begin{bmatrix} {p_{C}^{T}\left( s_{1} \right)} \\ \vdots \\ {p_{C}^{T}\left( s_{N} \right)} \end{bmatrix}}} & (3) \end{matrix}$

The matrices P_(SA) and P_(UC) are matrices composed of the

distrubution p_(A) (s_(n)) and the

distributions p_(c) (u_(m)) written as row vectors. The

distributions p_(A) (u_(m)) a

distributions p_(c) (s_(n)) that form the row vectors of the matrices P^(UA) and P_(SC) matrices are the projections of the distributions in P_(SA) and P_(UC), respectively, under the linear embedding (2).

Although P is an (

+

)×(

+

) matrix, it bears a specific relationship to the matrix X that implies that if the 0 matrix is the only solution for X then the 0 matrix if the only solution for P. The columns of P must have the columns of X as a basis and therefore the column space has dimension M+N at most. If X does not exist, then the null space of YTY⁻¹ has dimension M+N and P must be the 0 matrix if W is not the identity matrix.

Conversely, if X exists, even though a non-zero P that meets the row-scaling constraints on P in (3) may not exist, a non-zero

P _(R) =r ⁻¹ [X|X| . . . |X]

composed of

r=┌(

+

)/(

+

)┐

replications of X that meets the row-scaling constraints does exist. From this we deduce an entire subspace of matrices P_(R) exists. A P with

+

columns selected from any matrix in this subspace and rows re-nonnalized to meet the row-scaling constraints may be a sufficient approximation for many applications.

Embedding algorithms including the adsorption algorithm are learning methods for a class of recommender algorithms. The key idea behind the adsorption algorithm that similar item nodes will have similar component metric vectors p_(A) (s_(n)) does provide the basis for an adsorption-based recommendation algorithm. The component metrics p_(A) (s_(n)) can be approximated by several rounds of an iterative MapReduce computation with run-time

(M+N). The component metrics may be compared to develop lists of similar items. If these comparisons are limited to a fixed-sized neighborhood, they can be easily parallelized as a MapReduce computation with run-time (N). The resulting lists are then used by the recommender to generate recommendations.

Model-Based Algorithms

Memory-based solutions to the recommender problem may be adequate for many applications. As shown here though, they can be awkward and have weak mathematical foundations. The memory-based recommender adsorption algorithm proceeds from the simple concept that the items a user might find interesting should display some consistent set of properties, characteristics, or attributes and the users to whom an item might appeal should have some consistent set of properties, characteristics, or attributes. Equation (3) compactly expresses this concept. Model-based solutions can offer more principled and mathematically sound grounds for solutions to the recommender problem. The model-based solutions of interest here represent the recommender problem with the full graph

_(USF) that includes the octagonal factor nodes shown in FIG. 1( a).

Explicit Classification In Collaborative Filters

To further clarify the conceptual difference between the particular family of memory-based algorithms that we describe above, and the particular family of model-based algorithms that we describe below, we focus on how each algorithm classifies users and items. The family of adsorption algorithms we discuss above explicitly computes vector of probabilities p_(c) (u) and p_(A) (s) that describe how much interests in set

apply to user u and attributes in set A apply to item s, respectively. These probability vectors implicitly define communities of users and items which a specific implementation may make explicit by computing similarities between users and between items in a post-processing step.

Recommenders incorporating model-based algorithms explicitly classify users and items into latent clusters or groupings, represented by the octagonal factor nodes

={z₁, . . . , z_(K)} in FIG. 1( b), which match user communities with item collections of interest to the factor z_(k). The degree to which user u_(m) and item s_(n) belong to factor z_(k) is explicitly computed, but generally, no other descriptions of the properties of users and items corresponding to the probability vectors in the adsorption algorithms and which can be used to compute similarities are explicitly computed. The relative importance of the interests in

of similar users and the relative importance of the attributes in

of similar items can be implicitly inferred from the characteristic descriptions for users and items in the factors z_(k).

Probabilistic Latent Semantic Indexing Algorithms

A recommender may implement a user-item co-occurrence algorithm from a family of probabilistic latent semantic indexing (PLSI) recommendation algorithms. This family also includes versions that incorporate ratings. In simplest terms, given T user-item data pairs

={(u_(m) ₁ , S_(n) ₁ ), . . . , (u_(m) _(T) , s_(n) _(T) )}, the recommender estimates a conditional probability distribution Pr(s|u, θ) that maximizes a parametric maximum likelihood estimator (PMLE)

${\hat{R}(\theta)} = {{\prod\limits_{{({u,s})} \in }\; {\Pr \left( {{su},\theta} \right)}} = {\prod\limits_{u \in }\; {\prod\limits_{s \in }\; {\Pr \left( {{su},\theta} \right)}^{b_{us}}}}}$

where b_(us) is the number of occurrences of the user-item pair (u, s) in the input data set. Maximizing the PMLE is equivalent to minimizing the empirical logarithmic loss function

$\begin{matrix} {{R(\theta)} = {{{- \frac{1}{T}}\log {\hat{R}(\theta)}} = {{- \frac{1}{T}}{\sum\limits_{u \in }\; {\sum\limits_{s \in }\; {b_{us}\log \; {\Pr \left( {{su},\theta} \right)}}}}}}} & (4) \end{matrix}$

The PLSI algorithm treats users u_(m) and items s_(n) as distinct states of a user variable u and an item variable s, respectively. A factor variable z with the factors s_(k) as states is associated with each user and item pair so that the input actually consists of triples (u_(m), s_(n), z_(k)), where z_(k) is a hidden data value such that the user variable u conditioned on z and the item variable s conditioned on z are independent and

$\begin{matrix} {{{\Pr \left( {{zu},s} \right)}{\Pr \left( {su} \right)}{\Pr (u)}} = {{\Pr \left( {u,{sz}} \right)}{\Pr (z)}}} \\ {= {{\Pr \left( {sz} \right)}{\Pr \left( {uz} \right)}{\Pr (z)}}} \\ {= {{\Pr \left( {sz} \right)}{\Pr \left( {zu} \right)}{\Pr (u)}}} \\ {= {{\Pr \left( {s,{zu}} \right)}{\Pr (u)}}} \end{matrix}$

The conditional probability Pr(s|u, θ) which describes how much item s ∈

is likely to be of interest to user u ∈

then satisfies the relationship

$\begin{matrix} {{\Pr \left( {\left. s \middle| u \right.,\theta} \right)} = {\sum\limits_{z \in { -}}{{\Pr \left( s \middle| z \right)}{\Pr \left( z \middle| u \right)}}}} & (5) \end{matrix}$

The parameter vector θ is just the conditional probabilities Pr(z|u) that describe how much user u interests correspond to factor z ∈

and the conditional probabilities Pr(s|z) that describe how likely item s is of interest to users associated with factor z. The full data model is Pr(s, z|u)=Pr(s|z) Pr(z|u) with a loss function

$\begin{matrix} {{R^{\prime}(\theta)} = {{{- \frac{1}{T}}{\sum\limits_{{({u,s,z})} \in {}}^{\;}{\log \; {\Pr \left( {s,\left. z \middle| u \right.} \right)}}}}\mspace{50mu} = {{- \frac{1}{T}}{\sum\limits_{{({u,s,z})} \in }\left\lbrack {{\log \; {\Pr \left( s \middle| z \right)}} + {\log \; {\Pr \left( z \middle| u \right)}}} \right\rbrack}}}} & (6) \end{matrix}$

where the input data

actually consists of triples (u, s, z) in which z is hidden. Using Jensen's Inequality and (5) we can derive an upper-bound on R(θ) as

$\begin{matrix} {{R(\theta)} = {{{- \frac{1}{T}}{\sum\limits_{{({u,s})} \in {}}^{\;}{\log {\sum\limits_{z \in { -}}{{\Pr \left( s \middle| z \right)}{\Pr \left( z \middle| u \right)}}}}}} \leq {{- \frac{1}{T}}{\sum\limits_{{({u,s})} \in }{\sum\limits_{z \in { -}}\left\lbrack {{\log \; {\Pr \left( s \middle| z \right)}} + {\log \; {\Pr \left( z \middle| u \right)}_{.}^{.}}} \right.}}}}} & (7) \end{matrix}$

Combining (6) and (7) we see that

${R^{\prime}(\theta)} \leq {R(\theta)} \leq {{- \frac{1}{T}}{\sum\limits_{{({u,s})} \in }^{\;}{\sum\limits_{z \in { -}}\left\lbrack {{\log \; {\Pr \left( s \middle| z \right)}} + {\log \; {\Pr \left( z \middle| u \right)}}} \right\rbrack}}}$

Unlike the Latent Semantic Indexing (LSI) algorithm that estimates a single optimal z_(k) estimated for every pair (u_(m), s_(n)), the PLSI algorithm [5], [6] estimates the probability of each state z_(k) for each (u_(m), s_(n)) by computing the conditional probabilities in (5) with, for example, an Expectation Maximization (EM) algorithm as we describe below. The upper bound (7) on R(θ) can be re-expressed as

$\begin{matrix} \begin{matrix} {{F(Q)} = {{{- \frac{1}{T}}{\sum\limits_{{({u,s})} \in {}}^{\;}{\sum\limits_{z \in { -}}{{Q\left( {\left. z \middle| u \right.,s,\theta} \right)}\left\{ {{\log \; {\Pr \left( s \middle| z \right)}} + {\log \; {\Pr \left( z \middle| u \right)}}} \right\rbrack}}}} -}} \\ \left. {\log \; {Q\left( {\left. z \middle| u \right.,s,\theta} \right)}} \right\} \\ {= {{R\left( {\theta,Q} \right)} + {\frac{1}{T}{\sum\limits_{{({u,s})} \in {}}^{\;}{\sum\limits_{z \in { -}}{{Q\left( {\left. z \middle| u \right.,s,\theta} \right)}\log \; {Q\left( {\left. z \middle| u \right.,s,\theta} \right)}}}}}}} \end{matrix} & (8) \end{matrix}$

where Q(z|u, s, θ) is a probability distribution. The PLSI algorithm may minimize this upper bound by expressing the optimal Q*(z|u, s, θ) in terms of the components Pr(s|z) and Pr(z|u) of θ, and then finding the optimal values for these conditional probabilities.

E-step: The “Expectation” step computes the optimal Q*(z|u, s, θ⁻)⁺=Pr(z|u, s, θ) that minimizes F(Q), taking as the values of θ⁻ for this iteration the values of θ⁺from the M-step of the previous iteration

$\begin{matrix} {{Q^{*}\left( {\left. z \middle| u \right.,s,\theta^{-}} \right)}^{+} = {\frac{{\Pr \left( s \middle| z \right)}^{-}{\Pr ({zu})}^{-}}{{\Pr \left( s \middle| u \right)}^{-}} = \frac{{\Pr \left( s \middle| z \right)}^{-}{\Pr \left( z \middle| u \right)}^{-}}{\sum\limits_{z \in { -}}{{\Pr \left( s \middle| z \right)}^{-}{\Pr \left( z \middle| u \right)}^{-}}}}} & (9) \end{matrix}$

M-step: The “Maximization” step then computes new values for the conditional probabilities θ⁺={Pr(s|z)⁻, Pr(z|u)⁻} that minimize R(θ, Q) directly from the Q*(z|u, s, θ⁻)⁺ values from the E-step as

$\begin{matrix} {{\Pr \left( s \middle| z \right)}^{+} = \frac{\sum\limits_{{({u,s})} \in {{(*}{{,s})}}}{Q^{*}\left( {\left. z \middle| u \right.,s,\theta^{-}} \right)}^{+}}{\sum\limits_{{({u,s})} \in }{Q^{*}\left( {\left. z \middle| u \right.,s,\theta^{-}} \right)}^{+}}} & (10) \\ {{\Pr \left( z \middle| u \right)}^{+} = \frac{\sum\limits_{{{({u,s})} \in {({u,}}}{*)}}{Q^{*}\left( {\left. z \middle| u \right.,s,\theta^{-}} \right)}^{+}}{\sum\limits_{z \in { -}}{\sum\limits_{{{({u,s})} \in {({u,}}}{*)}}{Q^{*}\left( {\left. z \middle| u \right.,s,\theta^{-}} \right)}^{+}}}} & (11) \end{matrix}$

where

u, ·) and

(·, s) denote the subsets of

for user u and item s, respectively.

Since Q*(z|u, s, θ) results in the optimal upper bound on the minimum value of R(θ), and the second component of the expression (8 for F(Q) does not depend on θ, these values for the conditional probabilities θ={Pr(s|z), Pr(z|u)} are the optimal estimates we seek.¹ The new values for the conditional probabilities θ⁺={Pr(s|z)⁺, Pr(z|u)⁺} that maximize Q*(z, u, s, θ), and therefore minimize R(θ, Q), are then computed. ¹ It happens that the adsorption algorithm of memory-based recommender we describe above can be viewed as a degenerate EM algorithm. The loss function to be minimized is R(X)=X−MX. There is no E-step because there are no hidden variables, and the M-step is just the computation of the matrix X of point probabilities that satisfy (2).

One insight that might further understanding how the EM algorithm minimizes the loss function R(θ, Q) with regard to a particular data set is that the EM iteration is only done for the pairs (u_(m) _(i) , s_(n) _(i) ) that occur in the data with the users u ∈

items s ∈

and the number of factors z ∈

fixed in at the start of the computation. Multiple occurrences of (u_(m), s_(n)), typically reflected in the edge weight function h(u_(m), s_(n)) are indirectly factored into the minimization by multiple iterations of the EM algorithm.² To match the expected slow rate of increase in the number of users, but relatively faster expected rate of increase in items, an implementation of the EM iteration as a Map-Reduce computation actually is an approximation that fixes the users

and then number of factors in

in advance, but which allows the number of items in

to increase. ² Modifications to the model are presented in [6] that deal with potential over-fitting problems due to sparseness of the data set.

As new items are added, the approximate algorithm does not re-compute the probabilities Pr(s|z) by the EM algorithm. Instead, the algorithm keeps a count for each item S_(n) in each factor z_(k) and incriminates the count for s_(n) in each factor z_(k) for which Pr(z_(k)|u_(m)) is large, indicating user u_(m) has a strong probability of membership, for each item s_(n) user u_(m) accesses. The counts for the s_(n), in each factor z_(k) are normalized to serve as the value Pr(s_(n)|z_(k)), rather than the formal value in between re-computations of the model by the EM algorithm.

Like the adsorption algorithm, the EM algorithm is a learning algorithm for a class of recommender algorithms. Many recommenders are continuously trained from the sequence of user-item pairs (u_(m) _(i) , s_(n) _(i) ). The values of Pr(s|z) and Pr(z|u) are used to compute factors z_(k) linking user communities and item collections that can be used in a simple recommender algorithm. The specific factors z_(k) associated with the user communities for which user u has the most affinity are identified from the Pr(z|u) and then recommended items s are selected from those item collections most associated with those communities based on the values Pr(s|z).

A Classification Algorithm With Prescribed Constraints

In an embodiment, an alternate data model for user-item pairs and a nonparametric empirical likelihood estimator (NPMLE) for the model can serve as the basis for a model-based recommender. Rather than estimate the solution for a simple model for the data, the proposed estimator actually admits additional assumptions about the model that in effect specify the family of admissible models and that also that incorporates ratings more naturally. The NPMLE can be viewed as nonparametric classification algorithm which can serve as the basis for a recommender system. We first describe the data model and then detail the nonparametric empirical likelihood estimator.

A User Community and Item Collection Constrained Data Model

FIG. 1( a) conceptually represents a generalized data model. In this embodiment, however, we assume the input data set consists of three bags of lists:

-   -   1. a bag         of lists         ={(u_(i*), s_(i) ₁ , h_(i) ₁ ), . . . , (u_(i*), s_(i) _(n) ,         h_(i) _(n) )} of triples, where h_(i) _(n) is a rating that user         u_(i*) implicitly or explicitly assigns item s_(i) _(n) ,     -   2. a bag ε of user communities ε₁={u_(l) ₁ , . . . , u_(l) _(m)         }, and     -   3. a bag         of item collections         _(k)={s_(k) ₁ , . . . , s_(k) _(n) }.

By accepting input data in the form of lists, we seek to endow the model with knowledge about the complementary and substitute nature of items gained from users and item collections, and with knowledge about user relationships. For data sources that only produce triples (u, s, h), we assume the set

of lists that capture this information about complementary or substitute items can be built by selecting lists of triples from an accumulated pool based on relevant shared attributes. The most important of these attributes would be the context in which the items were selected or experienced by the user, such as a defined (short) temporal interval.

A useful data model should include an alternate approach to identifying factors that reflects the complementary or substitute nature of items inferred from user lists

and item collections ε, as well as the perceived value of recommendations based on a user's social or other relationships inferred from the user communities

as approximately represented by the graph G_(HEF) depicted in FIG. 2.

As for the PLSI model with ratings, our goal is to estimate the distribution Pr(h, s|S, u) given the observed data

ε, and

Because user ratings may not be available for a given user in a particular application, we re-express this distribution as

Pr(h,s|S,u)=Pr(h|s,S,u)Pr(s|S,u)   (12)

where S={s_(n) ₁ , . . . , s_(n) _(j) } is a set of seed items, and we design our data model to support estimation of Pr(s|S, u) and Pr(h|s, S, u) as separate sub-problems. The observed data has the generative conditional probability distribution

$\begin{matrix} {{\Pr \left( {{\mathcal{H}ɛ},\mathcal{F}} \right)} = \frac{\Pr \left( {\mathcal{H},ɛ,\mathcal{F}} \right)}{\Pr \left( {ɛ,\mathcal{F}} \right)}} & (13) \end{matrix}$

To formally relate these two distributions, we first define the set

(U, S, H) ⊂

of lists

that include any triple (u, s, h) ∈U×S×H and let S ⊂

be a set of seed items. Then

${\Pr \left( {s,S,u} \right)} = {\frac{\Pr \left( {s,\left. S \middle| u \right.} \right)}{\Pr \left( S \middle| u \right)}\mspace{115mu} = {\frac{\Pr \left( {s,S,u} \right)}{\Pr \left( {S,u} \right)}\mspace{115mu} = \frac{\sum\limits_{\mathcal{H}_{l} \in {\mathcal{H}{({{\{ u\}},{{\{ s\}}\bigcup S},H})}}}\; {\Pr \left( {\left. \mathcal{H}_{l} \middle| \mathcal{E} \right.,\mathcal{F}} \right)}}{\sum\limits_{\mathcal{H}_{l} \in {\mathcal{H}{({{\{ u\}},S,H})}}}\; {\Pr \left( {\left. \mathcal{H}_{l} \middle| \mathcal{E} \right.,\mathcal{F}} \right)}}}}$ ${\Pr \left( {\left. h \middle| s \right.,S,u} \right)} = {\frac{\Pr \left( {h,\left. s \middle| S \right.,u} \right)}{\Pr \left( {\left. s \middle| S \right.,u} \right)}\mspace{115mu} = {\frac{\Pr \left( {h,s,S,u} \right)}{\Pr \left( {s,S,u} \right)}\mspace{115mu} = \frac{\sum\limits_{\mathcal{H}_{l} \in {\mathcal{H}{({{\{ u\}},{{\{ s\}}\bigcup S},h})}}}\; {\Pr \left( {\left. \mathcal{H}_{l} \middle| \mathcal{E} \right.,\mathcal{F}} \right)}}{\sum\limits_{\mathcal{H}_{l} \in {\mathcal{H}{({{\{ u\}},{{\{ s\}}\bigcup S},H})}}}\; {\Pr \left( {\left. \mathcal{H}_{l} \middle| \mathcal{E} \right.,\mathcal{F}} \right)}}}}$

The primary task then is to derive a data model for

and estimate the parameters of that model to maximize the probability

$\begin{matrix} {R = {{\prod\limits_{\mathcal{H}_{1} \in \mathcal{H}}\; {\prod\limits_{\mathcal{E}_{i} \in \mathcal{E}}\; {\prod\limits_{\mathcal{F}_{j} \in \mathcal{F}}\; {\Pr \left( {\mathcal{H}_{l},\mathcal{E}_{i},\mathcal{F}_{j}} \right)}}}}\mspace{14mu} = {\prod\limits_{\mathcal{H}_{1} \in \mathcal{H}}\; {\prod\limits_{\mathcal{E}_{i} \in \mathcal{E}}\; {\prod\limits_{\mathcal{F}_{j} \in \mathcal{F}}{{\Pr \left( {\left. \mathcal{H}_{l} \middle| \mathcal{E}_{i} \right.,\mathcal{F}_{j}} \right)}{\Pr \left( \mathcal{E}_{i} \right)}{\Pr \left( \mathcal{F}_{j} \right)}}}}}}} & (14) \end{matrix}$

given the observed data

ε, and

Estimating the Recommendation Conditionals

As a practical approach to maximizing the probability R, we first focus on estimating Pr(s|S, u) by maximizing Pr(s, S, u) for the data sets

ε, and

We do this by introducing latent variables y and z such that

${\Pr \left( {s,S,u} \right)} = {\sum\limits_{z \in { -}}{\sum\limits_{y \in }{\Pr \left( {s,S,u,z,y} \right)}}}$

so we can express the joint probability Pr(s, S, u) in terms of independent conditional probabilities. We assume that s, S, and y are conditionally independent with respect to z, and that u and z are conditionally independent with respect to y

Pr(s,S,y|z)=Pr(s|z)Pr(y|z)=Pr(s,S|y,z)Pr(y|z) Pr(u,z|y)=Pr(u|y)=Pr(u|z,y)Pr(z|y)

We can then rewrite the joint probability

$\begin{matrix} {\begin{matrix} {{\Pr \left( {s,S,u,y,z} \right)} = {{\Pr \left( {s,S,z,\left. y \middle| u \right.} \right)}{\Pr (u)}}} \\ {= {{\Pr \left( {z,\left. y \middle| s \right.,S,u} \right)}{\Pr \left( {s,\left. S \middle| u \right.} \right)}{\Pr (u)}}} \end{matrix}{as}\begin{matrix} {{{\Pr \left( {z,\left. y \middle| s \right.,S,u} \right)}{\Pr \left( {s,\left. S \middle| u \right.} \right)}{\Pr (u)}} = {{\Pr \left( {u,s,\left. S \middle| z \right.,y} \right)}{\Pr \left( {z,y} \right)}}} \\ {= {{\Pr \left( {s,\left. S \middle| z \right.,y} \right)}{\Pr \left( {\left. u \middle| z \right.,y} \right)}}} \\ {{{\Pr \left( {z,y} \right)} - {\Pr \left( {s,\left. S \middle| z \right.,y} \right)}}} \\ {{{\Pr \left( {\left. z \middle| y \right.,u} \right)}{\Pr \left( y \middle| u \right)}{\Pr (u)}}} \\ {= {{\Pr \left( {s,\left. S \middle| z \right.} \right)}{\Pr \left( z \middle| y \right)}}} \\ {{{\Pr \left( y \middle| u \right)}{\Pr (u)}}} \\ {= {{\Pr \left( s \middle| z \right)}{\prod\limits_{s^{\prime} \in S}\; {\Pr \left( s^{\prime} \middle| z \right)}}}} \\ {{{\Pr \left( z \middle| y \right)}{\Pr \left( y \middle| u \right)}{\Pr (u)}}} \end{matrix}} & (15) \end{matrix}$

Finally, we can derive an expression for Pr(s|S, u) by first summing (15) over z and y to compute the marginal Pr(s, S, u) and factoring out Pr(u)

$\begin{matrix} {{\Pr \left( {s,\left. S \middle| u \right.} \right)} = {\sum\limits_{z \in { -}}{\sum\limits_{y \in }{{\Pr \left( s \middle| z \right)}{\prod\limits_{s^{\prime} \in S}\; {{\Pr \left( s^{\prime} \middle| z \right)}{\Pr \left( z \middle| y \right)}{\Pr \left( y \middle| u \right)}}}}}}} & (16) \end{matrix}$

and then expanding the conditional as

$\begin{matrix} {{\Pr \left( {\left. s \middle| S \right.,u} \right)} = \frac{\sum\limits_{z \in { -}}{\sum\limits_{y \in }{{\Pr \left( s \middle| z \right)}{\prod\limits_{s^{\prime} \in S}\; {{\Pr \left( s^{\prime} \middle| z \right)}{\Pr \left( z \middle| y \right)}{\Pr \left( y \middle| u \right)}}}}}}{\sum\limits_{z \in { -}}{\sum\limits_{y \in }{\prod\limits_{s^{\prime} \in S}\; {{\Pr \left( s^{\prime} \middle| z \right)}{\Pr \left( z \middle| y \right)}{\Pr \left( y \middle| u \right)}}}}}} & (17) \end{matrix}$

Equation (16) expresses the distribution Pr(s, S|u) as a product of three independent distributions. The conditional distribution Pr(s|z) expresses the probability that item s is a member of the latent item collection z. The conditional distribution Pr(y|u) similarly expresses the probability that the latent user community y is representative for user u. Finally, the probability that items in collection z are of interest to users in community y is specified by the distribution Pr(z|y). We compose these relationships between users and items into the full data model by the graph G_(UCIC) shown in FIG. 3. We describe next how the distribution can be estimated from the input item collections

the user communities ε, and user lists

respectively, using variants of the expectation maximization algorithm.

User Community and Item Collection Conditionals

The estimation problem for the user community conditional distribution Pr(y|u) and for the item collection conditional distribution Pr(s|z) is essentially the same. They are both computed from lists that imply some relationship between the users or items on the lists that is germane to making recommendations. Given the set ε of lists of users and the set

of lists of items, we can compute the conditionals Pr(y|u) and Pr(s|z) several ways.

One very simple approach is to match each user community ε_(l) with a latent factor y_(l) and each item collection

_(k) with a latent factor z_(k). The conditionals could be the uniform distributions

${\Pr \left( y_{l} \middle| u \right)} = {{\frac{1}{\left\{ \mathcal{E}_{l} \middle| {u \in \mathcal{E}_{l}} \right\} }{\Pr \left( s \middle| z_{k} \right)}} = \frac{1}{\mathcal{F}_{k}}}$

While this approach is easily implemented, it potentially results in a large number of user community factors y ∈ γ and item collection factors z ∈

. Estimating Pr(z|y) is a correspondingly large computation task. Also, recommendations cannot be made for users in a community ε_(l) if

does not include a list for at least one user in ε_(l). Similarly, items in a collection F_(k) cannot be recommended if no item on

_(k) occurs on a list in

Another approach is simply to use the previously described EM algorithm to derive the conditional probabilities. For each list ε_(i) in ε we can construct M² pairs (u, v) ∈

×

³ We can also construct N² pairs (t, s) ∈

We can estimate the pairs of conditional probabilities Pr(v|y), Pr(y|u) and Pr(s|z), Pr(z|t) using the EM algorithm. For Pr(v|y) and Pr(y|u) we have ³If u and v are two distinct members of ε_(l), we would construct the pairs (u; v), (v; u), (u; u), and (v; v).

E-Step:

$\begin{matrix} {{Q^{*}\left( {\left. y \middle| u \right.,v,\theta^{-}} \right)}^{+} = \frac{{\Pr \left( v \middle| y \right)}^{-}{\Pr \left( y \middle| u \right)}^{\_}}{\sum\limits_{y \in }{{\Pr \left( v \middle| y \right)}{\Pr \left( y \middle| u \right)}}}} & (18) \end{matrix}$

M-Step:

$\begin{matrix} {{\Pr \left( {vy} \right)}^{+} = \frac{\sum\limits_{{({u,v})} \in {_{ɛ}{({\cdot {,v}})}}}{Q^{*}\left( {{yu},v,\theta^{-}} \right)}^{+}}{\sum\limits_{{({u,v})} \in _{ɛ}}{Q^{*}\left( {{yu},v,\theta^{-}} \right)}^{+}}} & (19) \\ {{\Pr \left( {yu} \right)}^{+} = \frac{\sum\limits_{{({u,v})} \in {_{ɛ}{({u, \cdot})}}}{Q^{*}\left( {{yu},v,\theta^{-}} \right)}^{+}}{\sum\limits_{y \in Y}{\sum\limits_{{({u,v})} \in {_{ɛ}{({u, \cdot})}}}{Q^{*}\left( {{yu},u,\theta^{-}} \right)}^{+}}}} & (20) \end{matrix}$

where

ε is the collection of all co-occurrence pairs (u, v) constructed from all lists ε_(l) ∈ε.

ε (u,·) and

ε(·, v) denote the subsets of such pairs with the specified user u as the first member and the specified user v as the second member, respectively. Similarly, for Pr(s|z) and Pr(z|t) we have

E-Step:

$\begin{matrix} {{Q^{*}\left( {{xt},s,\psi^{-}} \right)}^{+} = \frac{{\Pr \left( {sz} \right)}^{-}{\Pr \left( {zt} \right)}^{-}}{\sum\limits_{z \in Z}{{\Pr \left( {sz} \right)}^{-}{\Pr \left( {zt} \right)}^{-}}}} & (21) \end{matrix}$

M-Step:

$\begin{matrix} {{\Pr \left( {sz} \right)}^{+} = \frac{\sum\limits_{{({t,o})} \in {_{\mathcal{F}}{({\cdot {,o}})}}}{Q^{*}\left( {{zt},s,\psi^{-}} \right)}^{+}}{\sum\limits_{{({t,s})} \in _{\mathcal{F}}}{Q^{*}\left( {{zt},s,\psi^{-}} \right)}^{+}}} & (22) \\ {{\Pr \left( {zt} \right)}^{+} = \frac{\sum\limits_{{({t,s})} \in {_{\mathcal{F}}{({t, \cdot})}}}{Q^{*}\left( {{zt},s,\psi^{-}} \right)}^{-}}{\sum\limits_{z \in Z}{\sum\limits_{{({t,s})} \in {_{\mathcal{F}}{({t, \cdot})}}}{Q^{*}\left( {{zt},s,\psi^{-}} \right)}^{+}}}} & (23) \end{matrix}$

While the preceding two approaches may be adequate for many applications, both may not explicitly incorporate incremental addition of new input data. The iterative computations (18), (19), (20) and (21), (22), (24) assume the input data set is known and fixed at the outset. As we noted above, some recommenders incorporate new input data in an ad hoc fashion. We can extend the basic PLSI algorithm to more effectively incorporate sequential input data for another approach to computing the user community and item collection conditionals.

Focusing first on the conditionals Pr(v|y) and Pr(y|u), there are several ways we could incorporate sequential input data into an EM algorithm for computing time-varying conditionals Pr(v|y; τ_(n))⁺, Pr(y|u; τ_(n))⁺, and Q*(y|u, v, θ⁻; τ_(n))⁺ We only describe one simple method here in which we also gradually de-emphasize older data as we incorporate new data. We first define two time-varying co-occurrence matrices ΔE(τ_(n)) and ΔF(τ_(n)) of the data pairs received since time τ_(n−1) with elements

Δe _(vu)(τ_(n))−|{(u,v)|(u,v)∈D _(ε)(τ_(n))−D _(ε)(τ_(n−1))}|Δf _(at)(τ_(n))=|{(t,s)|(t,s)∈D _(F)(τ_(n))−D _(ε)(τ_(n−1))}|

We then add two additional initial steps to the basic EM algorithm so that the extended computation consists of four steps. The first two steps are done only once before the E and M steps are iterated until the estimates for Pr(v|y; τ_(n)) and Pr(y|u; τ_(n)) converge:

W-Step: The initial “Weighting” step computes an appropriate weighted estimate for the co-occurrence matrix E(τ_(n)). The simplest method for doing this is to compute a suitably weighted sum of the older data with the latest data

E(τ_(n))=αεE(τ_(n−1))+β_(ε)ΔE(τ_(n))   (25)

This difference equation has the solution

${E\left( \tau_{n} \right)} = {\beta_{E}{\sum\limits_{i = 0}^{¨}{\alpha_{ɛ}^{- {({n - i})}}\Delta \; {E\left( t_{i} \right)}}}}$

(25) is just a scaled discrete integrator for α_(ε)=1. Choosing 0≦α_(ε)<1 and setting β_(ε)=1−α_(ε) gives a simple linear estimator for the mean value of the co-occurrence matrix that emphasizes the most recent data.

I-Step: In the next “Input” step, the estimated co-occurrence data is incorporated in the EM computation. This can be done in multiple ways, one straightforward approach is to adjust the starting values for the EM phase of the algorithm by re-expressing the M-step computations (19) and (20) in terms of E(τ_(n)), and then re-estimating the conditionals Pr(v|y; τ_(n))⁻ and Pr(y|u; τ_(n))⁻at time τ_(n)

$\begin{matrix} {{\Pr \left( {{vy};\tau_{n}} \right)}^{-} = \frac{\sum\limits_{u}{{e_{vu}\left( \tau_{n} \right)}{Q^{*}\left( {{yu},v,{\theta^{-};\tau_{n - 1}}} \right)}^{+}}}{\sum\limits_{v}{\sum\limits_{u}{{e_{vu}\left( \tau_{n} \right)}{Q^{*}\left( {{yu},v,{\theta^{-};\tau_{n - 1}}} \right)}^{+}}}}} & (26) \\ {{\Pr \left( {{yu};\psi_{n}} \right)}^{-} = \frac{\sum\limits_{v}{{e_{vu}\left( \tau_{n} \right)}{Q^{*}\left( {{yu},v,{\theta^{-};\tau_{n - 1}}} \right)}^{+}}}{\sum\limits_{{v \in} = V}{\sum\limits_{n}{{e_{vu}\left( \tau_{n} \right)}{Q^{*}\left( {{yu},v,{\theta^{-};\tau_{n - 1}}} \right)}^{+}}}}} & (27) \end{matrix}$

E-Step: The EM iteration consists of the same E-step and M-step as the basic algorithm. The E-step computation is

$\begin{matrix} {{Q^{*}\left( {{yu},v,{\theta^{-};\tau_{n}}} \right)}^{+} = \frac{{\Pr \left( {{vy};\tau_{n}} \right)}^{-}{\Pr \left( {{yu};\tau_{n}} \right)}^{-}}{\sum\limits_{y \in Y}{{\Pr \left( {{vy};\tau_{n}} \right)}^{-}{\Pr \left( {{yu};\tau_{n}} \right)}^{-}}}} & (28) \end{matrix}$

M-step: Finally, the M-step computation is

$\begin{matrix} {{\Pr \left( {{vy};\tau_{n}} \right)}^{+} = \frac{\sum\limits_{u}{{e_{vu}\left( \tau_{n} \right)}{Q^{*}\left( {{yu},v,{\theta^{-};\tau_{n}}} \right)}^{+}}}{\sum\limits_{v}{\sum\limits_{u}{{e_{vu}\left( \tau_{n} \right)}{Q^{*}\left( {{yu},v,{\theta^{-};\tau_{n}}} \right)}^{+}}}}} & (29) \\ {{\Pr \left( {{yu};\tau_{n}} \right)}^{+} = \frac{\sum\limits_{v}{{e_{vu}\left( \tau_{n} \right)}{Q^{*}\left( {{yu},v,{\theta^{-};\tau_{n}}} \right)}^{+}}}{\sum\limits_{y \in Y}{\sum\limits_{v}{{e_{vu}\left( \tau_{n} \right)}{Q^{*}\left( {{yu},v,{\theta^{-};\tau_{n}}} \right)}^{+}}}}} & (30) \end{matrix}$

Convergence of the EM iteration in this extended algorithm is guaranteed since this algorithm only changes the starting values for the EM iteration.

The extended algorithm for computing Pr(s|z) and Pr(z|t) is analogous to the algorithm for computing Pr(v|y) and Pr(y|u):

W-Step: Given input data ΔF(τ_(n)), the estimated co-occurrence data is computed as

F(τ_(n))=α_(F) F(τ_(n−1))+β_(F) ΔF(τ_(n))   (31)

I-Step:

$\begin{matrix} {{\Pr \left( {{sz};\tau_{n}} \right)}^{-} = \frac{\sum\limits_{t}{{f_{st}\left( \tau_{n} \right)}{Q^{*}\left( {{zt},s,{\psi^{-};\tau_{n - 1}}} \right)}^{+}}}{\sum\limits_{s}{\sum\limits_{t}{{f_{st}\left( \tau_{n} \right)}{Q^{*}\left( {{zt},s,{\psi^{-};\tau_{n - 1}}} \right)}^{+}}}}} & (32) \\ {{\Pr \left( {{zt};\tau_{n}} \right)}^{-} = \frac{\sum\limits_{s}{{f_{st}\left( \tau_{n} \right)}{Q^{*}\left( {{zt},s,{\psi^{-};\tau_{n - 1}}} \right)}^{+}}}{\sum\limits_{z \in Z}{\sum\limits_{s}{{f_{st}\left( \tau_{n} \right)}{Q^{*}\left( {{zt},s,{\psi^{-};\tau_{n - 1}}} \right)}^{+}}}}} & (33) \end{matrix}$

E-Step:

$\begin{matrix} {{Q^{*}\left( {{zt},s,{\psi^{-};\tau_{n}}} \right)}^{+} = \frac{{\Pr \left( {{sz};\tau_{n}} \right)}^{-}{\Pr \left( {{zt};\tau_{n}} \right)}^{-}}{\sum\limits_{z \in Z}{{\Pr \left( {{sx};\tau_{n}} \right)}^{-}{\Pr \left( {{zt};\tau_{n}} \right)}^{-}}}} & (35) \end{matrix}$

M-Step:

$\begin{matrix} {{\Pr \left( {{sz};\tau_{n}} \right)}^{+} = \frac{\sum\limits_{t}{{f_{st}\left( \tau_{n} \right)}{Q^{*}\left( {{zt},s,{\psi^{-};\tau_{n}}} \right)}^{+}}}{\sum\limits_{s}{\sum\limits_{t}{{f_{st}\left( \tau_{n} \right)}{Q^{*}\left( {{zt},s,{\psi^{-};\tau_{n}}} \right)}^{+}}}}} & (36) \\ {{\Pr \left( {{zt};\tau_{n}} \right)}^{+} = \frac{\sum\limits_{s}{{f_{st}\left( \tau_{n} \right)}{Q^{*}\left( {{zt},s,{\psi^{-};\tau_{n}}} \right)}^{+}}}{\sum\limits_{z \in Z}{\sum\limits_{s}{{f_{st}\left( \tau_{n} \right)}{Q^{*}\left( {{zt},s,{\psi^{-};\tau_{n}}} \right)}^{+}}}}} & (37) \end{matrix}$

Association Conditionals

Once we have estimates for Pr(s|z; τ_(n)) and Pr(y|u; τ_(n)), we can derive estimates for the association conditionals Pr(z|y; τ_(n)) expressing the probabilistic relationships between the user communities y ∈γ and item collections z ∈

These estimates must be derived from the lists

since this is the only observed data that relates users and items. A key simplifying assumption in the model we build here is that

$\begin{matrix} {{\Pr \left( {s,{Sz}} \right)} = {{\Pr \left( {sz} \right)}{\prod\limits_{s^{\prime} \in S}{\Pr \left( {s^{\prime}z} \right)}}}} & (39) \end{matrix}$

Appendix C presents a full derivation of E-step (49) and M-step (53) of the basic EM algorithm for estimating Pr(z|y). Defining the list of seeds S in the triples (u, s, S) is needed in the M-step computation. In some cases, the seeds S could be independent and supplied with the list. For these cases, the input data

from the user lists

would be

={(u _(i*) ,s _(i) ₁ ,S), . . . , (u _(i*) ,s _(i) _(n) ,S)}  (40)

In other cases, the seeds might be inferred from the items in the user list H_(i) itself. These could be just the items preceding each item in the list so that the input data would be

={(u _(i*) ,s _(i) ₁ ,S _(i) ₁ =0),(u _(i*) ,s _(i) ₂ ,S _(i) ₂ 32 {s _(i) ₁ }), . . . ,(u _(i*) ,s _(i) _(n) ,S _(i) _(n) ={s _(i) ₁ , . . . ,s _(n−1)})}  (41)

The seeds for each (u, s) pair in the list could also be every other item in the list, in this case

_(i)={(u _(i*) ,s _(i) ₁ ,S _(i) ₁ =S−{s _(i) ₁ }, . . . ,(u _(i*) ,s _(i) _(n) ,S _(i) _(n) =S−{s _(i) _(n) })}  (42)

As we did for the user community conditional Pr(y|u) and item collection conditional Pr(s|z), we can also extend this EM algorithm to incorporate sequential input data. However, instead of forming data matrices, we define two time-varying data lists Δ

(τ_(n)) and Δ

(τ_(n)) from the bag of lists

(τ_(n))

Δ

(τ_(n))={(u,s,S,h)|(u,s,h,)∈

_(i),

_(i)∈

(τ_(n)),

∉

τ_(n−1))}Δ

(τ_(n))={(u u,s,S,1)|(u,s,S,h)∈ΔD(τ_(n))}

where the seeds S for each item are computed by one of the methods (40), (41), (42) or any other desired method. We also note that Δ

(τ_(n)) and Δ

(τ_(n)) are bags, meaning they include an instance of the appropriate tuple for each instance of the defining tuple in the description. The extended EM algorithm for computing Pr(z|y; τ) then incorporates appropriate versions of the initial W-step and I-step computations into the basic EM computations:

W-Step: The weighting factors are applied directly to the list

(τ_(n−1)) and the new data list Δ

(τ_(n)) to create the new list

(τ_(n))={(u,s,S,aa)|(u,s,S,a)∈

(τ_(n−1))}∪{(u,s,S,βa)|(u,s,S,a)∈Δ

(τ_(n))}  (43)

I-Step: The weighted data at time τ_(n) is incorporated into the EM computation via the weighting coefficient a from each tuple (u, s, S, a) to re-estimate Pr(z|y; τ_(n−1))⁺ as Pr(z|y; τ_(n))⁻

$\begin{matrix} {{\Pr \left( {{zy};\tau_{n}} \right)}^{-} = \frac{\sum\limits_{{({u,s,S,a})} \in {A{(\tau_{n})}}}{{aQ}^{*}\left( {z,{ys},S,u,{\psi^{-};\tau_{n - 1}}} \right)}^{+}}{\sum\limits_{z \in Z}{\sum\limits_{{({u,s,S,a})} \in {A{(\tau_{n})}}}{{aQ}^{*}\left( {z,{ys},S,u,{\varphi^{-};\tau_{n - 1}}} \right)}^{+}}}} & (44) \end{matrix}$

We note, however, that we may have Q*(z, y|s, S, u, θ⁻; τ_(n−1))⁺=0 for (u, s, S, a) that are in

(τ_(n)) but such that (u, s, S, a′) is not in

(τ_(n−1)). This missing data is filled by the first iteration of the following E-step.

E-Step:

$\begin{matrix} {{Q^{*}\left( {z,{ys},S,u,{\varphi^{-};\tau_{n}}} \right)}^{+} = \frac{\begin{bmatrix} {{\Pr \left( {{sz};\tau_{n}} \right)}\prod\limits_{s^{\prime} \in S}} \\ {\Pr \left( {{s^{\prime}z};\tau_{n}} \right){\Pr \left( {{yu};\tau_{n}} \right)}} \end{bmatrix}{\Pr \left( {{zy};\tau_{n}} \right)}^{-}}{\sum\limits_{z \in Z}{\sum\limits_{u \in Y}{\begin{bmatrix} {{\Pr \left( {{sz};\tau_{n}} \right)}\prod\limits_{s^{\prime} \in S}} \\ {\Pr \left( {{s^{\prime}z};\tau_{n}} \right){\Pr \left( {{yu};\tau_{n}} \right)}} \end{bmatrix}{\Pr \left( {{zy};\tau_{n}} \right)}^{-}}}}} & (45) \end{matrix}$

M-Step:

$\begin{matrix} {{\Pr \left( {{zy};\tau_{n}} \right)}^{+} = \frac{\sum\limits_{{({u,a,S,a})} \in {A{(\tau_{n})}}}{{aQ}^{*}\left( {z,{ys},S,u,{\varphi^{-};\tau_{n}}} \right)}^{+}}{\sum\limits_{z \in Z}{\sum\limits_{{({u,s,S,a})} \in {A{(\tau_{n})}}}{{aQ}^{*}\left( {z,{ys},S,u,{\varphi^{-};\tau_{n}}} \right)}^{+}}}} & (46) \end{matrix}$

Memory-based recommenders are not well suited to explicitly incorporating independent, a priori knowledge about user communities and item collections. One type of user community and item collection information is implicit in some model-based recommenders. However, some recommenders' data models do not provide the needed flexibility to accommodate notions for such clusters or groupings other than item selection behavior. In some recommnenders, additional knowledge about item collections is incorporated in an ad hoc way via supplementary algorithms.

In an embodiment, the model-based recommender we describe above allows user community and item collection information to be specified explicitly as a priori constraints on recommendations. The probabilities that users in a community are interested in the items in a collection are independently learned from collections of user communities, item collections, and user selections. In addition, the system learns these probabilities by an adaptive EM algorithm that extends the basic EM algorithm to better capture the time-varying nature of these sources of knowledge. The recommender that we describe above is inherently massively-scalable. It is well suited to implementation as a data-center scale Map-Reduce computation. The computations to produce the knowledge base can be run as an off-line batch operation and only recommendations computed in real-time on-line, or the entire process can be run as a continuous update operation. Finally, it is possible and practical to run multiple recommendation instances with knowledge bases built from different sets of user communities and item collections as a multi-criteria meta-recommender.

Exemplary Pseudo Code

Process: INFER_COLLECTIONS

Description:

To construct time-varying latent collections c₁(τ_(n)), c₂(τ_(n)), . . . , c_(k)(τ_(n)), given a time-varying list D(τ_(n)) of pairs (a_(i), b_(j)). The collections c_(k)(τ_(n)) are implicitly specified by the probabilities Pr(c_(k)|a_(i): τ_(n)) and Pr(b_(j)|c_(k); τ_(n)).

Input:

-   -   A) List D(τ_(n)).     -   B) Previous probabilities Pr(c_(k)|a_(i); τ_(n−1)) and         Pr(b_(j)|c_(k); τ_(n−1)).     -   C) Previous conditional probabilities Q*(c_(k)|a_(i), b_(j);         τ_(n−)).     -   D) Previous list E(τ_(n−1)) of triples (a_(i), b_(j), e_(ij))         representing weighted, accumulated input lists.

Output:

-   -   A) Updated probabilities Pr(c_(k)|a_(i); τ_(n)) and         Pr(b_(j)|c_(k); τ_(n)).     -   B) Conditional probabilities Q*(c_(k)|a_(i), b_(j); τ_(n)).     -   C) Updated list E(τ_(n)) of triples (a_(i), b_(j), e_(ij))         representing weighted, accumulated input lists.

Exemplary Method:

-   -   1) (W-step) Create the updated list E(τ_(n)) incorporating the         new pairs D(τ_(n)) into E(τ_(n−1)):         -   a) Let E(τ_(n)) be the empty list.         -   b) For each triple (a_(i), b_(j), e_(ij)) in E(τ_(n−1)), add             (a_(i), b_(j), αe_(ij)) to E(τ_(n)).         -   c) For each pair (a_(i), b_(j)) in D(τ_(n)):             -   i. If (a_(i), b_(j), e_(ij)) in E(τ_(n)), replace                 (a_(i), b_(j), e_(ij)) with (a_(i), b_(j), e_(ij +β).)             -   ii. Otherwise, add (a_(i), b_(j), β) to E(τ_(n)).     -   2) (I-step) Initially re-estimate the probabilities         Pr(c_(k)|a_(i); τ_(n))⁻ and Pr(b_(j)|c_(k); τ_(n))⁻ using         E(τ_(n)) and the conditional probabilities Q*(c_(k)|a_(i),         b_(j); τ_(n−1)):         -   a) For each c_(k) and each (a_(i), b_(j), e_(ij)) in             E(τ_(n)), estimate Pr(b_(j)|c_(k); τ_(n))⁻:             -   i. Let Pr_(N) be the sum across a_(i)′ of e_(ij)                 Q*(c_(k)|a_(i)′, b_(j); τ_(n−1)).             -   ii. Let Pr_(D) be the sum across a_(i)′ and b_(j)′ of                 e_(ij) Q*(c_(k)|a_(i)′, b_(j)′; τ_(n−1)).             -   iii. Let Pr(b_(j)|c_(k); τ_(n))³¹ be Pr_(N)/Pr_(D).         -   b) For each c_(k) and each (a_(i), b_(j), e_(ij)) in             E(τ_(n)), estimate Pr(c_(k)|a_(i); τ_(n))⁻:             -   i. Let Pr_(N) be the sum across b_(j)′ of e_(ij)                 Q*(c_(k)|a_(i), b_(j)′; τ_(n−1)).             -   ii. Let Pr_(D) be the sum across c_(k) ′ and b_(j)′ of                 e_(ij) Q*(c_(k)′|a_(i), b_(j)′; τ_(n−1)).             -   iii. Let Pr(c_(k)|a_(i); τ_(n))⁻ be Pr_(N)/Pr_(D).     -   3) (E-step) Estimate the new conditionals Q*(c_(k)|a_(i), b_(j);         τ_(n)):         -   a) For each c_(k) and each (a_(i), b_(j), e_(ij)) in             E(τ_(n)), estimate the conditional probability             Q*(c_(k)|a_(i), b_(j); τ_(n)):             -   i. Let Q*_(D) be the sum across c_(k)′ of                 Pr(b_(j)|c_(k)′; τ_(n))⁻Pr(c_(k)′|a_(i); τ_(n))⁻.             -   ii. Let Q*(c_(k)|a_(i), b_(j); τ_(n)) be Pr(b_(j)|c_(k);                 τ_(n))⁻Pr(c_(k)|a_(i); τ_(n))⁻/Q*_(D).     -   4) (M-step) Estimate the new probabilities Pr(c_(k)|a_(i);         τ_(n))⁺ and Pr(b_(j)|c_(k); τ_(n))⁺:         -   a) For each c_(k) and each (a_(i), b_(j), e_(ij)) in             E(τ_(n)), estimate Pr(b_(j)|c_(k); τ_(n))⁻:             -   i. Let Pr_(N) be the sum across a_(i)′ of e_(ij)                 Q*(c_(k)|a_(i)′, b_(j); τ_(n)).             -   ii. Let Pr_(D) be the sum across a_(i)′ and b_(j)′ of                 e_(ij) Q*(c_(k)|a_(i)′, b_(j)′; τ_(n)).             -   iii. Let Pr(b_(j)|c_(k); τ_(n))⁺ be Pr_(N)/Pr_(D).         -   b) For each c_(k) and each (a_(i), b_(j), e_(ij)) in             E(τ_(n)), estimate Pr(c_(k)|a_(i); τ_(n))⁺:             -   i. Let Pr_(N) be the sum across b_(j)′ of e_(ij)                 Q*(c_(k)|a_(i), b_(j)′; τ_(n)).             -   ii. Let Pr_(D) be the sum across c_(k)′ and b_(j)′ of                 e_(ij) Q*(c_(k)′|a_(i), b_(j)′; τ_(n)).             -   iii. Let Pr(c_(k)|a_(i); τ_(n))⁺ be Pr_(N)/Pr_(D).     -   5) If |Pr(b_(j)|c_(k); τ_(n))⁻−Pr(b_(j)|c_(k); τ_(n))⁺|>d or         |Pr(c_(k)|a_(i); τ_(n))⁻−Pr(c_(k)|a_(i), τ_(n))⁺|>d for a         pre-specified d<<1, repeat E-step (3.) and M-step (4.) with         Pr(b_(j)|c_(k); τ_(n))⁻=Pr(b_(j)|c_(k); τ_(n))⁺ and         Pr(c_(k)|a_(i); τ_(n))⁻=Pr(c_(k)|a_(i); τ_(n))⁺.     -   6) Return updated probabilities Pr(c_(k)|a_(i);         τ_(n))=Pr(c_(k)|a_(i); τ_(n))⁺ and Pr(b_(j)|c_(k); τ_(n))         =Pr(b_(j)|c_(k); τ_(n))⁺, along with conditional probabilities         Q*(c_(k)|a_(i), b_(j); τ_(n)), and updated list E(τ_(n)) of         triples (a_(i), b_(j), e_(ij)).

Notes:

-   -   A) In one embodiment, α and β in the W-step (1. ) are assumed to         be constants specified a priori.     -   B) In the I-step (2. ), Q*(c_(k)|a_(p), b_(j); τ_(n))=0 if         Q*(c_(k)|a_(p), b_(j); τ_(n−)) does not exist from the previous         iteration.

Process: INFER_ASSOCIATIONS

Description:

To construct time-varying association probabilities Pr(z_(k)|y_(l); τ_(n)) between two collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) and y₁(τ_(n)), y₂(τ_(n)), . . . , y_(l)(τ_(n)) of items, given the probabilities Pr(y_(k)|u_(i); τ_(n)) that the u_(i) are members of the collections y_(l)(τ_(n)), the probabilities Pr(s_(j)|z_(l); τ_(n)) that the collections z_(k)(τ_(n)) include the s_(j) as members, and a time-varying list D(τ_(n)) of triples (u_(i), s_(j), S_(o)).

Input:

-   -   A) Probabilities Pr(y_(l)|u_(i); τ_(n)) and Pr(s_(j)|z_(k);         τ_(n)).     -   B) List D(τ_(n)).     -   C) Previous probabilities Pr(z_(k)|y_(l); τ_(n−1)).     -   D) Previous list E(τ_(n−1)) of 4-tuples (u_(i), s_(j), S_(o),         e_(ijo)) representing weighted, accumulated input lists.     -   E) Previous conditional probabilities Q*(z_(k), y_(l)|u_(i),         s_(j), S_(o); τ_(n−1)).

Output:

-   -   A) Updated probabilities Pr(z_(k)|y_(l); τ_(n)).     -   B) Updated list E(τ_(n)) of 4-tuples (u_(i), s_(j), S_(o),         e_(ijo)) representing weighted, accumulated input lists.     -   C) Conditional probabilities Q*(z_(k)|y_(l)|u_(i), s_(j), S_(o);         τ_(n)).

Exemplary Method:

-   -   1) (W-step) Create the updated list E(τ_(n)) incorporating the         new triples D(τ_(n)) into E(τ_(n−1)):         -   a) Let E(τ_(n)) be the empty list.         -   b) For each 4-tuple (u_(i), s_(j), S_(o), e_(ijo)) in             E(τ_(n−1)), add (u_(i), s_(j), S_(o), αe_(ji)) to E(τ_(n)).         -   c) For each triple (u_(i), s_(j), S_(o)) in D(τ_(n)):             -   i. If (u_(i), s_(j), S_(o), e_(ijo)) in E(τ_(n)),                 replace (u_(i), s_(j), S_(o), e_(ijo)) with (u_(i),                 s_(j), S_(o), e_(ijo)+β).             -   ii. Otherwise, add (u_(i), s_(j), S_(o), β) to E(τ_(n)).     -   2) (I-step) Initially estimate the probabilities Pr(z_(k)|y_(l);         τ_(n)) using E(τ_(n)) and the conditional probabilities         Q*(z_(k), y_(l)|u_(i), s_(j), S_(o); τ_(n)).         -   a) For each y_(l) and z_(k), estimate Pr(z_(k)|y_(l);             τ_(n))⁻:             -   i. Let Pr_(N) be the sum across u_(i), s_(j), and S_(o)                 of e_(ijo) Q*(z_(k),y_(l)|u_(i), s_(j), S_(o); τ_(n−1)).             -   ii. Let Pr_(D) be the sum across u_(i), s_(j), S_(o) and                 z_(k)′ of e_(ijo) Q*(z_(k), y_(l)|u_(i), s_(j), S_(o);                 τ_(n−1)).             -   iii. Let Pr(z_(k)|y_(l); τ_(n))³¹ be Pr_(N)/Pr_(D).     -   3) (E-step) Estimate the new conditionals Q*(z_(k), y_(l)|u_(i),         s_(j), S_(o); τ_(n)):         -   a) For each y_(l) and z_(k), estimate the conditional             probability Q*(z_(k), y_(l)|u_(i), s_(j), S_(o); τ_(n)):             -   i. Let Q*_(s) be the total product of Pr(s_(j)|z_(k);                 τ_(n))⁻, the product across s_(j)′ of Pr(s_(j)′|z_(k);                 τ_(n))⁻, and Pr(y_(l)|u_(i); τ_(n))⁻.             -   ii. Let Q*_(D) be the sum across y_(l)′ and z_(k)′ of                 Q*_(s) Pr(z_(k)′|y_(l); τ_(n))⁻.             -   iii. Let Q*(z_(k), y_(l)|u_(i), s_(j), S_(o); τ_(n)) be                 Q*_(s) Pr(z_(k)|y_(l); τ_(n))⁻/Q*_(D).     -   4) (M-step) Estimate the new probabilities Pr(z_(k)|y_(l);         τ_(n))⁺:         -   a) For each y_(l) and z_(k), estimate Pr(z_(k)|y_(l);             τ_(n))⁺:             -   i. Let Pr_(N) be the sum across u_(i), s_(j), and S_(o)                 of e_(ijo) Q*(z_(k), y_(l)|u_(i), s_(j), S_(o); τ_(n)).             -   ii. Let Pr_(D) be the sum across u_(i), s_(j), S_(o) and                 z_(k)′ of e_(ijo) Q*(z_(k)′, y_(l)|u_(i), s_(j), S_(o);                 τ_(n)).             -   iii. Let Pr(z_(k)|y_(l); τ_(n))⁺ be Pr_(N)/Pr_(D).     -   5) If, for any pair (z_(k), y_(l)), |Pr(z_(k)|y_(l);         τ_(n))⁻−Pr(z_(k)|y_(l); τ_(n))⁺|>d for a pre-specified d <<1,         and the E-step (3.) and M-step (4.) and not been repeated more         than some number R times, repeat E-step (3.) and M-step (4.)         with Pr(z_(k)|y_(l); τ_(n)) Pr(z_(k)|y_(l); τ_(n))⁺.     -   6) For any pair (z_(k), y_(l)), |Pr(z_(k)|y_(l);         τ_(n))⁻−Pr(z_(k)|y_(l); τ_(n))⁺|>d for a pre-specified d <<1,         let Pr(z_(k)|y_(l); τ_(n))⁺=[Pr(z_(k)|y_(l);         τ_(n))⁻+Pr(z_(k)|y₁; τ_(n))⁺]/2.     -   7) Return updated probabilities Pr(z_(k)|y_(l);         τ_(n))=Pr(z_(k)|y_(l); τ_(n))⁺, along with conditional         probabilities Q*(z_(k), y_(l)|u_(i), s_(j), S_(o); τ_(n)), and         updated list E(τ_(n)) of 4-tuples (u_(i), s_(j), S_(o),         e_(ijo)).

Notes:

-   -   A) There potentially are combinations of triples (u_(i), s_(j),         S_(o)) such that the process does not produce valid         Pr(z_(k)|y_(l); τ_(n)).     -   B) The α and β in the W-step (1.) are assumed to be constants         specified a priori.     -   C) In the I-step (2.), Q*(z_(l)|y_(k)|u_(i), s_(j), S_(o);         τ_(n−1))=0 if Q*(z_(k), y_(k)|u_(i), s_(j), S_(o); τ_(n−1)) does         not exist from the previous iteration.

Process: CONSTRUCT_MODEL

Description:

To construct a model for time-varying lists D_(uv)(τ_(n)) of user-user pairs (u_(i), v_(j)), D_(ts)(τ_(n)) of item-item pairs (t_(i), s_(j)), and D_(us)(τ_(n)) of user-item triples (u_(i), s_(j), S_(o)) that groups users u_(i) into communities of items y_(l) and items s_(j) into communities of items s_(k). The model is specified by the probabilities Pr(y_(l)|u_(i); τ_(n)) that the u_(i) are members of the collections y_(l)(τ_(n)), the probabilities Pr(s_(j)|z_(k); τ_(n)) that the collections z_(k)(τ_(n)) include the s_(j) as members, and the probabilities Pr(z_(k)|y_(l); τ_(n)) that the communities y_(l)(τ_(n)) are associated with the collections z_(k)(τ_(n)).

Input:

-   -   A) Lists D_(uv)(τ_(n)), D_(ts)(τ_(n)), and D_(us)(τ_(n)).     -   B) Previous probabilities Pr(y_(l)|u_(i); τ_(n−1)),         Pr(z_(k)|y_(l); τ_(n−1)), and Pr(s_(j)|z_(k); τ_(n−1)).     -   C) Previous lists E_(uv)(τ_(n−1)) of triples (u_(i), v_(j),         e_(ij)), E_(ts)(τ_(n−1)) of triples (t_(i), s_(j), e_(ij)), and         E_(us)(τ⁻¹) of 4-tuples (u_(i), s_(j), S_(o), e_(ijo))         representing weighted, accumulated input lists.     -   D) Previous conditional probabilities Q*(y_(l)|u_(i), v_(j);         τ_(n−1)), Q*(z_(k)|t_(i), s_(j); τ_(n−1)), and Q*(z_(k)|u_(i),         s_(j), S_(o); τ_(n−1)).

Output:

-   -   A) Updated probabilities Pr(y_(l)|u_(i); τ_(n)), Pr(z_(k)|y_(l);         τ_(n)), and Pr(s_(i)|z_(k); τ_(n)).     -   B) Conditional probabilities Q*(y_(l)|u_(i), v_(j); τ_(n−1)),         Q*(z_(k), |t_(i), s_(j); τ_(n−1)), and Q*(z_(k), y_(l)|u_(i),         s_(j), S_(o); τ_(n−1)).     -   C) Updated lists E_(uv)(τ_(n)) of triples (u_(i), v_(j),         e_(ij)), E_(ts)(τ_(n)) of triples (t_(i), s_(j), e_(ij)), and         E_(us)(τ_(n)) of 4-tuples (u_(i), s_(j), S_(o), e_(ijo))         representing weighted, accumulated input lists.

Exemplary Method:

-   -   1) Construct user communities y₁(τ_(n)), y₂(τ_(n)), . . . ,         y_(l)(τ_(n)) by the process INFER_COLLECTIONS.         -   Let D_(uv)(τ_(n)), Pr(y_(l)|u_(i); τ_(n−1)), Pr(v_(i)|y_(l);             τ_(n−1)), Q*(y_(l)|u_(i), v_(j); τ_(n−1)), and             E_(uv)(τ_(n−1)) be the inputs D(τ_(n)), Pr(c_(k)|a_(i);             τ_(n−1)), Pr(b_(j)|c_(k); τ_(n−1)), Q*(y_(l)|u_(i), v_(j);             τ_(n−1)), and E(τ_(n−1)), respectively.         -   Let Pr(y_(l)|u_(i); τ_(n)), Pr(v_(j)|y_(l); τ_(n)),             Q*(y_(l)|u_(j), v_(j); τ_(n)), and E_(uv)(τ_(n)) be the             outputs Pr(c_(k)|a_(i); τ_(n)), Pr(b_(j)|c_(k); τ_(n)),             Q*(y_(l)|u_(i), v_(j); τ_(n)), and E(τ_(n)), respectively.     -   2) Construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . ,         z_(k)(τ_(n)) by the process INFER_COLLECTIONS.         -   Let D_(ts)(τ_(n)), Pr(z_(k)|t_(j); τ_(n−1)), Pr(s_(j)|z_(k);             τ_(n−1)), Q*(z_(k)|t_(i), s_(j); τ_(n−1)), and             E_(st)(τ_(n−1)) be the inputs D(τ_(n)), Pr(c_(k)|a_(i);             τ_(n−1)), Pr(b_(j)|c_(k); τ_(n−1)), Q*(y_(l)|u_(i), v_(j);             τ_(n−1)), and E(τ_(n−1)), respectively.         -   Let Pr(z_(k)|t_(j); τ_(n)), Pr(s_(j)|z_(k); τ_(n)),             Q*(z_(k)|t_(i), a_(j); τ_(n)), and E_(st)(τ_(n)) be the             outputs Pr(c_(k)|a_(i); τ_(n)), Pr(b_(j)|c_(k); τ_(n)),             Q*(y_(l)|u_(i), v_(j); τ_(n)), and E(τ_(n)), respectively.     -   3) Estimate the associations between user communities and item         collections by the process INFER_ASSOCIATIONS:         -   Let Pr(y_(l)|u_(i); τ_(n)), Pr(z_(k)|t_(j); τ_(n)),             D_(us)(τ_(n)), Pr(z_(k)|y_(l); τ_(n)), E_(uv)(τ_(n−1)), and             Q*(z_(k), y_(l)|u_(i), s_(j), S_(o); τ_(n−1)) be the inputs.         -   Let Pr(z_(k)|y_(l); τ_(n)), E_(uv)(τ_(n)), and             Q*(z_(k)|u_(i), s_(j), S_(o); τ_(n)) be the outputs.

Notes:

-   -   A) The process may optionally be initialized with estimates for         the user communities and item collections, in the form of the         probabilities Pr(y_(l)|u_(i); τ⁻¹), Pr(v_(j)|y_(l); τ⁻¹) and the         probabilities Pr(z_(k)|t_(j); τ⁻¹), Pr(s_(j)|z_(k); τ⁻¹), and         using the process INFER_COLLECTIONS without inputs D_(uv)(τ_(n))         and D_(ts)(τ_(n)) to re-estimate the probabilities         Pr(y_(l)|u_(i); τ⁻¹), Pr(v_(j)|y_(l); τ⁻¹), Q*(y_(l)|u_(i),         v_(j); τ⁻¹), and the probabilities Pr(z_(k)|t_(j); τ⁻¹),         Pr(s_(j)|z_(k); τ⁻¹), Q*(z_(k)|t_(i), a_(j); τ⁻¹).     -   B) Alternatively, the estimated user communities and item         collections may be supplemented with additional fixed user         communities and item collections, in the form of fixed         probabilities Pr(y_(l)|u_(i); ·), Pr(z_(k)|t_(j); ·), in the         input to the INFER_ASSOCIATIONS process.

Exemplary System

The recommenders we describe above may be implemented on any number of computer systems, for use by one or more users, including the exemplary system 400 shown in FIG. 4. Referring to FIG. 4, the system 400 includes a general purpose or personal computer 302 that executes one or more instructions of one or more application programs or modules stored in system memory, e.g., memory 406. The application programs or modules may include routines, programs, objects, components, data structures, and like that perform particular tasks or implement particular abstract data types. A person of reasonable skill in the art will recognize that many of the methods or concepts associated with the above recommender, that we describe at times algorithmically may be instantiated or implemented as computer instructions, firmware, or software in any of a variety of architectures to achieve the same or equivalent result.

Moreover, a person of reasonable skill in the art will recognize that the recommender we describe above may be implemented on other computer system configurations including hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, application specific integrated circuits, and like. Similarly, a person of reasonable skill in the art will recognize that the recommender we describe above may be implemented in a distributed computing system in which various computing entities or devices, often geographically remote from one another, perform particular tasks or execute particular instructions. In distributed computing systems, application programs or modules may be stored in local or remote memory.

The general purpose or personal computer 402 comprises a processor 404, memory 406, device interface 408, and network interface 410, all interconnected through bus 412. The processor 404 represents a single, central processing unit, or a plurality of processing units in a single or two or more computers 402. The memory 406 may be any memory device including any combination of random access memory (RAM) or read only memory (ROM). The memory 406 may include a basic input/output system (BIOS) 406A with routines to transfer data between the various elements of the computer system 400. The memory 406 may also include an operating system (OS) 406B that, after being initially loaded by a boot program, manages all the other programs in the computer 402. These other programs may be, e.g., application programs 406C. The application programs 406C make use of the OS 406B by making requests for services through a defined application program interface (API). In addition, users can interact directly with the OS 406B through a user interface such as a command language or a graphical user interface (GUI) (not shown).

Device interface 408 may be any one of several types of interfaces including a memory bus, peripheral bus, local bus, and like. The device interface 408 may operatively couple any of a variety of devices, e.g., hard disk drive 414, optical disk drive 416, magnetic disk drive 418, or like, to the bus 412. The device interface 408 represents either one interface or various distinct interfaces, each specially constructed to support the particular device that it interfaces to the bus 412. The device interface 408 may additionally interface input or output devices 420 utilized by a user to provide direction to the computer 402 and to receive information from the computer 402. These input or output devices 420 may include keyboards, monitors, mice, pointing devices, speakers, stylus, microphone, joystick, game pad, satellite dish, printer, scanner, camera, video equipment, modem, and like (not shown). The device interface 408 may be a serial interface, parallel port, game port, firewire port, universal serial bus, or like.

The hard disk drive 414, optical disk drive 416, magnetic disk drive 418, or like may include a computer readable medium that provides non-volatile storage of computer readable instructions of one or more application programs or modules 406C and their associated data structures. A person of skill in the art will recognize that the system 400 may use any type of computer readable medium accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, cartridges, RAM, ROM, and like.

Network interface 410 operatively couples the computer 302 to one or more remote computers 302R on a local area network 422 or a wide area network 432. The computers 302R may be geographically remote from computer 302. The remote computers 402R may have the structure of computer 402, or may be a server, client, router, switch, or other networked device and typically includes some or all of the elements of computer 402. peer device, or network node. The computer 402 may connect to the local area network 422 through a network interface or adapter included in the interface 410. The computer 402 may connect to the wide area network 432 through a modem or other communications device included in the interface 410. The modem or communications device may establish communications to remote computers 402R through global communications network 424. A person of reasonable skill in the art should recognize that application programs or modules 406C might be stored remotely through such networked connections.

We describe some portions of the recommender using algorithms and symbolic representations of operations on data bits within a memory, e.g., memory 306. A person of skill in the art will understand these algorithms and symbolic representations as most effectively conveying the substance of their work to others of skill in the art. An algorithm is a self-consistent sequence leading to a desired result. The sequence requires physical manipulations of physical quantities. Usually, but not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. For expressively simplicity, we refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or like. The terms are merely convenient labels. A person of skill in the art will recognize that terms such as computing, calculating, determining, displaying, or like refer to the actions and processes of a computer, e.g., computers 402 and 402R. The computers 402 or 402R manipulates and transforms data represented as physical electronic quantities within the computer 402's memory into other data similarly represented as physical electronic quantities within the computer 402's memory. The algorithms and symbolic representations we describe above

The recommender we describe above explicitly incorporates a co-occurrence matrix to define and determine similar items and utilizes the concepts of user communities and item collections, drawn as lists, to inform the recommendation. The recommender more naturally accommodates substitute or complementary items and implicitly incorporates intuition, i.e., two items should be more similar if more paths between them exist in the co-occurrence matrix. The recommender segments users and items and is massively scalable for direct implementation as a Map-Reduce computation.

A person of reasonable skill in the art will recognize that they may make many changes to the details of the above-described embodiments without departing from the underlying principles. The following claims, therefore, define the scope of the present systems and methods. 

1. A computer-implemented method, comprising: programming one or more processors to: access a list of users stored in one or more user databases and a list of items stored in one or more item databases; construct user communities of two or more users having an association there between; construct item collections of two or more items having an association therebetween; estimate associations between the user communities and the item collections; and provide one or more recommendations responsive to estimating the associations; and displaying the one or more recommendations on a display.
 2. The computer-implemented method of claim 1 further comprising programming the one or more processors to access the list of users or list of items in one or more memories.
 3. The computer-implemented method of claim 1 further comprising programming the one or more processors to construct the user communities by constructing time-varying user communities responsive to a time-varying list of user-user pairs.
 4. The computer-implemented method of claim 3 further comprising programming the one or more processors to construct the user communities responsive to time-varying relational probabilities between the user communities and the list of users, the list of items, item collections, or combinations thereof.
 5. The computer-implemented method of claim 3 further comprising programming the one or more processors to construct the user communities y₁(τ_(n)) y₂(τ_(n)), . . . , y_(l)(τ_(n)) by creating an updated list E_(uv)(τ_(n)) at a time τ incorporating a time-varying list of user-user pairs D_(uv)(τ_(n)) into E_(uv)(τ_(n)) where l and n are integers.
 6. The computer-implemented method of claim 5 further comprising programming the one or more processors to construct the user communities y₁(τ_(n)), y₂(τ_(n)), . . . , y_(l)(τ_(n)) by: adding (u_(i), v_(j), αe_(ij)) to E_(uv)(τ_(n)) for each triple (u_(i), v_(j), e_(ij)) in E_(uv)(τ_(n−1)); and for each pair (u_(i), v_(j)) in D_(uv)(τ_(n)), replacing (u_(i), v_(j), e_(ij)) with (u_(i), v_(j), e_(ij)+β) if (u_(i), v_(j), e_(ij)) is in E_(uv)(τ_(n)), otherwise add (u_(i), v_(j), β) to E_(uv)(τ_(n)); where β is a predetermined variable; and where l, n, i, and j are integers.
 7. The computer-implemented method of claim 5 further comprising programming the one or more processors to construct the user communities y₁(τ_(n)), y₂(τ_(n)), . . . , y_(l)(τ_(n)) by estimating at least one of the probabilities Pr(y_(l)|u_(i); τ_(n))⁻ or Pr(v_(j)|y_(l); τ_(n))⁻ using the updated list E_(uv)(τ_(n)) and conditional probabilities Q*(y_(l)|u_(i), v_(j); τ_(n−1)), where l, n, i, and j are integers.
 8. The computer-implemented method of claim 7 further comprising programming the one or more processors to construct the user communities y₁(τ_(n)), y₂(τ_(n)), . . . , y_(l)(τ_(n)) by, for each y_(l) and each (u_(i), v_(j), e_(ij)) in E_(uv)(τ_(n)), estimating Pr(v_(j)|y_(l); τ_(n))⁻ as Pr_(N)/Pr_(D), where Pr_(N) is a sum across u_(i)′ of e_(ij)Q*(y_(l)|u_(i)′, v_(j); τ_(n−1)) and where Pr_(D) is a sum across y_(l)′ and v_(l)′ of e_(ij)Q*(y_(l)′|u_(i), v_(j)′; τ_(n−1)).
 9. The computer-implemented method of claim 7 further comprising programming the one or more processors to construct the user communities y₁(τ_(n)), y₂(τ_(n)), . . . , y_(l)(τ_(n)) by, for each y_(l) and each (u_(i), v_(j), e_(ij)) in E_(uv)(τ_(n)), estimating Pr(y_(l)|u_(i); τ_(n))⁻ as Pr_(N)/Pr_(D) where Pr_(N) is a sum across v_(j)′ of e_(ij)Q*(y_(l)|u_(i), v_(j)′; τ_(n−1)) and where Pt_(D) is a sum across y_(l)′ and v_(j)′ of e_(ij)Q*(y_(l)′|u_(i), v_(j)′; τ_(n−1)).
 10. The computer-implemented method of claim 7 further comprising programming the one or more processors to construct the user communities y₁(τ_(n)), y₂(τ_(n)), . . . , y_(l)(τ_(n)) by estimating conditional probabilities Q*(y_(l)|u_(i), v_(j); τ_(n)) for each y_(l) and each (u_(i), v_(j), e_(ij)) in E_(uv)(τ_(n)).
 11. The computer-implemented method of claim 10 further comprising programming the one or more processors to construct the user communities y₁(τ_(n)), y₂(τ_(n)), . . . , y_(l)(τ_(n)) by setting Q*(y_(l)|u_(i), v_(j); τ_(n)) to Pr(v_(j)|y_(l); τ_(n))⁻ Pr(y_(l)|u_(i); τ_(n))⁻/Q*_(D) where Q*_(D) is a sum across y_(l)′ of Pr(v_(j)|y_(l)′;τ_(n))⁻Pr(y_(l)′|u_(i); τ_(n)).
 12. The computer-implemented method of claim 10 further comprising programming the one or more processors to construct the user communities y_(l)(τ_(n)), y₂(τ_(n)), . . . , t_(l)(τ_(n)) by estimating probabilities Pr(y_(l)|u_(i); τ_(n))⁺ and Pr(v_(j)|y_(l); τ_(n))⁺ for each y_(l) and each (u_(i), v_(j), e_(ij)) in E_(uv)(τ_(n)).
 13. The computer-implemented method of claim 12 further comprising programming the one or more processors to construct the user communities y₁(τ_(n)), Y₂(τ_(n)), . . . , y_(l)(τ_(n)) by setting Pr(v_(j)|y_(l); τ_(n))⁺ to Pr_(N1)/Pr_(D1) where Pr_(N1) is a sum across u_(i)′ of e_(ij)Q*(y_(l)|u_(i)′, v_(j); τ) and Pr_(D1) is a sum across u_(i)′ and v_(j)′ of e_(ij)Q*(y_(l)|u_(i)′, v_(j)′; τ_(n)).
 14. The computer-implemented method of claim 13 further comprising programming the one or more processors to construct the user communities y₁(τ_(n)), y₂(τ_(n)), . . . , y_(l)(τ_(n)) by setting Pr(y_(l)|u_(i); τ_(n))⁺ to Pr_(N2)/Pr_(D2) where Pr_(N2) is a sum across v_(j)′ of e_(ij)Q*(y_(l)|u_(i), v_(j)′; τ_(n)) and Pr_(D2) is a sum across y_(l)′ and v_(j)′ of e_(ij)Q*(y_(l)′|u_(i), v_(j)′; τ_(n)).
 15. The computer-implemented method of claim 14 further comprising programming the one or more processors to construct the user communities y_(l)(τ_(n)), y₂(τ_(n)), . . . , y_(l)(τ_(n)) by: repeating the estimating conditional probabilities Q*(y_(l),|u_(i), v_(j); τ_(n)) and the estimating probabilities Pr(y_(l)|u_(i); τ_(n)) and Pr(v_(j)|y_(l); τ_(n))⁺ with Pr(v_(j)|y_(l); τ_(n))⁻=Pr(v_(j)|y_(l); τ_(n))⁺ and Pr(y_(l)|u_(j); τ_(n))⁻=Pr(y_(l)|u_(i); τ_(n))⁺ if |Pr(v_(j)|y_(l); τ_(n))⁻−Pr(v_(j)|y_(l); τ_(n))⁺|>d or |Pr(y_(l)|u_(i); τ_(n))⁻Pr(y_(l)|u_(i); τ_(n))⁺|>d for a predetermined d<<1; and returning the probabilities Pr(y_(l)|u_(i); τ_(n))=Pr(y_(l)|u_(i); τ_(n))⁺ and Pr(v_(j)|y_(l); τ_(n))=Pr(v_(j)|y_(l); τ_(n))⁺, the conditional probabilities Q*(y_(l)|u_(i), v_(j); τ_(n)), and the list E_(uv)(τ_(n)) of triples (u_(i), v_(j), e_(ij)), where d is a predetermined number.
 16. The computer-implemented method of claim 1 further comprising programming the one or more processors to construct the item collections by constructing time-varying items collections responsive to a time-varying list of item-item pairs.
 17. The computer-implemented method of claim 16 further comprising programming the one or more processors to construct item collections responsive to time-varying relational probabilities between the item collections and the list of users, the list of items, user communities, or combinations thereof.
 18. The computer-implemented method of claim 16 further comprising programming the one or more processors to construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) by creating an updated list E_(st)(τ_(n)) at a time τ incorporating a time-varying list of item-item pairs D_(st)(τ_(n)) into E_(st)(τ_(n−1)), where k and n are integers.
 19. The computer-implemented method of claim 16 further comprising programming the one or more processors to construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) by: adding (s_(i), t_(j), αe_(il)) to E_(st)(τ_(n)) for each triple (s_(i), t_(j), e_(ij)) in E_(st)(τ_(n−1)); and for each pair (s_(i), t_(j)) in D_(st)(τ_(n)) replacing (v_(i), t_(j), e_(ij)) with (s_(i), t_(j), e_(ij)+β) if (s_(i), t_(j), e_(ij)) is in E_(st)(τ_(n)), otherwise add (s_(i), t_(j), β) to E_(st)(τ_(n)); where β is a predetermined variable; and where k, n, i, andj are integers.
 20. The computer-implemented method of claim 16 further comprising programming the one or more processors to construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) by estimating at least one of the probabilities Pr(z_(k)|s_(i); τ_(n))⁻ or Pr(t_(j)|z_(k); τ_(n))⁻ using the updated list E_(st)(τ_(n)) and conditional probabilities Q*(z_(k)|s_(i), t_(j); τ_(n−1)), where k, n, i, and j are integers.
 21. The computer-implemented method of claim 20 further comprising programming the one or more processors to construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) by, for each Zk and each (s_(i), t_(j), e_(ij)) in E_(st)(τ_(n)), estimating Pr(t_(j)|z_(k); τ_(n))⁻ as Pr_(N)/Pr_(D), where Pr_(N) is a sum across s_(i)′ of e_(ij)Q*(z_(k)|s_(i)′; τ_(n−1)) and where Pr_(D) is a sum across z_(k)′ and t_(j)′ of e_(ij) Q*(z_(k)′|s_(i), t_(j)′; τ_(n−1)).
 22. The computer-implemented method of claim 20 further comprising programming the one or more processors to construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) by, for each z_(k) and each (s_(i), t_(j), e_(ij)) in E_(st)(τ_(n)), estimating Pr(z_(k)|t_(i); τ_(n))⁻ as Pr_(N)/Pr_(D) where Pr_(N) is a sum across t_(j)′ of e_(ij)Q*(z_(k)|s_(i), t_(j)′; τ_(n−1)) and where Pr_(D) is a sum across z_(k)′ and t_(j)′ of e_(ij)Q*(z_(k)′|s_(i), t_(j); τ_(n−1)).
 23. The computer-implemented method of claim 20 further comprising programming the one or more processors to construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) by estimating conditional probabilities Q*(z_(k)|s_(i), t_(j); τ_(n)) for each z_(k) and each (s_(i), t_(j), e_(ij)) in E_(st)(τ_(n)).
 24. The computer-implemented method of claim 23 further comprising programming the one or more processors to construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) by setting Q*(z_(k)|s_(i), t_(j); τ_(n)) to Pr(t_(j)|z_(k); τ_(n))⁻Pr(z_(k)|s_(i); τ_(n))⁻/Q*_(D) where Q*_(D) is a sum across z_(k)′ of Pr(t_(k)|z_(k)′; τ_(n))⁻Pr(z_(k)′s_(i); τ_(n))⁻.
 25. The computer-implemented method of claim 23 further comprising programming the one or more processors to construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) by estimating probabilities Pr(z_(k)|s_(i); τ_(n))⁺ and Pr(t_(j)|z_(k); τ_(n))⁺ for each z_(k) and each (s_(i), t_(j), e_(ij)) in E_(st)(τ_(n)).
 26. The computer-implemented method of claim 25 further comprising programming the one or more processors to construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) by setting Pr(t_(j)|z_(k); τ_(n))⁺ Pr_(N1)/Pr_(D1) where Pr_(N1) is a sum across s_(i)′ of e_(ij)Q*(z_(k)|s_(i)′, t_(j); τ) and Pr_(D1) is a sum across s_(i)′ and t_(j)′ of e_(ij)Q*(z_(k)|s_(i)′, t_(j)′; τ_(n)).
 27. The computer-implemented method of claim 26 further comprising programming the one or more processors to construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) by setting Pr(z_(k)|s_(i); τ_(n))⁺ to Pr_(N2)/Pr_(D2) where Pr_(N2) is a sum across t_(j)′ of e_(ij)Q*(z_(k)|s_(i), t_(j)′; τ_(n)) and Pr_(D2) is a sum across z_(k) and t_(j)′ of e_(ij)Q*(z_(k)′|s_(i), t_(j)′; τ_(n)).
 28. The computer-implemented method of claim 27 further comprising programming the one or more processors to construct item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) by: repeating the estimating conditional probabilities Q*(z_(k)|s_(i), t_(j); τ_(n)) and the estimating probabilities Pr(z_(k)|s_(i); τ_(n))⁺ and Pr(t_(j)|z_(k); τ_(n))⁺ with Pr(t_(j)|z_(k); τ_(n) ⁻=Pr(t_(j)|z_(k); τ_(n))⁺ and Pr(z_(k)|s_(i); τ_(n))⁻=Pr (z_(k)|s_(i); τ_(n))⁺ if |Pr(t_(j)|z_(k); τ_(n))⁻−Pr(t_(j)|z_(k); τ_(n))⁺|>d or |Pr(z_(k)|s_(i); τ_(n))⁻−Pr(z_(k)|s_(i); τ_(n))⁺|>d for a predetermined d<<1; and returning the probabilities Pr(z_(k)|s_(i); τ_(n))=Pr(z_(k)|s_(i); τ_(n))⁺ and Pr(t_(j)|z_(k); τ_(n))=Pr(t_(j)|z_(k); τ_(n))⁺, the conditional probabilities Q*(z_(k)|s_(i), t_(j); τ_(n)), and the list E_(st)(τ_(n)) of triples (s_(i), t_(j), e_(ij)), where d is a predetermined number.
 29. The computer-implemented method of claim 1 further comprising programming the one or more processors to estimate associations by constructing time-varying association probabilities between at least two item collections.
 30. The computer-implemented method of claim 1 further comprising programming the one or more processors to estimate associations by constructing time-varying association probabilities between at least two item collections z₁(τ_(n)), z₂(τ_(n)), . . . , z_(k)(τ_(n)) and y₁(τ_(n)), y₂(τ_(n)), . . . , y_(l)(τ_(n)) responsive to probabilities Pr(y_(k)|u_(i); τ_(n)) that u_(i) are members of the item collection y_(l)(τ_(n)), probabilities Pr(t_(j)|z_(k); τ_(n)) that the item collection z_(k)(τ_(n)) include the t_(j) as members, and a time-varying list D(τ_(n)) of triples (u_(i), t_(j), S_(o)).
 31. The computer-implemented method of claim 30 further comprising programming the one or more processors to estimate associations by creating an updated list E(τ_(n)) at a time τ incorporating a time-varying list of triples D(τ_(n)) into E(τ_(n−1)), where l and n are integers.
 32. The computer-implemented method of claim 31 further comprising programming the one or more processors to estimate associations by: adding (u_(i), t_(j), S_(o), αe_(ij)) to E(τ_(n)) for each 4-tuple (u_(i), t_(j), S_(o), e_(ijo)) in E(τ_(n−1)); and for each triple (u_(i), t_(j), S_(o)) in D(τ_(n)), replacing (u_(i), t_(j), S_(o), e_(ijo)) with (u_(i), t_(j), e_(ijo)+β) if (u_(i), t_(j), S_(o), e_(ijo)) is in E(τ_(n)), otherwise add (u_(i), s_(j), S_(o), β) to E(τ_(n)); where, β is a predetermined variable; and where l, n, i, j, o are integers.
 33. The computer-implemented method of claim 31 further comprising programming the one or more processors to estimate associations by estimating probabilities Pr(z_(k)|y_(l); τ_(n))⁻ using the updated list E(τ_(n)) and conditional probabilities Q*(z_(k), y_(l)|u_(i), t_(jS) _(o),; τ_(n−1)), where l, n, i, j, and o are integers.
 34. The computer-implemented method of claim 33 further comprising programming the one or more processors to estimate associations by, for each y_(l) and z_(k), estimating Pr(z_(k)|y_(l); τ_(n))⁻ as Pr_(N)/Pr_(D), where Pr_(N) is a sum across u_(i), t_(j), and S_(o) of e_(ijo)Q*(z_(k), y_(l)|u_(i), t_(j), S_(o); τ_(n−1)) and where Pr_(D) is a sum across u_(i), t_(j), S_(o) and z_(k)′ of e_(ijo)Q*(z_(k)′, y_(l)|u_(i), t_(j), S_(o); τ_(n1)).
 35. The computer-implemented method of claim 33 further comprising programming the one or more processors to estimate associations by estimating conditional probabilities Q*(z_(k), y_(l)|u_(i), s_(j), S_(o); τ_(n)).
 36. The computer-implemented method of claim 35 further comprising programming the one or more processors to estimate associations by, each y_(l) and z_(k), estimating probabilities Pr(z_(k)|y_(l); τ_(n))⁻ as Pr_(N)/Pr_(D), where Pr_(N) is a sum across u_(i), t_(j), and S_(o) of e_(ijo)Q*(z_(k), y_(l)|u_(i), t_(j), S_(o); τ_(n−1)) and where Pr_(D) is a sum across u_(i), t_(j), S_(o) and z_(k)′ of e_(ijo)Q*(z_(k)′, y_(l)|u_(i), t_(j), S_(o); τ_(n−1)).
 37. The computer-implemented method of claim 35 further comprising programming the one or more processors to estimate associations by estimating the probabilities Pr(z_(k)|y_(l); τ_(n))⁺.
 38. The computer-implemented method of claim 37 further comprising programming the one or more processors to estimate associations by, for each y_(l) and z_(k), estimating probabilities Pr(z_(k)|y_(l); τ_(n))⁺ as Pr_(N)/Pr_(D), where Pr_(N) is a sum across u_(i), t_(j), and S_(o) of e_(ijo)Q*(z_(k), y_(l)|u_(i), t_(j), S_(o); τ_(n)) and where Pr_(D) is a sum across u_(i), t_(j), S_(o) and z_(k)′ of e_(ijo)Q*(z_(k)′, y_(l)|u_(i), t_(j), S_(o); τ_(n)).
 39. The computer-implemented method of claim 37 further comprising programming the one or more processors to estimate associations by, for any pair (z_(k), y_(l)), if |Pr(z_(k)|y_(l); τ_(n))⁻−Pr(z_(k)|y_(l); τ_(n))⁺|>d for a predetermined d<<1 and the estimating probabilities Pr(z_(k)|y_(l); τ_(n))⁻ and the estimating probabilities Pr(z_(k)|y_(l); τ_(n))⁺ have not been repeated more than R times, repeat the estimating probabilities Pr(z_(k)|y_(l); τ_(n))⁻ and the estimating probabilities Pr(z_(k)|y_(l); τ_(n))⁺ with Pr(z_(k)|y_(l); τ_(n))⁻=Pr(z_(k)|y_(l); τ_(n))⁺, where d is a predetermined variable and R is an integer.
 40. The computer-implemented method of claim 38 further comprising programming the one or more processors to estimate associations by, for any pair (z_(k), y_(l)) and for |Pr(z_(k)|y_(l); τ_(n))⁻−Pr(z_(k)|y_(l); τ_(n))⁺|>d for a predetermined d<<1, let Pr(z_(k)|y_(l); τ_(n))⁺=[Pr(z_(k)|y_(l); τ_(n))⁺+Pr(z_(k)|y_(l); τ_(n))⁺]/2 where d is an predetermined variable. 