Diverse User Preference Elicitation with Multi-Armed Bandits

Diverse User Preference Elicitation with Multi-Armed Bandits

Session 3: Recommender Systems WSDM ’21, March 8–12, 2021, Virtual Event, Israel Diverse User Preference Elicitation with Multi-Armed Bandits Javier Parapar∗ Filip Radlinski [email protected] [email protected] Universidade da Coruña Google Research A Coruña, Spain London, United Kingdom ABSTRACT 1 INTRODUCTION Personalized recommender systems rely on knowledge of user pref- Recommender Systems (RSs) [46] have become ubiquitous for rec- erences to produce recommendations. While those preferences are ommending movies [19], music [54], books [57], news [34], and in often obtained from past user interactions with the recommenda- numerous other domains. Their goal is to help users more quickly tion catalog, in some situations such observations are insufficient find relevant items in vast catalogues. or unavailable. The most widely studied case is with new users, One of the most common approaches is Collaborative Filtering although other similar situations arise where explicit preference (CF), which depends on rich user preference information to discover elicitation is valuable. At the same time, a seemingly disparate relationships between items, and in turn allows user-user and item- challenge is that there is a well known popularity bias in many al- item similarity to be estimated. Given a user profile, items of interest gorithmic approaches to recommender systems. The most common to similar users can then be suggested. Preferences can be explicit way of addressing this challenge is diversification, which tends to (for example, ratings on books, or likes of posts) or implicit (for be applied to the output of a recommender algorithm, prior to items example, the history of songs a user has listened to, or films the user being presented to users. has watched). However, for CF approaches to work well, algorithms We tie these two problems together, showing a tight relationship. need sufficient user preferences, which are not always available. In Our results show that popularity bias in preference elicitation con- fact, cold start is one of the most acute problems of CF methods tributes to popularity bias in recommendation. In particular, most and is heavily studied [50]. User cold start refers to the problem of elicitation methods directly optimize only for the relevance of rec- new users, where a system has no or little preference information. ommendations that would result from collected preferences. This In this situation, the usual solution to enable CF algorithms is to focus on recommendation accuracy biases the preferences collected. perform preference elicitation: The system asks the user for some We demonstrate how diversification can instead be applied directly initial preference information (e.g., [14, 44, 45]). at elicitation time. Our model diversifies the preferences elicited However, elicitation is useful beyond the cold start problem. For using Multi-Armed Bandits, a classical exploration-exploitation instance user interests change or conflict over time [42], or depend framework from reinforcement learning. This leads to a broader on context [7]. Beyond this, systems can improve by validating understanding of users’ preferences, and improved diversity and preferences collected previously, to remove noisy observations [4, serendipity of recommendations, without necessitating post-hoc 53, 58]. In general terms, an elicitation algorithm’s objective is debiasing corrections. to decide which items or questions to ask a user so as to obtain information about their preferences most effectively. CCS CONCEPTS Recommendation accuracy has dominated RSs research in the • Information systems ! Recommender systems. past. However, there has been a recent recognition that other as- pects are also important. For instance, item novelty and recom- KEYWORDS mendation diversity have been found to improve user satisfaction [11, 22, 37]. As such, it is now generally accepted that recommen- recommender systems, preference elicitation, diversity, bandits dation systems should help users find items they would not have ACM Reference Format: discovered otherwise. This has led to studies measuring unexpected Javier Parapar and Filip Radlinski. 2021. Diverse User Preference Elicitation items, or serendipity [2, 29], which is often associated with user sat- with Multi-Armed Bandits. In Proceedings of the Fourteenth ACM Inter- isfaction [16]. Indeed, it has been shown that improving diversity, national Conference on Web Search and Data Mining (WSDM ’21), March as a proxy for serendipity, also improves user satisfaction [10]. 8–12, 2021, Virtual Event, Israel. ACM, New York, NY, USA, 9 pages. https: To improve such aspects, the most common approach is to im- //doi.org/10.1145/3437963.3441786 prove diversity in recommendation results, as surveyed by [31]. ∗Work carried out as Visiting Faculty Researcher at Google. Diversification algorithms reorder the items scored for relevance to increase item diversity. However, the best performing RSs fre- Permission to make digital or hard copies of all or part of this work for personal or quently rank very similar items together at the top of the ranking classroom use is granted without fee provided that copies are not made or distributed (as similar items are of similar relevance). Diversification thus tends for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the to delve deep into the recommendation list, increasing the proba- author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or bility of selecting non-relevant items to recommend. This creates a republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. trade-off between accuracy and diversity [38]. WSDM ’21, March 8–12, 2021, Virtual Event, Israel In this work, we present an alternative approach, addressing the © 2021 Copyright held by the owner/author(s). Publication rights licensed to ACM. diversity problem at a fundamentally different stage: We introduce ACM ISBN 978-1-4503-8297-7/21/03...$15.00 https://doi.org/10.1145/3437963.3441786 130 Session 3: Recommender Systems WSDM ’21, March 8–12, 2021, Virtual Event, Israel a method for the diversification of the preference elicitation pro- The advantage of this (rather than only pursuing entropy reduc- cess. By tackling diversity when user interests are established, our tion) is that popular items have a higher chance of having been method provides the recommender algorithm with a broader and rated in offline test data used to evaluate elicitation algorithms. This more complete user profile. This variety of user interests allows fact, combined with the tendency of popularity-biased user pro- the recommendation algorithm to produce recommendations less files to produce popularity-biased recommendations, suggests that prone to popularity bias and overspecialization. Specifically, we those recommendation lists would tend to show higher precision propose a Multi-Armed Bandits based algorithm [26] that improves in offline evaluation. This argument resulted in the appearance both thematic and item diversity during preference elicitation. of models designed to work around two well-known problems of We make two key contributions: offline RSs evaluation: popularity bias, and missing ratings. Rashid et al. [45] also recognized the problem of the missing item ratings • We present the first model that diversifies preference elicita- and present an entropy variant for that problem. Their 퐸=CA>?~0 tion. This approach is independent of any particular recom- method presented better accuracy figures than popularity in iso- mendation algorithm, and results in broader user profiles. lation. Similarly, Sepliarskaia et al. [51] presented an approach to • We present a new methodology for offline evaluation of create a fixed preference questionnaire offline instead of interac- preference elicitation, reducing an important bias that we tively computing the next item to be presented after each answer. identify in existing approaches, favouring apparent accuracy Static questionnaires facilitate the logistics of the preference elici- of greedy-like algorithms. tation without the need of an online feedback loop-back. All this Next, we discuss related work and provide background on key work contrasts with optimizing for user satisfaction. concepts. Then Section 3 presents our algorithm for diversified pref- erence elicitation. We describe the experimental setup in Section 4 and results in Section 5. Finally, we conclude in Section 6. 2.2 Results Diversification Diversity in Recommendations has attracted attention as well [6], 2 RELATED WORK with much other work surveyed by Kunaver and Porl [31]. In the same way that top-n recommendation has benefited from advances To the best of our knowledge, this is the first attempt to diversify the in search ranking, diversity in recommendation also takes ideas preference elicitation process. However, there is extensive work on from Web search result diversification. In particular, the Maximal preference elicitation, diversification of recommendation lists, and Marginal Relevance method (MMR) presented by Carbonell and Multi-Armed Bandits for recommendation. We now summarize this Goldstein [9] has been the base of many RS diversification proposals. previous work and introduce some of the key relevant concepts. In general terms, such approaches try to

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us