Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 423-427.
• Big Date & Date Mining • Previous Articles Next Articles
SHI Jin-ping1,3,LI Jin1,3,HE Feng-zhen2
CLC Number:
[1]KUNAVER M,PO RL T.Diversity in recommender systems-A survey[J].Knowledge-Based Systems,2017,123:154-162.<br /> [2]JAVARI A,IZADI M,JALILI M.Recommender Systems for Social Networks Analysis and Mining:Precision Versus Diversity[J].Understanding Complex Systems,2016,73:423-438.<br /> [3]LEE K,LEE K.Escaping your comfort zone:A graph-based recommender system for finding novel recommendations among relevant items[J].Expert Systems with Applications,2015,42(10):4851-4858.<br /> [4]AYTEKIN T,KARAKAYA M .Clustering-based diversity improvement in top-N recommendation[J].Journal of Intelligent Information Systems,2014,42(1):1-18.<br /> [5]MCNEE S M,RIEDL J,KONSTAN J A.Being accurate is not enough:how accuracy metrics have hurt recommender systems[C]∥CHI ’06 Extended Abstracts on Human Factors in Computing Systems.ACM,2006:1097-1101.<br /> [6]ZIEGLER C,MCNEE S M,KONSTAN J A,et al.Improving recommendation lists through topic diversication[C]∥International Conference on World Wide Web.2005:22-32.<br /> [7]HURLEY N,ZHANG M.Novelty and Diversity in Top-N Re- commendation- Analysis and Evaluation[J].ACM Transactions on Internet Technology,2011,10(4):1-30.<br /> [8]SUN Z,HAN L,HUANG W,et al.Recommender systems based on social networks[J].Journal of Systems and Software,2015,99(C):109-119.<br /> [9]LIU R,JIN Z.An Improved Graph-based Recommender System for Finding Novel Recommendations among Relevant Items[C]∥International Conference on Mechatronics,Materials,Chemistry and Computer Engineering.2015.<br /> [10]SHANNON C E.A mathematical theory of communication[J]. ACM Sigmobile Mobile Computing & Communications Review,2001,5(1):3-55. [11]ANTIKACIOGLU A,RAVI R.Post Processing Recommender Systems for Diversity[C]∥The ACM SIGKDD International Conference.ACM,2017:707-716.<br /> [12]LEE S C,KIM S W,PARK S,et al.A Single-Step Approach to Recommendation Diversification[C]∥26th International Conference on World Wide Web Companion.2017. |
[1] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[2] | WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126. |
[3] | WANG Yu-fei, CHEN Wen. Tri-training Algorithm Based on DECORATE Ensemble Learning and Credibility Assessment [J]. Computer Science, 2022, 49(6): 127-133. |
[4] | YU Ai-xin, FENG Xiu-fang, SUN Jing-yu. Social Trust Recommendation Algorithm Combining Item Similarity [J]. Computer Science, 2022, 49(5): 144-151. |
[5] | CHEN Zhuang, ZOU Hai-tao, ZHENG Shang, YU Hua-long, GAO Shang. Diversity Recommendation Algorithm Based on User Coverage and Rating Differences [J]. Computer Science, 2022, 49(5): 159-164. |
[6] | CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66. |
[7] | ZUO Yuan-lin, GONG Yue-jiao, CHEN Wei-neng. Budget-aware Influence Maximization in Social Networks [J]. Computer Science, 2022, 49(4): 100-109. |
[8] | GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120. |
[9] | SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215. |
[10] | LIU Yi, MAO Ying-chi, CHENG Yang-kun, GAO Jian, WANG Long-bao. Locality and Consistency Based Sequential Ensemble Method for Outlier Detection [J]. Computer Science, 2022, 49(1): 146-152. |
[11] | WANG Jian, WANG Yu-cui, HUANG Meng-jie. False Information in Social Networks:Definition,Detection and Control [J]. Computer Science, 2021, 48(8): 263-277. |
[12] | TAN Qi, ZHANG Feng-li, WANG Ting, WANG Rui-jin, ZHOU Shi-jie. Social Network User Influence Evaluation Algorithm Integrating Structure Centrality [J]. Computer Science, 2021, 48(7): 124-129. |
[13] | ZHOU Gang, GUO Fu-liang. Research on Ensemble Learning Method Based on Feature Selection for High-dimensional Data [J]. Computer Science, 2021, 48(6A): 250-254. |
[14] | ZHANG Ren-zhi, ZHU Yan. Malicious User Detection Method for Social Network Based on Active Learning [J]. Computer Science, 2021, 48(6): 332-337. |
[15] | BAO Zhi-qiang, CHEN Wei-dong. Rumor Source Detection in Social Networks via Maximum-a-Posteriori Estimation [J]. Computer Science, 2021, 48(4): 243-248. |
|