Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 493-496.
• Big Date & Date Mining • Previous Articles Next Articles
HE Ji-xing,CHEN Wen-bin,MOU Bin-hao
CLC Number:
[1]李容,李明奇,郭文强.基于改进相似度的协同过滤算法研究[J].计算机科学,2016,43(12):206-208. [2]徐蕾,杨成,姜春晓,等.协同过滤推荐系统中的用户博弈[J].计算机学报,2016,39(6):1176-1189. [3]XUE G R,LIN C,YANG Q,et al.Scalable collaborative filtering using cluster-based smoothing[C]∥International ACM Sigir Conference on Research & Development in Information Retrieval.2005:114-121. [4]姚彬修,倪建成,于苹苹,等.基于多源信息相似度的微博用户推荐算法[J].计算机应用,2017,37(5):1382-1386. [5]于洪涛,周倩楠,张付志.基于项目流行度和新颖度分类特征的托攻击检测算法[J].工程科学与技术,2017,49(1):176-183. [6]SHI Y,LARSON M,HANJALIC A.Exploiting user similarity based on rated-item pools for improved user-based collaborative filtering[C]∥Proceedings of the Third ACM Conference on Recommender Systems.ACM,2009:125-132. [7]BANDA L,BHARADWAJ K K.Evaluation of Collaborative Filtering Based on Tagging with Diffusion Similarity Using Gradual Decay Approach[M]∥Advanced Computing,Networking and Informatics- Volume 1.Springer International Publi-shing,2014:421-428. [8]黄文明,莫阳.基于文本加权KNN算法的中文垃圾短信过滤[J].计算机工程,2017,43(3):193-199. [9]郑洁,钱育蓉,杨兴耀,等.基于信任和项目偏好的协调过滤算法[J].计算机应用,201636(10):2784-2788. [10]王吉源,黎晨,王婵娟.用户属性加权活跃近邻的协同过滤算法[J].计算机应用研究,2016,(12):3625-3629. [11]SHANG M S,JIN C H,ZHOU T,et al.Collaborative filtering based on multi-channel diffusion [J].Physica A Statistical Mechanics & Its Applications,2009,388(23):4867-4871. [12]王伟,徐平平,王华君,等.基于概率回归模型和K-最近邻的电子商务个性化推荐方案[J].湘潭大学自科学报,2016,38(1):97-100. [13]BOBADILLA J,ORTEGA F,HERNANDO A.Recommender systems survey [J].Knowledge-Based Systems,2013,46(1):109-132. [14]徐雅斌,孙晓晨.位置社交网络的个性化位置推荐[J].北京邮电大学学报,2015,38(5):118-124. |
[1] | ZHANG Ren-jie, CHEN Wei, HANG Meng-xin, WU Li-fa. Detection of Abnormal Flow of Imbalanced Samples Based on Variational Autoencoder [J]. Computer Science, 2021, 48(7): 62-69. |
[2] | ZHAO Zhi-qiang, YI Xiu-shuang, LI Jie, WANG Xing-wei. Research on DoS Intrusion Detection Technology of IPv6 Network Based on GR-AD-KNN Algorithm [J]. Computer Science, 2021, 48(6A): 524-528. |
[3] | HUANG Ming, SUN Lin-fu, REN Chun-hua , WU Qi-shi. Improved KNN Time Series Analysis Method [J]. Computer Science, 2021, 48(6): 71-78. |
[4] | HE Miao-miao, GUO Wei-bin. Inductive Learning Algorithm of Graph Node Embedding Based on KNN and Matrix Transform [J]. Computer Science, 2021, 48(3): 201-205. |
[5] | BAO Zong-ming, GONG Sheng-rong, ZHONG Shan, YAN Ran, DAI Xing-hua. Person Re-identification Algorithm Based on Bidirectional KNN Ranking Optimization [J]. Computer Science, 2019, 46(11): 267-271. |
[6] | LI Si-yao, ZHOU Hai-fang, FANG Min-quan. Research of Image Classification Algorithm Based on GPU [J]. Computer Science, 2018, 45(6A): 143-145. |
[7] | CHEN Jing-jie and CHE Jie. Fuel Flow Missing-value Imputation Method Based on Standardized Euclidean Distance [J]. Computer Science, 2017, 44(Z6): 109-111. |
[8] | FENG Fei, JIANG Bao-hua, LIU Pei-xue and CHEN Yu-jie. Application of Improved 2DPCA Algorithm in Face Recognition [J]. Computer Science, 2017, 44(Z11): 267-268. |
[9] | XUE Zhong-bin, BAI Li-guang, HE Ning, ZHOU Xuan, ZHOU Xin and WANG Shan. Throughput Oriented Real-time Query Processing Algorithm for Moving Objects in Road Network [J]. Computer Science, 2017, 44(3): 16-19. |
[10] | WANG Li, WANG Xin and MA Chao-dong. Distributed Caching Strategy for Data Exchange Program Based on Ontology and KNN Algorithm [J]. Computer Science, 2016, 43(Z11): 316-319. |
[11] | HUA Hui-you, CHEN Qi-mai, LIU Hai, ZHANG Yang and YUAN Pei-quan. Hybrid Kmeans with KNN for Network Intrusion Detection Algorithm [J]. Computer Science, 2016, 43(3): 158-162. |
[12] | WANG Pei-zhong, ZHENG Nan-shan and ZHANG Yan-zhe. Indoor Positioning Algorithm Based on Dynamic K Value and AP MAC Address Match [J]. Computer Science, 2016, 43(1): 163-165. |
[13] | WANG Fei, QIN Xiao-lin, LIU Liang and SHEN Yao. Algorithm for k-Nearest Neighbor Join Based on Data Stream [J]. Computer Science, 2015, 42(5): 204-210. |
[14] | XU Xiao-dan, YAO Ming-hai, LIU Hua-wen and ZHENG Zhong-long. Pre-processing Method of Multi-label Classification Based on kNN [J]. Computer Science, 2015, 42(5): 106-108. |
[15] | QIAN Yan-yan, LI Yong-zhong and YU Xi-ya. Intrusion Detection Method Based on Multi-label and Semi-supervised Learning [J]. Computer Science, 2015, 42(2): 134-136. |
|