Computer Science ›› 2019, Vol. 46 ›› Issue (2): 202-209.doi: 10.11896/j.issn.1002-137X.2019.02.031
• Artificial Intelligence • Previous Articles Next Articles
MAO Yu-jia, LIU Xue-jun, XU Xin-yan, ZHANG Xin
CLC Number:
[1]O’CONNOR M,DAN C,KONSTAN J A,et al.PolyLens:A Recommender System for Groups of Users[C]∥ Conference on European Conference on Computer Supported Cooperative Work.Netherlands:Springer,2001:199-218. [2]FENG S,CAO J.Improving group recommendations via detecting comprehensive correlative information[J].Multimedia Tools & Applications,2015,76(1):1-23. [3]SYMEONIDIS P,TIAKAS E,MANOLOPOULOS Y.Product recommendation and rating prediction based on multi-modal social networks[C]∥Proceedings of the fifth ACM Conference on Recommender Systems.New York:ACM,2011:61-68. [4]BAGCI H,KARAGOZ P.Context-Aware Friend Recommendation for Location Based Social Networks using Random Walk[C]∥ Proceedings of the 25th International Conference Companion on World Wide Web.Canada,2016:531-536. [5]REN Z,LIANG S,LI P,et al.Social Collaborative Viewpoint Regression with Explainable Recommendations[C]∥ Procee-dings of the Tenth ACM International Conference on Web Search and Data Mining.New York:ACM,2017:485-494. [6]HONG M,JUNG J J,CAMACHO D.GRSAT:A Novel Method on Group Recommendation by Social Affinity and Trustworthiness[J].Cybernetics & Systems,2017,48(3):140-161. [7]YUAN Z,CHEN C.Research on group POIs recommendation fusion of users’ gregariousness and activity in LBSN[C]∥ IEEE International Conference on Cloud Computing and Big Data Analysis.China:IEEE,2017:305-310. [8]LIN X,ZHANG M,ZHANG Y F,et al.Fairness-Aware Group Recommendation with Pareto-Efficiency[C]∥The Eleventh ACM Conference.New York:ACM,2017:107-115. [9]WANG S,WANG Y,TANG J,et al.What Your Images Reveal:Exploiting Visual Contents for Point-of-Interest Recommendation[C]∥ Proceedings of the 26th International Con-ference on World Wide Web.Canada,2017:391-400. [10]HE R,MCAULEY J.Ups and Downs:Modeling the Visual Evolution of Fashion Trends with One-Class Collaborative Filtering[C]∥ Proceedings of the 25th International Conference on World Wide Web.Canada,2016:507-517. [11]LAI C H,HONG P R.Group Recommendation Based on the Analysis of Group Influence and Review Content[C]∥Asian Conference on Intelligent Information and Database Systems.Japan:Springer,Cham,2017:100-109. [12]NAAMANI-DERY L,KALECH M,ROKACH L,et al.Pre- ference elicitation for narrowing the recommended list for groups[C]∥ Proceedings of the 8th ACM Conference onRe-commender systems.New York:ACM,2014:333-336. [13]HUANG C H,YIN J,HOU F.A text similarity measurement combining word semantic information with TF-IDF method[J].Chinese Journal of Computers,2011,34(5):856-864.(in Chinese) 黄承慧,印鉴,侯昉.一种结合词项语义信息和TF-IDF方法的文本相似度量方法[J].计算机学报,2011,34(5):856-864. [14]ZHANG Y J,DU Y L,MENG X W.Research on group recommendation systems and their application[J].Chinese Journal of Computers,2016,39(4):745-764.(in Chinese) 张玉洁,杜雨露,孟祥武.组推荐系统及其应用研究[J].计算机学报,2016,39(4):745-764. [15]PESSEMIER T,DOOMS S,MARTENS L.Comparison of group recommendation algorithms[M].Dordrecht:Kluwer Academic Publishers,2014:2497-2541. [16]KAGITA V R,PUJARI A K,PADMANABHAN V.Virtual user approach for group recommender systems using precedence relations[M].Tanytown:Elsevier Science Inc,2015:15-30. |
[1] | CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543. |
[2] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[3] | JI Yu-xiang, HUANG Jian-hua, WANG Zhe, ZHENG Hong, TANG Rui-cong. Improved PBFT Consensus Algorithm Based on Trust Matching [J]. Computer Science, 2021, 48(2): 303-310. |
[4] | LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339. |
[5] | CHENG Yu, LIU Wei, SUN Tong-xin, WEI Zhi-gang, DU Wei. Design of Fault-tolerant L1 Cache Architecture at Near-threshold Voltage [J]. Computer Science, 2020, 47(4): 42-49. |
[6] | GENG Lei-lei, CUI Chao-ran, SHI Cheng, SHEN Zhen, YIN Yi-long, FENG Shi-hong. Social Image Tag and Group Joint Recommendation Based on Deep Multi-task Learning [J]. Computer Science, 2020, 47(12): 177-182. |
[7] | ZHOU Wan-kai, LONG Min. Secure Transmission Scheme for Environmental Monitoring Data Based on Blockchain [J]. Computer Science, 2020, 47(1): 315-320. |
[8] | CHEN Zi-hao, LI Qiang. Improved PBFT Consensus Mechanism Based on K-medoids [J]. Computer Science, 2019, 46(12): 101-107. |
[9] | WANG Xiao-fang, XIE Zhong-wen, LI Tong, CHENG Lei, ZHENG Jiao-jiao and LIU Xiao-fang. Saas Service Evolution Consistency Checking with Tenant Tolerance [J]. Computer Science, 2018, 45(5): 147-155. |
[10] | ZHOU Jing and FANG Gui-sheng. Judging and Fitting Method for Fractured Freehand Multi-stroke Based on Tolerance Zone [J]. Computer Science, 2017, 44(Z11): 184-188. |
[11] | ZHANG Nan, XU Xin, TONG Xiang-rong, GAO Xue-yi and JIANG Li-li. Distribution Reduction in Inconsistent Interval-valued Decision Systems [J]. Computer Science, 2017, 44(9): 78-82. |
[12] | DING Mian-wei, ZHANG Teng-fei and MA Fu-min. Incremental Attribute Reduction Algorithm Based on Binary Discernibility Matrix in Incomplete Information System [J]. Computer Science, 2017, 44(7): 244-250. |
[13] | WU Ya-lan, WU Ji-gang, JIANG Wen-chao and LIU Zhu-song. Reconfiguring Multiprocessor Arrays for Synchronous Communication [J]. Computer Science, 2017, 44(7): 47-56. |
[14] | YANG Na and LIU Jing. Cloud Fault Tolerance Services Adaption Method Based on Requirement and Resource Constriction [J]. Computer Science, 2017, 44(7): 61-67. |
[15] | LIU Yi, ZHONG Xian and LI Lin. Research on Method of Group Recommendation for Fusion of Hidden Features [J]. Computer Science, 2017, 44(3): 231-236. |
|