Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 220900067-10.doi: 10.11896/jsjkx.220900067
• Big Data & Data Science • Previous Articles Next Articles
FENG Shu1,3, ZHU Yi1,2,3, SONG Mei1,3, JU Chengcheng1,3
CLC Number:
[1]YUN Y,DAI H,ZHANG P Y,et al.State-of-the-Art Survey of Personalized Learning Path Recommendation [J].Journal of Software,2022,33(12):4590-4615. [2]JAIN A,NAGAR S,SINGH P K,et al.EMUCF:Enhancedmultistage user-based collaborative filtering through non-linear similarity for recommendation systems[J].Expert Systems with Applications,2020,161:113724. [3]SARWAR B,KARYPIS G,KONSTAN J,et al.Item-based collaborative filtering recommendation algorithms[C]//Procee-dings of the 10th international conference on World Wide Web.2001:285-295. [4]TEWARI A S.Generating items recommendations by fusingcontent and user-item based collaborative filtering[C]//Procedia Computer Science,2020,167:1934-1940. [5]YU M,QUAN T,PENG Q,et al.A model-based collaborate filtering algorithm based on stacked AutoEncoder[J].Neural Computing and Applications,2022,34(4):2503-2511. [6]WANG X,KADIOĞLU S.Modeling uncertainty to improve personalized recommendations via Bayesian deep learning[J].International Journal of Data Science and Analytics,2021,16(2/3):191-201. [7]TAN W Z.The Algorithmic Risk of Artificial Intelligence in Edu-cation[J].Open Education Research,2019,25(6):20-30. [8]LI L.Design and Implementation of Recommendation A lgo-rithm Based on Post Hoc Interpretability[D].Taiyuan:Shanxi University,2021. [9]LIU H L,GUO Y,MA J.Research Progress of Similarity Algorithm in Collaborative Filtering [J].Computer Engineering and Applications,2022,58(13):27-35. [10]MA S C,SHI J Q,HUANG Y H,et al.Minimal-unsatisfiable-core-driven Local Explainability Analysis for Random Forest [J].Journal of Software,2022,33(7):2447-2463. [11]GOODFELLOW I J,SHLENS J,SZEGEDY C.Explaining andHarnessing Adversarial Examples[C]//ICLR.2015. [12]WU Y,ZHANG M.Tightening Robustness Verification of Convolutional Neural Networks with Fine-Grained Linear Approximation[C]//The Thirty-Fifth AAAI Conference on Artificial Intelligence(AAAI-21).2021. [13]MILNER R.A Calculus of Communicating Systems[C]//Springer Berlin Heidelberg,1980. [14]HOARE C A R.Communicating sequential processes[J].Communications of the ACM,1978,21(8):666-677. [15]ISO.ISO 8807.LOTOS Standard[OL].http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=16258. [16]MILNER R.Communication and concurrency[M].EnglewoodCliffs:Prentice hall,1989. [17]FIORE M,CATTANI G L,WINSKEL G.Weak bisimulationand open maps.Proceedings[C]//14th Symposium on Logic in Computer Science(Cat.No.PR00158).IEEE,1999:67-76. [18]MA Z Q,WANG Y C,YUE Y Z,et al.Research on OnlineLearning Behavior Pattern from the Perspective of Learning Analysis[J].Modern Distance Education,2019(6):35-44. [19]BAKEMAN R,GOTTMAN J M.Observing interaction:An introduction to sequential analysis[M].Cambridge university press,1997. [20]ZHANG H,CUI Y L,YU L Y,et al.Study of Classroom Event Logic Graph of Intelligent Teaching based on Method of Data Mining[J].Journal of Distance Education,2020,38(2):80-88. [21]BAKEMAN R,QUERA V.Analyzing interaction:Sequentialanalysis with SDIS and GSEQ[M].Cambridge University Press,1995. [22]LI Y,LI X.A Verification Tool MWB for CCS[J].Communications Technology,2005(S1):178-180. [23]ZHU Y,XIAO F X,ZHOU H,et al.Method for Modeling and Analyzing Software Energy Consumption of Embedded Real-Time System[J].Journal of Computer Research and Development,2014,51(4):848-855. [24]CHEN X Y,ZHU Y,ZHAO Y,et al.Hybrid AADL Modeling and Model Transformation for CPS Time and Space Properties Verification[J].Journal of Software,2021,32(6):1779-1798. [25]FEI Y,ZHONG L,JHA N K.An energy-aware framework for dynamic software management in mobile computing systems[J].ACM Transactions on Embedded Computing Systems(TECS),2008,7(3):1-31. [26]FERNANDEZ J C,MOUNIER L.Verifying Bisimulations “On the Fly”[C]//FORTE.1990:95-110. [27]LEI G Q.Comparison and Application of Bisimulation Verification Algorithm[M].East China Normal University,2018. [28]ZHENG G,YU H,XU W.Collaborative filtering recommendation algorithm with item label features[J].International Core Journal of Engineering,2020,6(1):160-170. [29]CHEN J,WANG X,ZHAO S,et al.Deep attention user-basedcollaborative filtering for recommendation[J].Neurocomputing,2020,383:57-68. [30]ZHOU W,DU Y,DUAN M,et al.NtCF:Neural Trust-Aware Collaborative Filtering Toward Hierarchical Recommendation Services[J].Arabian Journal for Science and Engineering,2022,47(2):1239-1252. [31]LIU M,LI J,LIU K,et al.Graph-ICF:Item-based collaborative filtering based on graph neural network[J].Knowledge-Based Systems,2022,251:109208. [32]WANG L S.Research on Theory and Application of Access Control Based on Resources [D].Nanjing:Nanjing University of Aeronautics and Astronautics,2010. [33]LEE I,PHILIPPOU A,SOKOLSKY O.Resources in process algebra[J].The Journal of Logic and Algebraic Programming,2007,72:98-122. [34]LEE I,PHILIPPOU A,SOKOLSKY O.A general resourceframework for real-time systems[C]//Proceedings of RISSEF’02,LNCS 2941.2002:234-248. [35]BǍDICǍ A,BǍDICǍC,LOGOFǍTU D,et al.Modeling blockstructured project scheduling with resource constraints[C]//International Conference on Large-Scale Scientific Computing.Cham:Springer,2019:484-492. [36]CHEN X Y,ZHU Y,ZHAO Y,et al.Modeling and safety verification method for CPS time and topology constrained resources[J].Journal of Software,2022,33(8):2815-2838. [37]JOHNSEN E B,STEFFEN M,STUMPF J B.Virtually timedambients:A calculus of nested virtualization[J].Journal of Lo-gical and Algebraic Methods in Programming,2018,94:109-127. [38]FERNANDEZ J C,MOUNIER L.Verifying bisimulations onthe fly[C]//Proceedings of the 3rd International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols.North-Holland Publishing Co.,1990:95-110. [39]DU W J,DENGY X.A quasi-local algorithm for checking bisi-milarity[C]//Proceedingsof the IEEE International Conference.on Computer Science and Automation Engineering.2011:1-5. [40]ZHENG X L,DENG Y X,FU C,et al.Extension and Implementation of the Quasi-Local Algorithm for Checking Bisimilarity [J].Journal of Software,2018,29(6):1517-1526. [41]DOVIER A,PIAZZA C,POLICRITI A.An efficient algorithm for computing bisimulation equivalence[J].Theoretical Compu-ter Science,2004,311(1/2/3):221-256. [42]GROOTE J F,RIVERA VERDUZCO J,DE VINK E P.An efficient algorithm to determine probabilistic bisimulation[J].Algorithms,2018,11(9):131. [43]HUYBERS R,LAARMAN A.A Parallel Relation-Based Algorithm for Symbolic Bisimulation Minimization[C]//Interna-tional Conference on Verification,Model Checking,and Abstract Interpretation.Cham:Springer,2019:535-554. [44]PRABHAKAR P.Bisimulations for Neural Network Reduction[C]//International Conference on Verification,Model Che-cking,and Abstract Interpretation.Cham:Springer,2022:285-300. |
[1] | CAI Yu-tong, WANG Yong, WANG Ran-ran, JIANG Zheng-tao, DAI Gui-ping. Formal Verification of Otway-Rees Protocol Based on Process Algebra [J]. Computer Science, 2021, 48(6A): 477-480. |
[2] | TAN Li-xing, WANG Fu-jun. On Logic of Graded Argumentation System [J]. Computer Science, 2020, 47(5): 27-31. |
[3] | LIN Lei-lei, ZHOU Hua, DAI Fei, HE Zhen-li, SHEN Yong and KANG Hong-wei. Method of Software Architecture Refinement Based on Algebraic Semantics [J]. Computer Science, 2017, 44(7): 141-146. |
[4] | ZHENG Ming, LI Tong, LIN Ying, ZHOU Xiao-xuan, LI Xiang and MING Li. Dynamic Evolution Consistency Verification Method for Component System Modeling [J]. Computer Science, 2017, 44(11): 80-86. |
[5] | QIAN Ye, LI Tong, YU Yong, SUN Ji-hong, YU Qian and PENG Lin. Approach to Modeling Software Evolution Process for Synchronous Interaction [J]. Computer Science, 2016, 43(8): 154-158. |
[6] | HUANG Yong WU Jin-zhao. Security Model for Distributed System Based on Seal Calculus [J]. Computer Science, 2015, 42(7): 178-181. |
[7] | WU Xin-xing, HU Guo-sheng and CHEN Yi-xiang. Quantification and Conformance of Web Service Degraded Substitution [J]. Computer Science, 2015, 42(2): 81-85. |
[8] | PAN Li,ZHENG Hong,YANG Bo and ZHOU Xin-min. Characteristic Conditions and Timed Properties of Time Petri Nets with Mixed Semantics [J]. Computer Science, 2014, 41(12): 202-205. |
[9] | ZHANG Wei. Axiomatizing Weak Covariant-contravariant Simulation Semantics [J]. Computer Science, 2014, 41(11): 99-102. |
[10] | ZHU Rui,LI Tong,MO Qi,ZHANG Xuan,WANG Yi-quan,LIN Lei-lei and DAI Fei. Research on Deviation Diagnostic of Software Process Behavior Based on EPMM Modelling [J]. Computer Science, 2014, 41(11): 56-62. |
[11] | . Dynamic Collaborative Filtering Recommender Model Based on Rolling Time Windows and its Algorithm [J]. Computer Science, 2013, 40(2): 206-209. |
[12] | . Extended Pi-calculus for Service Selection Using Particle Swarm Optimization [J]. Computer Science, 2012, 39(Z11): 259-269. |
[13] | . Formal Verification of Trusted Connection Architecture [J]. Computer Science, 2012, 39(Z11): 230-233. |
[14] | . Security Process Algebra-based Analysis and Verification of Non-deducibility Security Model [J]. Computer Science, 2012, 39(2): 56-58. |
[15] | . Computation Tree Logic CTL* Based on Possibility Measure and Possibilistic Bisimulation [J]. Computer Science, 2012, 39(10): 258-263. |
|