Netinfo Security ›› 2015, Vol. 15 ›› Issue (2): 77-81.doi: 10.3969/j.issn.1671-1122.2015.02.013
• Orginal Article • Previous Articles
Received:
2014-12-03
Online:
2015-02-10
Published:
2015-07-05
CLC Number:
Hua CHAI, Jian-yi LIU. Research on Improved Slope One Recommendation Algorithm[J]. Netinfo Security, 2015, 15(2): 77-81.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.02.013
[1] | BREESE J, HECHERMAN D, KADIE C.Empirical Analysis of Predictive Algorithms for Collaborative Filtering [C]//Proceedings of the 14th Conference on Uneertainty in Artifical Itelligence (UAI-98), New York: ACM Press, 1998:43-52. |
[2] | LEMIRE D, MACLACHLAN A. slope one Predictors for Online Rating Based Collaborative Filtering[C]//In SIAM Data Mining. California: SIAM, 2005: 21-23. |
[3] | 林德军,孟祥武. 基于奇异值分解的slope one算法[EB/OL]. , 2012. |
[4] | 杜茂康,刘苗,李韶华,等. 基于邻近项目的slope one协同过滤算法[J]. 重庆邮电大学学报:自然科学版,2014,26(3):421-426. |
[5] | 王毅,楼恒越. 一种改进的slope one协同过滤算法[J]. 计算机科学,2011,38(10A):192-194. |
[6] | 张贤达. 矩阵分析与应用[M]. 北京:清华大学出版社,2004. |
[7] | 刘勇. 基于项目相似度计算改进的协同过滤算法[J]. 商场现代化,2007,(31):84-85. |
[8] | 董丽,邢春晓,王克宏. 基于不同数据集的协作过滤算法评测[J]. 清华大学学报:自然科学版,2009,49(4):590-594. |
[9] | 肖敏,熊前兴. 基于项目语义相似度的协同过滤推荐算法[J]. 武汉理工大学学报,2009,31(3):21-23,32. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||