From post

Comparison of the Non-personalized Active Learning Strategies Used in Recommender Systems.

, , , , , и . EMCIS, том 341 из Lecture Notes in Business Information Processing, стр. 443-456. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Introducing and Comparing Recent Clustering Methods for Massive Data Management in the Internet of Things., , , , и . J. Sens. Actuator Networks, 8 (4): 56 (2019)Efficient anomaly detection on sampled data streams with contaminated phase I data., , , , , и . Internet Technol. Lett., (2020)Group Validation in Recommender Systems: Framework for Multi-layer Performance Evaluation., , , и . CoRR, (2022)Strategic Attacks on Recommender Systems: An Obfuscation Scenario., , , и . AICCSA, стр. 1-8. IEEE, (2022)A distributed trust and reputation model for capacity enhancement in wireless networks., , , и . Wireless Days, стр. 1-5. IEEE, (2008)A Multivariate Data Reduction Approach for Wireless Sensor Networks., , , и . MENACOMM, стр. 43-48. IEEE, (2021)A Wearable LoRa-Based Emergency System for Remote Safety Monitoring., , , , и . IWCMC, стр. 120-125. IEEE, (2020)A Secure Way to Combine IPsec, NAT & DHCP., , , и . MMM-ACNS, том 3685 из Lecture Notes in Computer Science, стр. 104-118. Springer, (2005)Adaptive Serendipity for Recommender Systems: Let It Find You., , , и . ICAART (2), стр. 739-745. SciTePress, (2019)Towards Efficient Data Sampling for Temporal Anomaly Detection in Sensor Networks., , , , и . MENACOMM, стр. 1-6. IEEE, (2019)