2020
DOI: 10.1016/j.knosys.2020.106196
|View full text |Cite
|
Sign up to set email alerts
|

Diversified service recommendation with high accuracy and efficiency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 71 publications
(44 citation statements)
references
References 27 publications
0
44
0
Order By: Relevance
“…In the follow-up work, the real-world experiments are designed and performed to further validate the feasibility and effectiveness of PSRASk+S approach. In addition, as the diversity is a significance criterion for evaluating the performance of various decision-making systems [34][35][36][37], we go on improving our work to provide diverse and high-quality recommendation results [38][39][40][41] when government officials search for public sports resource allocation strategies.…”
Section: Discussionmentioning
confidence: 99%
“…In the follow-up work, the real-world experiments are designed and performed to further validate the feasibility and effectiveness of PSRASk+S approach. In addition, as the diversity is a significance criterion for evaluating the performance of various decision-making systems [34][35][36][37], we go on improving our work to provide diverse and high-quality recommendation results [38][39][40][41] when government officials search for public sports resource allocation strategies.…”
Section: Discussionmentioning
confidence: 99%
“…In the current state-of-the-art, deep neural network compression can be conducted in two approaches: i) compressing the trained models by optimizing the network parameters and ii) designing and training small network models directly [29].…”
Section: Related Workmentioning
confidence: 99%
“…Privacy is a serious issue in edge computing as users data is collected, processed, transmitted, and shared over edge nodes, so it is becoming a necessity to secure user privacy before these data are integrated together [3]. The explosive growth and variety of information available on edge nodes frequently overwhelm users, recommender systems are a promising way for users to quickly find the valuable information that they are interested in from massive data [4,5,6]. In addition to these challenges, edge computing introduces a scale of cyber security challenges regular data center operators may not be used to dealing with.…”
Section: Introductionmentioning
confidence: 99%