2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) 2017
DOI: 10.1109/iciiecs.2017.8276172
|View full text |Cite
|
Sign up to set email alerts
|

Recommender systems: An overview of different approaches to recommendations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(27 citation statements)
references
References 6 publications
0
26
0
1
Order By: Relevance
“…In order to evaluate the feasibility of the recommendation process, the MENTOR was assessed using four widely used similarity measures: (i) Euclidean distance, (ii) Manhattan distance, (iii) Cosine similarity, and (iv) Pearson correlation. These measures were selected because of their potential to quantify the similarity of two objects [17]. Thus, end-users demand can be compared with protections available in order to decide which fits better for each specific case.…”
Section: A Recommendation Enginementioning
confidence: 99%
See 1 more Smart Citation
“…In order to evaluate the feasibility of the recommendation process, the MENTOR was assessed using four widely used similarity measures: (i) Euclidean distance, (ii) Manhattan distance, (iii) Cosine similarity, and (iv) Pearson correlation. These measures were selected because of their potential to quantify the similarity of two objects [17]. Thus, end-users demand can be compared with protections available in order to decide which fits better for each specific case.…”
Section: A Recommendation Enginementioning
confidence: 99%
“…In this scenario, it is essential to observe not only how often attacks surpass the on-site infrastructure capacity, but also which off-site services can provide the necessary protection, considering their different service flavors, such as the amount of traffic supported, the capacity to address particularities of a determined attack, and price conditions. In this sense, recommender systems [17] provide a valuable security management tool to support decision during the detection and mitigation process.…”
Section: Introductionmentioning
confidence: 99%
“…This not only impedes the diversity of experiences of users, but also causes filter bubbles [12,13], e.g., a reduced spectrum of user consumption and the political bias, which limit discovery or neglect the potential for promoting new items from the long tail [14,15]. Moreover, as the training of a recommender system mostly relies on explicit feedback (typically the ratings of items), it is inevitable to face the fact that only a small portion of users leave their ratings-the so-called the sparsity problem [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…Recommender systems can be largely classified into three categories: the collaborative approach, content-based approach, and hybrid approach [16,17,25]. Firstly, the collaborative approach is based on the idea that people with similar preferences are likely to agree on an evaluation of an item.…”
Section: Introductionmentioning
confidence: 99%
“…Firstly, we are going to make a brief introduction about the different types of recommendations systems in order to know which technique fits better with the problem we want to resolve. According to some state-of-the-art reviews about recommendation systems, like Isinkaye et al [6] and Shah et al [7], there are three kinds. The most famous are content-based filtering (CB) and collaborative filtering (CF).…”
Section: Introductionmentioning
confidence: 99%