[1]LIU C,WANG Y.Analysis on the cold-start problem in recommendation system[J].Telecommunications Network Technology,2017(1):56-76.
[2]WEI J,HE J,CHEN K,et al.Collaborative filtering and deep learning based recommendation system for cold start items[J].Expert Systems with Applications,2017,69:29-39.
[3]冷亚军,陆青,梁昌勇.协同过滤推荐技术综述[J].模式识别与人工智能,2014,27(8):720-734.
[4]王洁,汤小春.基于社区网络内容的个性化推荐算法研究[J].计算机应用研究,2011,28(4):1248-1250.
[5]王国霞,刘贺平.个性化推荐系统综述[J].计算机工程与应用,2012,48(7):66-76.
[6]ZHU R,WANG H M,FENG D W.Trustworthy services selection based on preference recommendation[J].Journal of Software,2011,22(5):852-864.
[7]李改,李磊.一种解决协同过滤系统冷启动问题的新算法[J].山东大学学报(工学版),2012,42(2):11-17.
[8]MASSA P,AVESANI P.Trust-aware recommender systems[C]//Proceedings of ACM Conference on Recommender Systems.New York,USA:ACM Press,2007:17-24.
[9]MIDDLETON S E,SHADBOLT N R,DE ROURE D C.Ontological user profiling in recommender systems[J].ACM Transactions on Information Systems,2004,22(1):54-88.
[10]ZHANG X,NAKHAI M R,WAN N S F W A.A multi-armed bandit approach to distributed robust beamforming in multicell networks[C]//Proceedings of 2016 IEEE Global Communications Conference.Washington D.C.,USA:IEEE Press,2016:1-6.
[11]TAKAHASHI K,YAMADA T.Application of an immune feedback mechanism to control systems[J].JSME International Journal,1998,41(2):184-191.
[12]BERRY D A,FRISTEDT B.Bandit problems:sequential allocation of experiments[M].Berlin,Germany:Springer,1985.
[13]HILLS T T.Trade-off between exploration and exploitation[M]//TODD K,SHACKELFOR D,VIVIANA A.Encyclopedia of evolutionary psycholo-gical science.Berlin,Germany:Springer,2017.
[14]LANGFORD J,ZHANG T.The epoch-greedy algorithm for contextual multi-armed bandits[EB/OL].[2017-09-01].http://courses.cms.caltech.edu/cs101.2/slides/cs101.2-05-contextual-bandits.pdf.
[15]AUER P,ORTNER R.UCB revisited:improved regret bounds for the stochastic multi-armed bandit problem[J].Periodica Mathematica Hungarica,2010,61(1):55-65.
[16]AUER P,CESA-BIANCHI N,FREUND Y,et al.The nonstochastic multiarmed bandit problem[J].SIAM Journal on Computing,2002,32(1):48-77.
[17]CHAPELLE O,LI L.An empirical evaluation of thompson sampling[C]//Proceedings of International Conference on Neural Information Processing Systems.[S.l.]:Curran Associates Inc.,2011:2249-2257.
[18]BERRY D A,FRISTEDT B.Bandit problems[J].Monographs on Statistics and Applied Probability,1985,25(10):1585-1594.
[19]ANANTHARAM V,VARAIYA P,WALRAND J.Asymptotically efficient allocation rules for the multiarmed bandit problem with multiple plays-part II:Markovian rewards[J].IEEE Transactions on Automatic Control,1987,32(11):977-982.
[20]AUER P.Using confidence bounds for exploitation-exploration trade-offs[J].Journal of Machine Learning Research,2002,3(3):397-422.
[21]LI L,CHU W,LANGFORD J,et al.A contextual-bandit approach to personalized news article recommenda-tion[C]//Proceedings of International Conference on World Wide Web.New York,USA:ACM Press,2010:661-670.
[22]MCNEE S M,RIEDL J,KONSTAN J A.Being accurate is not enough:how accuracy metrics have hurt recommender systems[C]//Proceedings of 2006 Conference on Human Factors in Computing Systems.New York,USA:ACM Press,2006:1097-1101.
[23]KAWAFUKU M,SASAKI M,TAKAHASHI K.Adaptive learning method of neural network controller using an immune feedback law[C]//Proceedings of IEEE/ASME International Conference on Advanced Intelligent Mechatronics.Washington D.C.,USA:IEEE Press,1999:641-646.
[24]SASAKI M,KAWAFUKU M,TAKAHASHI K.An immune feedback mechanism based adaptive learning of neural network controller[C]//Proceedings of Interna-tional Conference on Neural Information Processing.Washington D.C.,USA:IEEE Press,1999:502-507.
[25]MACKAY D J C.Introduction to Monte Carlo methods[C]//Proceedings of NATO Advanced Study Institute on Learning in Graphical Models.Norwell,USA:Kluwer Academic Publishers,1998:175-204. |