Journal of shanghai Jiaotong University (Science) ›› 2015, Vol. 20 ›› Issue (5): 535-539.doi: 10.1007/s12204-015-1618-7
Previous Articles Next Articles
TU Shi-tao* (涂世涛), ZHU Lan-juan (朱兰娟)
Online:
2015-10-28
Published:
2015-10-29
Contact:
TU Shi-tao (涂世涛)
E-mail: tushitao@126.com
CLC Number:
TU Shi-tao* (涂世涛), ZHU Lan-juan (朱兰娟). A Bandit Method Using Probabilistic Matrix Factorization in Recommendation[J]. Journal of shanghai Jiaotong University (Science), 2015, 20(5): 535-539.
[1] | Sarwar B, Karypis G, Konstan J, et al. Itembased collaborative filtering recommendation algorithms[C]//Proceedings of the 10th international conference on World Wide Web. Hong Kong, China:ACM, 2001: 285-295. |
[2] | Schein A I, Popescul A, Ungar L H, et al.Methods and metrics for cold-start recommendations[C]//Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. Tampere, Finland: ACM,2002: 253-260. |
[3] | Koren Y, Bell R, Volinsky C. Matrix factorization techniques for recommender systems [J]. Computer,2009, 42(8): 30-37. |
[4] | Lee D D, Seung H. Algorithms for non-negative matrix factorization [J]. Advances in Neural Information Processing Systems, 2001, 13: 556-562. |
[5] | Jamali M, Ester M. A matrix factorization technique with trust propagation for recommendation in social networks[C]//Proceedings of the 4th ACM Conference on Recommender Systems. Barcelona, Spain:ACM, 2010: 135-142. |
[6] | Ma H, Yang H, Lyu M R, et al. Sorec: Social recommendation using probabilistic matrix factorization[C]//Proceedings of the 17th ACM Conference on Information and Knowledge Management. Napa. Valley,California, USA: ACM, 2008: 931-940. |
[7] | Macready W G, Wolpert D H. Bandit problems and the exploration/exploitation tradeoff [J]. IEEE Transactions on Evolutionary Computation, 1998,2(1): 2-22. |
[8] | Auer P. Using confidence bounds for exploitationexploration trade-offs [J]. The Journal of Machine Learning Research, 2003, 3: 397-422. |
[9] | Salakhutdinov R, Mnih A. Probabilistic matrix factorization [C]//Advances in Neural Information Processing Systems. Cambridge, Massachusetts: MIT Press, 2007: 1257-1264. |
[10] | Golub G H, Reinsch C. Singular value decomposition and least squares solutions [J]. Numerische Mathematik,1970, 14(5): 403-420. |
[11] | Precup D, Sutton R S, Singh S. Eligibility traces for off-policy policy evaluation [C]// Proceedings of 17th International Conference on Machine Learning.San Francisco, CA, USA: Morgan Kaufmann, 2000:759-766. |
[12] | Li L, ChuW, Langford J, et al. A contextual-bandit approach to personalized news article recommendation[C]//Proceedings of the 19th International Conference on World Wide Web. Raleish, North Carolina, USA:ACM, 2010: 661-670. |
[1] | LU Pengli1∗ (卢鹏丽), CHEN Wei1 (陈玮), GUO Yuhong2 (郭育红), CHEN Yahong3 (陈娅红). Symmetric Nonnegative Matrix Factorization for Vertex Centrality in Complex Networks [J]. J Shanghai Jiaotong Univ Sci, 2024, 29(6): 1037-1049. |
[2] | YADAV Asmita1*, SINGH Kumar Sandeep1,2. Automated Time Based Multi-Criteria Bug Triage Approach: Developer Working Efficiency and Social Network Based Developer Recommendation [J]. J Shanghai Jiaotong Univ Sci, 2024, 29(3): 566-578. |
[3] | YAN Jiayu, HONG Yi, LIU Boying, ZHOU Xuejun, CHEN Di, HE Xiaoyong. Research on Product Standard and Test Scheme of High Pressure Underwater Valve [J]. Ocean Engineering Equipment and Technology, 2023, 10(4): 36-43. |
[4] | YANG Peng,JING Shangqi,YAN Junjie,YANG Zhigang. Defending Bad Mouthing Attack Data Forwarding Mechanism for Intermittently Connected Wireless Networks [J]. Journal of Shanghai Jiaotong University, 2018, 52(7): 808-815. |
[5] | HUANG Jinchao,ZHANG Jiawei,CHEN Ning,CHEN Yihong. Preference Degree Based Personalized Recommendation Algorithm [J]. Journal of Shanghai Jiaotong University, 2018, 52(7): 770-776. |
[6] | MAO Qingqing (毛青青), DONG Aihua (董爱华), MIAO Qingying (苗清影), PAN Lu (潘璐). Intelligent Costume Recommendation System Based on Expert System [J]. Journal of Shanghai Jiao Tong University (Science), 2018, 23(2): 227-234. |
[7] | Yi DING, Zhirong SHENG, Yinghua XIE. Design and Implementation of Recommendation Engine Based on University Campus’ Used Book Shopping Network [J]. Research and Exploration in Laboratory, 2017, 36(5): 148-153. |
[8] | LIANG Ye (梁野). Multilingual Financial News Retrieval and Smart Recommendation Based on Big Data [J]. Journal of shanghai Jiaotong University (Science), 2016, 21(1): 18-24. |
[9] | TANG Song-ze*(唐松泽), XIAO Liang (肖亮), LIU Peng-fei (刘鹏飞). Single Image Super-Resolution Method via Refined Local Learning [J]. Journal of shanghai Jiaotong University (Science), 2015, 20(1): 26-31. |
[10] | XU Rong,WU Cong,JIANG ShiZheng,CHEN QiMei. Evaluation of Network-Level Traffic State Using 2DLNMF Algorithm [J]. Journal of Shanghai Jiaotong University, 2015, 49(08): 1131-1136. |
[11] | LONG Shun (龙舜), ZHU Wei-heng (朱蔚恒). Mining Evolving Association Rules for E-Business Recommendation [J]. Journal of shanghai Jiaotong University (Science), 2012, 17(2): 161-165. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 221
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 758
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||