Research on the Collaborative Filtering Recommendation Algorithm in Ubiquitous computing

被引:0
|
作者
Wei, Zhi-Qiang [1 ]
Qu, Lian-En [1 ]
Jia, Dong-Ning [1 ]
Zhou, Wei [1 ]
Kang, Mi-Jun [2 ]
机构
[1] Ocean Univ China, Coll Informat Sci & Engn, Dept Comp, Qingdao, Shandong, Peoples R China
[2] Nanchang Hangkong Univ, Coll Informat Sci & Engn, Dept Comp, Nanchang, Jiangxi, Peoples R China
关键词
ubiquitous computing; machine learning; recommendation system; recommendation algorithm; collaborative filtering;
D O I
10.1109/WCICA.2010.5554872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is very difficult for primary users to make up new policies by themselves. To deal with such situation, in this paper a fundamental framework is proposed to fully describe the generation process of policies in pervasive computing applications. Furthermore, the collaborative filtering algorithms based on cosine vector are utilized to calculate characteristic similarity and classic similarity to aggregate the user identity similarity. The machine learning algorithm is adopted to generate the policies which will be recommended to the users. By utilizing the recommended policies, the users can finish the system policies setting process in a more quick and accurate way.
引用
收藏
页码:5233 / 5237
页数:5
相关论文
共 13 条
  • [1] [Anonymous], 2006, Pattern recognition and machine learning
  • [2] Breese J. S., 2013, P 14 C UNC ART INT
  • [3] CONG, 2008, J HEFEI U TECHNOLOGY, V31
  • [4] User-controllable security and privacy for pervasive computing
    Cornwell, Jason
    Fette, Ian
    Hsieh, Gary
    Prabaker, Madhu
    Rao, Jinghai
    Tang, Karen
    Vaniea, Kami
    Bauer, Lujo
    Cranor, Lorrie
    Hong, Jason
    McLaren, Bruce
    Reiter, Mike
    Sadeh, Norman
    [J]. EIGHTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, : 14 - +
  • [5] DASARATHY BV, 1991, K NEAREST NEIGHBOR N
  • [6] Deng Ai-Lin, 2003, Journal of Software, V14, P1621
  • [7] GOOD N, 1999, P NAT C ART INT
  • [8] Referral web: Combining social networks and collaborative filtering
    Kautz, H
    Selman, B
    Shah, M
    [J]. COMMUNICATIONS OF THE ACM, 1997, 40 (03) : 63 - 65
  • [9] Use of K-Nearest Neighbor classifier for intrusion detection
    Liao, YH
    Vemuri, VR
    [J]. COMPUTERS & SECURITY, 2002, 21 (05) : 439 - 448
  • [10] Michie D, 1994, Technometrics, DOI DOI 10.2307/1269742