Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Business process management (BPM) standards: a survey
RKL Ko, SSG Lee, E Wah Lee - Business process management …, 2009 - emerald.com
Purpose–In the last two decades, a proliferation of business process management (BPM)
modeling languages, standards and software systems has given rise to much confusion and …
modeling languages, standards and software systems has given rise to much confusion and …
[書籍][B] Recommender systems: an introduction
In this age of information overload, people use a variety of strategies to make choices about
what to buy, how to spend their leisure time, and even whom to date. Recommender …
what to buy, how to spend their leisure time, and even whom to date. Recommender …
A two-stage social trust network partition model for large-scale group decision-making problems
T Wu, K Zhang, X Liu, C Cao - Knowledge-Based Systems, 2019 - Elsevier
With the development of big data and social computing, large-scale group decision making
(LGDM) problems attract much attention and become merging with social networks or …
(LGDM) problems attract much attention and become merging with social networks or …
Neighbor selection and weighting in user-based collaborative filtering: a performance prediction approach
User-based collaborative filtering systems suggest interesting items to a user relying on
similar-minded people called neighbors. The selection and weighting of these neighbors …
similar-minded people called neighbors. The selection and weighting of these neighbors …
Evaluating user reputation in online rating systems via an iterative group-based ranking method
Reputation is a valuable asset in online social lives and it has drawn increased attention.
Due to the existence of noisy ratings and spamming attacks, how to evaluate user reputation …
Due to the existence of noisy ratings and spamming attacks, how to evaluate user reputation …
Social and Human Elements of Information Security: Emerging Trends and Countermeasures: Emerging Trends and Countermeasures
M Gupta, R Sharman - 2008 - books.google.com
More often than not, it is becoming increasingly evident that the weakest links in the
information-security chain are the people. Due an increase in information security threats, it …
information-security chain are the people. Due an increase in information security threats, it …
[書籍][B] Trust networks for recommender systems
P Victor, C Cornelis, M De Cock - 2011 - books.google.com
This book describes research performed in the context of trust/distrust propagation and
aggregation, and their use in recommender systems. This is a hot research topic with …
aggregation, and their use in recommender systems. This is a hot research topic with …
Novel personal and group-based trust models in collaborative filtering for document recommendation
CH Lai, DR Liu, CS Lin - Information Sciences, 2013 - Elsevier
Collaborative filtering (CF) recommender systems have been used in various application
domains to solve the information-overload problem. Recently, trust-based recommender …
domains to solve the information-overload problem. Recently, trust-based recommender …
Collaborative filtering recommendation of educational content in social environments utilizing sentiment analysis techniques
Collaborative filtering techniques are commonly used in social networking environments for
proposing user connections or interesting shared resources. While metrics based on access …
proposing user connections or interesting shared resources. While metrics based on access …
Multidimensional credibility model for neighbor selection in collaborative recommendation
K Kwon, J Cho, Y Park - Expert Systems with Applications, 2009 - Elsevier
Collaborative filtering (CF) is the most commonly applied recommendation system for
personalized services. Since CF systems rely on neighbors as information sources, the …
personalized services. Since CF systems rely on neighbors as information sources, the …