JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2015, Vol. 50 ›› Issue (09): 36-41.doi: 10.6040/j.issn.1671-9352.3.2014.287
Previous Articles Next Articles
WANG Li-ren1,2, YU Zheng-tao1,2, WANG Yan-bing1,2, GAO Sheng-xiang1,2, LI Xian-hui1,2
CLC Number:
[1] CLAYPOOL M, LE P, WASEDA M, et al.Implicit interest indicators[C]//Proceedings of the 6th International Conference. New York:ACM, 2001:30-40. [2] SHEN Xuehua, TAN Bin, ZHAI Chengxiang. Implicit user modeling for personalized search[C]//Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management. New York:ACM, 2005, 10(5):5-6. [3] 林鸿飞, 杨元生. 用户兴趣模型的表示和更新机制[J]. 计算机研究与发展, 2002, 39(7):843-847. LIN Hongfei, YANG Yuansheng. The representation and update mechanism for user profile[J]. Journal of Computer Research and Development, 2002, 39(7):843-847. [4] WENG Jianshu, LIM E P, JIANG Jing, et al.TwitterRank:finding topic-sensitive influential twitterers[C]//Proceedings of the 3th ACM International Conference on Web Search and Data Mining.New York:ACM, 2010:261-270. [5] 董婧灵,李芳,何婷婷,等.基于LDA模型的文本聚类研究[C]//中国计算语言学研究前沿进展,北京:清华大学出版社,2011:455-461. DONG Jingling, LI Fang, HE Tingting, et al.Document clustering method based on LDA model[C]//Advances of Computational Linguistics in China.Beijing:Tsinghua University Press, 2011:455-461. [6] YAO Quanzhu, SONG Zhili, PENG Cheng.Research on text categorization based on LDA[J].Computer Engineering and Applications, 2011, 47(13):150-153. [7] 张晨逸, 孙建伶, 丁轶群. 基于 MB-LDA 模型的微博主题挖掘[J]. 计算机研究与发展, 2011, 48(10):1795-1802. ZHANG Chenyi, SUN Jianling, DING Yiqun. Topic mining for Micro-blog based on MB-LDA model[J]. Journal of Computer Research and Development, 2011, 48(10):1795-1802. [8] BLEI D M, NG A Y, JORDAN M I. Latent dirichlet allocation[J]. Journal of Machine Learning Research, 2003, 3:993-1022. [9] GRIFFITHS T, STEYVERS M. Finding scientific topics[C]//Proceedings of the National Academy of Sciences of the United States America. [S.l.]: [s.n.], 2004, 101:5228-5235. [10] ROSEN-ZVI M, GRIFITHS T, STEYVERS M, et al. The author-topic model for authors and documents[C]//Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence. Virginia: AUAI Press, 2004:487-494. [11] HOFMANN T. Probabilistic latent semantic indexing[C]//Proceedings of the 22th Annual International SIGIR Conference on Research and Development in Information Retrieval(SIGIR'99). Berkeley: ACM, 1999:50-57. [12] 刘群,李素建.基于《知网》的词汇语义相似度计算[J].中文计算语言学, 2002, 7(2):59-76. LIU Qun, LI Suqun. Word similarity computing based on How-net[J]. International Journal of Computational Linguistics & Chinese Language Processing, 2002, 7(2):59-76. |
[1] | LI Yan-ping, QI Yan-jiao, ZHANG Kai, WEI Xu-guang. Multi-authority and revocable attribute-based encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 75-84. |
[2] | ZHANG Guang-zhi, CAI Shao-bin, MA Chun-hua, ZHANG Dong-qiu. Application of maximum distance separable codes in the error correction of the network coding [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 75-82. |
[3] | LI Yang, CHENG Xiong, TONG Yan, CHEN Wei, QIN Tao, ZHANG Jian, XU Ming-di. Method for threaten users mining based on traffic statistic characteristics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 83-88. |
[4] | ZHAO Guang-yuan, QIN Feng-lin, GUO Xiao-dong. Design and implementation of P2P-based network measurement cloud platform [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(12): 104-110. |
[5] | HUANG Shu-qin, XU Yong, WANG Ping-shui. User similarity calculation method based on probabilistic matrix factorization and its recommendation application [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 37-43. |
[6] | WANG Ya-qi, WANG Jing. Rumor spreading on dynamic complex networks with curious psychological mechanism [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 99-104. |
[7] | CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67. |
[8] | ZHUANG Zheng-mao, CHEN Xing-shu, SHAO Guo-lin, YE Xiao-ming. A time-relevant network traffic anomaly detection approach [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 68-73. |
[9] | SONG Yuan-zhang, LI Hong-yu, CHEN Yuan, WANG Jun-jie. P2P botnet detection method based on fractal and adaptive data fusion [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 74-81. |
[10] | ZHU Sheng, ZHOU Bin, ZHU Xiang. EIP: discovering influential bloggers by user similarity and topic timeliness [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 113-120. |
[11] | . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100. |
[12] | LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91. |
[13] | SU Bin-ting, XU Li, FANG He, WANG Feng. Fast authentication mechanism based on Diffie-Hellman for wireless mesh networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 101-105. |
[14] | LIN Li. News event extraction based on kernel dependency graph [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 121-126. |
[15] | LIU Chi, YAN Hong-fei. Deduplicating search results of cloud disk resources using meta-information [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 11-17. |
|