Accurate Content Push for Content-Centric Social Networks: A Big Data Support Online Learning Approach
暂无分享,去创建一个
Pan Zhou | Dapeng Oliver Wu | Yuchong Hu | Yinan Feng | Dapeng Wu | Yuchong Hu | Pan Zhou | Yinan Feng
[1] Xu Chen,et al. Content Retrieval at the Edge: A Social-Aware and Named Data Cooperative Framework , 2019, IEEE Transactions on Emerging Topics in Computing.
[2] Mihaela van der Schaar,et al. Distributed Online Learning via Cooperative Contextual Bandits , 2013, IEEE Transactions on Signal Processing.
[3] Naixue Xiong,et al. Cold-Start Recommendation Using Bi-Clustering and Fusion for Large-Scale Social Recommender Systems , 2014, IEEE Transactions on Emerging Topics in Computing.
[4] Ning Zhang,et al. Time-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process , 2012, AAAI.
[5] Ikjun Yeom,et al. Performance analysis of in-network caching for content-centric networking , 2013, Comput. Networks.
[6] Mihaela van der Schaar,et al. Online Learning in Large-Scale Contextual Recommender Systems , 2016, IEEE Transactions on Services Computing.
[7] Bo Du,et al. Robust and Discriminative Labeling for Multi-Label Active Learning Based on Maximum Correntropy Criterion , 2017, IEEE Transactions on Image Processing.
[8] Dacheng Tao,et al. Linear Submodular Bandits with a Knapsack Constraint , 2016, AAAI.
[9] Bo Du,et al. Ensemble manifold regularized sparse low-rank approximation for multiview feature embedding , 2015, Pattern Recognit..
[10] Wei You,et al. Information-centric networking: a natural design for social network applications , 2012, IEEE Communications Magazine.
[11] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[12] Csaba Szepesvári,et al. –armed Bandits , 2022 .
[13] Gene Tsudik,et al. Securing instrumented environments over content-centric networking: the case of lighting control and NDN , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[14] David Carmel,et al. Social media recommendation based on people and tags , 2010, SIGIR.
[15] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[16] Simon M. Lucas,et al. A Survey of Monte Carlo Tree Search Methods , 2012, IEEE Transactions on Computational Intelligence and AI in Games.
[17] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[18] Wei Chu,et al. A contextual-bandit approach to personalized news article recommendation , 2010, WWW '10.
[19] Uichin Lee,et al. Greening the internet with content-centric networking , 2010, e-Energy.
[20] Yisong Yue,et al. Linear Submodular Bandits and their Application to Diversified Retrieval , 2011, NIPS.
[21] Alda Lopes Gançarski,et al. A Contextual-Bandit Algorithm for Mobile Context-Aware Recommender System , 2012, ICONIP.
[22] Hao Wu,et al. Energy-Efficient In-Network Caching for Content-Centric Networking , 2013, IEEE Communications Letters.
[23] Alessandro Lazaric,et al. Online Stochastic Optimization under Correlated Bandit Feedback , 2014, ICML.
[24] Mihaela van der Schaar,et al. Distributed Online Learning in Social Recommender Systems , 2013, IEEE Journal of Selected Topics in Signal Processing.
[25] Issa M. Khalil,et al. An O(1)-competitive online caching algorithm for content centric networking , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[26] Mihaela van der Schaar,et al. Distributed online Big Data classification using context information , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[27] Sébastien Bubeck,et al. Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems , 2012, Found. Trends Mach. Learn..
[28] Laks V. S. Lakshmanan,et al. Influence Maximization with Bandits , 2015, ArXiv.
[29] Rui L. Aguiar,et al. Consumer driven information freshness approach for content centric networking , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).