Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
The book includes a thorough examination of the many types of algorithms for recommender systems, as well as a comparative analysis of them. It addresses the problem of dealing with the large amounts of data generated by the recommender system. The book also includes two case studies on recommender system applications in healthcare monitoring and military surveillance. It demonstrates how to create attack-resistant and trust-centric recommender systems for sensitive data applications. This book provides a solid foundation for designing recommender systems for use in healthcare and defense.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.