Du er ikke logget ind
Beskrivelse
The book includes a thorough examination of the many types of algorithms for recommender systems, as well as a comparative analysis of them. It addresses the problem of dealing with the large amounts of data generated by the recommender system. The book also includes two case studies on recommender system applications in healthcare monitoring and military surveillance. It demonstrates how to create attack-resistant and trust-centric recommender systems for sensitive data applications. This book provides a solid foundation for designing recommender systems for use in healthcare and defense.