-
5
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu. Two can keep a secret: A distributed architecture for secure database services. In In Proc. CIDR, 2005.
-
(2005)
Proc. CIDR
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
6
-
-
68249129760
-
-
Technical report, EECS Department University of California Berkeley
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A berkeley view of cloud computing. Technical report, EECS Department, University of California, Berkeley, 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
9
-
-
57149125942
-
-
J. T.-L. Wang, Editor ACM
-
M. Brantner, D. Florescu, D. A. Graf, D. Kossmann, and T. Kraska. Building a database on s3. In J. T.-L. Wang, editor, ACM, pages 251-264, 2008.
-
(2008)
Building A Database on s3
, pp. 251-264
-
-
Brantner, M.1
Florescu, D.2
Graf, D.A.3
Kossmann, D.4
Kraska, T.5
-
10
-
-
84867451946
-
Multiple linear regression analysis: A matrix approach with matlab
-
S. H. Brown. Multiple linear regression analysis: A matrix approach with matlab. Alabama Journal of Mathematics, 2009.
-
(2009)
Alabama Journal of Mathematics
-
-
Brown, S.H.1
-
11
-
-
74049093526
-
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: Outsourcing computation without outsourcing control. pages 85-90, 2009.
-
(2009)
Controlling Data in the Cloud: Outsourcing Computation Without Outsourcing Control
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
12
-
-
0003504808
-
Security and privacy implications of data mining
-
C. Clifton and D. Marks. Security and privacy implications of data mining. In ACM SIGMOD Workshop, pages 15-19, 1996.
-
(1996)
ACM SIGMOD Workshop
, pp. 15-19
-
-
Clifton, C.1
Marks, D.2
-
13
-
-
21644437974
-
The google file system
-
Oct
-
S. Ghemawat, H. Gobioff, and S.-T. Leung. The google file system. SIGOPS Oper. Syst. Rev., 37(5):29-43, Oct. 2003.
-
(2003)
SIGOPS Oper. Syst. Rev
, vol.37
, Issue.5
, pp. 29-43
-
-
Ghemawat, S.1
Gobioff, H.2
Leung, S.-T.3
-
15
-
-
46949103941
-
The privacy implications of personal locators: Why you should think twice before voluntarily availing yourself to GPS monitoring
-
W. Karim. The Privacy Implications of Personal Locators: Why You Should Think Twice Before Voluntarily Availing Yourself to GPS Monitoring. Washington University Journal of Law and Policy, 14:485-515, 2004.
-
(2004)
Washington University Journal of Law and Policy
, vol.14
, pp. 485-515
-
-
Karim, W.1
-
17
-
-
80052885267
-
The strategy of mining association rule based on cloud computing
-
L. Li and M. Zhang. The strategy of mining association rule based on cloud computing. In IEEE Computer Society, pages 475-478, 2011.
-
(2011)
IEEE Computer Society
, pp. 475-478
-
-
Li, L.1
Zhang, M.2
-
18
-
-
84876587730
-
-
Y. Liu, J. Pisharath, W. keng Liao, G. Memik, A. Choudhary, and P. Dubey. Performance evaluation and characterization of scalable data mining algorithms abstract.
-
Performance Evaluation and Characterization of Scalable Data Mining Algorithms Abstract
-
-
Liu, Y.1
Pisharath, J.2
Keng Liao, W.3
Memik, G.4
Choudhary, A.5
Dubey, P.6
-
19
-
-
0034775826
-
A scalable content-addressable network
-
Aug
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. SIGCOMM Comput.commun. Rev., 31(4):161-172, Aug. 2001.
-
(2001)
SIGCOMM Comput.commun. Rev
, vol.31
, Issue.4
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
20
-
-
85015649873
-
Airavat: Security and privacy for mapreduce
-
Berkeley, CA, USA. USENIX Association
-
I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: security and privacy for mapreduce. In Proceedings of the 7th USENIX conference on Networked systems design and implementation, NSDI'10, pages 20-20, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10
, pp. 20-20
-
-
Roy, I.1
Setty, S.T.V.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
22
-
-
0035342304
-
Knowledge management and data mining for marketing
-
M. J. Shaw, C. Subramaniam, G. W. Tan, and M. E. Welge. Knowledge management and data mining for marketing. Decis. Support Syst., 31(1):127-137, 2001.
-
(2001)
Decis. Support Syst
, vol.31
, Issue.1
, pp. 127-137
-
-
Shaw, M.J.1
Subramaniam, C.2
Tan, G.W.3
Welge, M.E.4
-
24
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
Aug
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. SIGCOMM Comput.commun. Rev., 31(4):149-160, Aug. 2001.
-
(2001)
SIGCOMM Comput.commun. Rev
, vol.31
, Issue.4
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
27
-
-
79960394236
-
Data mining of mass storage based on cloud computing
-
J. Wang, J. Wan, Z. Liu, and P. Wang. Data mining of mass storage based on cloud computing. In IEEE Computer Society, pages 426-431, 2010.
-
(2010)
IEEE Computer Society
, pp. 426-431
-
-
Wang, J.1
Wan, J.2
Liu, Z.3
Wang, P.4
-
28
-
-
84876547122
-
Data mining in the real world: Experiences, challenges, and recommendations
-
G. M. Weiss. Data mining in the real world: Experiences, challenges, and recommendations. In DMIN, pages 124-130, 2009.
-
(2009)
DMIN
, pp. 124-130
-
-
Weiss, G.M.1
|