-
1
-
-
84900356860
-
-
Internet 2012 in numbers", posted on Jan 16
-
Pingdom, "Internet 2012 in numbers", posted on Jan 16, 2013, http://royal.pingdom. com/2013/01/16/internet-2012-in-numbers
-
(2013)
-
-
-
2
-
-
84900362268
-
-
Gartner Says Solving 'Big Data' Challenge Involcves More Than Just Managing Volumes of Data", posted on June 27, 2011
-
Stamford, "Gartner Says Solving 'Big Data' Challenge Involcves More Than Just Managing Volumes of Data", posted on June 27, 2011, http://www.gartner.com/newsroom/id/1731916
-
-
-
-
3
-
-
84878825844
-
-
June
-
D. Klein, P. Tran-Gia, M. Hartmann "Big Data", Informatik-Spektrum, vol 36, issue 3, pp319-323, June 2013
-
(2013)
Big Data", Informatik-Spektrum
, vol.36
, Issue.3
, pp. 319-323
-
-
Klein, D.1
Tran-Gia, P.2
Hartmann, M.3
-
6
-
-
84898005076
-
-
Published by John Wiley Sons. Inc
-
J. Hurwitz, A. Nugent, F. Halper, M. Kaufman, Big Data for Dummies, Published by John Wiley Sons. Inc, 2013
-
(2013)
Big Data for Dummies
-
-
Hurwitz, J.1
Nugent, A.2
Halper, F.3
Kaufman, M.4
-
7
-
-
84880820335
-
Customizing computational methods for visual analytics with big data
-
July
-
J. Choo, H. Park, "Customizing Computational Methods for Visual Analytics with Big Data", IEEE Computer Graphics and Applications, vol 33, No 4, pp 22-28, July 2013
-
(2013)
IEEE Computer Graphics and Applications
, vol.33
, Issue.4
, pp. 22-28
-
-
Choo, J.1
Park, H.2
-
8
-
-
84893491079
-
Visual analytics model for intrusion detection in flood attack
-
July
-
J. Zhang, and M.L. Huang, "Visual Analytics Model for Intrusion Detection in Flood Attack". In Proc. TrustCom 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp 277-284, July 2013
-
(2013)
Proc. TrustCom 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 277-284
-
-
Zhang, J.1
Huang, M.L.2
-
9
-
-
84859430323
-
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
-
May ISSN 01674048
-
A. Shiravi, H. Shiravi, M. Tavallaee, and A.A. Ghorbani, "Toward developing a systematic approach to generate benchmark datasets for intrusion detection," Computers &Security, vol 31, issue 3, May 2012, pp 357-374, ISSN 01674048
-
(2012)
Computers &Security
, vol.31
, Issue.3
, pp. 357-374
-
-
Shiravi, A.1
Shiravi, H.2
Tavallaee, M.3
Ghorbani, A.A.4
-
10
-
-
84873816417
-
Finding the needle in the big data systems haystack
-
Jan-Feb
-
T. Kraska, "Finding the Needle in the Big Data Systems Haystack," Internet Computing, IEEE, vol.17, no.1, pp 84,86, Jan-Feb. 2013
-
(2013)
Internet Computing, IEEE
, vol.17
, Issue.1
, pp. 84-86
-
-
Kraska, T.1
-
11
-
-
84876524015
-
Hadoop acceleration in an openflow-based cluster
-
10-16 Nov
-
S. Narayan, S. Bailey, A. Daga,"Hadoop Acceleration in an OpenFlow-Based Cluster," High Performance Computing, Networking, Storage and Analysis (SCC), 2012 SC Companion:, pp 535,538, 10-16 Nov. 2012
-
(2012)
High Performance Computing, Networking, Storage and Analysis (SCC), 2012 SC Companion
, pp. 535-538
-
-
Narayan, S.1
Bailey, S.2
Daga, A.3
-
13
-
-
84883578383
-
Visual analytics for intrusion detection in spam emails
-
J. Zhang, M.L. Huang and D. Hoang, "Visual analytics for intrusion detection in spam emails", International Journal of Grid and Utility Computing, vol 4, no 2/3, pp 178-186, 2013
-
(2013)
International Journal of Grid and Utility Computing
, vol.4
, Issue.2-3
, pp. 178-186
-
-
Zhang, J.1
Huang, M.L.2
Hoang, D.3
|