-
1
-
-
84902195250
-
Smart city architecture: A technology guide for implementation and design challenges
-
W. Rong, X. Zhang, C. Dave, L. Chao, and S. Hao, "Smart city architecture: A technology guide for implementation and design challenges," China Commun., vol. 11, no. 3, pp. 56-69, 2014.
-
(2014)
China Commun.
, vol.11
, Issue.3
, pp. 56-69
-
-
Rong, W.1
Zhang, X.2
Dave, C.3
Chao, L.4
Hao, S.5
-
2
-
-
84906841638
-
An information framework for creating a smart city through Internet of Things
-
Apr.
-
J. Jin, J. Gubbi, S. Marusic, and M. Palaniswami, "An information framework for creating a smart city through Internet of Things," IEEE Internet Things J., vol. 1, no. 2, pp. 112-121, Apr. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.2
, pp. 112-121
-
-
Jin, J.1
Gubbi, J.2
Marusic, S.3
Palaniswami, M.4
-
3
-
-
84890454748
-
Public open sensor data: Revolutionizing smart cities
-
Dec.
-
A. Domingo, B. Bellalta, M. Palacin, M. Oliver, and E. Almirall, "Public open sensor data: Revolutionizing smart cities," IEEE Technol. Soc. Mag., vol. 32, no. 4, pp. 50-56, Dec. 2013.
-
(2013)
IEEE Technol. Soc. Mag.
, vol.32
, Issue.4
, pp. 50-56
-
-
Domingo, A.1
Bellalta, B.2
Palacin, M.3
Oliver, M.4
Almirall, E.5
-
4
-
-
84879082499
-
Trace analysis and mining for smart cities: Issues, methods, and applications
-
Jun.
-
G. Pan, G. Qi, W. Zhang, S. Li, Z. Wu, and L. T. Yang, "Trace analysis and mining for smart cities: Issues, methods, and applications," IEEE Commun. Mag., vol. 51, no. 6, pp. 120-126, Jun. 2013.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.6
, pp. 120-126
-
-
Pan, G.1
Qi, G.2
Zhang, W.3
Li, S.4
Wu, Z.5
Yang, L.T.6
-
5
-
-
84879086620
-
Bootstrapping smart cities through a selfsustainable model based on big data flows
-
Jun.
-
I. Vilajosana, J. Llosa, B. Martinez, M. Domingo-Prieto, A. Angles, and X. Vilajosana, "Bootstrapping smart cities through a selfsustainable model based on big data flows," IEEE Commun. Mag., vol. 51, no. 6, pp. 128-134, Jun. 2013.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.6
, pp. 128-134
-
-
Vilajosana, I.1
Llosa, J.2
Martinez, B.3
Domingo-Prieto, M.4
Angles, A.5
Vilajosana, X.6
-
6
-
-
84923318381
-
Big data deep learning: Challenges and perspectives
-
May
-
X. -W. Chen and X. Lin, "Big data deep learning: Challenges and perspectives," IEEE Access, vol. 2, pp. 514-525, May 2014.
-
(2014)
IEEE Access
, vol.2
, pp. 514-525
-
-
Chen, X.-W.1
Lin, X.2
-
7
-
-
85032752433
-
Modeling and optimization for big data analytics: (Statistical) learning tools for our era of data deluge
-
Sep.
-
K. Slavakis, G. B. Giannakis, and G. Mateos, "Modeling and optimization for big data analytics: (Statistical) learning tools for our era of data deluge," IEEE Signal Process. Mag., vol. 31, no. 5, pp. 18-31, Sep. 2014.
-
(2014)
IEEE Signal Process. Mag.
, vol.31
, Issue.5
, pp. 18-31
-
-
Slavakis, K.1
Giannakis, G.B.2
Mateos, G.3
-
8
-
-
84881330832
-
Machine learning on big data
-
T. Condie, P. Mineiro, N. Polyzotis, and M. Weimer, "Machine learning on big data," in Proc. IEEE Int. Conf. Data Eng., 2013, pp. 1242-1244.
-
(2013)
Proc. IEEE Int. Conf. Data Eng.
, pp. 1242-1244
-
-
Condie, T.1
Mineiro, P.2
Polyzotis, N.3
Weimer, M.4
-
9
-
-
84890419941
-
Data mining with big data
-
Jan.
-
X. Wu, X. Zhu, G. -Q. Wu, and W. Ding, "Data mining with big data," IEEE Trans. Knowl. Data Eng., vol. 26, no. 1, pp. 97-107, Jan. 2014.
-
(2014)
IEEE Trans. Knowl. Data Eng.
, vol.26
, Issue.1
, pp. 97-107
-
-
Wu, X.1
Zhu, X.2
Wu, G.-Q.3
Ding, W.4
-
10
-
-
84921787304
-
Big data machine learning and graph analytics: Current state and future challenges
-
H. H. Huang and H. Liu, "Big data machine learning and graph analytics: Current state and future challenges," in Proc. IEEE Int. Conf. Big Data, 2014, pp. 16-17.
-
(2014)
Proc. IEEE Int. Conf. Big Data
, pp. 16-17
-
-
Huang, H.H.1
Liu, H.2
-
11
-
-
84921350571
-
A time efficient approach for detecting errors in big sensor data on cloud
-
Feb.
-
C. Yang, C. Liu, X. Zhang, S. Nepal, and J. Chen, "A time efficient approach for detecting errors in big sensor data on cloud," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 2, pp. 329-339, Feb. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.2
, pp. 329-339
-
-
Yang, C.1
Liu, C.2
Zhang, X.3
Nepal, S.4
Chen, J.5
-
12
-
-
79955537453
-
QoS-aware fault-tolerant scheduling for real-time tasks on heterogeneous clusters
-
Jun.
-
X. Zhu, X. Qin, and M. Qiu, "QoS-aware fault-tolerant scheduling for real-time tasks on heterogeneous clusters," IEEE Trans. Comput., vol. 60, no. 6, pp. 800-812, Jun. 2011.
-
(2011)
IEEE Trans. Comput.
, vol.60
, Issue.6
, pp. 800-812
-
-
Zhu, X.1
Qin, X.2
Qiu, M.3
-
13
-
-
84890479671
-
A mechanism design approach to resource procurement in cloud computing
-
Jan.
-
A. S. Prasad and S. Rao, "A mechanism design approach to resource procurement in cloud computing," IEEE Trans. Comput., vol. 63, no. 1, pp. 17-30, Jan. 2014.
-
(2014)
IEEE Trans. Comput.
, vol.63
, Issue.1
, pp. 17-30
-
-
Prasad, A.S.1
Rao, S.2
-
14
-
-
84870870355
-
Agent-based cloud computing
-
Oct.-Dec.
-
S. M. Kwang, "Agent-based cloud computing," IEEE Trans. Serv. Comput., vol. 5, no. 4, pp. 564-577, Oct.-Dec. 2012.
-
(2012)
IEEE Trans. Serv. Comput.
, vol.5
, Issue.4
, pp. 564-577
-
-
Kwang, S.M.1
-
15
-
-
84892142922
-
Computer science: The learning machines
-
N. Jones, "Computer science: The learning machines," Nature, vol. 505, no. 7482, pp. 146-148, 2014.
-
(2014)
Nature
, vol.505
, Issue.7482
, pp. 146-148
-
-
Jones, N.1
-
16
-
-
85027938495
-
Performance analysis of cloud computing services for many-tasks scientific computing
-
Jun.
-
A. Iosup, S. Ostermann, M. N. Yigitbasi, R. Prodan, T. Fahringer, and D. H. J. Epema, "Performance analysis of cloud computing services for many-tasks scientific computing," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 6, pp. 931-945, Jun. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.6
, pp. 931-945
-
-
Iosup, A.1
Ostermann, S.2
Yigitbasi, M.N.3
Prodan, R.4
Fahringer, T.5
Epema, D.H.J.6
-
17
-
-
84946898154
-
ANGEL: Agent-based scheduling for real-time tasks in virtualized clouds
-
[Online]
-
X. Zhu, C. Chen, Laurence T. Yang, and Y. Xiang, "ANGEL: Agent-based scheduling for real-time tasks in virtualized clouds," IEEE Trans. Comput., [Online]. Available: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7054494, 2015.
-
(2015)
IEEE Trans. Comput.
-
-
Zhu, X.1
Chen, C.2
Yang, L.T.3
Xiang, Y.4
-
18
-
-
84927696216
-
A weighted kernel possibilistic C-means algorithm based on cloud computing for clustering big data
-
Q. Zhang and Z. Chen, "A weighted kernel possibilistic C-means algorithm based on cloud computing for clustering big data," Int. J. Commun. Syst., vol. 27, no. 9, pp. 1378-1391, 2014.
-
(2014)
Int. J. Commun. Syst.
, vol.27
, Issue.9
, pp. 1378-1391
-
-
Zhang, Q.1
Chen, Z.2
-
19
-
-
80052119994
-
An architecture for parallel topic models
-
A. Smola and S. Narayanamurthy, "An architecture for parallel topic models," Proc. VLDB Endowment, vol. 3, no. 1-2, pp. 703-710, 2010.
-
(2010)
Proc. VLDB Endowment
, vol.3
, Issue.1-2
, pp. 703-710
-
-
Smola, A.1
Narayanamurthy, S.2
-
20
-
-
84862684679
-
Large-scale machine learning at Twitter
-
J. Lin and A. Kolcz, "Large-scale machine learning at Twitter," in Proc. ACM Conf. Manage. Data, 2012, pp. 793-804.
-
(2012)
Proc. ACM Conf. Manage. Data
, pp. 793-804
-
-
Lin, J.1
Kolcz, A.2
-
21
-
-
84901924319
-
Privacy preserving back-propagation neural network learning made practical with cloud computing
-
Jan.
-
J. Yuan and S. Yu, "Privacy preserving back-propagation neural network learning made practical with cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 212-221, Jan. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 212-221
-
-
Yuan, J.1
Yu, S.2
-
22
-
-
84900000827
-
Information flow control for secure cloud computing
-
Apr.
-
J. Bacon, D. Eyers, T. F. J. -M. Pasquier, J. Singh, J. I. Papagiannis, and P. Pietzuch, "Information flow control for secure cloud computing," IEEE Trans. Netw. Serv. Manage., vol. 11, no. 1, pp. 76-89, Apr. 2014.
-
(2014)
IEEE Trans. Netw. Serv. Manage
, vol.11
, Issue.1
, pp. 76-89
-
-
Bacon, J.1
Eyers, D.2
Pasquier, T.F.J.-M.3
Singh, J.4
Papagiannis, J.I.5
Pietzuch, P.6
-
23
-
-
84901332371
-
Enabling reliable and secure IoT-based smart city applications
-
E. Z. Tragos, V. Angelakis, A. Fragkiadakis, D. Gundlegard, C.-S. Nechifor, G. Oikonomou, H. C. Pohls, and A. Gavras, "Enabling reliable and secure IoT-based smart city applications," in Proc. Int. Conf. Pervasive Comput. Commun., 2014, pp. 111-116.
-
(2014)
Proc. Int. Conf. Pervasive Comput. Commun.
, pp. 111-116
-
-
Tragos, E.Z.1
Angelakis, V.2
Fragkiadakis, A.3
Gundlegard, D.4
Nechifor, C.-S.5
Oikonomou, G.6
Pohls, H.C.7
Gavras, A.8
-
25
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindelland B. Pinkas, "Privacy preserving data mining," J. Cryptol., vol. 15, no. 3, pp. 177-206, 2002.
-
(2002)
J. Cryptol.
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindelland, Y.1
Pinkas, B.2
-
26
-
-
77952334884
-
Using randomized response techniques for privacy preserving data mining
-
W. Du and Z. Zhan, "Using randomized response techniques for privacy preserving data mining," in Proc. ACM Int. Conf. Knowl. Discovery Data Mining, 2003, pp. 505-510.
-
(2003)
Proc. ACM Int. Conf. Knowl. Discovery Data Mining
, pp. 505-510
-
-
Du, W.1
Zhan, Z.2
-
27
-
-
12244255356
-
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
-
R. Wright and Z. Yang, "Privacy-preserving Bayesian network structure computation on distributed heterogeneous data," in Proc. ACM Int. Conf. Knowl. Discovery Data Mining, 2004, pp. 713-718.
-
(2004)
Proc. ACM Int. Conf. Knowl. Discovery Data Mining
, pp. 713-718
-
-
Wright, R.1
Yang, Z.2
-
28
-
-
2942536415
-
Privacy preserving naive Bayes classifier for vertically partitioned data
-
J. Vaidya and C. Clifton, "Privacy preserving naive Bayes classifier for vertically partitioned data," in Proc. SIAM Int. Conf. Data Mining, 2004, pp. 522-526.
-
(2004)
Proc. SIAM Int. Conf. Data Mining
, pp. 522-526
-
-
Vaidya, J.1
Clifton, C.2
-
29
-
-
33749576809
-
Cryptographically private support vector machines
-
S. Laur, H. Lipmaa, and T. Mielikaihen, "Cryptographically private support vector machines," in Proc. ACM Int. Conf. Knowl. Discovery Data Mining, 2006, pp. 618-624.
-
(2006)
Proc. ACM Int. Conf. Knowl. Discovery Data Mining
, pp. 618-624
-
-
Laur, S.1
Lipmaa, H.2
Mielikaihen, T.3
-
32
-
-
84908564438
-
A tensor-based approach for big data representation and dimensionality reduction
-
Sep.
-
L. Kuang, F. Hao, L. T. Yang, M. Lin, C. Luo, and G. Min, "A tensor-based approach for big data representation and dimensionality reduction," IEEE Trans. Emerging Topics Comput., vol. 2, no. 3, pp. 280-291, Sep. 2014.
-
(2014)
IEEE Trans. Emerging Topics Comput.
, vol.2
, Issue.3
, pp. 280-291
-
-
Kuang, L.1
Hao, F.2
Yang, L.T.3
Lin, M.4
Luo, C.5
Min, G.6
-
34
-
-
84879854889
-
Representation learning: A review and new perspectives
-
Aug.
-
Y. Bengio, A. Courville, and P. Vincent, "Representation learning: A review and new perspectives," IEEE Trans. Pattern Anal. Mach. Intell., vol. 35, no. 8, pp. 1798-1828, Aug. 2013.
-
(2013)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.35
, Issue.8
, pp. 1798-1828
-
-
Bengio, Y.1
Courville, A.2
Vincent, P.3
-
35
-
-
78149327155
-
Tensor distance based multilinear locality-preserved maximum information embedding
-
Nov.
-
Y. Liu, Y. Liu, and K. Chan, "Tensor distance based multilinear locality-preserved maximum information embedding," IEEE Trans. Neural Netw., vol. 21, no. 11, pp. 1848-1854, Nov. 2010.
-
(2010)
IEEE Trans. Neural Netw.
, vol.21
, Issue.11
, pp. 1848-1854
-
-
Liu, Y.1
Liu, Y.2
Chan, K.3
-
36
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. L. Rivest, L. Adleman, and M. L. Dertouzos, "On data banks and privacy homomorphisms," Found. Secure Comput., vol. 4, no. 11, pp. 169-180, 1978.
-
(1978)
Found. Secure Comput.
, vol.4
, Issue.11
, pp. 169-180
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
37
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
38
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
D. Boneh, E. -J. Goh, and K. Nissim, "Evaluating 2-DNF formulas on ciphertexts," in Proc. Int. Conf. Theory Cryptography, 2005, pp. 325-341.
-
(2005)
Proc. Int. Conf. Theory Cryptography
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
39
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. ACM Symp. Theory Comput., 2009, pp. 169-178.
-
(2009)
Proc. ACM Symp. Theory Comput.
, pp. 169-178
-
-
Gentry, C.1
-
41
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 1999, pp. 223-238.
-
(1999)
Proc. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 223-238
-
-
Paillier, P.1
-
43
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 1985, pp. 10-18.
-
(1985)
Proc. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 10-18
-
-
El Gamal, T.1
-
44
-
-
84865507640
-
Fully homomorphic encryption without modulus switching from classical GapSVP
-
Z. Brakerski, "Fully homomorphic encryption without modulus switching from classical GapSVP," in Proc. 32nd Annu. Cryptol. Conf. Adv. Cryptol., 2012, pp. 868-886.
-
(2012)
Proc. 32nd Annu. Cryptol. Conf. Adv. Cryptol.
, pp. 868-886
-
-
Brakerski, Z.1
-
45
-
-
84884485247
-
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptoticallyfaster, attribute-based
-
C. Gentry, A. Sahai, and B. Waters, "Homomorphic encryption from learning with errors: Conceptually-simpler, asymptoticallyfaster, attribute-based," in Proc. 33rd Annu. Cryptol. Conf. Adv. Cryptol., 2013, pp. 75-92.
-
(2013)
Proc. 33rd Annu. Cryptol. Conf. Adv. Cryptol.
, pp. 75-92
-
-
Gentry, C.1
Sahai, A.2
Waters, B.3
-
46
-
-
84862283411
-
An analysis of single-layer networks in unsupervised feature learning
-
A. Coates, A. Y. Ng, and H. Lee, "An analysis of single-layer networks in unsupervised feature learning," in Proc. Int. Conf. Artif. Intell. Statist., 2011, pp. 215-223.
-
(2011)
Proc. Int. Conf. Artif. Intell. Statist.
, pp. 215-223
-
-
Coates, A.1
Ng, A.Y.2
Lee, H.3
-
47
-
-
74049158146
-
NUSWIDE: A real-world web image database from National University of Singapore
-
T. Chua, J. Tang, R. Hong, H. Li, Z. Luo, and Y. Zheng, "NUSWIDE: A real-world web image database from National University of Singapore," in Proc. ACM Int. Conf. Image Video Retrieval, 2009, pp. 1-9.
-
(2009)
Proc. ACM Int. Conf. Image Video Retrieval
, pp. 1-9
-
-
Chua, T.1
Tang, J.2
Hong, R.3
Li, H.4
Luo, Z.5
Zheng, Y.6
-
48
-
-
84907500988
-
Deep architecture for traffic flow prediction: Deep belief networks with multitask learning
-
Oct.
-
W. Huang, G. Song, H. Hong, and K. Xie, "Deep architecture for traffic flow prediction: Deep belief networks with multitask learning," IEEE Trans. Intell. Transp. Syst., vol. 15, no. 5, pp. 2191-2201, Oct. 2014.
-
(2014)
IEEE Trans. Intell. Transp. Syst.
, vol.15
, Issue.5
, pp. 2191-2201
-
-
Huang, W.1
Song, G.2
Hong, H.3
Xie, K.4
-
52
-
-
79960618403
-
A protocol for privacy preserving neural network learning on horizontal partitioned data
-
N. Schlitter, "A protocol for privacy preserving neural network learning on horizontal partitioned data," in Proc. Privacy Statist. Databases, 2008, pp. 298-315.
-
(2008)
Proc. Privacy Statist. Databases
, pp. 298-315
-
-
Schlitter, N.1
-
53
-
-
70350345197
-
Privacy-preserving backpropagation neural network learning
-
Oct.
-
T. Chen and S. Zhong, "Privacy-preserving backpropagation neural network learning," IEEE Trans. Neural Netw., vol. 20, no. 10, pp. 1554-1564, Oct. 2009.
-
(2009)
IEEE Trans. Neural Netw.
, vol.20
, Issue.10
, pp. 1554-1564
-
-
Chen, T.1
Zhong, S.2
-
54
-
-
79251640709
-
Privacy preserving backpropagation neural network learning over arbitrarily partitioned data
-
Feb.
-
A. Bansal, T. Chen, and S. Zhong, "Privacy preserving backpropagation neural network learning over arbitrarily partitioned data," Neural Comput. Appl., vol. 20, no. 1, pp. 143-150, Feb. 2011.
-
(2011)
Neural Comput. Appl.
, vol.20
, Issue.1
, pp. 143-150
-
-
Bansal, A.1
Chen, T.2
Zhong, S.3
-
55
-
-
84904461949
-
HVSTO: Efficient privacy preserving hybrid storage in cloud data center
-
M. Dong, H. Li, K. Ota, and H. Zhu, "HVSTO: Efficient privacy preserving hybrid storage in cloud data center," in Proc. IEEE Conf. Comput. Commun. INFOCOM Workshop Security Privacy Big Data, 2014, pp. 529-534.
-
(2014)
Proc. IEEE Conf. Comput. Commun. INFOCOM Workshop Security Privacy Big Data
, pp. 529-534
-
-
Dong, M.1
Li, H.2
Ota, K.3
Zhu, H.4
-
56
-
-
33750908650
-
A privacy-preserving protocol for neural-network-based computation
-
M. Barni, C. Orlandi, and A. Piva, "A privacy-preserving protocol for neural-network-based computation," in Proc. 8th Workshop Multimedia Security, 2006, pp. 146-151.
-
(2006)
Proc. 8th Workshop Multimedia Security
, pp. 146-151
-
-
Barni, M.1
Orlandi, C.2
Piva, A.3
|