-
1
-
-
77951604529
-
-
Data management challenges in cloud computing infrastructures, Databases in Networked Information Systems, vol. 5999, 2010, Springer.
-
Agrawal, D., El Abbadi, A., Antony, S., Das, S., 2010. Data management challenges in cloud computing infrastructures, Databases in Networked Information Systems, vol. 5999, 2010, Springer, pp.1–10.
-
(2010)
, pp. 1-10
-
-
Agrawal, D.1
El Abbadi, A.2
Antony, S.3
Das, S.4
-
2
-
-
54849413009
-
Application of data mining techniques to storage management and online distribution of satellite images
-
N. Nedjah L. de Macedo Mourelle J. Kacprzyk Springer Berlin Heidelberg
-
Azevedo, D.R., de Oliveira, J.P., Application of data mining techniques to storage management and online distribution of satellite images. Nedjah, N., de Macedo Mourelle, L., Kacprzyk, J., (eds.) Innovative Applications in Data Mining, 2009, Springer, Berlin Heidelberg, 1–15.
-
(2009)
Innovative Applications in Data Mining
, pp. 1-15
-
-
Azevedo, D.R.1
de Oliveira, J.P.2
-
3
-
-
84922205951
-
Techniques about data replication for mobile ad-hoc network databases
-
Azeem, R., Khan, M.I.A., Techniques about data replication for mobile ad-hoc network databases. Int J. Multidiscip. Sci. Eng., 3, 2012, 5.
-
(2012)
Int J. Multidiscip. Sci. Eng.
, vol.3
, pp. 5
-
-
Azeem, R.1
Khan, M.I.A.2
-
4
-
-
85172644695
-
Data integration progression in large data source using mapping affinity
-
In: Proceedings of the 7th International Conference on Advanced Software Engineering and Its Applications (ASEA).
-
Ahamed, B.B., Ramkumar, T., Hariharan, S., 2014. Data integration progression in large data source using mapping affinity. In: Proceedings of the 7th International Conference on Advanced Software Engineering and Its Applications (ASEA).
-
(2014)
-
-
Ahamed, B.B.1
Ramkumar, T.2
Hariharan, S.3
-
5
-
-
78149315694
-
Symbiotic routing in future data centers
-
Abu-Libdeh, H., et al. Symbiotic routing in future data centers. ACM SIGCOMM Comput. Commun. Rev. 41:4 (2011), 51–62.
-
(2011)
ACM SIGCOMM Comput. Commun. Rev.
, vol.41
, Issue.4
, pp. 51-62
-
-
Abu-Libdeh, H.1
-
6
-
-
61649125169
-
OFDM for optical communications
-
Armstrong, J., OFDM for optical communications. J. Light Technol. 27:3 (2009), 189–204.
-
(2009)
J. Light Technol.
, vol.27
, Issue.3
, pp. 189-204
-
-
Armstrong, J.1
-
7
-
-
46649105498
-
-
On exploring complex relationships of correlation clusters. In: Proceedings of the IEEE SSBDM’07 19th International Conference on Scientific and Statistical Database Management.
-
Achtert, E., et al., 2007. On exploring complex relationships of correlation clusters. In: Proceedings of the IEEE SSBDM’07 19th International Conference on Scientific and Statistical Database Management.
-
(2007)
-
-
Achtert, E.1
-
8
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
In: Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM.
-
Agrawal, D., Aggarwal, C.C., 2001. On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM.
-
(2001)
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
9
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
In: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of database systems. ACM, Santa Barbara, California, USA.
-
Agrawal, D., Aggarwal, C.C., 2001. On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of database systems. ACM, Santa Barbara, California, USA, pp. 247–255.
-
(2001)
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
10
-
-
84929641095
-
Big Data computing and clouds: trends and future directions
-
Assunção, M.D., et al. Big Data computing and clouds: trends and future directions. J. Parallel Distrib. Comput., 2014.
-
(2014)
J. Parallel Distrib. Comput.
-
-
Assunção, M.D.1
-
11
-
-
84978940016
-
-
Big Data Computing and Clouds: Challenges, Solutions, and Future Directions. arXiv preprint arXiv:1312.4722.
-
Assunçaoa, M.D., et al., 2013. Big Data Computing and Clouds: Challenges, Solutions, and Future Directions. arXiv preprint arXiv:1312.4722.
-
(2013)
-
-
Assunçaoa, M.D.1
-
12
-
-
84906680356
-
Inside Big Data management: ogres, onions, or parfaits? In: Proceedings of the 15th International Conference on Extending Database Technology
-
ACM.
-
Borkar, V., Carey, M.J., Li, C., 2012. Inside Big Data management: ogres, onions, or parfaits? In: Proceedings of the 15th International Conference on Extending Database Technology. ACM.
-
(2012)
-
-
Borkar, V.1
Carey, M.J.2
Li, C.3
-
13
-
-
84979064109
-
Designing and managing Big Data – How are you researching your outcomes
-
In SimTecT 2014.
-
Baker, T, 2014. Designing and managing Big Data – How are you researching your outcomes. In SimTecT 2014.
-
(2014)
-
-
Baker, T.1
-
14
-
-
84893477212
-
Storage-optimizing clustering algorithms for high-dimensional tick data
-
Buza, K., Nagy, G.I., Nanopoulos, A., Storage-optimizing clustering algorithms for high-dimensional tick data. Expert Syst. Appl. 41:9 (2014), 4148–4157.
-
(2014)
Expert Syst. Appl.
, vol.41
, Issue.9
, pp. 4148-4157
-
-
Buza, K.1
Nagy, G.I.2
Nanopoulos, A.3
-
15
-
-
80052919731
-
A distributed genetic algorithm for graph-based clustering Man-Machine Interactions 2, Springer, pp
-
Buza, K., Buza, A., Kis, P.B., 2011. A distributed genetic algorithm for graph-based clustering Man-Machine Interactions 2, Springer, pp. 323–331.
-
(2011)
, pp. 323-331
-
-
Buza, K.1
Buza, A.2
Kis, P.B.3
-
16
-
-
84978931501
-
DIPAR: a framework for implementing big data science in organizations
-
Z. Mahmood Springer London
-
Bautista Villalpando, L.E., April, A., Abran, A., DIPAR: a framework for implementing big data science in organizations. Mahmood, Z., (eds.) Continued Rise of the Cloud, 2014, Springer, London, 177–194.
-
(2014)
Continued Rise of the Cloud
, pp. 177-194
-
-
Bautista Villalpando, L.E.1
April, A.2
Abran, A.3
-
17
-
-
84944182926
-
A systematic approach on data pre-processing in data mining
-
2320-0790
-
Baskar, S., Arockiam, L., Charles, S., A systematic approach on data pre-processing in data mining. Int J. Adv. Comput. Technol. (IJACT), 2, 2013 2320-0790.
-
(2013)
Int J. Adv. Comput. Technol. (IJACT)
, vol.2
-
-
Baskar, S.1
Arockiam, L.2
Charles, S.3
-
18
-
-
34548731840
-
-
Conditional functional dependencies for data cleaning. In: Proceedings of the IEEE 23rd International Conference on ICDE Data Engineering.
-
Bohannon, P., et al., 2007. Conditional functional dependencies for data cleaning. In: Proceedings of the IEEE 23rd International Conference on ICDE Data Engineering.
-
(2007)
-
-
Bohannon, P.1
-
19
-
-
84870689823
-
Design principles for effective knowledge discovery from big data
-
In: Proceedings of the IEEE 2012 Joint Working IEEE/IFIP Conference on Software Architecture (WICSA) and European Conference on Software Architecture (ECSA).
-
Begoli, E., Horey, J., 2012. Design principles for effective knowledge discovery from big data. In: Proceedings of the IEEE 2012 Joint Working IEEE/IFIP Conference on Software Architecture (WICSA) and European Conference on Software Architecture (ECSA).
-
(2012)
-
-
Begoli, E.1
Horey, J.2
-
20
-
-
84975740121
-
Nonlinear programming
-
Bertsekas, D.P., 1999. Nonlinear programming.
-
(1999)
-
-
Bertsekas, D.P.1
-
21
-
-
84861159329
-
Considerations for big data: architecture and approach
-
In: Proceedings of IEEE Aerospace Conference.
-
Bakshi, K., 2012. Considerations for big data: architecture and approach. In: Proceedings of IEEE Aerospace Conference.
-
(2012)
-
-
Bakshi, K.1
-
22
-
-
84898804353
-
Toward sustainable development in constraint programming
-
Beldiceanu, N., et al. Toward sustainable development in constraint programming. Constraints 19:2 (2014), 139–149.
-
(2014)
Constraints
, vol.19
, Issue.2
, pp. 139-149
-
-
Beldiceanu, N.1
-
23
-
-
84883084033
-
Managing big data through hybrid data infrastructures
-
Candela, L., Castelli, D., Pagano, P., Managing big data through hybrid data infrastructures. ERCIM News 89 (2012), 37–38.
-
(2012)
ERCIM News
, vol.89
, pp. 37-38
-
-
Candela, L.1
Castelli, D.2
Pagano, P.3
-
24
-
-
84862600340
-
What next?: a half-dozen data management research goals for big data and the cloud
-
In: Proceedings of the 31st Symposium on Principles of Database Systems. ACM.
-
Chaudhuri, S., 2012. What next?: a half-dozen data management research goals for big data and the cloud. In: Proceedings of the 31st Symposium on Principles of Database Systems. ACM.
-
(2012)
-
-
Chaudhuri, S.1
-
25
-
-
79961048653
-
An overview of business intelligence technology
-
Chaudhuri, S., Dayal, U., Narasayya, V., An overview of business intelligence technology. Commun. ACM 54:8 (2011), 88–98.
-
(2011)
Commun. ACM
, vol.54
, Issue.8
, pp. 88-98
-
-
Chaudhuri, S.1
Dayal, U.2
Narasayya, V.3
-
26
-
-
77954756661
-
-
Leveraging spatio-temporal redundancy for RFID data cleansing. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. ACM.
-
Chen, H., et al., 2010. Leveraging spatio-temporal redundancy for RFID data cleansing. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. ACM.
-
(2010)
-
-
Chen, H.1
-
27
-
-
84876005101
-
Big data challenge: a data management perspective
-
Chen, J., et al. Big data challenge: a data management perspective. Front. Comput. Sci. 7:2 (2013), 157–164.
-
(2013)
Front. Comput. Sci.
, vol.7
, Issue.2
, pp. 157-164
-
-
Chen, J.1
-
28
-
-
84870902757
-
Privacy and Big Data
-
O'Reilly Media, Inc
-
Craig, T., Ludloff, M.E., Privacy and Big Data. 2011, O'Reilly Media, Inc.
-
(2011)
-
-
Craig, T.1
Ludloff, M.E.2
-
29
-
-
84898796363
-
Big data: a survey
-
Chen, M., Mao, S., Liu, Y., Big data: a survey. Mob. Netw. Appl. 19:2 (2014), 171–209.
-
(2014)
Mob. Netw. Appl.
, vol.19
, Issue.2
, pp. 171-209
-
-
Chen, M.1
Mao, S.2
Liu, Y.3
-
30
-
-
84958534252
-
A sentence vector based over-sampling method for imbalanced emotion classification
-
A. Gelbukh Springer Berlin Heidelberg
-
Chen, T., et al. A sentence vector based over-sampling method for imbalanced emotion classification. Gelbukh, A., (eds.) Computational Linguistics and Intelligent Text Processing, 2014, Springer, Berlin Heidelberg, 62–72.
-
(2014)
Computational Linguistics and Intelligent Text Processing
, pp. 62-72
-
-
Chen, T.1
-
31
-
-
33746638518
-
Principles of Data Quality
-
GBIF
-
Chapman, A.D., Principles of Data Quality. 2005, GBIF.
-
(2005)
-
-
Chapman, A.D.1
-
32
-
-
34347244664
-
Principles and Methods of Data Cleaning: Primary Species and Species-Occurrence Data
-
Global Biodiversity Information Facility
-
Chapman, A.D., Principles and Methods of Data Cleaning: Primary Species and Species-Occurrence Data. 2005, Global Biodiversity Information Facility.
-
(2005)
-
-
Chapman, A.D.1
-
33
-
-
84978989601
-
-
Proactive Data Mining Using Decision Trees Proactive Data Mining with Decision Trees, New York, NY: Springer New York.
-
Dahan, H., Cohen, S., Rokach, L., & Maimon, O., 2014. Proactive Data Mining Using Decision Trees Proactive Data Mining with Decision Trees, New York, NY: Springer New York, pp. 21-33.
-
(2014)
, pp. 21-33
-
-
Dahan, H.1
Cohen, S.2
Rokach, L.3
Maimon, O.4
-
34
-
-
80052964745
-
MOVIES: indexing moving objects by shooting index images
-
Dittrich, J., Blunschi, L., Salles, M. Vaz, MOVIES: indexing moving objects by shooting index images. GeoInformatica 15:4 (2011), 727–767.
-
(2011)
GeoInformatica
, vol.15
, Issue.4
, pp. 727-767
-
-
Dittrich, J.1
Blunschi, L.2
Salles, M.V.3
-
35
-
-
51649119212
-
Data Quality Concepts and Techniques Applied to Taxonomic Databases
-
University of Southampton
-
Dalcin, E.C., Data Quality Concepts and Techniques Applied to Taxonomic Databases. 2005, University of Southampton.
-
(2005)
-
-
Dalcin, E.C.1
-
37
-
-
0015644825
-
A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters
-
Dunn, J.C., A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters. Journal of cybernetics 3:3 (1973), 32–57.
-
(1973)
Journal of cybernetics
, vol.3
, Issue.3
, pp. 32-57
-
-
Dunn, J.C.1
-
38
-
-
0012834533
-
Why so many clustering algorithms: a position paper
-
Estivill-Castro, V., Why so many clustering algorithms: a position paper. ACM SIGKDD Explor. Newsl 4:1 (2002), 65–75.
-
(2002)
ACM SIGKDD Explor. Newsl
, vol.4
, Issue.1
, pp. 65-75
-
-
Estivill-Castro, V.1
-
39
-
-
74049121230
-
-
Dynamic provable data possession. In: Proceedings of the 16th ACM conference on Computer and Communications Security. ACM.
-
Erway, C., et al., 2009. Dynamic provable data possession. In: Proceedings of the 16th ACM conference on Computer and Communications Security. ACM.
-
(2009)
-
-
Erway, C.1
-
40
-
-
0003970424
-
-
John Wiley & Sons, Inc
-
Ferguson, P., Huston, G., Quality of Service: Delivering QoS on the Internet and in Corporate Networks, 1998, John Wiley & Sons, Inc.
-
(1998)
Quality of Service: Delivering QoS on the Internet and in Corporate Networks
-
-
Ferguson, P.1
Huston, G.2
-
41
-
-
84872083170
-
Helios: a hybrid electrical/optical switch architecture for modular data centers
-
Farrington, N., et al. Helios: a hybrid electrical/optical switch architecture for modular data centers. SIGCOMM Comput. Commun. Rev. 40:4 (2010), 339–350.
-
(2010)
SIGCOMM Comput. Commun. Rev.
, vol.40
, Issue.4
, pp. 339-350
-
-
Farrington, N.1
-
42
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
In Selected areas in cryptography, Springer, Berlin Heidelberg
-
Fluhrer, S., Mantin, I., Shamir, A., 2001. Weaknesses in the key scheduling algorithm of RC4. In Selected areas in cryptography, Springer, Berlin Heidelberg, pp. 1–24.
-
(2001)
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
43
-
-
84963770577
-
A survey on indexing techniques for big data: taxonomy and performance evaluation
-
Gani, A., et al. A survey on indexing techniques for big data: taxonomy and performance evaluation. Knowl. Inf. Syst., 2015, 1–44.
-
(2015)
Knowl. Inf. Syst.
, pp. 1-44
-
-
Gani, A.1
-
44
-
-
84979052372
-
-
NSA Collecting Phone Records of Millions of Verizon Customers Daily, Guardian (cited 03.03.14); Available from: 〈〉.
-
Greenwald, G., 2014a NSA Collecting Phone Records of Millions of Verizon Customers Daily, Guardian (cited 03.03.14); Available from: 〈 http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order〉.
-
(2014)
-
-
Greenwald, G.1
-
45
-
-
84979052366
-
-
Glenn Greenwald & Ewen MacAskill, NSA Prism Program Taps in to User Data of Apple, Google and Others (cited 07.03.14); Available from: 〈〉.
-
Greenwald, G., 2014b. Glenn Greenwald & Ewen MacAskill, NSA Prism Program Taps in to User Data of Apple, Google and Others (cited 07.03.14); Available from: 〈 http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data〉.
-
(2014)
-
-
Greenwald, G.1
-
46
-
-
84922525788
-
Scalable end-user access to big data
-
Giese, M., et al. Scalable end-user access to big data. Big Data Comput., 2013, 205–245.
-
(2013)
Big Data Comput.
, pp. 205-245
-
-
Giese, M.1
-
47
-
-
84919389514
-
Beyond the hype: big data concepts, methods, and analytics
-
Gandomi, A., Haider, M., Beyond the hype: big data concepts, methods, and analytics. Int. J. Inf. Manag. 35:2 (2015), 137–144.
-
(2015)
Int. J. Inf. Manag.
, vol.35
, Issue.2
, pp. 137-144
-
-
Gandomi, A.1
Haider, M.2
-
48
-
-
84923224316
-
Toward scalable systems for big data analytics: a technology tutorial
-
Han, H., et al. Toward scalable systems for big data analytics: a technology tutorial. IEEE Access 2 (2014), 652–687.
-
(2014)
IEEE Access
, vol.2
, pp. 652-687
-
-
Han, H.1
-
49
-
-
84979051990
-
-
Towards Scalable Systems for Big Data Analytics: A Technology Tutorial.
-
Hu, H., et al., 2014. Towards Scalable Systems for Big Data Analytics: A Technology Tutorial.
-
(2014)
-
-
Hu, H.1
-
50
-
-
84964735578
-
Data Mining: Concepts and Techniques
-
Han, J., 2006. Data Mining: Concepts and Techniques.
-
(2006)
-
-
Han, J.1
-
51
-
-
51049122536
-
Biological data cleaning: a case study
-
Herbert, K.G., Wang, J.T., Biological data cleaning: a case study. Int. J. Inf. Qual. 1:1 (2007), 60–82.
-
(2007)
Int. J. Inf. Qual.
, vol.1
, Issue.1
, pp. 60-82
-
-
Herbert, K.G.1
Wang, J.T.2
-
52
-
-
0028448235
-
Data replication for mobile computers
-
Huang, Y., Sistla, P., Wolfson, O., 1994. Data replication for mobile computers. SIGMOD Rec., 23 (2), 13–24, http://dx.doi.org/10.1145/191843.191845.
-
(1994)
SIGMOD Rec.
, vol.23
, Issue.2
, pp. 13-24
-
-
Huang, Y.1
Sistla, P.2
Wolfson, O.3
-
53
-
-
84907325157
-
The rise of “big data” on cloud computing: Review and open research issues
-
Hashem, I.A.T., et al. The rise of “big data” on cloud computing: Review and open research issues. Inf. Syst. 47 (2015), 98–115.
-
(2015)
Inf. Syst.
, vol.47
, pp. 98-115
-
-
Hashem, I.A.T.1
-
54
-
-
46449097011
-
Data integration: the teenage years
-
In: Proceedings of the 32nd international conference on Very large data bases. VLDB Endowment.
-
Halevy, A., Rajaraman, A., Ordille, J., 2006. Data integration: the teenage years. In: Proceedings of the 32nd international conference on Very large data bases. VLDB Endowment.
-
(2006)
-
-
Halevy, A.1
Rajaraman, A.2
Ordille, J.3
-
55
-
-
84885393132
-
Study on big data center traffic management based on the separation of large-scale data stream
-
In: Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
-
Hyoung Woo, P., et al., 2013. Study on big data center traffic management based on the separation of large-scale data stream. In: Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
-
(2013)
-
-
Hyoung Woo, P.1
-
57
-
-
71949128695
-
Dynamic optical mesh networks: drivers, challenges and solutions for the future
-
ECOC 2009.
-
Jinno, M., Takara, H., Kozicki, B., 2009. Dynamic optical mesh networks: drivers, challenges and solutions for the future. ECOC 2009.
-
(2009)
-
-
Jinno, M.1
Takara, H.2
Kozicki, B.3
-
58
-
-
84901640093
-
Trends in big data analytics
-
Kambatla, K., et al. Trends in big data analytics. J. Parallel Distrib. Comput. 74:7 (2014), 2561–2573.
-
(2014)
J. Parallel Distrib. Comput.
, vol.74
, Issue.7
, pp. 2561-2573
-
-
Kambatla, K.1
-
59
-
-
77957901422
-
A novel clustering approach: artificial Bee Colony (ABC) algorithm
-
Karaboga, D., Ozturk, C., A novel clustering approach: artificial Bee Colony (ABC) algorithm. Appl. Soft Comput. 11:1 (2011), 652–657.
-
(2011)
Appl. Soft Comput.
, vol.11
, Issue.1
, pp. 652-657
-
-
Karaboga, D.1
Ozturk, C.2
-
60
-
-
84892730007
-
Mining association rules in student's assessment data
-
Kumar, V., Chadha, A., Mining association rules in student's assessment data. Int. J. Comput. Sci. Issues 9:5 (2012), 211–216.
-
(2012)
Int. J. Comput. Sci. Issues
, vol.9
, Issue.5
, pp. 211-216
-
-
Kumar, V.1
Chadha, A.2
-
61
-
-
84866975242
-
The rise of optical interconnects in data centre networks
-
In: Proceedings of the IEEE 14th International Conference on Transparent Optical Networks (ICTON).
-
Kachris, C., Tomkos, I., 2012. The rise of optical interconnects in data centre networks. In: Proceedings of the IEEE 14th International Conference on Transparent Optical Networks (ICTON).
-
(2012)
-
-
Kachris, C.1
Tomkos, I.2
-
62
-
-
3242806004
-
Lessons and challenges from mining retail e-commerce data
-
Kohavi, R., et al. Lessons and challenges from mining retail e-commerce data. Mach. Learn. 57:1–2 (2004), 83–113.
-
(2004)
Mach. Learn.
, vol.57
, Issue.1-2
, pp. 83-113
-
-
Kohavi, R.1
-
63
-
-
52649177070
-
Probabilistic event extraction from RFID data
-
In: ICDE.
-
Khoussainova, N., Balazinska, M., Suciu, D., 2008. Probabilistic event extraction from RFID data. In: ICDE.
-
(2008)
-
-
Khoussainova, N.1
Balazinska, M.2
Suciu, D.3
-
64
-
-
84928663874
-
Mobile botnet attacks – an emerging threat: classification, review and open issues
-
S.A.A.S.
-
Karim, Ahmad, S.A.A.S., Salleh, Rosli, Arif, Muhammad, Noor, Rafidah Md, Shamshirband, Shahaboddin, Mobile botnet attacks – an emerging threat: classification, review and open issues. KSII Trans. Internet Inf. Syst., 9, 2015, 4.
-
(2015)
KSII Trans. Internet Inf. Syst.
, vol.9
, pp. 4
-
-
Karim, A.1
Salleh, R.2
Arif, M.3
Noor, R.M.4
Shamshirband, S.5
-
65
-
-
84898604749
-
Mobile Botnet Attacks: A Thematic Taxonomy
-
Á. Rocha M.A. Correia B.F. Tan A.K. Stroetmann Springer International Publishing Cham
-
Karim, A., Shah, S.A.A., Salleh, R., Mobile Botnet Attacks: A Thematic Taxonomy. Rocha, Á., Correia, M.A., Tan, B.F., Stroetmann, A.K., (eds.) New Perspectives in Information Systems and Technologies, vol. 2, 2014, Springer International Publishing, Cham, 153–164.
-
(2014)
New Perspectives in Information Systems and Technologies
, vol.2
, pp. 153-164
-
-
Karim, A.1
Shah, S.A.A.2
Salleh, R.3
-
66
-
-
84877799216
-
Investigating the efficiency of blowfish and rejindael (AES) algorithms
-
Kumar, M.A., Karthikeyan, S., Investigating the efficiency of blowfish and rejindael (AES) algorithms. Int. J. Comput. Netw. Inf. Secur. (IJCNIS), 4(2), 2012, 22.
-
(2012)
Int. J. Comput. Netw. Inf. Secur. (IJCNIS)
, vol.4
, Issue.2
, pp. 22
-
-
Kumar, M.A.1
Karthikeyan, S.2
-
67
-
-
84920872753
-
Botnet detection techniques: review, future trends, and issues
-
Karim, A., et al. Botnet detection techniques: review, future trends, and issues. J. Zhejiang Univ. Sci. C 15:11 (2014), 943–983.
-
(2014)
J. Zhejiang Univ. Sci. C
, vol.15
, Issue.11
, pp. 943-983
-
-
Karim, A.1
-
68
-
-
84899458050
-
Data quality management, data usage experience and acquisition intention of big data analytics
-
Kwon, O., Lee, N., Shin, B., Data quality management, data usage experience and acquisition intention of big data analytics. Int. J. Inf. Manag. 34:3 (2014), 387–394.
-
(2014)
Int. J. Inf. Manag.
, vol.34
, Issue.3
, pp. 387-394
-
-
Kwon, O.1
Lee, N.2
Shin, B.3
-
69
-
-
73649138928
-
Designing data governance
-
Khatri, V., Brown, C.V., Designing data governance. Commun. ACM 53:1 (2010), 148–152.
-
(2010)
Commun. ACM
, vol.53
, Issue.1
, pp. 148-152
-
-
Khatri, V.1
Brown, C.V.2
-
70
-
-
84913585600
-
Big data's impact on privacy, security and consumer welfare
-
Kshetri, N., Big data's impact on privacy, security and consumer welfare. Telecommun. Policy 38:11 (2014), 1134–1145.
-
(2014)
Telecommun. Policy
, vol.38
, Issue.11
, pp. 1134-1145
-
-
Kshetri, N.1
-
71
-
-
77954283112
-
Fiber optic communication technologies: what's needed for datacenter network operations
-
Lam, C.F., et al. Fiber optic communication technologies: what's needed for datacenter network operations. IEEE Commun. Mag. 48:7 (2010), 32–39.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.7
, pp. 32-39
-
-
Lam, C.F.1
-
72
-
-
84964723149
-
-
Data replication strategies in grid environments. In: Proceedings of the IEEE Fifth International Conference on Algorithms and Architectures for Parallel Processing.
-
Lamehamedi, H., et al., 2002. Data replication strategies in grid environments. In: Proceedings of the IEEE Fifth International Conference on Algorithms and Architectures for Parallel Processing.
-
(2002)
-
-
Lamehamedi, H.1
-
73
-
-
84873131659
-
Challenges and opportunities with big data
-
Labrinidis, A., Jagadish, H., Challenges and opportunities with big data. Proc. VLDB Endow. 5:12 (2012), 2032–2033.
-
(2012)
Proc. VLDB Endow.
, vol.5
, Issue.12
, pp. 2032-2033
-
-
Labrinidis, A.1
Jagadish, H.2
-
74
-
-
84939984701
-
External integrity verification for outsourced big data in cloud and IoT: a big picture
-
Liu, C., et al. External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gener. Comput. Syst., 2014.
-
(2014)
Future Gener. Comput. Syst.
-
-
Liu, C.1
-
75
-
-
84946688439
-
-
Challenges and trends of big data analytics. In: Proceedings of the IEEE Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
-
Li, H. Lu, X., 2014. Challenges and trends of big data analytics. In: Proceedings of the IEEE Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
-
(2014)
-
-
Li, H.1
Lu, X.2
-
76
-
-
84902519636
-
Data integration in fuzzy XML documents
-
Liu, J., Zhang, X., Data integration in fuzzy XML documents. Inf. Sci. 280 (2014), 82–97.
-
(2014)
Inf. Sci.
, vol.280
, pp. 82-97
-
-
Liu, J.1
Zhang, X.2
-
77
-
-
84921747858
-
The big data security challenge
-
Lafuente, G., The big data security challenge. Netw. Secur. 2015:1 (2015), 12–14.
-
(2015)
Netw. Secur.
, vol.2015
, Issue.1
, pp. 12-14
-
-
Lafuente, G.1
-
78
-
-
84978948554
-
-
Big Data: The Next Frontier for Innovation, Competition, and Productivity.
-
Manyika, J., et al., 2011. Big Data: The Next Frontier for Innovation, Competition, and Productivity.
-
(2011)
-
-
Manyika, J.1
-
79
-
-
84866640011
-
Big data: the management revolution
-
128
-
McAfee, A., Brynjolfsson, E., Big data: the management revolution. Harv. Bus. Rev. 68:90 (2012), 60–66 128.
-
(2012)
Harv. Bus. Rev.
, vol.68
, Issue.90
, pp. 60-66
-
-
McAfee, A.1
Brynjolfsson, E.2
-
80
-
-
84902531809
-
On establishing nonlinear combinations of variables from small to big data for use in later processing
-
Mendel, J.M., Korjani, M.M., On establishing nonlinear combinations of variables from small to big data for use in later processing. Inf. Sci. 280:0 (2014), 98–110.
-
(2014)
Inf. Sci.
, vol.280
, pp. 98-110
-
-
Mendel, J.M.1
Korjani, M.M.2
-
81
-
-
84979039151
-
-
Data Cleansing: Beyond Integrity Analysis. In IQ.
-
Maletic, J.I., Marcus, A. Data Cleansing: Beyond Integrity Analysis. In IQ, 2000, pp. 200–209.
-
(2000)
, pp. 200-209
-
-
Maletic, J.I.1
Marcus, A.2
-
82
-
-
84887058308
-
Big data: new opportunities and new challenges
-
Editorial
-
Michael, K., Miller, K.W., Big data: new opportunities and new challenges. IEEE Comput. 46:6 (2013), 22–24 Editorial.
-
(2013)
IEEE Comput.
, vol.46
, Issue.6
, pp. 22-24
-
-
Michael, K.1
Miller, K.W.2
-
83
-
-
84940025297
-
Managing data replication and placement based on availability
-
Meroufel, B., Belalem, G., Managing data replication and placement based on availability. AASRI Procedia 5 (2013), 147–155.
-
(2013)
AASRI Procedia
, vol.5
, pp. 147-155
-
-
Meroufel, B.1
Belalem, G.2
-
84
-
-
84961371413
-
Lean big data integration in systems biology and systems pharmacology
-
Ma'ayan, A., et al. Lean big data integration in systems biology and systems pharmacology. Trends Pharmacol. Sci. 35:9 (2014), 450–460.
-
(2014)
Trends Pharmacol. Sci.
, vol.35
, Issue.9
, pp. 450-460
-
-
Ma'ayan, A.1
-
85
-
-
84880170201
-
Artificial intelligence and big data
-
O'Leary, D.E., Artificial intelligence and big data. IEEE Intell. Syst. 28:2 (2013), 96–99.
-
(2013)
IEEE Intell. Syst.
, vol.28
, Issue.2
, pp. 96-99
-
-
O'Leary, D.E.1
-
86
-
-
84900800509
-
Data-intensive applications, challenges, techniques and technologies: a survey on big data
-
Philip Chen, C.L., Zhang, C.-Y., Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf. Sci. 275:0 (2014), 314–347.
-
(2014)
Inf. Sci.
, vol.275
, pp. 314-347
-
-
Philip Chen, C.L.1
Zhang, C.-Y.2
-
87
-
-
84874841112
-
Video search and indexing with reinforcement agent for interactive multimedia services
-
Paul, A., et al. Video search and indexing with reinforcement agent for interactive multimedia services. ACM Trans. Embed. Comput. Syst. 12:2 (2013), 1–16.
-
(2013)
ACM Trans. Embed. Comput. Syst.
, vol.12
, Issue.2
, pp. 1-16
-
-
Paul, A.1
-
88
-
-
84885393132
-
-
Study on big data center traffic management based on the separation of large-scale data stream. In: Proceedings of the IEEE Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
-
Park, H.W., et al., 2013. Study on big data center traffic management based on the separation of large-scale data stream. In: Proceedings of the IEEE Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
-
(2013)
-
-
Park, H.W.1
-
89
-
-
84863919680
-
Data integrity in cloud storage
-
In: Proceedings of IEEE International Conference on Advances in Engineering, Science and Management (ICAESM).
-
Priyadharshini, B., Parvathi, P., 2012. Data integrity in cloud storage. In: Proceedings of IEEE International Conference on Advances in Engineering, Science and Management (ICAESM).
-
(2012)
-
-
Priyadharshini, B.1
Parvathi, P.2
-
90
-
-
84883246731
-
Scalability in manufacturing systems design and operation: state-of-the-art and future developments roadmap
-
Putnik, G., et al. Scalability in manufacturing systems design and operation: state-of-the-art and future developments roadmap. CIRP Ann. – Manuf. Technol. 62:2 (2013), 751–774.
-
(2013)
CIRP Ann. – Manuf. Technol.
, vol.62
, Issue.2
, pp. 751-774
-
-
Putnik, G.1
-
91
-
-
84942374444
-
GRASP-based resource re-optimization for effective big data access in federated clouds
-
Palmieri, F., et al. GRASP-based resource re-optimization for effective big data access in federated clouds. Future Gener. Comput. Syst., 2015.
-
(2015)
Future Gener. Comput. Syst.
-
-
Palmieri, F.1
-
92
-
-
84863610828
-
Big data analytics
-
TDWI Best Practices Report, Fourth Quarter.
-
Russom, P., 2011. Big data analytics. TDWI Best Practices Report, Fourth Quarter.
-
(2011)
-
-
Russom, P.1
-
93
-
-
84937439575
-
Managing big data
-
TDWI.
-
Russom, P., 2013. Managing big data. TDWI.
-
(2013)
-
-
Russom, P.1
-
94
-
-
0034704222
-
Nonlinear dimensionality reduction by locally linear embedding
-
Roweis, S.T., Saul, L.K., Nonlinear dimensionality reduction by locally linear embedding. Science 290:5500 (2000), 2323–2326.
-
(2000)
Science
, vol.290
, Issue.5500
, pp. 2323-2326
-
-
Roweis, S.T.1
Saul, L.K.2
-
95
-
-
0032680362
-
A fast algorithm for the minimum covariance determinant estimator
-
Rousseeuw, P.J., Driessen, K.V., A fast algorithm for the minimum covariance determinant estimator. Technometrics 41:3 (1999), 212–223.
-
(1999)
Technometrics
, vol.41
, Issue.3
, pp. 212-223
-
-
Rousseeuw, P.J.1
Driessen, K.V.2
-
96
-
-
84978948616
-
-
Big Data: The End of Privacy or a New Beginning?
-
Rubinstein, I.S., 2012. Big Data: The End of Privacy or a New Beginning?.
-
(2012)
-
-
Rubinstein, I.S.1
-
97
-
-
84904103655
-
Big data: the end of privacy or a new beginning?
-
Rubinstein, I., Big data: the end of privacy or a new beginning?. NYU Sch. Law Public Law Res. Pap., 2012, 12–56.
-
(2012)
NYU Sch. Law Public Law Res. Pap.
, pp. 12-56
-
-
Rubinstein, I.1
-
99
-
-
84869425384
-
P2P data replication and trustworthiness for a JXTA-Overlay P2P system using fuzzy logic
-
Spaho, E., et al. P2P data replication and trustworthiness for a JXTA-Overlay P2P system using fuzzy logic. Appl. Soft Comput. 13:1 (2013), 321–328.
-
(2013)
Appl. Soft Comput.
, vol.13
, Issue.1
, pp. 321-328
-
-
Spaho, E.1
-
100
-
-
84861644982
-
Modeling a dynamic data replication strategy to increase system availability in cloud computing environments
-
Sun, D.-W., et al. Modeling a dynamic data replication strategy to increase system availability in cloud computing environments. J. Comput. Sci. Technol. 27:2 (2012), 256–272.
-
(2012)
J. Comput. Sci. Technol.
, vol.27
, Issue.2
, pp. 256-272
-
-
Sun, D.-W.1
-
101
-
-
84961361396
-
Comparison of K-Means clustering and statistical outliers in reducing medical datasets
-
In: Proceedings of International Conference on Science Engineering and Management Research (ICSEMR).
-
Santhanam, T, Padmavathi, M.S., 2014. Comparison of K-Means clustering and statistical outliers in reducing medical datasets. In: Proceedings of International Conference on Science Engineering and Management Research (ICSEMR).
-
(2014)
-
-
Santhanam, T.1
Padmavathi, M.S.2
-
102
-
-
85008062008
-
OFDM for flexible high-speed optical networks
-
Shieh, W., OFDM for flexible high-speed optical networks. J. Light Technol. 29:10 (2011), 1560–1577.
-
(2011)
J. Light Technol.
, vol.29
, Issue.10
, pp. 1560-1577
-
-
Shieh, W.1
-
103
-
-
77957933159
-
Preventing information leakage from indexing in the cloud
-
In: Proceedings of the IEEE 3rd International Conference on Cloud Computing (CLOUD).
-
Squicciarini, A., Sundareswaran, S., Lin, D, 2010. Preventing information leakage from indexing in the cloud. In: Proceedings of the IEEE 3rd International Conference on Cloud Computing (CLOUD).
-
(2010)
-
-
Squicciarini, A.1
Sundareswaran, S.2
Lin, D.3
-
104
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
Sebé, F., et al. Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20:8 (2008), 1034–1038.
-
(2008)
IEEE Trans. Knowl. Data Eng.
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebé, F.1
-
105
-
-
46249103560
-
FPGA implementations of the DES and triple-DES masked against power analysis attacks
-
In: Proceedings of FPL’06 IEEE International Conference on Field Programmable Logic and Applications.
-
Standaert, F.-X., Rouvroy, G., Quisquater, J.J., 2006. FPGA implementations of the DES and triple-DES masked against power analysis attacks. In: Proceedings of FPL’06 IEEE International Conference on Field Programmable Logic and Applications.
-
(2006)
-
-
Standaert, F.-X.1
Rouvroy, G.2
Quisquater, J.J.3
-
108
-
-
84883221550
-
Big data visual analytics for exploratory earth system simulation analysis
-
Steed, C.A., et al. Big data visual analytics for exploratory earth system simulation analysis. Comput. Geosci. 61 (2013), 71–82.
-
(2013)
Comput. Geosci.
, vol.61
, pp. 71-82
-
-
Steed, C.A.1
-
109
-
-
84900453631
-
Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
-
Shamshirband, S., et al. Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J. Netw. Comput. Appl. 42 (2014), 102–117.
-
(2014)
J. Netw. Comput. Appl.
, vol.42
, pp. 102-117
-
-
Shamshirband, S.1
-
110
-
-
25144439604
-
-
First Ed. Addison-Wesley Longman Publishing Co., Inc
-
Tan, P.-N., Steinbach, M., Kumar, V., Introduction to Data Mining, First Ed., 2005, Addison-Wesley Longman Publishing Co., Inc.
-
(2005)
Introduction to Data Mining
-
-
Tan, P.-N.1
Steinbach, M.2
Kumar, V.3
-
111
-
-
84875723860
-
A bee colony based optimization approach for simultaneous job scheduling and data replication in grid environments
-
Taheri, J., et al. A bee colony based optimization approach for simultaneous job scheduling and data replication in grid environments. Comput. Oper. Res. 40:6 (2013), 1564–1578.
-
(2013)
Comput. Oper. Res.
, vol.40
, Issue.6
, pp. 1564-1578
-
-
Taheri, J.1
-
112
-
-
84877885971
-
Clouds for scalable big data analytics
-
Talia, D., Clouds for scalable big data analytics. Computer 46:5 (2013), 98–101.
-
(2013)
Computer
, vol.46
, Issue.5
, pp. 98-101
-
-
Talia, D.1
-
113
-
-
84869398503
-
Big data security
-
Tankard, C., Big data security. Netw. Secur. 2012:7 (2012), 5–8.
-
(2012)
Netw. Secur.
, vol.2012
, Issue.7
, pp. 5-8
-
-
Tankard, C.1
-
114
-
-
84921806680
-
Big Data for All: Privacy and User Control in the Age of Analytics
-
Tene, O., Polonetsky, J., 2013. Big Data for All: Privacy and User Control in the Age of Analytics.
-
(2013)
-
-
Tene, O.1
Polonetsky, J.2
-
115
-
-
84880174298
-
DES, AES and Blowfish: symmetric key cryptography algorithms simulation based performance analysis
-
Thakur, J., Kumar, N., DES, AES and Blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. 1:2 (2011), 6–12.
-
(2011)
Int. J. Emerg. Technol. Adv. Eng.
, vol.1
, Issue.2
, pp. 6-12
-
-
Thakur, J.1
Kumar, N.2
-
116
-
-
84979048936
-
Toward Cloud-based Big Data Analytics
-
Talia, D., 2013. Toward Cloud-based Big Data Analytics.
-
(2013)
-
-
Talia, D.1
-
117
-
-
84879125644
-
Corporate governance of big data: Perspectives on value, risk, and cost
-
Tallon, P.P., Corporate governance of big data: Perspectives on value, risk, and cost. Computer 46:6 (2013), 32–38.
-
(2013)
Computer
, vol.46
, Issue.6
, pp. 32-38
-
-
Tallon, P.P.1
-
118
-
-
36549065119
-
Maintaining data integrity in a rural clinical trial
-
Van den Broeck, J., et al. Maintaining data integrity in a rural clinical trial. Clin. Trials 4:5 (2007), 572–582.
-
(2007)
Clin. Trials
, vol.4
, Issue.5
, pp. 572-582
-
-
Van den Broeck, J.1
-
119
-
-
84879200068
-
High volumes of event stream indexing and efficient multi-keyword searching for cloud monitoring
-
Wang, M., et al. High volumes of event stream indexing and efficient multi-keyword searching for cloud monitoring. Future Gener. Comput. Syst. 29:8 (2013), 1943–1962.
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.8
, pp. 1943-1962
-
-
Wang, M.1
-
121
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
In Computer Security–ESORICS, Springer, Berlin Heidelberg
-
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W., 2009. Enabling public verifiability and data dynamics for storage security in cloud computing. In Computer Security–ESORICS, Springer, Berlin Heidelberg, pp. 355–370.
-
(2009)
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
122
-
-
77953295132
-
-
Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the IEEE INFOCOM.
-
Wang, C., et al., 2010. Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the IEEE INFOCOM.
-
(2010)
-
-
Wang, C.1
-
123
-
-
84947278873
-
Erasure coding vs
-
replication: A quantitative comparison. In Peer-to-Peer Systems, Springer Berlin Heidelberg.
-
Weatherspoon, H., Kubiatowicz, J.D., 2002. Erasure coding vs. replication: A quantitative comparison. In Peer-to-Peer Systems, Springer Berlin Heidelberg, pp. 328–337.
-
(2002)
, pp. 328-337
-
-
Weatherspoon, H.1
Kubiatowicz, J.D.2
-
124
-
-
0000721930
-
An adaptive data replication algorithm
-
Wolfson, O., Jajodia, S., Huang, Y., An adaptive data replication algorithm. ACM Trans. Database Syst. (TODS) 22:2 (1997), 255–314.
-
(1997)
ACM Trans. Database Syst. (TODS)
, vol.22
, Issue.2
, pp. 255-314
-
-
Wolfson, O.1
Jajodia, S.2
Huang, Y.3
-
125
-
-
84964833687
-
Network big data: a literature survey on stream data mining
-
Wu, Y., Network big data: a literature survey on stream data mining. J. Softw. 9:9 (2014), 2427–2434.
-
(2014)
J. Softw.
, vol.9
, Issue.9
, pp. 2427-2434
-
-
Wu, Y.1
-
127
-
-
84979065386
-
-
Privacy-preserving layer over map reduce on cloud. In: Proceedings of Second International Conference on Cloud and Green Computing (CGC).
-
Xuyun, Z., et al., 2012. Privacy-preserving layer over map reduce on cloud. In: Proceedings of Second International Conference on Cloud and Green Computing (CGC).
-
(2012)
-
-
Xuyun, Z.1
-
128
-
-
84877786158
-
A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud
-
Xuyun, Z., et al. A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Trans. Parallel Distrib. Syst. 24:6 (2013), 1192–1202.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.6
, pp. 1192-1202
-
-
Xuyun, Z.1
-
129
-
-
77949305252
-
Configuring clark-wilson integrity model to enforce flexible protection
-
In: Proceedings of IEEE CIS’09 International Conference on Computational Intelligence and Security.
-
Xu, Q., Liu, G., 2009. Configuring clark-wilson integrity model to enforce flexible protection. In: Proceedings of IEEE CIS’09 International Conference on Computational Intelligence and Security.
-
(2009)
-
-
Xu, Q.1
Liu, G.2
-
130
-
-
77958581901
-
Study on methods for data confidentiality and data integrity in relational database
-
In: Proceedings of the IEEE 3rd IEEE International Conference onComputer Science and Information Technology (ICCSIT).
-
Xu, L.-X., Sun, D., Liu, D., 2010. Study on methods for data confidentiality and data integrity in relational database. In: Proceedings of the IEEE 3rd IEEE International Conference onComputer Science and Information Technology (ICCSIT).
-
(2010)
-
-
Xu, L.-X.1
Sun, D.2
Liu, D.3
-
131
-
-
85119161640
-
-
ABSS: an attribute-based sanitizable signature for integrity of outsourced database with public cloud. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. ACM, San Antonio, Texas, USA.
-
Xu, L., et al., 2015. ABSS: an attribute-based sanitizable signature for integrity of outsourced database with public cloud. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. ACM, San Antonio, Texas, USA. pp. 167–169.
-
(2015)
, pp. 167-169
-
-
Xu, L.1
-
132
-
-
84894468601
-
The descriptive study of knowledge discovery from web usage mining
-
Yogish, H., Raju, D.G., Manjunath, T., The descriptive study of knowledge discovery from web usage mining. IJCSI Int. J. Comput. Sci. Issues, 8(5), 2011.
-
(2011)
IJCSI Int. J. Comput. Sci. Issues
, vol.8
, Issue.5
-
-
Yogish, H.1
Raju, D.G.2
Manjunath, T.3
-
133
-
-
84978940025
-
Discretizing numerical attributes in decision tree for big data analysis
-
In: Proceedings of IEEE International Conference on Data Mining Workshop (ICDMW).
-
Yiqun, Z., Yiu-ming, C., 2014. Discretizing numerical attributes in decision tree for big data analysis. In: Proceedings of IEEE International Conference on Data Mining Workshop (ICDMW).
-
(2014)
-
-
Yiqun, Z.1
Yiu-ming, C.2
-
134
-
-
74849107591
-
-
Digital image encryption algorithm based on chaos and improved DES. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, SMC.
-
Yun-Peng, Z., et al., 2009. Digital image encryption algorithm based on chaos and improved DES. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, SMC.
-
(2009)
-
-
Yun-Peng, Z.1
-
135
-
-
71749094178
-
Parallel k-means clustering based on mapreduce
-
In Cloud computing, Springer, Berlin Heidelberg.
-
Zhao, W., Ma, H., He, Q., 2009. Parallel k-means clustering based on mapreduce. In Cloud computing, Springer, Berlin Heidelberg, pp. 674–679.
-
(2009)
, pp. 674-679
-
-
Zhao, W.1
Ma, H.2
He, Q.3
-
136
-
-
84871089045
-
A model-based approach for rfid data stream cleansing
-
In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management. ACM.
-
Zhao, Z., Ng, W., 2012. A model-based approach for rfid data stream cleansing. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management. ACM.
-
(2012)
-
-
Zhao, Z.1
Ng, W.2
-
137
-
-
77949301092
-
Strict integrity policy of biba model with dynamic characteristics and its correctness
-
In: Proceedings of IEEE International Conference on Computational Intelligence and Security, CIS’09.
-
Zhang, M. Strict integrity policy of biba model with dynamic characteristics and its correctness. In: Proceedings of IEEE International Conference on Computational Intelligence and Security, CIS’09.
-
-
-
Zhang, M.1
-
138
-
-
0141866718
-
A heuristic algorithm for solving hazardous materials distribution problems
-
Zografos, K.G., Androutsopoulos, K.N., A heuristic algorithm for solving hazardous materials distribution problems. Eur. J. Oper. Res. 152:2 (2004), 507–519.
-
(2004)
Eur. J. Oper. Res.
, vol.152
, Issue.2
, pp. 507-519
-
-
Zografos, K.G.1
Androutsopoulos, K.N.2
|