메뉴 건너뛰기




Volumn 71, Issue , 2016, Pages 151-166

A survey of big data management: Taxonomy and state-of-the-art

Author keywords

Big data; Big data management; Processing; Security; Storage

Indexed keywords

DATA HANDLING; DIGITAL STORAGE; ENERGY STORAGE; INFORMATION MANAGEMENT; PROCESSING; STORAGE MANAGEMENT; SURVEYS; TAXONOMIES;

EID: 84978946777     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2016.04.008     Document Type: Article
Times cited : (193)

References (138)
  • 1
    • 77951604529 scopus 로고    scopus 로고
    • Data management challenges in cloud computing infrastructures, Databases in Networked Information Systems, vol. 5999, 2010, Springer.
    • Agrawal, D., El Abbadi, A., Antony, S., Das, S., 2010. Data management challenges in cloud computing infrastructures, Databases in Networked Information Systems, vol. 5999, 2010, Springer, pp.1–10.
    • (2010) , pp. 1-10
    • Agrawal, D.1    El Abbadi, A.2    Antony, S.3    Das, S.4
  • 2
    • 54849413009 scopus 로고    scopus 로고
    • Application of data mining techniques to storage management and online distribution of satellite images
    • N. Nedjah L. de Macedo Mourelle J. Kacprzyk Springer Berlin Heidelberg
    • Azevedo, D.R., de Oliveira, J.P., Application of data mining techniques to storage management and online distribution of satellite images. Nedjah, N., de Macedo Mourelle, L., Kacprzyk, J., (eds.) Innovative Applications in Data Mining, 2009, Springer, Berlin Heidelberg, 1–15.
    • (2009) Innovative Applications in Data Mining , pp. 1-15
    • Azevedo, D.R.1    de Oliveira, J.P.2
  • 3
    • 84922205951 scopus 로고    scopus 로고
    • Techniques about data replication for mobile ad-hoc network databases
    • Azeem, R., Khan, M.I.A., Techniques about data replication for mobile ad-hoc network databases. Int J. Multidiscip. Sci. Eng., 3, 2012, 5.
    • (2012) Int J. Multidiscip. Sci. Eng. , vol.3 , pp. 5
    • Azeem, R.1    Khan, M.I.A.2
  • 4
    • 85172644695 scopus 로고    scopus 로고
    • Data integration progression in large data source using mapping affinity
    • In: Proceedings of the 7th International Conference on Advanced Software Engineering and Its Applications (ASEA).
    • Ahamed, B.B., Ramkumar, T., Hariharan, S., 2014. Data integration progression in large data source using mapping affinity. In: Proceedings of the 7th International Conference on Advanced Software Engineering and Its Applications (ASEA).
    • (2014)
    • Ahamed, B.B.1    Ramkumar, T.2    Hariharan, S.3
  • 5
    • 78149315694 scopus 로고    scopus 로고
    • Symbiotic routing in future data centers
    • Abu-Libdeh, H., et al. Symbiotic routing in future data centers. ACM SIGCOMM Comput. Commun. Rev. 41:4 (2011), 51–62.
    • (2011) ACM SIGCOMM Comput. Commun. Rev. , vol.41 , Issue.4 , pp. 51-62
    • Abu-Libdeh, H.1
  • 6
    • 61649125169 scopus 로고    scopus 로고
    • OFDM for optical communications
    • Armstrong, J., OFDM for optical communications. J. Light Technol. 27:3 (2009), 189–204.
    • (2009) J. Light Technol. , vol.27 , Issue.3 , pp. 189-204
    • Armstrong, J.1
  • 7
    • 46649105498 scopus 로고    scopus 로고
    • On exploring complex relationships of correlation clusters. In: Proceedings of the IEEE SSBDM’07 19th International Conference on Scientific and Statistical Database Management.
    • Achtert, E., et al., 2007. On exploring complex relationships of correlation clusters. In: Proceedings of the IEEE SSBDM’07 19th International Conference on Scientific and Statistical Database Management.
    • (2007)
    • Achtert, E.1
  • 8
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • In: Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM.
    • Agrawal, D., Aggarwal, C.C., 2001. On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM.
    • (2001)
    • Agrawal, D.1    Aggarwal, C.C.2
  • 9
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • In: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of database systems. ACM, Santa Barbara, California, USA.
    • Agrawal, D., Aggarwal, C.C., 2001. On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of database systems. ACM, Santa Barbara, California, USA, pp. 247–255.
    • (2001) , pp. 247-255
    • Agrawal, D.1    Aggarwal, C.C.2
  • 10
    • 84929641095 scopus 로고    scopus 로고
    • Big Data computing and clouds: trends and future directions
    • Assunção, M.D., et al. Big Data computing and clouds: trends and future directions. J. Parallel Distrib. Comput., 2014.
    • (2014) J. Parallel Distrib. Comput.
    • Assunção, M.D.1
  • 11
    • 84978940016 scopus 로고    scopus 로고
    • Big Data Computing and Clouds: Challenges, Solutions, and Future Directions. arXiv preprint arXiv:1312.4722.
    • Assunçaoa, M.D., et al., 2013. Big Data Computing and Clouds: Challenges, Solutions, and Future Directions. arXiv preprint arXiv:1312.4722.
    • (2013)
    • Assunçaoa, M.D.1
  • 12
    • 84906680356 scopus 로고    scopus 로고
    • Inside Big Data management: ogres, onions, or parfaits? In: Proceedings of the 15th International Conference on Extending Database Technology
    • ACM.
    • Borkar, V., Carey, M.J., Li, C., 2012. Inside Big Data management: ogres, onions, or parfaits? In: Proceedings of the 15th International Conference on Extending Database Technology. ACM.
    • (2012)
    • Borkar, V.1    Carey, M.J.2    Li, C.3
  • 13
    • 84979064109 scopus 로고    scopus 로고
    • Designing and managing Big Data – How are you researching your outcomes
    • In SimTecT 2014.
    • Baker, T, 2014. Designing and managing Big Data – How are you researching your outcomes. In SimTecT 2014.
    • (2014)
    • Baker, T.1
  • 14
    • 84893477212 scopus 로고    scopus 로고
    • Storage-optimizing clustering algorithms for high-dimensional tick data
    • Buza, K., Nagy, G.I., Nanopoulos, A., Storage-optimizing clustering algorithms for high-dimensional tick data. Expert Syst. Appl. 41:9 (2014), 4148–4157.
    • (2014) Expert Syst. Appl. , vol.41 , Issue.9 , pp. 4148-4157
    • Buza, K.1    Nagy, G.I.2    Nanopoulos, A.3
  • 15
    • 80052919731 scopus 로고    scopus 로고
    • A distributed genetic algorithm for graph-based clustering Man-Machine Interactions 2, Springer, pp
    • Buza, K., Buza, A., Kis, P.B., 2011. A distributed genetic algorithm for graph-based clustering Man-Machine Interactions 2, Springer, pp. 323–331.
    • (2011) , pp. 323-331
    • Buza, K.1    Buza, A.2    Kis, P.B.3
  • 16
    • 84978931501 scopus 로고    scopus 로고
    • DIPAR: a framework for implementing big data science in organizations
    • Z. Mahmood Springer London
    • Bautista Villalpando, L.E., April, A., Abran, A., DIPAR: a framework for implementing big data science in organizations. Mahmood, Z., (eds.) Continued Rise of the Cloud, 2014, Springer, London, 177–194.
    • (2014) Continued Rise of the Cloud , pp. 177-194
    • Bautista Villalpando, L.E.1    April, A.2    Abran, A.3
  • 18
    • 34548731840 scopus 로고    scopus 로고
    • Conditional functional dependencies for data cleaning. In: Proceedings of the IEEE 23rd International Conference on ICDE Data Engineering.
    • Bohannon, P., et al., 2007. Conditional functional dependencies for data cleaning. In: Proceedings of the IEEE 23rd International Conference on ICDE Data Engineering.
    • (2007)
    • Bohannon, P.1
  • 19
    • 84870689823 scopus 로고    scopus 로고
    • Design principles for effective knowledge discovery from big data
    • In: Proceedings of the IEEE 2012 Joint Working IEEE/IFIP Conference on Software Architecture (WICSA) and European Conference on Software Architecture (ECSA).
    • Begoli, E., Horey, J., 2012. Design principles for effective knowledge discovery from big data. In: Proceedings of the IEEE 2012 Joint Working IEEE/IFIP Conference on Software Architecture (WICSA) and European Conference on Software Architecture (ECSA).
    • (2012)
    • Begoli, E.1    Horey, J.2
  • 20
    • 84975740121 scopus 로고    scopus 로고
    • Nonlinear programming
    • Bertsekas, D.P., 1999. Nonlinear programming.
    • (1999)
    • Bertsekas, D.P.1
  • 21
    • 84861159329 scopus 로고    scopus 로고
    • Considerations for big data: architecture and approach
    • In: Proceedings of IEEE Aerospace Conference.
    • Bakshi, K., 2012. Considerations for big data: architecture and approach. In: Proceedings of IEEE Aerospace Conference.
    • (2012)
    • Bakshi, K.1
  • 22
    • 84898804353 scopus 로고    scopus 로고
    • Toward sustainable development in constraint programming
    • Beldiceanu, N., et al. Toward sustainable development in constraint programming. Constraints 19:2 (2014), 139–149.
    • (2014) Constraints , vol.19 , Issue.2 , pp. 139-149
    • Beldiceanu, N.1
  • 23
    • 84883084033 scopus 로고    scopus 로고
    • Managing big data through hybrid data infrastructures
    • Candela, L., Castelli, D., Pagano, P., Managing big data through hybrid data infrastructures. ERCIM News 89 (2012), 37–38.
    • (2012) ERCIM News , vol.89 , pp. 37-38
    • Candela, L.1    Castelli, D.2    Pagano, P.3
  • 24
    • 84862600340 scopus 로고    scopus 로고
    • What next?: a half-dozen data management research goals for big data and the cloud
    • In: Proceedings of the 31st Symposium on Principles of Database Systems. ACM.
    • Chaudhuri, S., 2012. What next?: a half-dozen data management research goals for big data and the cloud. In: Proceedings of the 31st Symposium on Principles of Database Systems. ACM.
    • (2012)
    • Chaudhuri, S.1
  • 25
    • 79961048653 scopus 로고    scopus 로고
    • An overview of business intelligence technology
    • Chaudhuri, S., Dayal, U., Narasayya, V., An overview of business intelligence technology. Commun. ACM 54:8 (2011), 88–98.
    • (2011) Commun. ACM , vol.54 , Issue.8 , pp. 88-98
    • Chaudhuri, S.1    Dayal, U.2    Narasayya, V.3
  • 26
    • 77954756661 scopus 로고    scopus 로고
    • Leveraging spatio-temporal redundancy for RFID data cleansing. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. ACM.
    • Chen, H., et al., 2010. Leveraging spatio-temporal redundancy for RFID data cleansing. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. ACM.
    • (2010)
    • Chen, H.1
  • 27
    • 84876005101 scopus 로고    scopus 로고
    • Big data challenge: a data management perspective
    • Chen, J., et al. Big data challenge: a data management perspective. Front. Comput. Sci. 7:2 (2013), 157–164.
    • (2013) Front. Comput. Sci. , vol.7 , Issue.2 , pp. 157-164
    • Chen, J.1
  • 28
    • 84870902757 scopus 로고    scopus 로고
    • Privacy and Big Data
    • O'Reilly Media, Inc
    • Craig, T., Ludloff, M.E., Privacy and Big Data. 2011, O'Reilly Media, Inc.
    • (2011)
    • Craig, T.1    Ludloff, M.E.2
  • 29
    • 84898796363 scopus 로고    scopus 로고
    • Big data: a survey
    • Chen, M., Mao, S., Liu, Y., Big data: a survey. Mob. Netw. Appl. 19:2 (2014), 171–209.
    • (2014) Mob. Netw. Appl. , vol.19 , Issue.2 , pp. 171-209
    • Chen, M.1    Mao, S.2    Liu, Y.3
  • 30
    • 84958534252 scopus 로고    scopus 로고
    • A sentence vector based over-sampling method for imbalanced emotion classification
    • A. Gelbukh Springer Berlin Heidelberg
    • Chen, T., et al. A sentence vector based over-sampling method for imbalanced emotion classification. Gelbukh, A., (eds.) Computational Linguistics and Intelligent Text Processing, 2014, Springer, Berlin Heidelberg, 62–72.
    • (2014) Computational Linguistics and Intelligent Text Processing , pp. 62-72
    • Chen, T.1
  • 31
    • 33746638518 scopus 로고    scopus 로고
    • Principles of Data Quality
    • GBIF
    • Chapman, A.D., Principles of Data Quality. 2005, GBIF.
    • (2005)
    • Chapman, A.D.1
  • 32
    • 34347244664 scopus 로고    scopus 로고
    • Principles and Methods of Data Cleaning: Primary Species and Species-Occurrence Data
    • Global Biodiversity Information Facility
    • Chapman, A.D., Principles and Methods of Data Cleaning: Primary Species and Species-Occurrence Data. 2005, Global Biodiversity Information Facility.
    • (2005)
    • Chapman, A.D.1
  • 33
    • 84978989601 scopus 로고    scopus 로고
    • Proactive Data Mining Using Decision Trees Proactive Data Mining with Decision Trees, New York, NY: Springer New York.
    • Dahan, H., Cohen, S., Rokach, L., & Maimon, O., 2014. Proactive Data Mining Using Decision Trees Proactive Data Mining with Decision Trees, New York, NY: Springer New York, pp. 21-33.
    • (2014) , pp. 21-33
    • Dahan, H.1    Cohen, S.2    Rokach, L.3    Maimon, O.4
  • 34
    • 80052964745 scopus 로고    scopus 로고
    • MOVIES: indexing moving objects by shooting index images
    • Dittrich, J., Blunschi, L., Salles, M. Vaz, MOVIES: indexing moving objects by shooting index images. GeoInformatica 15:4 (2011), 727–767.
    • (2011) GeoInformatica , vol.15 , Issue.4 , pp. 727-767
    • Dittrich, J.1    Blunschi, L.2    Salles, M.V.3
  • 35
    • 51649119212 scopus 로고    scopus 로고
    • Data Quality Concepts and Techniques Applied to Taxonomic Databases
    • University of Southampton
    • Dalcin, E.C., Data Quality Concepts and Techniques Applied to Taxonomic Databases. 2005, University of Southampton.
    • (2005)
    • Dalcin, E.C.1
  • 37
    • 0015644825 scopus 로고
    • A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters
    • Dunn, J.C., A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters. Journal of cybernetics 3:3 (1973), 32–57.
    • (1973) Journal of cybernetics , vol.3 , Issue.3 , pp. 32-57
    • Dunn, J.C.1
  • 38
    • 0012834533 scopus 로고    scopus 로고
    • Why so many clustering algorithms: a position paper
    • Estivill-Castro, V., Why so many clustering algorithms: a position paper. ACM SIGKDD Explor. Newsl 4:1 (2002), 65–75.
    • (2002) ACM SIGKDD Explor. Newsl , vol.4 , Issue.1 , pp. 65-75
    • Estivill-Castro, V.1
  • 39
    • 74049121230 scopus 로고    scopus 로고
    • Dynamic provable data possession. In: Proceedings of the 16th ACM conference on Computer and Communications Security. ACM.
    • Erway, C., et al., 2009. Dynamic provable data possession. In: Proceedings of the 16th ACM conference on Computer and Communications Security. ACM.
    • (2009)
    • Erway, C.1
  • 41
    • 84872083170 scopus 로고    scopus 로고
    • Helios: a hybrid electrical/optical switch architecture for modular data centers
    • Farrington, N., et al. Helios: a hybrid electrical/optical switch architecture for modular data centers. SIGCOMM Comput. Commun. Rev. 40:4 (2010), 339–350.
    • (2010) SIGCOMM Comput. Commun. Rev. , vol.40 , Issue.4 , pp. 339-350
    • Farrington, N.1
  • 42
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the key scheduling algorithm of RC4
    • In Selected areas in cryptography, Springer, Berlin Heidelberg
    • Fluhrer, S., Mantin, I., Shamir, A., 2001. Weaknesses in the key scheduling algorithm of RC4. In Selected areas in cryptography, Springer, Berlin Heidelberg, pp. 1–24.
    • (2001) , pp. 1-24
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 43
    • 84963770577 scopus 로고    scopus 로고
    • A survey on indexing techniques for big data: taxonomy and performance evaluation
    • Gani, A., et al. A survey on indexing techniques for big data: taxonomy and performance evaluation. Knowl. Inf. Syst., 2015, 1–44.
    • (2015) Knowl. Inf. Syst. , pp. 1-44
    • Gani, A.1
  • 44
    • 84979052372 scopus 로고    scopus 로고
    • NSA Collecting Phone Records of Millions of Verizon Customers Daily, Guardian (cited 03.03.14); Available from: 〈〉.
    • Greenwald, G., 2014a NSA Collecting Phone Records of Millions of Verizon Customers Daily, Guardian (cited 03.03.14); Available from: 〈 http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order〉.
    • (2014)
    • Greenwald, G.1
  • 45
    • 84979052366 scopus 로고    scopus 로고
    • Glenn Greenwald & Ewen MacAskill, NSA Prism Program Taps in to User Data of Apple, Google and Others (cited 07.03.14); Available from: 〈〉.
    • Greenwald, G., 2014b. Glenn Greenwald & Ewen MacAskill, NSA Prism Program Taps in to User Data of Apple, Google and Others (cited 07.03.14); Available from: 〈 http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data〉.
    • (2014)
    • Greenwald, G.1
  • 46
    • 84922525788 scopus 로고    scopus 로고
    • Scalable end-user access to big data
    • Giese, M., et al. Scalable end-user access to big data. Big Data Comput., 2013, 205–245.
    • (2013) Big Data Comput. , pp. 205-245
    • Giese, M.1
  • 47
    • 84919389514 scopus 로고    scopus 로고
    • Beyond the hype: big data concepts, methods, and analytics
    • Gandomi, A., Haider, M., Beyond the hype: big data concepts, methods, and analytics. Int. J. Inf. Manag. 35:2 (2015), 137–144.
    • (2015) Int. J. Inf. Manag. , vol.35 , Issue.2 , pp. 137-144
    • Gandomi, A.1    Haider, M.2
  • 48
    • 84923224316 scopus 로고    scopus 로고
    • Toward scalable systems for big data analytics: a technology tutorial
    • Han, H., et al. Toward scalable systems for big data analytics: a technology tutorial. IEEE Access 2 (2014), 652–687.
    • (2014) IEEE Access , vol.2 , pp. 652-687
    • Han, H.1
  • 49
    • 84979051990 scopus 로고    scopus 로고
    • Towards Scalable Systems for Big Data Analytics: A Technology Tutorial.
    • Hu, H., et al., 2014. Towards Scalable Systems for Big Data Analytics: A Technology Tutorial.
    • (2014)
    • Hu, H.1
  • 50
    • 84964735578 scopus 로고    scopus 로고
    • Data Mining: Concepts and Techniques
    • Han, J., 2006. Data Mining: Concepts and Techniques.
    • (2006)
    • Han, J.1
  • 51
    • 51049122536 scopus 로고    scopus 로고
    • Biological data cleaning: a case study
    • Herbert, K.G., Wang, J.T., Biological data cleaning: a case study. Int. J. Inf. Qual. 1:1 (2007), 60–82.
    • (2007) Int. J. Inf. Qual. , vol.1 , Issue.1 , pp. 60-82
    • Herbert, K.G.1    Wang, J.T.2
  • 52
    • 0028448235 scopus 로고
    • Data replication for mobile computers
    • Huang, Y., Sistla, P., Wolfson, O., 1994. Data replication for mobile computers. SIGMOD Rec., 23 (2), 13–24, http://dx.doi.org/10.1145/191843.191845.
    • (1994) SIGMOD Rec. , vol.23 , Issue.2 , pp. 13-24
    • Huang, Y.1    Sistla, P.2    Wolfson, O.3
  • 53
    • 84907325157 scopus 로고    scopus 로고
    • The rise of “big data” on cloud computing: Review and open research issues
    • Hashem, I.A.T., et al. The rise of “big data” on cloud computing: Review and open research issues. Inf. Syst. 47 (2015), 98–115.
    • (2015) Inf. Syst. , vol.47 , pp. 98-115
    • Hashem, I.A.T.1
  • 54
    • 46449097011 scopus 로고    scopus 로고
    • Data integration: the teenage years
    • In: Proceedings of the 32nd international conference on Very large data bases. VLDB Endowment.
    • Halevy, A., Rajaraman, A., Ordille, J., 2006. Data integration: the teenage years. In: Proceedings of the 32nd international conference on Very large data bases. VLDB Endowment.
    • (2006)
    • Halevy, A.1    Rajaraman, A.2    Ordille, J.3
  • 55
    • 84885393132 scopus 로고    scopus 로고
    • Study on big data center traffic management based on the separation of large-scale data stream
    • In: Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
    • Hyoung Woo, P., et al., 2013. Study on big data center traffic management based on the separation of large-scale data stream. In: Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
    • (2013)
    • Hyoung Woo, P.1
  • 57
    • 71949128695 scopus 로고    scopus 로고
    • Dynamic optical mesh networks: drivers, challenges and solutions for the future
    • ECOC 2009.
    • Jinno, M., Takara, H., Kozicki, B., 2009. Dynamic optical mesh networks: drivers, challenges and solutions for the future. ECOC 2009.
    • (2009)
    • Jinno, M.1    Takara, H.2    Kozicki, B.3
  • 58
    • 84901640093 scopus 로고    scopus 로고
    • Trends in big data analytics
    • Kambatla, K., et al. Trends in big data analytics. J. Parallel Distrib. Comput. 74:7 (2014), 2561–2573.
    • (2014) J. Parallel Distrib. Comput. , vol.74 , Issue.7 , pp. 2561-2573
    • Kambatla, K.1
  • 59
    • 77957901422 scopus 로고    scopus 로고
    • A novel clustering approach: artificial Bee Colony (ABC) algorithm
    • Karaboga, D., Ozturk, C., A novel clustering approach: artificial Bee Colony (ABC) algorithm. Appl. Soft Comput. 11:1 (2011), 652–657.
    • (2011) Appl. Soft Comput. , vol.11 , Issue.1 , pp. 652-657
    • Karaboga, D.1    Ozturk, C.2
  • 60
    • 84892730007 scopus 로고    scopus 로고
    • Mining association rules in student's assessment data
    • Kumar, V., Chadha, A., Mining association rules in student's assessment data. Int. J. Comput. Sci. Issues 9:5 (2012), 211–216.
    • (2012) Int. J. Comput. Sci. Issues , vol.9 , Issue.5 , pp. 211-216
    • Kumar, V.1    Chadha, A.2
  • 61
    • 84866975242 scopus 로고    scopus 로고
    • The rise of optical interconnects in data centre networks
    • In: Proceedings of the IEEE 14th International Conference on Transparent Optical Networks (ICTON).
    • Kachris, C., Tomkos, I., 2012. The rise of optical interconnects in data centre networks. In: Proceedings of the IEEE 14th International Conference on Transparent Optical Networks (ICTON).
    • (2012)
    • Kachris, C.1    Tomkos, I.2
  • 62
    • 3242806004 scopus 로고    scopus 로고
    • Lessons and challenges from mining retail e-commerce data
    • Kohavi, R., et al. Lessons and challenges from mining retail e-commerce data. Mach. Learn. 57:1–2 (2004), 83–113.
    • (2004) Mach. Learn. , vol.57 , Issue.1-2 , pp. 83-113
    • Kohavi, R.1
  • 63
    • 52649177070 scopus 로고    scopus 로고
    • Probabilistic event extraction from RFID data
    • In: ICDE.
    • Khoussainova, N., Balazinska, M., Suciu, D., 2008. Probabilistic event extraction from RFID data. In: ICDE.
    • (2008)
    • Khoussainova, N.1    Balazinska, M.2    Suciu, D.3
  • 64
    • 84928663874 scopus 로고    scopus 로고
    • Mobile botnet attacks – an emerging threat: classification, review and open issues
    • S.A.A.S.
    • Karim, Ahmad, S.A.A.S., Salleh, Rosli, Arif, Muhammad, Noor, Rafidah Md, Shamshirband, Shahaboddin, Mobile botnet attacks – an emerging threat: classification, review and open issues. KSII Trans. Internet Inf. Syst., 9, 2015, 4.
    • (2015) KSII Trans. Internet Inf. Syst. , vol.9 , pp. 4
    • Karim, A.1    Salleh, R.2    Arif, M.3    Noor, R.M.4    Shamshirband, S.5
  • 65
    • 84898604749 scopus 로고    scopus 로고
    • Mobile Botnet Attacks: A Thematic Taxonomy
    • Á. Rocha M.A. Correia B.F. Tan A.K. Stroetmann Springer International Publishing Cham
    • Karim, A., Shah, S.A.A., Salleh, R., Mobile Botnet Attacks: A Thematic Taxonomy. Rocha, Á., Correia, M.A., Tan, B.F., Stroetmann, A.K., (eds.) New Perspectives in Information Systems and Technologies, vol. 2, 2014, Springer International Publishing, Cham, 153–164.
    • (2014) New Perspectives in Information Systems and Technologies , vol.2 , pp. 153-164
    • Karim, A.1    Shah, S.A.A.2    Salleh, R.3
  • 66
    • 84877799216 scopus 로고    scopus 로고
    • Investigating the efficiency of blowfish and rejindael (AES) algorithms
    • Kumar, M.A., Karthikeyan, S., Investigating the efficiency of blowfish and rejindael (AES) algorithms. Int. J. Comput. Netw. Inf. Secur. (IJCNIS), 4(2), 2012, 22.
    • (2012) Int. J. Comput. Netw. Inf. Secur. (IJCNIS) , vol.4 , Issue.2 , pp. 22
    • Kumar, M.A.1    Karthikeyan, S.2
  • 67
    • 84920872753 scopus 로고    scopus 로고
    • Botnet detection techniques: review, future trends, and issues
    • Karim, A., et al. Botnet detection techniques: review, future trends, and issues. J. Zhejiang Univ. Sci. C 15:11 (2014), 943–983.
    • (2014) J. Zhejiang Univ. Sci. C , vol.15 , Issue.11 , pp. 943-983
    • Karim, A.1
  • 68
    • 84899458050 scopus 로고    scopus 로고
    • Data quality management, data usage experience and acquisition intention of big data analytics
    • Kwon, O., Lee, N., Shin, B., Data quality management, data usage experience and acquisition intention of big data analytics. Int. J. Inf. Manag. 34:3 (2014), 387–394.
    • (2014) Int. J. Inf. Manag. , vol.34 , Issue.3 , pp. 387-394
    • Kwon, O.1    Lee, N.2    Shin, B.3
  • 69
    • 73649138928 scopus 로고    scopus 로고
    • Designing data governance
    • Khatri, V., Brown, C.V., Designing data governance. Commun. ACM 53:1 (2010), 148–152.
    • (2010) Commun. ACM , vol.53 , Issue.1 , pp. 148-152
    • Khatri, V.1    Brown, C.V.2
  • 70
    • 84913585600 scopus 로고    scopus 로고
    • Big data's impact on privacy, security and consumer welfare
    • Kshetri, N., Big data's impact on privacy, security and consumer welfare. Telecommun. Policy 38:11 (2014), 1134–1145.
    • (2014) Telecommun. Policy , vol.38 , Issue.11 , pp. 1134-1145
    • Kshetri, N.1
  • 71
    • 77954283112 scopus 로고    scopus 로고
    • Fiber optic communication technologies: what's needed for datacenter network operations
    • Lam, C.F., et al. Fiber optic communication technologies: what's needed for datacenter network operations. IEEE Commun. Mag. 48:7 (2010), 32–39.
    • (2010) IEEE Commun. Mag. , vol.48 , Issue.7 , pp. 32-39
    • Lam, C.F.1
  • 72
    • 84964723149 scopus 로고    scopus 로고
    • Data replication strategies in grid environments. In: Proceedings of the IEEE Fifth International Conference on Algorithms and Architectures for Parallel Processing.
    • Lamehamedi, H., et al., 2002. Data replication strategies in grid environments. In: Proceedings of the IEEE Fifth International Conference on Algorithms and Architectures for Parallel Processing.
    • (2002)
    • Lamehamedi, H.1
  • 73
    • 84873131659 scopus 로고    scopus 로고
    • Challenges and opportunities with big data
    • Labrinidis, A., Jagadish, H., Challenges and opportunities with big data. Proc. VLDB Endow. 5:12 (2012), 2032–2033.
    • (2012) Proc. VLDB Endow. , vol.5 , Issue.12 , pp. 2032-2033
    • Labrinidis, A.1    Jagadish, H.2
  • 74
    • 84939984701 scopus 로고    scopus 로고
    • External integrity verification for outsourced big data in cloud and IoT: a big picture
    • Liu, C., et al. External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gener. Comput. Syst., 2014.
    • (2014) Future Gener. Comput. Syst.
    • Liu, C.1
  • 75
    • 84946688439 scopus 로고    scopus 로고
    • Challenges and trends of big data analytics. In: Proceedings of the IEEE Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
    • Li, H. Lu, X., 2014. Challenges and trends of big data analytics. In: Proceedings of the IEEE Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
    • (2014)
    • Li, H.1    Lu, X.2
  • 76
    • 84902519636 scopus 로고    scopus 로고
    • Data integration in fuzzy XML documents
    • Liu, J., Zhang, X., Data integration in fuzzy XML documents. Inf. Sci. 280 (2014), 82–97.
    • (2014) Inf. Sci. , vol.280 , pp. 82-97
    • Liu, J.1    Zhang, X.2
  • 77
    • 84921747858 scopus 로고    scopus 로고
    • The big data security challenge
    • Lafuente, G., The big data security challenge. Netw. Secur. 2015:1 (2015), 12–14.
    • (2015) Netw. Secur. , vol.2015 , Issue.1 , pp. 12-14
    • Lafuente, G.1
  • 78
    • 84978948554 scopus 로고    scopus 로고
    • Big Data: The Next Frontier for Innovation, Competition, and Productivity.
    • Manyika, J., et al., 2011. Big Data: The Next Frontier for Innovation, Competition, and Productivity.
    • (2011)
    • Manyika, J.1
  • 79
    • 84866640011 scopus 로고    scopus 로고
    • Big data: the management revolution
    • 128
    • McAfee, A., Brynjolfsson, E., Big data: the management revolution. Harv. Bus. Rev. 68:90 (2012), 60–66 128.
    • (2012) Harv. Bus. Rev. , vol.68 , Issue.90 , pp. 60-66
    • McAfee, A.1    Brynjolfsson, E.2
  • 80
    • 84902531809 scopus 로고    scopus 로고
    • On establishing nonlinear combinations of variables from small to big data for use in later processing
    • Mendel, J.M., Korjani, M.M., On establishing nonlinear combinations of variables from small to big data for use in later processing. Inf. Sci. 280:0 (2014), 98–110.
    • (2014) Inf. Sci. , vol.280 , pp. 98-110
    • Mendel, J.M.1    Korjani, M.M.2
  • 81
    • 84979039151 scopus 로고    scopus 로고
    • Data Cleansing: Beyond Integrity Analysis. In IQ.
    • Maletic, J.I., Marcus, A. Data Cleansing: Beyond Integrity Analysis. In IQ, 2000, pp. 200–209.
    • (2000) , pp. 200-209
    • Maletic, J.I.1    Marcus, A.2
  • 82
    • 84887058308 scopus 로고    scopus 로고
    • Big data: new opportunities and new challenges
    • Editorial
    • Michael, K., Miller, K.W., Big data: new opportunities and new challenges. IEEE Comput. 46:6 (2013), 22–24 Editorial.
    • (2013) IEEE Comput. , vol.46 , Issue.6 , pp. 22-24
    • Michael, K.1    Miller, K.W.2
  • 83
    • 84940025297 scopus 로고    scopus 로고
    • Managing data replication and placement based on availability
    • Meroufel, B., Belalem, G., Managing data replication and placement based on availability. AASRI Procedia 5 (2013), 147–155.
    • (2013) AASRI Procedia , vol.5 , pp. 147-155
    • Meroufel, B.1    Belalem, G.2
  • 84
    • 84961371413 scopus 로고    scopus 로고
    • Lean big data integration in systems biology and systems pharmacology
    • Ma'ayan, A., et al. Lean big data integration in systems biology and systems pharmacology. Trends Pharmacol. Sci. 35:9 (2014), 450–460.
    • (2014) Trends Pharmacol. Sci. , vol.35 , Issue.9 , pp. 450-460
    • Ma'ayan, A.1
  • 85
    • 84880170201 scopus 로고    scopus 로고
    • Artificial intelligence and big data
    • O'Leary, D.E., Artificial intelligence and big data. IEEE Intell. Syst. 28:2 (2013), 96–99.
    • (2013) IEEE Intell. Syst. , vol.28 , Issue.2 , pp. 96-99
    • O'Leary, D.E.1
  • 86
    • 84900800509 scopus 로고    scopus 로고
    • Data-intensive applications, challenges, techniques and technologies: a survey on big data
    • Philip Chen, C.L., Zhang, C.-Y., Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf. Sci. 275:0 (2014), 314–347.
    • (2014) Inf. Sci. , vol.275 , pp. 314-347
    • Philip Chen, C.L.1    Zhang, C.-Y.2
  • 87
    • 84874841112 scopus 로고    scopus 로고
    • Video search and indexing with reinforcement agent for interactive multimedia services
    • Paul, A., et al. Video search and indexing with reinforcement agent for interactive multimedia services. ACM Trans. Embed. Comput. Syst. 12:2 (2013), 1–16.
    • (2013) ACM Trans. Embed. Comput. Syst. , vol.12 , Issue.2 , pp. 1-16
    • Paul, A.1
  • 88
    • 84885393132 scopus 로고    scopus 로고
    • Study on big data center traffic management based on the separation of large-scale data stream. In: Proceedings of the IEEE Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
    • Park, H.W., et al., 2013. Study on big data center traffic management based on the separation of large-scale data stream. In: Proceedings of the IEEE Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
    • (2013)
    • Park, H.W.1
  • 89
    • 84863919680 scopus 로고    scopus 로고
    • Data integrity in cloud storage
    • In: Proceedings of IEEE International Conference on Advances in Engineering, Science and Management (ICAESM).
    • Priyadharshini, B., Parvathi, P., 2012. Data integrity in cloud storage. In: Proceedings of IEEE International Conference on Advances in Engineering, Science and Management (ICAESM).
    • (2012)
    • Priyadharshini, B.1    Parvathi, P.2
  • 90
    • 84883246731 scopus 로고    scopus 로고
    • Scalability in manufacturing systems design and operation: state-of-the-art and future developments roadmap
    • Putnik, G., et al. Scalability in manufacturing systems design and operation: state-of-the-art and future developments roadmap. CIRP Ann. – Manuf. Technol. 62:2 (2013), 751–774.
    • (2013) CIRP Ann. – Manuf. Technol. , vol.62 , Issue.2 , pp. 751-774
    • Putnik, G.1
  • 91
    • 84942374444 scopus 로고    scopus 로고
    • GRASP-based resource re-optimization for effective big data access in federated clouds
    • Palmieri, F., et al. GRASP-based resource re-optimization for effective big data access in federated clouds. Future Gener. Comput. Syst., 2015.
    • (2015) Future Gener. Comput. Syst.
    • Palmieri, F.1
  • 92
    • 84863610828 scopus 로고    scopus 로고
    • Big data analytics
    • TDWI Best Practices Report, Fourth Quarter.
    • Russom, P., 2011. Big data analytics. TDWI Best Practices Report, Fourth Quarter.
    • (2011)
    • Russom, P.1
  • 93
    • 84937439575 scopus 로고    scopus 로고
    • Managing big data
    • TDWI.
    • Russom, P., 2013. Managing big data. TDWI.
    • (2013)
    • Russom, P.1
  • 94
    • 0034704222 scopus 로고    scopus 로고
    • Nonlinear dimensionality reduction by locally linear embedding
    • Roweis, S.T., Saul, L.K., Nonlinear dimensionality reduction by locally linear embedding. Science 290:5500 (2000), 2323–2326.
    • (2000) Science , vol.290 , Issue.5500 , pp. 2323-2326
    • Roweis, S.T.1    Saul, L.K.2
  • 95
    • 0032680362 scopus 로고    scopus 로고
    • A fast algorithm for the minimum covariance determinant estimator
    • Rousseeuw, P.J., Driessen, K.V., A fast algorithm for the minimum covariance determinant estimator. Technometrics 41:3 (1999), 212–223.
    • (1999) Technometrics , vol.41 , Issue.3 , pp. 212-223
    • Rousseeuw, P.J.1    Driessen, K.V.2
  • 96
    • 84978948616 scopus 로고    scopus 로고
    • Big Data: The End of Privacy or a New Beginning?
    • Rubinstein, I.S., 2012. Big Data: The End of Privacy or a New Beginning?.
    • (2012)
    • Rubinstein, I.S.1
  • 97
    • 84904103655 scopus 로고    scopus 로고
    • Big data: the end of privacy or a new beginning?
    • Rubinstein, I., Big data: the end of privacy or a new beginning?. NYU Sch. Law Public Law Res. Pap., 2012, 12–56.
    • (2012) NYU Sch. Law Public Law Res. Pap. , pp. 12-56
    • Rubinstein, I.1
  • 99
    • 84869425384 scopus 로고    scopus 로고
    • P2P data replication and trustworthiness for a JXTA-Overlay P2P system using fuzzy logic
    • Spaho, E., et al. P2P data replication and trustworthiness for a JXTA-Overlay P2P system using fuzzy logic. Appl. Soft Comput. 13:1 (2013), 321–328.
    • (2013) Appl. Soft Comput. , vol.13 , Issue.1 , pp. 321-328
    • Spaho, E.1
  • 100
    • 84861644982 scopus 로고    scopus 로고
    • Modeling a dynamic data replication strategy to increase system availability in cloud computing environments
    • Sun, D.-W., et al. Modeling a dynamic data replication strategy to increase system availability in cloud computing environments. J. Comput. Sci. Technol. 27:2 (2012), 256–272.
    • (2012) J. Comput. Sci. Technol. , vol.27 , Issue.2 , pp. 256-272
    • Sun, D.-W.1
  • 101
    • 84961361396 scopus 로고    scopus 로고
    • Comparison of K-Means clustering and statistical outliers in reducing medical datasets
    • In: Proceedings of International Conference on Science Engineering and Management Research (ICSEMR).
    • Santhanam, T, Padmavathi, M.S., 2014. Comparison of K-Means clustering and statistical outliers in reducing medical datasets. In: Proceedings of International Conference on Science Engineering and Management Research (ICSEMR).
    • (2014)
    • Santhanam, T.1    Padmavathi, M.S.2
  • 102
    • 85008062008 scopus 로고    scopus 로고
    • OFDM for flexible high-speed optical networks
    • Shieh, W., OFDM for flexible high-speed optical networks. J. Light Technol. 29:10 (2011), 1560–1577.
    • (2011) J. Light Technol. , vol.29 , Issue.10 , pp. 1560-1577
    • Shieh, W.1
  • 103
    • 77957933159 scopus 로고    scopus 로고
    • Preventing information leakage from indexing in the cloud
    • In: Proceedings of the IEEE 3rd International Conference on Cloud Computing (CLOUD).
    • Squicciarini, A., Sundareswaran, S., Lin, D, 2010. Preventing information leakage from indexing in the cloud. In: Proceedings of the IEEE 3rd International Conference on Cloud Computing (CLOUD).
    • (2010)
    • Squicciarini, A.1    Sundareswaran, S.2    Lin, D.3
  • 104
    • 46649083439 scopus 로고    scopus 로고
    • Efficient remote data possession checking in critical information infrastructures
    • Sebé, F., et al. Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20:8 (2008), 1034–1038.
    • (2008) IEEE Trans. Knowl. Data Eng. , vol.20 , Issue.8 , pp. 1034-1038
    • Sebé, F.1
  • 105
    • 46249103560 scopus 로고    scopus 로고
    • FPGA implementations of the DES and triple-DES masked against power analysis attacks
    • In: Proceedings of FPL’06 IEEE International Conference on Field Programmable Logic and Applications.
    • Standaert, F.-X., Rouvroy, G., Quisquater, J.J., 2006. FPGA implementations of the DES and triple-DES masked against power analysis attacks. In: Proceedings of FPL’06 IEEE International Conference on Field Programmable Logic and Applications.
    • (2006)
    • Standaert, F.-X.1    Rouvroy, G.2    Quisquater, J.J.3
  • 108
    • 84883221550 scopus 로고    scopus 로고
    • Big data visual analytics for exploratory earth system simulation analysis
    • Steed, C.A., et al. Big data visual analytics for exploratory earth system simulation analysis. Comput. Geosci. 61 (2013), 71–82.
    • (2013) Comput. Geosci. , vol.61 , pp. 71-82
    • Steed, C.A.1
  • 109
    • 84900453631 scopus 로고    scopus 로고
    • Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
    • Shamshirband, S., et al. Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J. Netw. Comput. Appl. 42 (2014), 102–117.
    • (2014) J. Netw. Comput. Appl. , vol.42 , pp. 102-117
    • Shamshirband, S.1
  • 111
    • 84875723860 scopus 로고    scopus 로고
    • A bee colony based optimization approach for simultaneous job scheduling and data replication in grid environments
    • Taheri, J., et al. A bee colony based optimization approach for simultaneous job scheduling and data replication in grid environments. Comput. Oper. Res. 40:6 (2013), 1564–1578.
    • (2013) Comput. Oper. Res. , vol.40 , Issue.6 , pp. 1564-1578
    • Taheri, J.1
  • 112
    • 84877885971 scopus 로고    scopus 로고
    • Clouds for scalable big data analytics
    • Talia, D., Clouds for scalable big data analytics. Computer 46:5 (2013), 98–101.
    • (2013) Computer , vol.46 , Issue.5 , pp. 98-101
    • Talia, D.1
  • 113
    • 84869398503 scopus 로고    scopus 로고
    • Big data security
    • Tankard, C., Big data security. Netw. Secur. 2012:7 (2012), 5–8.
    • (2012) Netw. Secur. , vol.2012 , Issue.7 , pp. 5-8
    • Tankard, C.1
  • 114
    • 84921806680 scopus 로고    scopus 로고
    • Big Data for All: Privacy and User Control in the Age of Analytics
    • Tene, O., Polonetsky, J., 2013. Big Data for All: Privacy and User Control in the Age of Analytics.
    • (2013)
    • Tene, O.1    Polonetsky, J.2
  • 115
    • 84880174298 scopus 로고    scopus 로고
    • DES, AES and Blowfish: symmetric key cryptography algorithms simulation based performance analysis
    • Thakur, J., Kumar, N., DES, AES and Blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. 1:2 (2011), 6–12.
    • (2011) Int. J. Emerg. Technol. Adv. Eng. , vol.1 , Issue.2 , pp. 6-12
    • Thakur, J.1    Kumar, N.2
  • 116
    • 84979048936 scopus 로고    scopus 로고
    • Toward Cloud-based Big Data Analytics
    • Talia, D., 2013. Toward Cloud-based Big Data Analytics.
    • (2013)
    • Talia, D.1
  • 117
    • 84879125644 scopus 로고    scopus 로고
    • Corporate governance of big data: Perspectives on value, risk, and cost
    • Tallon, P.P., Corporate governance of big data: Perspectives on value, risk, and cost. Computer 46:6 (2013), 32–38.
    • (2013) Computer , vol.46 , Issue.6 , pp. 32-38
    • Tallon, P.P.1
  • 118
    • 36549065119 scopus 로고    scopus 로고
    • Maintaining data integrity in a rural clinical trial
    • Van den Broeck, J., et al. Maintaining data integrity in a rural clinical trial. Clin. Trials 4:5 (2007), 572–582.
    • (2007) Clin. Trials , vol.4 , Issue.5 , pp. 572-582
    • Van den Broeck, J.1
  • 119
    • 84879200068 scopus 로고    scopus 로고
    • High volumes of event stream indexing and efficient multi-keyword searching for cloud monitoring
    • Wang, M., et al. High volumes of event stream indexing and efficient multi-keyword searching for cloud monitoring. Future Gener. Comput. Syst. 29:8 (2013), 1943–1962.
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.8 , pp. 1943-1962
    • Wang, M.1
  • 121
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • In Computer Security–ESORICS, Springer, Berlin Heidelberg
    • Wang, Q., Wang, C., Li, J., Ren, K., Lou, W., 2009. Enabling public verifiability and data dynamics for storage security in cloud computing. In Computer Security–ESORICS, Springer, Berlin Heidelberg, pp. 355–370.
    • (2009) , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 122
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the IEEE INFOCOM.
    • Wang, C., et al., 2010. Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the IEEE INFOCOM.
    • (2010)
    • Wang, C.1
  • 123
    • 84947278873 scopus 로고    scopus 로고
    • Erasure coding vs
    • replication: A quantitative comparison. In Peer-to-Peer Systems, Springer Berlin Heidelberg.
    • Weatherspoon, H., Kubiatowicz, J.D., 2002. Erasure coding vs. replication: A quantitative comparison. In Peer-to-Peer Systems, Springer Berlin Heidelberg, pp. 328–337.
    • (2002) , pp. 328-337
    • Weatherspoon, H.1    Kubiatowicz, J.D.2
  • 125
    • 84964833687 scopus 로고    scopus 로고
    • Network big data: a literature survey on stream data mining
    • Wu, Y., Network big data: a literature survey on stream data mining. J. Softw. 9:9 (2014), 2427–2434.
    • (2014) J. Softw. , vol.9 , Issue.9 , pp. 2427-2434
    • Wu, Y.1
  • 127
    • 84979065386 scopus 로고    scopus 로고
    • Privacy-preserving layer over map reduce on cloud. In: Proceedings of Second International Conference on Cloud and Green Computing (CGC).
    • Xuyun, Z., et al., 2012. Privacy-preserving layer over map reduce on cloud. In: Proceedings of Second International Conference on Cloud and Green Computing (CGC).
    • (2012)
    • Xuyun, Z.1
  • 128
    • 84877786158 scopus 로고    scopus 로고
    • A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud
    • Xuyun, Z., et al. A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Trans. Parallel Distrib. Syst. 24:6 (2013), 1192–1202.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.6 , pp. 1192-1202
    • Xuyun, Z.1
  • 129
    • 77949305252 scopus 로고    scopus 로고
    • Configuring clark-wilson integrity model to enforce flexible protection
    • In: Proceedings of IEEE CIS’09 International Conference on Computational Intelligence and Security.
    • Xu, Q., Liu, G., 2009. Configuring clark-wilson integrity model to enforce flexible protection. In: Proceedings of IEEE CIS’09 International Conference on Computational Intelligence and Security.
    • (2009)
    • Xu, Q.1    Liu, G.2
  • 130
    • 77958581901 scopus 로고    scopus 로고
    • Study on methods for data confidentiality and data integrity in relational database
    • In: Proceedings of the IEEE 3rd IEEE International Conference onComputer Science and Information Technology (ICCSIT).
    • Xu, L.-X., Sun, D., Liu, D., 2010. Study on methods for data confidentiality and data integrity in relational database. In: Proceedings of the IEEE 3rd IEEE International Conference onComputer Science and Information Technology (ICCSIT).
    • (2010)
    • Xu, L.-X.1    Sun, D.2    Liu, D.3
  • 131
    • 85119161640 scopus 로고    scopus 로고
    • ABSS: an attribute-based sanitizable signature for integrity of outsourced database with public cloud. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. ACM, San Antonio, Texas, USA.
    • Xu, L., et al., 2015. ABSS: an attribute-based sanitizable signature for integrity of outsourced database with public cloud. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. ACM, San Antonio, Texas, USA. pp. 167–169.
    • (2015) , pp. 167-169
    • Xu, L.1
  • 133
    • 84978940025 scopus 로고    scopus 로고
    • Discretizing numerical attributes in decision tree for big data analysis
    • In: Proceedings of IEEE International Conference on Data Mining Workshop (ICDMW).
    • Yiqun, Z., Yiu-ming, C., 2014. Discretizing numerical attributes in decision tree for big data analysis. In: Proceedings of IEEE International Conference on Data Mining Workshop (ICDMW).
    • (2014)
    • Yiqun, Z.1    Yiu-ming, C.2
  • 134
    • 74849107591 scopus 로고    scopus 로고
    • Digital image encryption algorithm based on chaos and improved DES. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, SMC.
    • Yun-Peng, Z., et al., 2009. Digital image encryption algorithm based on chaos and improved DES. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, SMC.
    • (2009)
    • Yun-Peng, Z.1
  • 135
    • 71749094178 scopus 로고    scopus 로고
    • Parallel k-means clustering based on mapreduce
    • In Cloud computing, Springer, Berlin Heidelberg.
    • Zhao, W., Ma, H., He, Q., 2009. Parallel k-means clustering based on mapreduce. In Cloud computing, Springer, Berlin Heidelberg, pp. 674–679.
    • (2009) , pp. 674-679
    • Zhao, W.1    Ma, H.2    He, Q.3
  • 136
    • 84871089045 scopus 로고    scopus 로고
    • A model-based approach for rfid data stream cleansing
    • In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management. ACM.
    • Zhao, Z., Ng, W., 2012. A model-based approach for rfid data stream cleansing. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management. ACM.
    • (2012)
    • Zhao, Z.1    Ng, W.2
  • 137
    • 77949301092 scopus 로고    scopus 로고
    • Strict integrity policy of biba model with dynamic characteristics and its correctness
    • In: Proceedings of IEEE International Conference on Computational Intelligence and Security, CIS’09.
    • Zhang, M. Strict integrity policy of biba model with dynamic characteristics and its correctness. In: Proceedings of IEEE International Conference on Computational Intelligence and Security, CIS’09.
    • Zhang, M.1
  • 138
    • 0141866718 scopus 로고    scopus 로고
    • A heuristic algorithm for solving hazardous materials distribution problems
    • Zografos, K.G., Androutsopoulos, K.N., A heuristic algorithm for solving hazardous materials distribution problems. Eur. J. Oper. Res. 152:2 (2004), 507–519.
    • (2004) Eur. J. Oper. Res. , vol.152 , Issue.2 , pp. 507-519
    • Zografos, K.G.1    Androutsopoulos, K.N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.