1 |
H. Hu, Y. Wen, T. S. Chua, X. Li, "Toward Scalable Systems for Big Data Anaqlytics: A Technology Tutorial", IEEE Access, vol. 2, pp. 652-687, 2014.
DOI
ScienceOn
|
2 |
P. Russom, "Big Data Analytics", TDWI Research Fourth Quarter, pp. 6, Dec. 2011.
|
3 |
V. Gadepally, J. Kepner. "Big data dimensional analysis", 2014 IEEE High Performance Extreme Computing Conference(HPEC) pp. 1-6, Sep. 2014.
|
4 |
Y. Demchenko, C. De Laat, P. Membrey, "Defining architecture components of the Big data Ecosystem", 2014 International conference on Collaboration Technologies and Systems(CTS), pp.104-112, May, 2014.
|
5 |
J. Manyika, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, A. H. Byers, "Big Data: The Next Frontier for Innovation, Competition and Productivity", Mckinsey Global Institute, pp. 1-137. 2011.
|
6 |
P. Shen, Y. Zhou, K. Chen, "A Probability based Subnet Selection Method for Hot Event Detection in Sina Weibo Microblogging", 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 1410-1413, Aug. 2013.
|
7 |
K. Chen, Y. Zhou, H. Zha, J. He, P. Shen, X. Yang, "Cost-Effective Node Monitoring for Online Hot Event Detection in Sina Weibo", In Proceedings of the 22nd international conference on World Wide Web, ACM. pp. 107-108, April. 2013.
|
8 |
D. Kempe, J. Klenberg, E. Tardos, "Maximizing the spread of influence through a social netowrk", In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 137-146, Aug. 2003.
|
9 |
K. M. P. Shrivastba, M. A. Rizvi, S. Singh, "Big Data Privacy Based on Differential Privacy a Hope for Big Data", 2014 International conference on Computational Intelligence and Communication Networks, pp. 776-781. Nov. 2014.
|
10 |
A. Katal, M. Wazid, R. H. Goudar, "Big data: Issues, challenges, tools and Good practices ", 2013 Sixth International Conference on Contemporary Computing(IC3), pp. 404-409, Aug. 2013.
|
11 |
Y. C. Jung. "Big Data revolution and media policy issues", KISDI Premium Report, Vol. 12, No. 2, pp. 1-22, 2012.
|
12 |
S. H. Kim, N. U. Kim, t. M. Chung, "Attribute Relationship Evaluation Methodology for Big Data Seucrity", 2013 International Conference on IT Convergence and Security(ICITCS), pp. 1-4, Dec. 2013.
|
13 |
S. Y. Son, "Big data, online marketing and privacy protection", KISDI Premium Report, Vol. 13, No. 1, pp.1-26, 2013.
|
14 |
M. Paryasto, A. Alamsyah, B. Rahardjo, Kuspriyanto, "Big-data security management issues", 2014 2nd International Conference on Information and Communication Technology(ICoICT), pp. 59-63, May, 2014.
|
15 |
J. T. Kim, B. J. Oh, J. Y. Park, "Standard Trends for the BigData Technologies", 2013 Electronics and Telecommunications Trends, Vol. 28, No. 1, pp. 92-99, 2013.
|