Research progress and trend of cyberspace big search
FANG Bin-xing;JIA Yan;LI Ai-ping;YIN Li-hua;School of Computer Science;Beijing University of Posts and Telecommunications;School of Computer Science;National University of Defense Technology;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:1-8
Survey on the search of Internet of Things
GAO Yun-quan;LI Xiao-yong;FANG Bin-xing;Key Laboratory of Trustworthy Distributed Computing and Service;Ministry of Education;Beijing University of Posts and Telecommunications;School of Computer Science and Technology;Anhui University of Technology;
..............page:57-76
Exploratory search on big data
DU Xiao-yong;CHEN Jun;CHEN Yue-guo;MOE Key Laboratory of Data Engineering and Knowledge Engineering;Renmin University of China;School of Information;Renmin University of China;
..............page:77-88
Smart search in smart enterprise
CHEN Yang-bin;LI Qing;ZHUANG Yue-ting;Department of Computer Science;Multimedia Software Engineering Research Center;City University of HongKong;College of Computer Science and Technology;Zhejiang University;
..............page:89-96
Trajectory big data: data, applications and techniques
XU Jia-jie;ZHENG Kai;CHI Ming-min;ZHU Yang-yong;YU Xiao-hui;ZHOU Xiao-fang;School of Computer Science and Technology;Soochow University;Collaborative Innovation Center of Novel Software Technology and Industrialization;Dept.of Computer Science;Shanghai Key Laboratory of Data Science;School of Computer Science and Technology;Shandong University;
..............page:97-105
..............page:106-113
Efficient scheme for user’s trajectory privacy
LI Feng-hua;ZHANG Cui;NIU Ben;LI Hui;HUA Jia-feng;SHI Guo-zhen;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;State Key Laboratory of Integrated Services Networks;Xidian University;Department of Information Security;Beijing Electronic Science and Technology Institute;
..............page:114-123
..............page:124-130
Preserving data privacy in social recommendation
LIU Shu-shu;LIU An;ZHAO Lei;LIU Guan-feng;LI Zhi-xu;ZHENG Kai;ZHOU Xiao-fang;School of Computer Science and Technology;Soochow University;Collaborative Innovation Center of Novel Software Technology and Industrialization;
..............page:131-138
Cache privacy protection strategy in content centric networking
ZHU Yi;MI Zheng-kun;WANG Wen-nai;College of Communications & Information Engineering;Nanjing University of Posts and Telecommunications;School of Computer Science and Communication Engineering;Jiangsu University;Key Laboratory of Broadband Wireless Communication and Sensor Network Technology;Ministry of Education;Nanjing University of Posts and Telecommunications;
..............page:139-150
Bloom filter-based lightweight private matching scheme
WAN Sheng;HE Yuan-yuan;LI Feng-hua;NIU Ben;LI Hui;WANG Xin-yu;State Key Laboratory of Integrated Services Networks;Xidian University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;Department of Information Security;Beijing Electronic Science and Technology Institute;
..............page:151-162
..............page:163-171
..............page:172-177
..............page:178-189
..............page:190-199
..............page:200-211
..............page:212-222