Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
ZTE Communications
1009-6868
2016 Issue 2
Open Innovation of Big Data
WUGansha;
..............
page:2-6
A Commentary on the“Big”of Big Data
LILian;
..............
page:7-10
2015 nian zhong guo fa ming zhuan li shen qing liang shou ci tu po bai wan jian deng
..............
page:10-10
Big Data Analytic Platforms:Changing the Priority from Scalability to Performance
ZHENGWeimin;,CHENWenguang;
..............
page:11-13
Typical Big Data Computing Frameworks
ZHAOSheng;,JIANGJinlei;
..............
page:14-18
In-Memory Data-Object Management in Distributed Data Processing System
ZHANGXiong;,LULu;,SHIXuanhua;
..............
page:19-22
guang xian dao hu bao lei chai chu wang su zhi tong 10g
..............
page:22-22
Data Object Cache in Spark Computing Engine
CHENKang;,WANGBin;,FENGLing;
..............
page:23-27
Load Balanced Data Migration Algorithm for Big Data Storage Systems
LITiantian;,WANGZhi;,SONGJie;
..............
page:28-32
Topic Network-Based Media Big Data Analysis and Structural Description
ZHANG Baopeng;,PENG Jinye;,FAN Jianping;
..............
page:33-37
BC-BSP:A BSP-Based High Scalable Parallel Iterative Graph Processing System
LIU Enfu;,LENG Fangling;,BAO Yubin;
..............
page:38-43
Matrix of Attack Hypothesis Faced in Big Data Security
PANZhuting;
..............
page:44-48
quan qiu gong gong yun shi chang gui mo 2016 nian jiang da 2040 yi mei yuan deng
..............
page:48-48
Application-Driven Big Data Mining
LITao;,LIUZheng;,ZHOUQifeng;
..............
page:49-52
Big Data Security and Privacy Protection
FAN Yuan;
..............
page:53-56
The General Theory of Security:Blind Confrontation in Offensive and Defensive
YANGYixian;,NIUXinxin;
..............
page:57-60
Development Trend of Integration Business Technology in the M-ICT Era
LU Ping;,DONG Zhenjiang;,YANG Yong;
..............
page:61-66