Life beyond big data: governing with little analytics
暂无分享,去创建一个
[1] Itzhak Benenson,et al. The Data Revolution: Big Data, Open Data, Data Infrastructures and their Consequences. By Rob Kitchin, London: Sage, 2014. , 2016 .
[2] David Stuart,et al. The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences , 2015, Online Inf. Rev..
[3] Andra Giurgiu,et al. No Place to Hide – Edward Snowden, the NSA and the Surveillance State , 2015 .
[4] Vernon W. Cisney,et al. Biopower and the Avalanche of Printed Numbers , 2015 .
[5] swright. Privacy and Security: A modern and transparent legal framework , 2015 .
[6] Andrew Hoskins,et al. How we think: digital media and contemporary technogenesis , 2014 .
[7] Malhar Anjaria,et al. A novel sentiment analysis of social networks using supervised learning , 2014, Social Network Analysis and Mining.
[8] David M. Berry,et al. Critical Theory and the Digital , 2014 .
[9] William E. Connolly,et al. A World of Becoming , 2011, International Dialogue.
[10] Glenn Greenwald,et al. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State , 2014 .
[11] Prateek Singh,et al. Cloud Computing and Big Data Analytics , 2013 .
[12] Yadira Espinal. Viktor Mayer-Schonberger and Kenneth Cukier, Big Data: A Revolution That Will Transform How We Live, Work and Think , 2013 .
[13] Ju Wang,et al. Research on the Opinion Mining System for Massive Social Media Data , 2013, NLPCC.
[14] Louise Amoore,et al. The Politics of Possibility: Risk and Security Beyond Probability , 2013 .
[15] Reza Akbarinia,et al. Fast and Exact Mining of Probabilistic Data Streams , 2013, ECML/PKDD.
[16] Shintaro Okazaki,et al. Extracting Collective Trends from Twitter Using Social-Based Data Mining , 2013, ICCCI.
[17] M. Savage,et al. Reassembling Social Science Methods: The Challenge of Digital Devices , 2013 .
[18] L. Parisi. Contagious Architecture: Computation, Aesthetics, and Space , 2013 .
[19] Venu Madhav Kuthadi. A New Data Stream Mining Algorithm for Interestingness-Rich Association Rules , 2013, J. Comput. Inf. Syst..
[20] Melnned M. Kantardzic. Big Data Analytics , 2013, Lecture Notes in Computer Science.
[21] Spyros Kotoulas,et al. Scalable Nonmonotonic Reasoning over RDF Data Using MapReduce , 2012, SSWS+HPCSW@ISWC.
[22] Alexander Galloway,et al. The Interface Effect , 2012 .
[23] S. Singh,et al. Big Data analytics , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).
[24] D. Boyd,et al. CRITICAL QUESTIONS FOR BIG DATA , 2012 .
[25] M. Goede. Speculative Security: The Politics of Pursuing Terrorist Monies , 2012 .
[26] John Elder,et al. Practical Text Mining and Statistical Analysis for Non-structured Text Data Applications , 2012 .
[27] Alexander Horne,et al. The Intelligence and Security Committee , 2011 .
[28] Louise Amoore,et al. Data Derivatives , 2011 .
[29] Donald MacKenzie,et al. How to Make Money in Microseconds , 2011 .
[30] D. M. Berry,et al. The Philosophy of Software , 2011 .
[31] David M. Berry,et al. The Philosophy of Software: Code and Mediation in the Digital Age , 2011 .
[32] Nitesh V. Chawla,et al. Market basket analysis with networks , 2011, Social Network Analysis and Mining.
[33] M. DePristo,et al. The Genome Analysis Toolkit: a MapReduce framework for analyzing next-generation DNA sequencing data. , 2010, Genome research.
[34] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[35] Henrik Loodin,et al. The politics of life itself Biomedicine, power, and subjectivity in the twenty-first century , 2009 .
[36] A. Fontana,et al. Security, Territory, Population , 2009 .
[37] Viktor Mayer-Schönberger,et al. Delete: The Virtue of Forgetting in the Digital Age , 2009 .
[38] Sanjay Ghemawat,et al. MapReduce: simplified data processing on large clusters , 2008, CACM.
[39] William H. Inmon,et al. Tapping into Unstructured Data: Integrating Unstructured Data and Textual Analytics into Business Intelligence , 2007 .
[40] D. Marron. ‘Lending by numbers’: credit scoring and the constitution of risk within American consumer credit , 2007 .
[41] Graham D. Burchell,et al. Security, Territory, Population: Lectures at the College de France 1977-1978 , 2007 .
[42] N. K. Hayles. My Mother Was a Computer: Digital Subjects and Literary Texts , 2005 .
[43] Beate Porst,et al. A Reusable Platform for Building Sovereign Information Sharing Applications , 2004 .
[44] K. Pearson,et al. Henri Bergson: Key Writings , 2002 .
[45] Margaret H. Dunham,et al. Data Mining: Introductory and Advanced Topics , 2002 .
[46] D. Sparti. Making up People , 2001 .
[47] J. Crary. Suspensions of Perception: Attention, Spectacle, and Modern Culture , 2001 .
[48] Xindong Wu,et al. Large scale data mining based on data partitioning , 2001, Appl. Artif. Intell..
[49] Heikki Mannila,et al. Finding interesting rules from large sets of discovered association rules , 1994, CIKM '94.
[50] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[51] M. Boden. The Creative Mind , 1991 .
[52] P. Guttorp,et al. The Taming of Chance. , 1992 .
[53] N. Rose,et al. Governing economic life , 1990 .
[54] L. Daston. Classical Probability in the Enlightenment , 1988 .
[55] B. Latour. The pasteurization of France , 1988 .
[56] F. Guattari,et al. A Thousand Plateaus: Capitalism and Schizophrenia , 1980 .
[57] W. J. Fisher. MATTER AND MEMORY. , 1914, Science.