IDENTIFYING AND ANALYZING THE TRANSIENT AND PERMANENT BARRIERS FOR BIG DATA
暂无分享,去创建一个
Mervat Adib Bamiah | Sarfraz Nawaz Brohi | Muhammad Nawaz Brohi | S. Brohi | M. N. Brohi | M. Bamiah
[1] Wei Guo,et al. An efficient transportation architecture for big data movement , 2013, 2013 9th International Conference on Information, Communications & Signal Processing.
[2] Divesh Srivastava,et al. Data quality: The other face of Big Data , 2014, 2014 IEEE 30th International Conference on Data Engineering.
[3] T. K. Das,et al. BIG Data Analytics: A Framework for Unstructured Data Analysis , 2013 .
[4] Madeline Gregory. Strategies for Implementing Big Data Analytics , 2013 .
[5] Ravindra S. Hegadi,et al. A novel data security framework using E-MOD for big data , 2015, 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE).
[6] Ping Wang,et al. Real-Time Big Data Processing Framework: Challenges and Solutions , 2015 .
[7] Yangyong Zhu,et al. The Challenges of Data Quality and Data Quality Assessment in the Big Data Era , 2015, Data Sci. J..
[8] Yong Xiang,et al. Protection of Big Data Privacy , 2016, IEEE Access.
[9] Minoru Uehara. Split File Model for Big Data in Low Throughput Storage , 2013, 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems.
[10] Feng Luo,et al. Accelerating big data analytics on HPC clusters using two-level storage , 2017, Parallel Comput..
[11] Paolo Papotti,et al. BigDansing: A System for Big Data Cleansing , 2015, SIGMOD Conference.
[12] Chunming Gao,et al. A social network model for big data privacy preserving and accountability assurance , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[13] Aniket Mahanti,et al. Comparative performance analysis of high-speed transfer protocols for big data , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[14] Evelyn Ruppert. Who Owns Big Data , 2015 .
[15] Josep Domingo-Ferrer,et al. Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics , 2015, ArXiv.
[16] Muhammad Shiraz,et al. Big Data: Survey, Technologies, Opportunities, and Challenges , 2014, TheScientificWorldJournal.
[17] Ion Stoica,et al. Blink and It's Done: Interactive Queries on Very Large Data , 2012, Proc. VLDB Endow..
[18] nbspAbdullah Al-Shomrani,et al. Big Data Security and Privacy Challenges , 2018 .
[19] Changxiao Zhao,et al. Novel group key transfer protocol for big data security , 2015, 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
[20] Mohamed Ben Ahmed,et al. Age of Big Data and Smart Cities: Privacy Trade-Off , 2014, ArXiv.
[21] Günther Pernul,et al. Trust and Big Data: A Roadmap for Research , 2014, 2014 25th International Workshop on Database and Expert Systems Applications.
[22] J. Alberto Espinosa,et al. Big Data: Issues and Challenges Moving Forward , 2013, 2013 46th Hawaii International Conference on System Sciences.
[23] Murtaza Haider,et al. Beyond the hype: Big data concepts, methods, and analytics , 2015, Int. J. Inf. Manag..
[24] K U Jaseena,et al. ISSUES , CHALLENGES , AND SOLUTIONS : BIG DATA MINING , 2014, NETCOM 2014.
[25] Carlos Serrão,et al. Security and Privacy Issues of Big Data , 2016, Web Services.