Computer Science ›› 2016, Vol. 43 ›› Issue (9): 184-187.doi: 10.11896/j.issn.1002-137X.2016.09.036
Previous Articles Next Articles
TAO Lin-bo, SHEN Jian-jing, XUE Meng and CAI Li-gang
[1] Lin Wei-wei,Qi De-yu.Survey of Resource Scheduling in Cloud Computing [J].Computer Science,2012,9(10):1-6(in Chinese) 林伟伟,齐德昱.云计算资源调度研究综述[J].计算机科学,2012,9(10):1-6 [2] Hou Hong-feng,Wang Can,Wang Li-juan.Research onInformation Security Issues of Cloud Computing [J].Journal of Electronic Design Engineering,2012,0(22):60-62(in Chinese) 侯洪凤,王璨,王立娟.云计算信息安全问题探讨[J].电子设计与工程,2012,0(22):60-62 [3] Chowdhury A,Tripathi P.Enhancing Cloud Computing Reliabi-lity Using Efficient Scheduling by Providing Reliability as a Service[C]∥2014 International Conference on Parallel,Distri-buted and Grid Computing.2014:99-104 [4] Hua Bei,Zhong Cheng.The Privacy Preserving Technology in Data Mining[J].Microelectronics & Computer,2009(8):26-28(in Chinese) 华蓓,钟诚.数据挖掘中的隐私保护技术进展分析[J].微电子学与计算机,2009(8):26-28 [5] Marozzo F,Talia D,Trunfio P.A Cloud Framework for Parameter Sweeping Data Mining Applications[C]∥2011 Third IEEE International Conference on Cloud Computing Technology and Science.2011:367-374 [6] Yang Hang,Fong S.Countering the Concept-drift Problem inBig Data Using iOVFDT[C]∥2013 IEEE International Congress on Big Data.2013:126-132 [7] Ding Jing,Yang Shan-lin,Luo He,et al.Data Mining ServiceModel in Cloud Computer Environment[J].Computer Science,2012,9(6A):217-220(in Chinese) 丁静,杨善林,罗贺,等.云计算环境下的数据挖掘服务模式[J].计算机科学,2012,9(6A):217-220 [8] Wang Zhen-qi,Li Hai-long.Research of Massive Web Log Data Mining Based on Cloud Computing[C]∥2013 International Conference on Computational and Information Sciences.2013:591-594 [9] Dev H,Sen T,Basak M,et al.An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks[C]∥2012 SC Companion:High Performance Computing,Networking Storage and Analysis.2012:1106-1115 [10] Zheng Xian.Status and Development of Web Mining[J].Journal of Technology and Market,2013,0(3):64-65(in Chinese) 郑弦.Web挖掘的现状和展望[J].技术研发,2013,0(3):64-65 [11] Li Ling-juan,Zheng Shao-fei.Analysis of Data Mining Privacy Preserving Technology Based on Data Processing [J].Journal of Computer Technology and Development,2011,1(3):94-97(in Chinese) 李玲娟,郑少飞.基于数据处理的数据挖掘隐私保护技术分析[J].计算机技术与发展,2011,1(3):94-97 [12] He Yao,Wang Wen-qing,Xue Fei.Study of Massive Data Mining Based on Cloud Computing[J].Computer Technology and Development,2013,3(2):69-72(in Chinese) 贺瑶,王文庆,薛飞.基于云计算的海量数据挖掘研究[J].计算机技术与发展,2013,3(2):69-72 [13] Ding Yan,Yang Qing-ping,Qian Yu-ming.Architecture and Key Technology of a Data Mining Platform Based on Cloud Computing[J].ZTE Technology Journa,2013,9(1):53-57(in Chinese) 丁岩,杨庆平,钱煜明.基于云计算的数据挖掘平台架构及其关键技术研究[J].中兴通信技术,2013,9(1):53-57 [14] Abuhussein A,Bedi H,Shiva S.Evaluating Security and Privacy in Cloud Computing Services:A Stakeholder’s Perspective[C]∥The 7th International Conference for Internet Technology and Secured Transactions.2012:388-395 |
No related articles found! |
|