


default search action
IEEE Transactions on Big Data, Volume 5
Volume 5, Number 1, March 2019
- Qiang Yang:

State of the Journal. 1 - Bingsheng He, Yunji Chen

, Jingren Zhou:
Guest Editors' Introduction: Special Issue on Big Data Systems on Emerging Architectures. 2-3 - Qingchao Cai

, Hao Zhang
, Wentian Guo, Gang Chen, Beng Chin Ooi
, Kian-Lee Tan, Weng-Fai Wong
:
MemepiC: Towards a Unified In-Memory Big Data Management System. 4-17 - Maziar Goudarzi

:
Heterogeneous Architectures for Big Data Batch Processing in MapReduce Paradigm. 18-33 - Kun Wang

, Chenhan Xu
, Yan Zhang
, Song Guo
, Albert Y. Zomaya
:
Robust Big Data Analytics for Electricity Price Forecasting in the Smart Grid. 34-45 - Xunyun Liu

, Rajkumar Buyya
:
Performance-Oriented Deployment of Streaming Applications on Cloud. 46-59 - Shlomi Dolev

, Patricia Florissi, Ehud Gudes, Shantanu Sharma
, Ido Singer:
A Survey on Geographically Distributed Big-Data Processing Using MapReduce. 60-80 - Zhen Jia, Wanling Gao, Yingjie Shi, Sally A. McKee, Zhenyan Ji, Jianfeng Zhan, Lei Wang, Lixin Zhang:

Understanding Processors Design Decisions for Data Analytics in Homogeneous Data Centers. 81-94 - Jonathon Edstrom, Dongliang Chen

, Yifu Gong, Jinhui Wang
, Na Gong
:
Data-Pattern Enabled Self-Recovery Low-Power Storage System for Big Video Data. 95-105
Volume 5, Number 2, June 2019
- Milad Makkie

, Xiang Li
, Shannon Quinn
, Binbin Lin, Jieping Ye, Geoffrey Mon
, Tianming Liu
:
A Distributed Computing Platform for fMRI Big Data Analytics. 109-119 - Shuhui Jiang

, Yu Kong
, Yun Fu
:
Deep Geo-Constrained Auto-Encoder for Non-Landmark GPS Estimation. 120-133 - Mustafa H. Hajeer

, Dipankar Dasgupta:
Handling Big Data Using a Data-Aware HDFS and Evolutionary Clustering Technique. 134-147 - Zhao Zhang

, Lei Jia, Mingbo Zhao
, Guangcan Liu
, Meng Wang
, Shuicheng Yan:
Kernel-Induced Label Propagation by Mapping for Semi-Supervised Classification. 148-165 - Scott Bruce

, Zeda Li
, Hsiang-Chieh Yang
, Subhadeep Mukhopadhyay
:
Nonparametric Distributed Learning Architecture for Big Data: Algorithm and Applications. 166-179 - Bo Lyu, Yanhua Li

, Jie Fu
, Andrew C. Trapp
, Haiyong Xie, Yong Liao:
Scalable User-Substation Assignment with Big Data from Power Grids. 209-222 - Weihua Li

, Quan Bai
, Minjie Zhang:
SIMiner: A Stigmergy-Based Model for Mining Influential Nodes in Dynamic Social Networks. 223-237 - Chenxi Qiu

, Haiying Shen
, Liuhua Chen
:
Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage. 238-251 - Matthew Malensek

, Walid Budgaga, Ryan Stern, Shrideep Pallickara, Sangmi Lee Pallickara:
Trident: Distributed Storage, Analysis, and Exploration of Multidimensional Phenomena. 252-265 - Mingyang Zhang

, Haohao Fu, Yong Li
, Sheng Chen
:
Understanding Urban Dynamics From Massive Mobile Traffic Data. 266-278 - Hongjian Wang

, Huaxiu Yao, Daniel Kifer
, Corina Graif
, Zhenhui Li:
Non-Stationary Model for Crime Rate Inference Using Modern Urban Data. 180-194 - Daniel Zhang, Dong Wang

, Nathan Vance
, Yang Zhang, Steven Mike
:
On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications. 195-208
Volume 5, Number 3, September 2019
- Kim-Kwang Raymond Choo, Mauro Conti, Ali Dehghantanha:

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1. 279-281 - Jemal H. Abawajy

, Andrei Kelarev
:
Iterative Classifier Fusion System for the Detection of Android Malware. 282-292 - Abdelrahman AlMahmoud

, Ernesto Damiani
, Hadi Otrok, Yousof Al-Hammadi
:
Spamdoop: A Privacy-Preserving Big Data Platform for Collaborative Spam Detection. 293-304 - Waqas Haider, Jiankun Hu

, Yi Xie, Xinghuo Yu
, Qianhong Wu
:
Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization. 305-316 - MingJian Tang

, Mamoun Alazab
, Yuxiu Luo:
Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies. 317-329 - Hui Cui

, Robert H. Deng
, Yingjiu Li
, Guowei Wu:
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud. 330-342 - Xiaofeng Ding

, Li Wang, Zhiyuan Shao
, Hai Jin
:
Efficient Recommendation of De-Identification Policies Using MapReduce. 343-354 - Jun Feng

, Laurence T. Yang
, Guohui Dai, Wei Wang
, Deqing Zou
:
A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment. 355-367 - Weixian Liao

, Changqing Luo
, Sergio Salinas
, Pan Li
:
Efficient Secure Outsourcing of Large-Scale Convex Separable Programming for Big Data. 368-378 - Deepak Puthal

, Xindong Wu
, Surya Nepal
, Rajiv Ranjan
, Jinjun Chen
:
SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams. 379-392 - Zheng Yan

, Lifang Zhang, Wenxiu Ding
, Qinghua Zheng:
Heterogeneous Data Storage Management with Deduplication in Cloud Computing. 393-407 - Arezou Soltani Panah

, Ali Yavari
, Ron G. van Schyndel, Dimitrios Georgakopoulos, Xun Yi
:
Context-Driven Granular Disclosure Control for Internet of Things Applications. 408-422
Volume 5, Number 4, December 2019
- Kim-Kwang Raymond Choo

, Mauro Conti
, Ali Dehghantanha:
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2. 423-424 - Aniello Castiglione

, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis
, Gianluca Roscigno
:
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud. 425-438 - Elias Bou-Harb

, Martin Husák
, Mourad Debbabi
, Chadi Assi
:
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. 439-453 - Binfeng Wang, Jun Zhang, Zili Zhang

, Lei Pan
, Yang Xiang
, Dawen Xia
:
Noise-Resistant Statistical Traffic Classification. 454-466 - Félix Iglesias

, Tanja Zseby
:
Pattern Discovery in Internet Background Radiation. 467-480 - Nour Moustafa

, Jill Slay, Gideon Creech:
Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks. 481-494 - Bin Cao

, Jianwei Zhao, Zhihan Lv
, Xin Liu:
3D Terrain Multiobjective Deployment Optimization of Heterogeneous Directional Sensor Networks in Security Monitoring. 495-505 - Weiren Yu

, Jianxin Li, Md. Zakirul Alam Bhuiyan, Richong Zhang
, Jinpeng Huai:
Ring: Real-Time Emerging Anomaly Monitoring System Over Text Streams. 506-519 - Zhiyong Zhang

, Ranran Sun
, Xiaoxue Wang, Changwei Zhao:
A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks. 520-528 - Zheng Xu

, Lin Mei
, Zhihan Lv
, Chuanping Hu, Xiangfeng Luo, Hui Zhang, Yunhuai Liu:
Multi-Modal Description of Public Safety Events Using Surveillance and Social Media. 529-539 - Zhiqiang Wan

, Haibo He:
AnswerNet: Learning to Answer Questions. 540-549 - Yichen Ding, Yanhua Li

, Xun Zhou
, Zhuojie Huang, Simin You, Jun Luo:
Sampling Big Trajectory Data for Traversal Trajectory Aggregate Query. 550-563 - Peng Zhang

, Xiang Shi, Samee U. Khan
:
QuantCloud: Enabling Big Data Complex Event Processing for Quantitative Finance Through a Data-Driven Execution. 564-575 - Yanhua Li

, Guanxiong Liu, Zhi-Li Zhang, Jun Luo, Fan Zhang:
CityLines: Designing Hybrid Hub-and-Spoke Transit System with Urban Big Data. 576-587 - Shengkang Yu, Xi Li

, Xueyi Zhao, Zhongfei Zhang, Fei Wu
, Jingdong Wang
, Yueting Zhuang, Xuelong Li
:
A Bilinear Ranking SVM for Knowledge Based Relation Prediction and Classification. 588-600

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














