


default search action
IEEE Transactions on Big Data, Volume 5
Volume 5, Number 1, March 2019
- Qiang Yang:
State of the Journal. 1 - Bingsheng He, Yunji Chen
, Jingren Zhou:
Guest Editors' Introduction: Special Issue on Big Data Systems on Emerging Architectures. 2-3 - Qingchao Cai
, Hao Zhang
, Wentian Guo, Gang Chen, Beng Chin Ooi
, Kian-Lee Tan, Weng-Fai Wong
:
MemepiC: Towards a Unified In-Memory Big Data Management System. 4-17 - Maziar Goudarzi
:
Heterogeneous Architectures for Big Data Batch Processing in MapReduce Paradigm. 18-33 - Kun Wang
, Chenhan Xu
, Yan Zhang
, Song Guo
, Albert Y. Zomaya
:
Robust Big Data Analytics for Electricity Price Forecasting in the Smart Grid. 34-45 - Xunyun Liu
, Rajkumar Buyya
:
Performance-Oriented Deployment of Streaming Applications on Cloud. 46-59 - Shlomi Dolev
, Patricia Florissi, Ehud Gudes, Shantanu Sharma
, Ido Singer:
A Survey on Geographically Distributed Big-Data Processing Using MapReduce. 60-80 - Zhen Jia, Wanling Gao, Yingjie Shi, Sally A. McKee, Zhenyan Ji, Jianfeng Zhan, Lei Wang, Lixin Zhang:
Understanding Processors Design Decisions for Data Analytics in Homogeneous Data Centers. 81-94 - Jonathon Edstrom, Dongliang Chen
, Yifu Gong, Jinhui Wang
, Na Gong
:
Data-Pattern Enabled Self-Recovery Low-Power Storage System for Big Video Data. 95-105
Volume 5, Number 2, June 2019
- Milad Makkie
, Xiang Li
, Shannon Quinn
, Binbin Lin, Jieping Ye, Geoffrey Mon
, Tianming Liu
:
A Distributed Computing Platform for fMRI Big Data Analytics. 109-119 - Shuhui Jiang
, Yu Kong
, Yun Fu
:
Deep Geo-Constrained Auto-Encoder for Non-Landmark GPS Estimation. 120-133 - Mustafa H. Hajeer
, Dipankar Dasgupta:
Handling Big Data Using a Data-Aware HDFS and Evolutionary Clustering Technique. 134-147 - Zhao Zhang
, Lei Jia, Mingbo Zhao
, Guangcan Liu
, Meng Wang
, Shuicheng Yan:
Kernel-Induced Label Propagation by Mapping for Semi-Supervised Classification. 148-165 - Scott Bruce
, Zeda Li
, Hsiang-Chieh Yang
, Subhadeep Mukhopadhyay
:
Nonparametric Distributed Learning Architecture for Big Data: Algorithm and Applications. 166-179 - Bo Lyu, Yanhua Li
, Jie Fu
, Andrew C. Trapp
, Haiyong Xie, Yong Liao:
Scalable User-Substation Assignment with Big Data from Power Grids. 209-222 - Weihua Li
, Quan Bai
, Minjie Zhang:
SIMiner: A Stigmergy-Based Model for Mining Influential Nodes in Dynamic Social Networks. 223-237 - Chenxi Qiu
, Haiying Shen
, Liuhua Chen
:
Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage. 238-251 - Matthew Malensek
, Walid Budgaga, Ryan Stern, Shrideep Pallickara, Sangmi Lee Pallickara:
Trident: Distributed Storage, Analysis, and Exploration of Multidimensional Phenomena. 252-265 - Mingyang Zhang
, Haohao Fu, Yong Li
, Sheng Chen
:
Understanding Urban Dynamics From Massive Mobile Traffic Data. 266-278 - Hongjian Wang
, Huaxiu Yao, Daniel Kifer
, Corina Graif, Zhenhui Li:
Non-Stationary Model for Crime Rate Inference Using Modern Urban Data. 180-194 - Daniel Zhang, Dong Wang
, Nathan Vance
, Yang Zhang, Steven Mike
:
On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications. 195-208
Volume 5, Number 3, September 2019
- Kim-Kwang Raymond Choo, Mauro Conti, Ali Dehghantanha:
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1. 279-281 - Jemal H. Abawajy
, Andrei Kelarev
:
Iterative Classifier Fusion System for the Detection of Android Malware. 282-292 - Abdelrahman AlMahmoud
, Ernesto Damiani
, Hadi Otrok, Yousof Al-Hammadi
:
Spamdoop: A Privacy-Preserving Big Data Platform for Collaborative Spam Detection. 293-304 - Waqas Haider, Jiankun Hu
, Yi Xie, Xinghuo Yu
, Qianhong Wu
:
Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization. 305-316 - MingJian Tang
, Mamoun Alazab
, Yuxiu Luo:
Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies. 317-329 - Hui Cui
, Robert H. Deng
, Yingjiu Li
, Guowei Wu:
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud. 330-342 - Xiaofeng Ding
, Li Wang, Zhiyuan Shao
, Hai Jin
:
Efficient Recommendation of De-Identification Policies Using MapReduce. 343-354 - Jun Feng
, Laurence T. Yang
, Guohui Dai, Wei Wang
, Deqing Zou
:
A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment. 355-367 - Weixian Liao
, Changqing Luo
, Sergio Salinas
, Pan Li
:
Efficient Secure Outsourcing of Large-Scale Convex Separable Programming for Big Data. 368-378 - Deepak Puthal
, Xindong Wu
, Surya Nepal
, Rajiv Ranjan
, Jinjun Chen
:
SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams. 379-392 - Zheng Yan
, Lifang Zhang, Wenxiu Ding
, Qinghua Zheng:
Heterogeneous Data Storage Management with Deduplication in Cloud Computing. 393-407 - Arezou Soltani Panah
, Ali Yavari
, Ron G. van Schyndel, Dimitrios Georgakopoulos, Xun Yi
:
Context-Driven Granular Disclosure Control for Internet of Things Applications. 408-422
Volume 5, Number 4, December 2019
- Kim-Kwang Raymond Choo
, Mauro Conti
, Ali Dehghantanha:
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2. 423-424 - Aniello Castiglione
, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis
, Gianluca Roscigno
:
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud. 425-438 - Elias Bou-Harb
, Martin Husák
, Mourad Debbabi
, Chadi Assi
:
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. 439-453 - Binfeng Wang, Jun Zhang, Zili Zhang
, Lei Pan
, Yang Xiang
, Dawen Xia
:
Noise-Resistant Statistical Traffic Classification. 454-466 - Félix Iglesias
, Tanja Zseby
:
Pattern Discovery in Internet Background Radiation. 467-480 - Nour Moustafa
, Jill Slay, Gideon Creech:
Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks. 481-494 - Bin Cao
, Jianwei Zhao, Zhihan Lv
, Xin Liu:
3D Terrain Multiobjective Deployment Optimization of Heterogeneous Directional Sensor Networks in Security Monitoring. 495-505 - Weiren Yu
, Jianxin Li, Md. Zakirul Alam Bhuiyan, Richong Zhang
, Jinpeng Huai:
Ring: Real-Time Emerging Anomaly Monitoring System Over Text Streams. 506-519 - Zhiyong Zhang
, Ranran Sun
, Xiaoxue Wang, Changwei Zhao:
A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks. 520-528 - Zheng Xu
, Lin Mei
, Zhihan Lv
, Chuanping Hu, Xiangfeng Luo, Hui Zhang, Yunhuai Liu:
Multi-Modal Description of Public Safety Events Using Surveillance and Social Media. 529-539 - Zhiqiang Wan
, Haibo He:
AnswerNet: Learning to Answer Questions. 540-549 - Yichen Ding, Yanhua Li
, Xun Zhou
, Zhuojie Huang, Simin You, Jun Luo:
Sampling Big Trajectory Data for Traversal Trajectory Aggregate Query. 550-563 - Peng Zhang
, Xiang Shi, Samee U. Khan
:
QuantCloud: Enabling Big Data Complex Event Processing for Quantitative Finance Through a Data-Driven Execution. 564-575 - Yanhua Li
, Guanxiong Liu, Zhi-Li Zhang, Jun Luo, Fan Zhang:
CityLines: Designing Hybrid Hub-and-Spoke Transit System with Urban Big Data. 576-587 - Shengkang Yu, Xi Li
, Xueyi Zhao, Zhongfei Zhang, Fei Wu
, Jingdong Wang
, Yueting Zhuang, Xuelong Li
:
A Bilinear Ranking SVM for Knowledge Based Relation Prediction and Classification. 588-600

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.