Search Results

There are 76356 results for: content related to: Secure and efficient integration of big data for multi-cells based on micro images

  1. Secure transmission for big data based on nested sampling and coprime sampling with spectrum efficiency

    Security and Communication Networks

    Volume 8, Issue 14, 25 September 2015, Pages: 2447–2456, Junjie Chen, Qilian Liang and Jie Wang

    Article first published online : 10 MAY 2013, DOI: 10.1002/sec.785

  2. Big data, bigger dilemmas: A critical review

    Journal of the Association for Information Science and Technology

    Volume 66, Issue 8, August 2015, Pages: 1523–1545, Hamid Ekbia, Michael Mattioli, Inna Kouper, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkata Ratandeep Suri, Andrew Tsou, Scott Weingart and Cassidy R. Sugimoto

    Article first published online : 31 DEC 2014, DOI: 10.1002/asi.23294

  3. You have free access to this content
    Security in big data

    Security and Communication Networks

    Volume 8, Issue 14, 25 September 2015, Pages: 2383–2385, Qilian Liang, Jian Ren, Jing Liang, Baoju Zhang, Yiming Pi and Chenglin Zhao

    Article first published online : 17 AUG 2015, DOI: 10.1002/sec.1332

  4. Big data clone detection using classical detectors: an exploratory study

    Journal of Software: Evolution and Process

    Volume 27, Issue 6, June 2015, Pages: 430–464, Jeffrey Svajlenko, Iman Keivanloo and Chanchal K. Roy

    Article first published online : 29 SEP 2014, DOI: 10.1002/smr.1662

  5. Anomaly detection in big data from UWB radars

    Security and Communication Networks

    Volume 8, Issue 14, 25 September 2015, Pages: 2469–2475, Wei Wang, Xin Zhou, Baoju Zhang and Jiasong Mu

    Article first published online : 22 MAR 2013, DOI: 10.1002/sec.745

  6. You have free access to this content
    ‘BIG DATA’, THE ‘INTERNET OF THINGS’ AND THE ‘INTERNET OF SIGNS’

    Intelligent Systems in Accounting, Finance and Management

    Volume 20, Issue 1, January/March 2013, Pages: 53–65, Daniel E. O'Leary

    Article first published online : 26 MAR 2013, DOI: 10.1002/isaf.1336

  7. Big Data with Cloud Computing: an insight on the computing environment, MapReduce, and programming frameworks

    Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery

    Volume 4, Issue 5, September/October 2014, Pages: 380–409, Alberto Fernández, Sara del Río, Victoria López, Abdullah Bawakid, María J. del Jesus, José M. Benítez and Francisco Herrera

    Article first published online : 29 SEP 2014, DOI: 10.1002/widm.1134

  8. Nursing Needs Big Data and Big Data Needs Nursing

    Journal of Nursing Scholarship

    Volume 47, Issue 5, September 2015, Pages: 477–484, Patricia Flatley Brennan and Suzanne Bakken

    Article first published online : 19 AUG 2015, DOI: 10.1111/jnu.12159

  9. Big Data and Industrial Ecology

    Journal of Industrial Ecology

    Volume 19, Issue 2, April 2015, Pages: 205–210, Ming Xu, Hua Cai and Sai Liang

    Article first published online : 12 MAR 2015, DOI: 10.1111/jiec.12241

  10. BIG DATA: NEW SCIENCE, NEW CHALLENGES, NEW DIALOGICAL OPPORTUNITIES

    Zygon®

    Volume 50, Issue 3, September 2015, Pages: 569–582, Michael Fuller

    Article first published online : 12 AUG 2015, DOI: 10.1111/zygo.12187

  11. Big Data and Business Intelligence: Debunking the Myths

    Global Business and Organizational Excellence

    Volume 35, Issue 1, November/December 2015, Pages: 23–34, Chris Kimble and Giannis Milolidakis

    Article first published online : 7 OCT 2015, DOI: 10.1002/joe.21642

  12. Time Series Data Mining

    Big Data, Data Mining, and Machine Learning: Value Creation for Business Leaders and Practitioners

    Jared Dean, Pages: 149–161, 2014

    Published Online : 2 MAY 2014, DOI: 10.1002/9781118691786.ch8

  13. Big Data's Effects on BI Efforts in the Cloud

    Business Intelligence and the Cloud

    Michael S. Gendron, Pages: 149–170, 2014

    Published Online : 4 APR 2014, DOI: 10.1002/9781118915240.ch8

  14. DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1494–1508, Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha and Xiaoling Wang

    Article first published online : 9 SEP 2014, DOI: 10.1002/sec.1098

  15. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  16. You have full text access to this OnlineOpen article
    No big data without small data: learning health care systems begin and end with the individual patient

    Journal of Evaluation in Clinical Practice

    Volume 21, Issue 6, December 2015, Pages: 1014–1017, José A. Sacristán and Tatiana Dilla

    Article first published online : 31 MAR 2015, DOI: 10.1111/jep.12350

  17. The Big (Data) Bang: Policy, Prospects, and Challenges

    Review of Policy Research

    Volume 31, Issue 4, July 2014, Pages: 304–310, Connie L. McNeely and Jong-on Hahm

    Article first published online : 16 JUL 2014, DOI: 10.1111/ropr.12082

  18. From A to Google: How Technology Is Impacting Information and Leadership

    Journal of Leadership Studies

    Volume 8, Issue 2, Summer 2014, Pages: 41–45, Brian Davenport

    Article first published online : 22 OCT 2014, DOI: 10.1002/jls.21329

  19. A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2836–2849, Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong and Xiaohua Jia

    Article first published online : 13 FEB 2015, DOI: 10.1002/sec.1208

  20. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Article first published online : 18 MAY 2011, DOI: 10.1002/sec.328