Last update: Fri Mar 23 02:20:06 MDT 2018
Top |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Zhu:2012:OTM,
author = "Huafei Zhu and Hong Xiao",
title = "Optimal Trust Mining and Computing on Keyed
{MapReduce}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7159",
pages = "143--150",
year = "2012",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-28166-2_14",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Wed Dec 19 15:25:19 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-28166-2_14/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-28166-2",
book-URL = "http://www.springerlink.com/content/978-3-642-28166-2",
fjournal = "Lecture Notes in Computer Science",
}
Related entries
- Computing,
7132(0)32,
7132(0)197,
7134(0)34,
7134(0)67,
7134(0)168,
7134(0)189,
7136(0)1,
7136(0)40,
7150(0)148,
7154(0)212,
7155(0)1,
7155(0)5,
7155(0)113,
7155(0)211,
7155(0)234,
7155(0)417,
7155(0)481,
7155(0)502,
7156(0)209,
7156(0)333,
7156(0)385,
7165(0)54,
7184(0)14,
7184(0)282,
7193(0)65,
7196(0)53,
7198(0)130,
7199(0)64
- MapReduce,
7185(0)48
- Mining,
7131(0)2,
7135(0)179,
7155(0)201,
7156(0)375,
7162(0)41,
7181(0)154,
7181(0)166,
7182(0)232,
7185(0)176
- Optimal,
7129(0)122,
7129(0)179,
7135(0)57,
7150(0)161,
7158(0)147,
7165(0)89,
7168(0)170,
7181(0)92,
7191(0)155
- Trust,
7159(0)75,
7170(0)1,
7170(0)6,
7170(0)22,
7170(0)28,
7170(0)175,
7187(0)19,
7187(0)122,
7198(0)27