P Bridge - Network Security, 2014
... Without question, we've entered an epoch defined by 'big data' (the term is used
to sum up very large, complex, rapidly-changing datasets) and there's no sign of
a slowdown. 1 So much big data is produced every second that ...
Y Zhao, X Zhang, Z Zhang, L Wang, Y Hu - 2014
GPU Accelerated Computation and Real-time Rendering of Cellular Automata Model for Spatial
Simulation | Yuan Zhao, Xinchang Zhang, Zhen Zhang, Lu Wang, Yueming Hu | Algorithms,
Cellular automata, Computer science, CUDA, nVidia, nVidia GeForce GTS 250, OpenGL, ...
C Li - 2014
... 2014 10 Page 11. Course Project □ 2 Programming Assignments, 15% each □
hands-on experience with big data, real application □ Must design, implement
(programming), and evaluate □ open to novel solutions Lecture 1 ...
Y Ishikawa, R Akahane-Yamada, M Kondo, C Smith… - Encyclopedia of Information …, 2014
An Interoperable ICT Educational Application for TOEIC Preparatory
Study: 10.4018/978-1-4666-5888-2.ch236:
M Santos-Trigo, E Suaste, P Figuerola - 2014
Technology and Tools Appropriation in Medical Practices: 10.4018/978-1-4666-5888-2.ch556:
A Smorkalov, M Fominykh, M Morozov - … Journal of Multimedia Data Engineering and …, 2014
... Complete Journal. $260.00 - $1,040.00 View Journal Pricing Options. InfoSci-OnDemand
Powered Search. Full-text search over 74,500 research articles and chapters. Related Articles.
A Hierarchical Security Model for Multimedia Big Data © 2014, 13 pp. ...
J Iparraguirre, CA Delrieux - International Journal of Multimedia Data Engineering …, 2014
... Complete Journal. $260.00 - $1,040.00 View Journal Pricing Options. InfoSci-OnDemand
Powered Search. Full-text search over 74,500 research articles and chapters. Related Articles.
A Hierarchical Security Model for Multimedia Big Data © 2014, 13 pp. ...
N Chah - 2014
... In such a context, this paper uses metadata and big data sources to delve into the American threat
perception of North Korean cyberspace. ... As a result, the use of big data and metadata technologies
reveal nuances in the American threat perception of North Korea. ...
C Kevorchian, C Gavrilescu, G Hurduzeu - 2014
Abstract The present paper analyses the current trends in the IT&C field, according to which
IT is delivered to the user as personalized, updated and secured service packages, at
reasonable costs. This new technology class is symbolically named Cloud Computing. ...
L Chithiray - 2014
A very clear upside of the mining boom was the favourable conditions for investment and
expansion of mining operations created by high demand and high commodity prices. The
downside, however, was that the benefits also masked inefficient work practices and their ...