合肥工业大学大数据模型(HACE原理)连续四月在IEEE电子图书馆被高频下载
IEEE电子图书馆(http://ieeexplore.ieee.org/xpl/browsePopular.jsp)的数据显示,由合肥工业大学DMiC研究团队学术带头人吴信东教授领衔发表在国际顶级期刊《IEEE Transactions on Knowledge and Data Engineering》(IEEE TKDE)2014 年第1 期上的题为“Data Mining with Big Data”的学术长文,在2013年12 月、2014 年1 月、2014 年2 月和2014年3月,已连续四个月被下载的次数均名列第一。
该文作为IEEE TKDE 期刊2014 年1 月的Highlight 文章,从数据挖掘角度出发提出了HACE 原理用以描述大数据的特征和大数据处理模型。这篇文章自2013年下半年在IEEE 的电子图书馆(快于纸质拷贝)正式发表以来,已经得到了国际同行的广泛关注。在所有IEEE 出版的文章中(包括所有年份、所有期刊和会议论文),这篇大数据文章已经连续四个月(见附件)被下载的次数均排第一。IEEE TKDE在2013年度的影响因子为1.892,是数据挖掘领域最具影响力的一份国际学术期刊。本文排名第一的下载量反映了该文在大数据和数据挖掘领域正在产生广泛的学术影响。
Xindong Wu(吴信东), Xingquan Zhu, Gong-Qing Wu(吴共庆), and Wei Ding, Data Mining with Big Data,IEEE Transactions on Knowledge and Data Engineering,26(2014), 1:97-107.文章网址:http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6547630
附件:2013年12月~2014年3月IEEE电子图书馆(IEEE XPlore)每月下载次数最多的前10名文章(信息来源:http://ieeexplore.ieee.org/xpl/browsePopular.jsp)
March 2014:
1. Data mining with big data. Xindong Wu; Xingquan Zhu; Gong-Qing Wu; Wei Ding. Knowledge and Data Engineering, IEEE Transactions on. Volume: 26 Issue: 1. Jan. 2014. Pages 97 - 107.
2. Localization Services for Online Common Operational Picture and Situation Awareness.Bjorkbom, M.; Timonen, J.; Yigitler, H.; Kaltiokallio, O.; Garcia, J.M.V.; Myrsky, M.; Saarinen, J.; Korkalainen, M.; Cuhac, C.; Jantti, R.; Virrankoski, R.; Vankka, J.; Koivo, H.N..Access, IEEE. Volume: 1. 2013. Pages 742 - 757.
3. Millimeter Wave Mobile Communications for 5G Cellular: It Will. Work!.Rappaport, T.S.; Shu Sun; Mayzus, R.; Hang Zhao; Azar, Y.; Wang, K.; Wong, G.N.; Schulz, J.K.; Samimi, M.; Gutierrez, F.. Access, IEEE. Volume: 1. 2013. Pages 335 - 349.
4. Five disruptive technology directions for 5G. Boccardi, F; Heath, R.W.; Lozano, A.; Marzetta, T.L.; Popovski, P. . Communications Magazine, IEEE. Volume: 52 Issue: 2. February 2014. Page(s): 74 - 80.
5. Cellular architecture and key technologies for 5G wireless communication networks. Cheng-Xiang Wang; Haider, F.; XiqiGao; Xiao-Hu You; Yang Yang; Dongfeng Yuan; Aggoune, H.; Haas, H.; Fletcher, S.; Hepsaydir, E.. Communications Magazine, IEEE. Volume: 52 Issue: 2. February 2014. Pages 122 - 130.
6. Security threats in cloud computing. Shaikh, F.B.; Haider, S.. Internet Technology and Secured Transactions (ICITST), 2011 International Conference for. 11-14 Dec. 2011. Pages 214 - 219.
7. Massive MIMO for next generation wireless systems. Larsson, E.; Edfors, O.; Tufvesson, F.; Marzetta, T.. Communications Magazine, IEEE. Volume: 52 Issue: 2. February 2014. Pages 186 - 195.
8. Compressed sensing. Donoho, D.L.. Information Theory, IEEE Transactions on. Volume: 52 Issue: 4. April 2006. Pages 1289 - 1306.
9. A tutorial on particle filters for online nonlinear/non-Gaussian. Bayesian tracking.Arulampalam, M.S.; Maskell, S.; Gordon, N.; Clapp, T.. Signal Processing, IEEE Transactions on. Volume: 50 Issue: 2. Feb 2002. Pages 174 - 188.
10. Real-World Neuroimaging Technologies. McDowell, K.; Chin-Teng Lin; Oie, K.S.; Tzyy-Ping Jung; Gordon, S.; Whitaker, K.W.; Shih-Yu Li; Shao-Wei Lu; Hairston, W.D..Access, IEEE. Volume: 1. 2013. Pages 131 - 149.
February 2014:
1. Data mining with big data. Xindong Wu; Xingquan Zhu; Gong-Qing Wu; Wei Ding. Knowledge and Data Engineering, IEEE Transactions on. Volume: 26 Issue: 1. Jan. 2014. Pages 97 - 107.
2. Millimeter Wave Mobile Communications for 5G Cellular: It Will Work!.Rappaport, T.S.; Shu Sun; Mayzus, R.; Hang Zhao; Azar, Y.; Wang, K.; Wong, G.N.; Schulz, J.K.; Samimi, M.;Gutierrez, F.. Access, IEEE. Volume: 1. 2013. Pages 335 - 349.
3. Localization Services for Online Common Operational Picture and Situation Awareness.Bjorkbom, M.; Timonen, J.; Yigitler, H.; et al.. Access, IEEE. Volume: 1. 2013. Pages 742 - 757.
4. Cloud computing-based forensic analysis for collaborative network security management system. Chen, Zhen; Han, Fuye; Cao, Junwei; Jiang, Xin; Chen, Shuo.Tsinghua Science and Technology. Volume: 18 Issue: 1. Feb. 2013. Pages 40 - 50.
5. Real-World Neuroimaging Technologies. McDowell, K.; Chin-Teng Lin; Oie, K.S.; Tzyy-Ping Jung; Gordon, S.; Whitaker, K.W.; Shih-Yu Li; Shao-Wei Lu; Hairston, W.D.. Access, IEEE Volume: 1. 2013. Pages 131 - 149.
6. Security threats in cloud computing. Shaikh, F.B.; Haider, S.. Internet Technology and Secured Transactions (ICITST), 2011 International Conference for. 11-14 Dec. 2011. Pages 214 - 219.
7. Compressed sensing. Donoho, D.L. Information Theory, IEEE Transactions on. Volume: 52 Issue: 4. April 2006. Pages 1289 - 1306.
8. Agent-Based Cloud Computing. KwangMongSim. Services Computing, IEEE Transactions on. Volume: 5 Issue: 4. Fourth Quarter 2012. Pages 564 - 577.
9. A Computational Approach to Edge Detection. Canny, John. Pattern Analysis and Machine Intelligence, IEEE Transactions on. Volume:
PAMI-8 Issue: 6. Nov. 1986. Pages 679 - 698.
10. A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking.Arulampalam, M.S.; Maskell, S.; Gordon, N.; Clapp, T.. Signal Processing, IEEE Transactions on. Volume: 50 Issue: 2. Feb 2002. Pages 174 - 188.
January 2014:
1. Data mining with big data. Xindong Wu; Xingquan Zhu; Gong-Qing Wu; Wei Ding. Knowledge and Data Engineering, IEEE Transactions on. Volume: 26 Issue: 1. Jan. 2014. Pages 97 - 107.
2. Millimeter Wave Mobile Communications for 5G Cellular: It Will Work!.Rappaport, T.S.; Shu Sun; Mayzus, R.; Hang Zhao; Azar, Y.; Wang, K.; Wong, G.N.; Schulz, J.K.; Samimi, M.; Gutierrez, F.. Access, IEEE. Volume: 1. 2013. Pages 335 - 349.
3. Cloud computing-based forensic analysis for collaborative network security management system. Chen, Zhen; Han, Fuye; Cao, Junwei; Jiang, Xin; Chen, Shuo.Tsinghua Science and Technology. Volume: 18 Issue: 1. Feb. 2013. Pages 40 - 50.
4. Security threats in cloud computing. Shaikh, F.B.; Haider, S.. Internet Technology and Secured Transactions (ICITST), 2011 International Conference for. 11-14 Dec. 2011. Pages 214 - 219.
5. Real-World Neuroimaging Technologies. McDowell, K.; Chin-Teng Lin; Oie, K.S.; Tzyy-Ping Jung; Gordon, S.; Whitaker, K.W.; Shih-Yu Li; Shao-Wei Lu; Hairston, W.D..Access, IEEE. Volume: 1. 2013. Pages 131 - 149.
6. gent-Based Cloud Computing. KwangMongSim. Services Computing, IEEE Transactions on. Volume: 5 Issue: 4. Fourth Quarter 2012. Pages 564 - 577.
7. Compressed sensing. Donoho, D.L.. Information Theory, IEEE Transactions on. Volume: 52 Issue: 4. April 2006. Pages 1289 - 1306.
8. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks.Zargar, S.T.; Joshi, J.; Tipper, D.. Communications Surveys & Tutorials, IEEE. Volume: 15 Issue: 4. Fourth Quarter 2013. Pages 2046 - 2069.
9. Privacy Preserving Data Sharing With Anonymous ID Assignment. Dunning, L.A.; Kresman, R.. Information Forensics and Security, IEEE Transactions on. Volume: 8 Issue: 2. Feb. 2013. Pages 402 - 413.
10. A Computational Approach to Edge Detection. Canny, John. Pattern Analysis and Machine Intelligence, IEEE Transactions on. Volume: PAMI-8 Issue: 6. Nov. 1986. Pages 679 - 698.
December 2013:
1. Data mining with big data. Xindong Wu; Xingquan Zhu; Gong-Qing Wu; Wei Ding. Knowledge and Data Engineering, IEEE Transactions on. Volume: 26 Issue: 1. Jan. 2014. Pages 97 - 107.
2. Millimeter Wave Mobile Communications for 5G Cellular: It Will Work!.Rappaport, T.S.; Shu Sun; Mayzus, R.; Hang Zhao; Azar, Y.; Wang, K.; Wong, G.N.; Schulz, J.K.; Samimi, M.; Gutierrez, F.. Access, IEEE. Volume: 1. 2013. Pages 335 - 349.
3. Security threats in cloud computing. Shaikh, F.B.; Haider, S.. Internet Technology and Secured Transactions (ICITST), 2011 International Conference for. 11-14 Dec. 2011. Pages 214 - 219.
4. Real-World Neuroimaging Technologies. McDowell, K.; Chin-Teng Lin; Oie, K.S.; Tzyy-Ping Jung; Gordon, S.; Whitaker, K.W.; Shih-Yu Li; Shao-Wei Lu; Hairston, W.D..Access, IEEE. Volume: 1. 2013. Pages 131 - 149.
5. Compressed sensing. Donoho, D.L.. Information Theory, IEEE Transactions on. Volume: 52 Issue: 4. April 2006. Pages 1289 - 1306.
6. Agent-Based Cloud Computing. KwangMongSim. Services Computing, IEEE Transactions on. Volume: 5 Issue: 4. Fourth Quarter 2012. Pages 564 - 577.
7. A Computational Approach to Edge Detection. Canny, John. Pattern Analysis and Machine Intelligence, IEEE Transactions on. Volume: PAMI-8 Issue: 6. Nov. 1986. Pages 679 - 698.
8. A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking.Arulampalam, M.S.; Maskell, S.; Gordon, N.; Clapp, T.. Signal Processing, IEEE Transactions on. Volume: 50 Issue: 2. Feb 2002. Pages 174 - 188.
9. Big data: A review. Sagiroglu, S.; Sinanc, D.. Collaboration Technologies and Systems (CTS), 2013 International Conference on. 20-24 May 2013. Pages 42 - 47.
10. An Introduction To Compressive Sampling. Candes, E.J.; Wakin, M.B.. Signal Processing Magazine, IEEE. Volume: 25 Issue: 2. March 2008. Pages 21 - 30.