共 50 条
- [31] Research on the effectiveness evaluation of big data in combat simulation [J]. PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON BIG DATA RESEARCH (ICBDR 2018), 2018, : 70 - 75
- [32] A big data analytics approach to combat telecommunication vulnerabilities [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2363 - 2374
- [33] Leveraging Big Data to Combat Terrorism in Developing Countries [J]. 2017 CONFERENCE ON INFORMATION COMMUNICATION TECHNOLOGY AND SOCIETY (ICTAS), 2017,
- [34] A big data analytics approach to combat telecommunication vulnerabilities [J]. Cluster Computing, 2017, 20 : 2363 - 2374
- [35] The Application of Big Data Technology in the Field of Combat Simulation Data Management [J]. THEORY, METHODOLOGY, TOOLS AND APPLICATIONS FOR MODELING AND SIMULATION OF COMPLEX SYSTEMS, PT III, 2016, 645 : 566 - 573
- [36] Efficiently algorithm based on itemsets-lattice and bitmap index for finding frequent itemsets [J]. Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2008, 28 (02): : 26 - 34
- [37] An efficiently algorithm based on itemsets-lattice and bitmap index for finding frequent itemsets [J]. FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS, 2005, 3614 : 420 - 429
- [38] Selection and pruning algorithms for bitmap index selection problem using data mining [J]. DATA WAREHOUSING AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2007, 4654 : 221 - +
- [40] Big data security access control algorithm based on memory index acceleration in WSNs [J]. EURASIP Journal on Wireless Communications and Networking, 2020