Linked e-resources

Details

Intro
Preface
Organization
Contents - Part II
Contents - Part I
Big Data Management and Applications
Research on the Realization Path and Application of a Data Governance System Based on Data Architecture
1 Introduction
2 Research Status and Development of Data Governance
3 Functional Composition of Data Architecture
3.1 The Method of Integrating Heterogeneous Data with Internal and External Centralized Data Management
3.2 Data Security Classification, Data Right Confirmation and Authorization Methods
3.3 Basic Composition and Form of the Data Architecture

3.4 Data Governance System Supported by Data Architecture
4 Understanding the Data Architecture Supporting the Data Governance System
4.1 The Impact of Data on Human Civilization - Recognizing the Importance of Data
4.2 Comparison Between Data and Material - Similarity and Particularity of Data and Material
4.3 Comparison of Data and Information
the Difference Between Data and Information Determines the Difference in Research Data Governance Methods
4.4 The Relationship Between Data and Applications - the Systematicness, Integrity, Relevance and Essence of Data

5 Implementation Path of the Data Governance System Supported by the Data Architecture
5.1 Distinguish the Information System and Data System, and Develop the Data System by Using the Data-Oriented Software Engineering Method
5.2 Unify the Database of the Existing Information System, Build a Data System and Crack the "Data Island"
5.3 The Separation of Data Management and Use is Adopted to Simplify the Complexity of Data and Business

5.4 The Public Key Infrastructure of the Domestic Commercial Key Algorithm is Used to Realize Data Right Confirmation, Data Ownership Authorization and Data Protection
5.5 Data Architecture Supports the Construction of a Data Governance System and Solves Data Governance Problems in a Package
5.6 Application Example of Data Governance System Based on Data Architecture in County New Smart City
6 Conclusion
References
Data Quality Identification Model for Power Big Data
1 Introduction
2 Background and Related Works
2.1 Related Works
2.2 Related Technologies

3 Problem Definition
4 Proposed Approach
4.1 Data Quality Identification Architecture
4.2 Data Preprocessing and Grouping
4.3 Data Augmentation
4.4 Tri-Training Based Detection
5 Experiments
5.1 Training Data and Baselines
5.2 Analysis
6 Conclusion
References
Data Security and Privacy
Effective and Lightweight Defenses Against Website Fingerprinting on Encrypted Traffic
1 Introduction
2 Background and Related Work
2.1 WF Attacks
2.2 WF Defense
3 Threat Model
4 The Propose TED
4.1 Overview of TED
4.2 Similar Scale Traces Clustering

Browse Subjects

Show more subjects...

Statistics

from
to
Export