Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The family of mapreduce and large-scale data processing systems
In the last two decades, the continuous increase of computational power has produced an
overwhelming flow of data which has called for a paradigm shift in the computing …
overwhelming flow of data which has called for a paradigm shift in the computing …
Scalable clustering algorithms for big data: A review
Clustering algorithms have become one of the most critical research areas in multiple
domains, especially data mining. However, with the massive growth of big data applications …
domains, especially data mining. However, with the massive growth of big data applications …
Graph based anomaly detection and description: a survey
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …
such as security, finance, health care, and law enforcement. While numerous techniques …
Data mining with big data
Big Data concern large-volume, complex, growing data sets with multiple, autonomous
sources. With the fast development of networking, data storage, and the data collection …
sources. With the fast development of networking, data storage, and the data collection …
Social influence analysis in large-scale networks
In large social networks, nodes (users, entities) are influenced by others for various reasons.
For example, the colleagues have strong influence on one's work, while the friends have …
For example, the colleagues have strong influence on one's work, while the friends have …
Copycatch: stop** group attacks by spotting lockstep behavior in social networks
How can web services that depend on user generated content discern fraudulent input by
spammers from legitimate input? In this paper we focus on the social network Facebook and …
spammers from legitimate input? In this paper we focus on the social network Facebook and …
Pegasus: A peta-scale graph mining system implementation and observations
In this paper, we describe PEGASUS, an open source peta graph mining library which
performs typical graph mining tasks such as computing the diameter of the graph, computing …
performs typical graph mining tasks such as computing the diameter of the graph, computing …
Gigatensor: scaling tensor analysis up by 100 times-algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the
predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the …
predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the …
MapReduce algorithms for big data analysis
K Shim - International workshop on databases in networked …, 2013 - Springer
As there is an increasing trend of applications being expected to deal with big data that
usually do not fit in the main memory of a single machine, analyzing big data is a …
usually do not fit in the main memory of a single machine, analyzing big data is a …
Slashburn: Graph compression and mining beyond caveman communities
Given a real world graph, how should we lay-out its edges? How can we compress it? These
questions are closely related, and the typical approach so far is to find clique-like …
questions are closely related, and the typical approach so far is to find clique-like …