Author of the publication

An Empirical Approach to Detection of Topic Bubbles in Tweets.

, , and . BDC, page 31-40. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation and tuning for MapReduce computing in Hadoop distributed file system., , , and . INDIN, page 62-68. IEEE, (2015)Dynamic deadline-constraint scheduler for Hadoop YARN., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1-8. IEEE, (2017)Entropy-Based Model for Estimating Veracity of Topics from Tweets., , and . ICCCI (2), volume 10449 of Lecture Notes in Computer Science, page 417-427. Springer, (2017)Real-Time Hybrid Intrusion Detection System Using Apache Storm., , and . HPCC/CSS/ICESS, page 1436-1441. IEEE, (2015)Identifying Sensitive Data Items within Hadoop., , , and . HPCC/CSS/ICESS, page 1308-1313. IEEE, (2015)An efficient and secure information retrieval framework for content centric networks., , and . J. Parallel Distributed Comput., (2017)Efficient structuring of data in big data., , and . ICDSE, page 1-5. IEEE, (2014)Veracity of information in twitter data: A case study., , and . BigComp, page 129-136. IEEE Computer Society, (2016)Dynamic Workload Balancing for Hadoop MapReduce., , , and . BDCloud, page 56-62. IEEE Computer Society, (2014)An Empirical Approach to Detection of Topic Bubbles in Tweets., , and . BDC, page 31-40. IEEE Computer Society, (2015)