Biblio
“Analysis of information management and scheduling technology in hadoop”, Journal of Digital Information Management, vol. 12, no. 2, pp. 133 - 138, 2014.
, “An indirect security trust method based on credibility evaluation”, Journal of Digital Information Management, vol. 12, no. 2, pp. 139 - 150, 2014.
, “A SEIR model epidemic of virus on the online social network”, Journal of Digital Information Management, vol. 12, no. 2, pp. 102 - 107, 2014.
,