Biblio
“Analysis of information management and scheduling technology in hadoop”, Journal of Digital Information Management, vol. 12, no. 2, pp. 133 - 138, 2014.
, “An indirect security trust method based on credibility evaluation”, Journal of Digital Information Management, vol. 12, no. 2, pp. 139 - 150, 2014.
,