期刊文献+

云计算中MapReduce技术研究 被引量:9

MapReduce Technology of Cloud Computing
原文传递
导出
摘要 云计算是由并行计算、分布式计算和网格计算发展而来,MapReduce是云计算的核心技术之一,它为并行系统的数据处理提供了一个简单、优雅的解决方案,其主要目的是为了大型集群的系统能在大数据集上进行并行工作,并用于大规模数据的并行运算。首先介绍了云计算与MapReduce的相关知识,然后对目前MapReduce的国内外研究状况进行了介绍与评析,并总结了目前MapReduce模型的相关研究问题,最后进行总结并展望了未来发展的趋势。 Cloud computing is resulted from the development of parallel computing, distributed computing and grid computing, MapReduce, as a of the core technology of cloud computing, provides a simple, elegant solution for parallel data processing system, and thus makes the large cluster of systems work on large data sets in parallel, and also for parallel computing of large-scale data. This paper first describes the relevant knowledge of cloud computing and MapReduce, then analyzes and reviews, the current research situation of MapReduce, summarizes the current research issues of MapReduce model. Finally, it gives the summary and the future trend.
作者 王晟 赵壁芳
机构地区 富国银行 ASDI公司
出处 《通信技术》 2011年第12期159-161,共3页 Communications Technology
关键词 MapReduce技术 云计算应用 云计算 并行计算 MapReduce technology cloud computing application cloud computing parallel computing
  • 相关文献

参考文献25

二级参考文献142

共引文献2251

同被引文献62

  • 1杨博,赵鹏飞.推荐算法综述[J].山西大学学报(自然科学版),2011,34(3):337-350. 被引量:86
  • 2The Cloud Security Alliance.Security Guidance for Critical Areas of Focus in Cloud Computing V3.0[EB/OL].(2011-09-23)[2012-01-12].http://www.cloudsecurityalliance.org.
  • 3SCHNEIDER F,WALSH K,SIRER E.Nexus authorization logic(NAL):Design rationale and applications[J].ACM Transaction of Information Security,2011(06):1-28.
  • 4GUDE N,KOPONEN T.NOX:Towards an OperatingSystem for Networks[J].ACM SIGCOMM Computer Communication Review,2008(7):105-110.
  • 5MITCHELL N,WINSBOROUGH W.Design of a Role-based Trust-management Framework[J].IEEE Security and Privacy,2011(5):114-130.
  • 6ENGLAND P,LAMPSON B,MANFERDELLI J.A Trusted Open Platform[J].Communication of ACM,2009(6):193-206.
  • 7SYVERSON P,MICHAEL R,GOLDSCHLAG D.Private Web Browsing[J].Journal of Computer Security,2011(5):37-48.
  • 8O'MALLEY O, ZHANG K, RADIA S, et al. Hadoop Security Design[EB/OL]. (2009-1 O- 11) [2012-04-15]. http : //www.issues.apache.org/jira/browse/HADOOP-4487.
  • 9BECHERER A. Hadoop Security Design Just Add Kerberos? Really?[EB/OL]. (2011-04-20) [2012-04-18]. http: //www. isecpartners.com.
  • 10The Apache Software Foundation. Service Level Authorization Guide[EB/OL]. (2012-02-14) [2012-04- i 8]. http : //hadoop. apache.org/common/docs/stable/service_level_auth.html.

引证文献9

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部