1 |
吕雪峰, 陈刚 . 电信企业网运体制改革探索. 通信企业管理, 2014(2): 64~66 Lv X G , Chen G . The structural reform exploration of telecommunication enterprise network maintenance. Enterprise Management, 2014,(2): 64~66
|
2 |
施雪华, 陈勇 . 大部制部门内部协调的意义、困境与途径. 深圳大学学报(人文社会科学版), 2012,29(3): 90~95 Shi X H , Chen Y . Significance, dilemmas and solutions: internal coordination in the super-ministry system. Journal of Shenzhen University(Humanities & Social Sciences), 2012,29(3): 90~95
|
3 |
黎娟 . 通信网网管支撑系统运行质量管控的研究与实现. 电信科学, 2013,29(12): 139~144 Li J . Research and implementation on quality control of network management support system. Telecommunications Science, 2013,29(12): 139~144
|
4 |
郑哲渊, 刘渊 . 面向大规模告警数据的高性能信息筛选系统. 计算机工程与设计, 2014,35(2): 435~439 Zheng Z Y , Liu Y . High performance information filtering system for large-scale alarm data. Computer Engineering and Design, 2014,35(2): 435~439
|
5 |
叶长根 . 基于业务平台综合网管的全业务流程监控设计思路和解决方案. 电信技术, 2014(3): 64~68 Ye C G . Design ideas and solutions of all business process monitoring based on integrated services management platform. Telecommunications Technology, 2014(3): 64~68
|
6 |
包劼 . 大数据,大变化,大未来—大数据支撑驱动电信运营商转型发展. 通信世界, 2013(20): 49~50 Bao J . Big data, big change, great future-telecom operators transformation development be driven by big data. Communications World, 2013(20): 49~50
|
7 |
Rijmenam M V . How telecom companies can improve their results with big data ,2014
|
8 |
Ignasi P O , Pere B , Xenofontas D . FaRNet: fast recognition of high-dimensional patterns from big network traffic data. Computer Networks, 2013, 57(18):3897~3913
|
9 |
Liu J , Li T T , Cheng G , et al. Mining and modeling the dynamic patterns of service providers in cellular data network based on big data analysis. China Communications, 2013, 10(12):25~36
|
10 |
陈为, 沈则潜, 陶煜波 等. 数据可视化. 北京: 电子工业出版社, 2013 Chen W , Shen Z Q , Tao Y B , et al. Data Visualization. Beijing: Publishing House of Electronics Industry of China, 2013
|
11 |
雷璟 . 安全桌面虚拟化信息系统设计与实现. 电讯技术, 2014,54(5): 637~643 Lei J . Information system design and implementation based on security desktop virtualization technology. Telecommunication Engineering, 2014,54(5): 637~643
|
12 |
Liao X J , Zhang M , Kong S Q . Experience of constructing virtual desktop. WIT Transactions on Information and Communication Technologies, 2014(51): 293~296
|