[1] |
杜磊 . 骚扰电话何时休[J]. 计算机与网络, 2015,41(3):1.
|
|
DU L . Harassing phone calls[J]. Computer and Network, 2015,41(3):1.
|
[2] |
漆晨曦 . 立足小数据基础的电信企业大数据分析应用发展策略[J]. 电信科学, 2014,30(10): 15-20.
|
|
QI C X . Analysis and application development strategy of tele-com enterprise big data based on small data[J]. Telecommuni-cations Science, 2014,30(10): 15-20.
|
[3] |
董师师, 黄哲学 . 随机森林理论浅析[J]. 集成技术, 2013(1): 1-7.
|
|
DONG S S , HUANG Z X . A brief theoretical overview of random forests[J]. Journal of Integration Technology, 2013(1): 1-7.
|
[4] |
黄勇军, 冯明, 丁圣勇 ,等. 电信运营商大数据发展策略探讨[J]. 电信科学, 2013,29(3): 6-11.
|
|
HUANG Y J , FENG M , DING S Y ,et al. Discussion on the de-volpment strategy of telecom operators[J]. Telecommunications Science, 2013,29(3): 6-11.
|
[5] |
卢卫, 陆希玉 . 4G时代移动互联网的发展趋势[J]. 电信科学, 2014,30(5): 51-54.
|
|
LU W , LU X Y . Mobile internet trends in 4G era[J]. Telecom-munications Science, 2014,30(5): 51-54.
|
[6] |
张艳芳, 黄群 . 基于Bootstrap方法的样本相等性检验[J]. 防灾科学学院学报, 2008,10(1): 95-98.
|
|
ZHANG Y F , HUANG Q . Tests based on bootstrap method for the equality of distribution[J]. Journal of Institute of Disaster-preven-tion Science and Technology, 2008,10(1): 95-98.
|
[7] |
杜海涛, 张峰, 高曼颖 ,等. 基于话音识别的骚扰电话呼叫检测技术分析[J]. 电信工程技术与标准化, 2014(12): 5-9.
|
|
DU H T , ZHANG F , GAO M Y ,et al. Analysis and experi-ment of disturbing call detection technology based on speech recognition[J]. Telecom Engineering Technics and Standardization, 2014(12): 5-9.
|
[8] |
胡坤, 刘镝, 刘明辉 ,等. 大数据的安全理解及应对策略研究[J]. 电信科学, 2014,30(2): 112-117,122.
|
|
HU K , LIU D , LIU M H ,et al. Research on security connotation and response strategies for big data[J]. Telecommunications Science, 2014,30(2): 112-117,122.
|