Logo

Data-Intensive Text Processing with MapReduce

Large book cover: Data-Intensive Text Processing with MapReduce

Data-Intensive Text Processing with MapReduce
by

Publisher: Morgan & Claypool Publishers
ISBN/ASIN: 1608453421
ISBN-13: 9781608453429
Number of pages: 175

Description:
This book focuses on MapReduce algorithm design, with an emphasis on text processing algorithms common in natural language processing, information retrieval, and machine learning. We introduce the notion of MapReduce design patterns, which represent general reusable solutions to commonly occurring problems across a variety of problem domains. This book not only intends to help the reader 'think in MapReduce', but also discusses limitations of the programming model as well.

Download or read it online for free here:
Download link
(1.7MB, PDF)

Similar books

Book cover: An Introduction to Relational Database TheoryAn Introduction to Relational Database Theory
by - BookBoon
This book introduces the theory of relational databases, focusing on the application of that theory to the design of computer languages that properly embrace it. The book covers different topics: Types, Variables, Operators, Relational Algebra, etc.
(16442 views)
Book cover: Temporal Database ManagementTemporal Database Management
by - Aalborg University
Topics covered: the semantics of temporal data, the design of data models and languages for temporal data, the design of databases expressed in terms of temporal data models as well as temporally enhanced design of conventional databases.
(4906 views)
Book cover: Data Mining and Knowledge Discovery in Real Life ApplicationsData Mining and Knowledge Discovery in Real Life Applications
by - InTech
This book presents different ways of theoretical and practical advances and applications of data mining in different promising areas. The book will serve as a Data Mining bible to show a right way for the students, researchers and practitioners.
(14359 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(18572 views)