Logo

Data-Intensive Text Processing with MapReduce

Large book cover: Data-Intensive Text Processing with MapReduce

Data-Intensive Text Processing with MapReduce
by

Publisher: Morgan & Claypool Publishers
ISBN/ASIN: 1608453421
ISBN-13: 9781608453429
Number of pages: 175

Description:
This book focuses on MapReduce algorithm design, with an emphasis on text processing algorithms common in natural language processing, information retrieval, and machine learning. We introduce the notion of MapReduce design patterns, which represent general reusable solutions to commonly occurring problems across a variety of problem domains. This book not only intends to help the reader 'think in MapReduce', but also discusses limitations of the programming model as well.

Download or read it online for free here:
Download link
(1.7MB, PDF)

Similar books

Book cover: Database design with UML and SQLDatabase design with UML and SQL
by
This text is a teaching resource for an introductory database class at California State University Long Beach, Department of Computer Engineering and Computer Science. It is also designed to be used as an individual self-study tutorial.
(20116 views)
Book cover: Data Modeling Techniques for Data WarehousingData Modeling Techniques for Data Warehousing
by - IBM Redbooks
It covers data modeling techniques for data warehousing, within the context of the overall data warehouse development process. The process of data warehouse modeling, including the steps required before and after the actual modeling, is discussed.
(22714 views)
Book cover: Database Systems and StructuresDatabase Systems and Structures
by - Simon Fraser University
An introduction to data models, database systems, the structure and use of relational database systems and relational languages, indexing and storage management, query processing in relational databases, and the theory of relational database design.
(16492 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21569 views)