Data-Intensive Text Processing with MapReduce
by Jimmy Lin, Chris Dyer
Publisher: Morgan & Claypool Publishers 2010
ISBN/ASIN: 1608453421
ISBN-13: 9781608453429
Number of pages: 175
Description:
This book focuses on MapReduce algorithm design, with an emphasis on text processing algorithms common in natural language processing, information retrieval, and machine learning. We introduce the notion of MapReduce design patterns, which represent general reusable solutions to commonly occurring problems across a variety of problem domains. This book not only intends to help the reader 'think in MapReduce', but also discusses limitations of the programming model as well.
Download or read it online for free here:
Download link
(1.7MB, PDF)
Similar books
![Book cover: Database design with UML and SQL](images/3506.jpg)
by Tom Jewett
This text is a teaching resource for an introductory database class at California State University Long Beach, Department of Computer Engineering and Computer Science. It is also designed to be used as an individual self-study tutorial.
(20116 views)
![Book cover: Data Modeling Techniques for Data Warehousing](images/1857.jpg)
by Chuck Ballard, et al. - IBM Redbooks
It covers data modeling techniques for data warehousing, within the context of the overall data warehouse development process. The process of data warehouse modeling, including the steps required before and after the actual modeling, is discussed.
(22714 views)
![Book cover: Database Systems and Structures](images/4287.jpg)
by Osmar R. Zaiane - Simon Fraser University
An introduction to data models, database systems, the structure and use of relational database systems and relational languages, indexing and storage management, query processing in relational databases, and the theory of relational database design.
(16492 views)
![Book cover: Forensic Analysis of Database Tampering](images/1544.jpg)
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21569 views)