{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:26:07Z","timestamp":1763663167134,"version":"build-2065373602"},"reference-count":56,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750165","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"71-76","source":"Crossref","is-referenced-by-count":15,"title":["A reference architecture for big data solutions introducing a model to perform predictive analytics using big data technology"],"prefix":"10.1109","author":[{"given":"Bas","family":"Geerdink","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"A Model for the Big Data Era-Data-centric Architecture Is Becoming ' Fashionable Again","year":"2011","author":"joshi","key":"35"},{"journal-title":"Business Research Methods","year":"2007","author":"bryman en","key":"36"},{"journal-title":"Big Data Reference Architecture","year":"2012","author":"soares","key":"33"},{"journal-title":"Big\" Data Architecture","year":"2012","author":"anuganti","key":"34"},{"key":"39","article-title":"An introduction to software architecture","author":"garlan en","year":"1994","journal-title":"School of Computer Science"},{"journal-title":"Basics of Qualitative Research Grounded Theory Procedures and Techniques","year":"2008","author":"corbin en","key":"37"},{"journal-title":"Pattern-Oriented Software Architecture","year":"1996","author":"buschmann","key":"38"},{"key":"43","article-title":"Architectural patterns revisited-A pattern language","author":"avgeriou","year":"2005","journal-title":"10th European Conference on Pattern Languages of Programs"},{"journal-title":"Berkshire","article-title":"ArchiMate 2 0 specification","year":"2012","key":"42"},{"key":"41","first-page":"8","article-title":"Principles in an enterprise architecture context","author":"proper","year":"2011","journal-title":"Journal of Enterprise Architecture"},{"journal-title":"IT Architecture-Essential Practice for IT Business Solutions","year":"2010","author":"beijer","key":"40"},{"key":"22","article-title":"Big data-Principles and best practices of scalable realtime data systems","author":"marz en","year":"2013","journal-title":"Manning Publications CO"},{"key":"23","first-page":"1","article-title":"Leveraging the capabilities of service-oriented decision support systems putting analytics and big data in the cloud","author":"demirkan en","year":"2012","journal-title":"Decision Support Systems"},{"journal-title":"Demystifying Big Data A Practical Guide to Transforming the Business of Government","year":"2012","key":"24"},{"journal-title":"Sunnyvale","article-title":"Apache hadoop the big data refinery","year":"2012","key":"25"},{"journal-title":"FUJITSU Technology Solutions GmbH","article-title":"Solution approaches for big data","year":"2013","key":"26"},{"journal-title":"Big Data Analytics Future Architectures Skills and Roadmaps for the CIO","year":"2011","author":"carter","key":"27"},{"journal-title":"Information Management and Big Data A Reference architectu'Re","year":"2013","key":"28"},{"journal-title":"SAS 9 2 Intelligence Platform Overview","year":"2010","key":"29"},{"journal-title":"The Origins of 'Big Data' An Etymological Detective Story\/","year":"2013","author":"lohr","key":"3"},{"journal-title":"That 'Internet of Things' Thing","year":"2009","author":"ashton","key":"2"},{"journal-title":"Big Data Just Beginning to Explode","year":"2012","key":"1"},{"key":"7","article-title":"Architecting a big data platform for analytics","author":"ferguson","year":"2012","journal-title":"Intelligent Business Strategies"},{"journal-title":"Teradata Dayton Ohio","article-title":"Teradata unified data architecture-Give any user any analytic on' any data","year":"2013","key":"30"},{"journal-title":"3d Data Management Controlling Data Volume Velocity and Variety","year":"2001","author":"laney","key":"6"},{"journal-title":"Harness the Power of Big Data The IBM Big Data Platform","year":"2013","author":"zikopoulos","key":"32"},{"journal-title":"Big Data Bigger Opportunities Investing in Information and Analytics\"","year":"2013","key":"5"},{"journal-title":"Integrating Hadoop into Business Intelligence and Data Warehousing","year":"2013","author":"russom","key":"31"},{"journal-title":"Data Data Everywhere","year":"2010","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"},{"key":"8","article-title":"MapReduce simplified data processing on large clusters","author":"dean en","year":"2004","journal-title":"OSDI'04 Sixth Symposium on Operating System Design and Implementation"},{"key":"56","first-page":"509","article-title":"The relationship between organizational culture and the deployment of agile methods","author":"livari en","year":"2011","journal-title":"Information and Software Technology"},{"key":"19","doi-asserted-by":"crossref","DOI":"10.1109\/ICECCS.1998.706657","article-title":"The architecture tradeoff analysis method","author":"kazman","year":"1998","journal-title":"Proceedings of the Fourth IEEE International Conference on Engineering of Complex Computer Systems (ICECCS)"},{"key":"55","first-page":"1213","author":"dingsoyr","year":"2012","journal-title":"A Decade of Agile Methodologies Towards Explaining Agile Software Development the Journal of Systems and Software"},{"key":"17","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","article-title":"Design science in information systems research","volume":"28","author":"hevner","year":"2004","journal-title":"MIS Quarterly"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.11.009"},{"journal-title":"A Reference Architecture Primer","year":"2008","author":"muller","key":"15"},{"key":"16","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1002\/sys.20129","article-title":"The concept of reference architecture","volume":"13","author":"cloutier","year":"2010","journal-title":"Systems Engineering"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/240455.240463"},{"journal-title":"Developing A Big Data Application for Data Exploration and Discovery","year":"2012","author":"cheung","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.172"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(01)00702-0"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.1999.809891"},{"key":"20","article-title":"Starfish a self-tuning system for big data analytics","author":"herodotou","year":"2011","journal-title":"5th Conference on Innovative Data Systems Research (CIDR '11)"},{"journal-title":"Various Licenses and Comments about Them","year":"2012","key":"49"},{"journal-title":"The Free Software Definition","year":"2013","author":"stallman","key":"48"},{"journal-title":"The Free Software Definition","year":"2013","key":"45"},{"journal-title":"Architecture Principles","year":"2011","key":"44"},{"journal-title":"Why Open Source Misses the Point of Free Software","year":"0","author":"stallman","key":"47"},{"journal-title":"The Open Source Definition (Annotated","year":"2008","key":"46"},{"key":"10","article-title":"TBigtable a distributed storage system for structured data","author":"chang","year":"2006","journal-title":"Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation (OSDI)"},{"key":"51","article-title":"Kanban and scrum-making the most of both","author":"kniberg en","year":"2009","journal-title":"Info"},{"journal-title":"Lean Software Development An Agile Toolkit","year":"2003","author":"poppendieck en","key":"52"},{"journal-title":"Extreme Programming Explained Embrace Change","year":"2004","author":"beck","key":"53"},{"journal-title":"Principles Behind the Agile Manifesto","year":"2001","author":"beck","key":"54"},{"key":"50","article-title":"SCRUM development process","author":"schwaber","year":"1995","journal-title":"Proceesings of the OOPSLA'95 Workshop on Business Object Design and Implementation"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750165.pdf?arnumber=6750165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T11:55:28Z","timestamp":1716638128000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750165\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750165","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}