<dfn id="w48us"></dfn><ul id="w48us"></ul>
  • <ul id="w48us"></ul>
  • <del id="w48us"></del>
    <ul id="w48us"></ul>
  • 最新軟件工程碩士論文參考文獻(xiàn)

    時(shí)間:2024-08-12 01:37:28 參考文獻(xiàn) 我要投稿
    • 相關(guān)推薦

    最新軟件工程碩士論文參考文獻(xiàn)

      軟件工程碩士論文參考文獻(xiàn)一

      [1]Schiller J H, Voisard A. Location-Based Services [C]. San Francisco: Morgan Kaufmann,2004

    最新軟件工程碩士論文參考文獻(xiàn)

      [2]Jiang B, Yao X. Location-based services and GIS in perspective [C]. Computers,Environment and Urban System, 2006, 30(6): 712-725[3]王惠南編著.GPS導(dǎo)航原理與應(yīng)用[M].科學(xué)出版社,2003

      [3]C.Drane, M.Vfacnaughtan and C.Scott. Positioning GSM Telephones [J], IEEE Comm.Magazine, pp.46-59, 1998[4]R.Klukas, G.Lachapeile and M.Fattouche. Cellular Telephone Positioning Using GPS TimeSynchronization [C], GPS World, pp.49-54 1998

      [4]Christie J, Fuller R, Nichols J. Development and deployment of GPS wireless devices forE911 and location based services. Position Location and Navigation Symposium [C], 2002, 60 - 65

      [5]胡加艷,陳秀萬(wàn),吳雨航,吳才聰.移動(dòng)位置服務(wù)在應(yīng)急救援中的應(yīng)用[J].中國(guó)應(yīng)急救援.2008(05)

      [6]馮錦海,楊連賀,劉軍發(fā)等.基于WLAN移動(dòng)定位的個(gè)性化商品信總推薦平臺(tái)[J].計(jì)算機(jī)工程與科學(xué).2014(10)

      [7]張寅寶,張威巍,孫衛(wèi)新.面向位置服務(wù)的室內(nèi)空間數(shù)據(jù)模型研宂[J].測(cè)繪與空間地理信息.2014(11)

      [8]ZhongLiang Deng, Weizheng Ren, Lianming Xu. Localization Algorithm Based onDifference Estimation for Wireless Sensor Networks in Pervasive Computing Environment.Pervasive Computing and Applications [C], 2008, p.479-484.

      [9]Stoyanova T, Kerasiotis F, Efstathiou K. Modeling of the RSS Uncertainty for RSS-BasedOutdoor Localization and Tracking Applications in Wireless Sensor Networks. Sensor Technologiesand Applications (SENSORCOMM) [C], 2010, 45 - 50

      [10]Jun-yong Yoon, Jae-Wan Kim, Won-Hee Lee. A TDoA-Based Localization Using PreciseTime-Synchronization. Advanced Communication Technology (ICACT) [C]3 2012 1266-1271

      [11]韓霜,羅海勇,陳穎等.基于TDOA的超聲波室內(nèi)定位系統(tǒng)的`設(shè)計(jì)與實(shí)現(xiàn)[J].傳感技術(shù)學(xué)報(bào).2010(03)

      [12]Hee-Joong Kim, Jihong Lee. Stereo AoA system for indoor SLAM [C]. Control,Automation and Systems (TCCAS), 2013 13th, 1164-1169

      [13]張明華.基于WLAN的室內(nèi)定位技術(shù)研究[D],上海,上海交通大學(xué),2009,36-38

      [14]Weston J L, Titterton D H. Modern Tnertial Navigation Technology and Its Application [J].Electronics & Communication Engineering Journal, 2000, 12(2):49-64

      [15] A.Taheri, A.Singh, A.Emmanuel. Location Fingerprinting on Infrastructure 802.11Wireless Local Area Networks (WLANS) Using Locus [C], Local Computer Networks, 2004. 29thAnnual IEEE International Conference on. IEEE, 2004, pp. 676-683.

      [16]王賽偉,徐玉濱,鄧志安等.基于概率分布的室內(nèi)定位算法研究[C].國(guó)際信息技與應(yīng)用論壇文集,2009.

      [17]寧?kù)o.采用紅外織網(wǎng)的室內(nèi)定位技術(shù)[J].激光與紅外.2011(07)

      [18]卜英勇,王紀(jì)嬋,趙海鳴等.基于單片機(jī)的高精度超聲波測(cè)距系統(tǒng)[J].儀表技術(shù)與傳感器.2007(03)

      [19]HyungSoo Lim, ByoungSuk Choi, JangMyung Lee. An Efficient Localization Algorithmfor Mobile Robots based on RFID System [C]. SICE-ICCAS,Oct. 2006 pp. 5945-5950

      [20]N4air N, Mahmoud Q.H. A collaborative Bluetooth-Based Approach to Localization ofMobile Devices [C]. Collaborative Computing: Networking, Applications and Worksharing(CoIlaborateCom), 2012,363 - 371

      [21]Si nan Gezici, Zhi Tian, Georgios B. Biannakis, et al. Localization via Ultra-WidebandRadios [C]. IEEE Signal Processing Magazine July 2005.

      [22]陳文周.WiFi技術(shù)研究及應(yīng)用[J].數(shù)據(jù)通信.2008(02)

      [23]李紅,郭大群.WiFi技術(shù)的優(yōu)勢(shì)與發(fā)展前景分析[J],電腦知識(shí)與技術(shù),2013(5)

      [24]石欣,印愛(ài)民,張琦.基于K最近鄰分類的無(wú)線傳感器網(wǎng)絡(luò)定位算法[J].儀器儀表學(xué)報(bào),2014(10)

      [25]Christopher J.C. Burges. A Tutorial on Support Vector Machines for Pattern Recognition[J]. Data Mining and Knowledge Discovery. 1998 (2)

      [26]Asano S,Wakuda Y’ Koshizuka N. A robust Pedestrian Dead-Reckoning PositioningBased on Pedestrian Behavior and Sensor Validity [C]. PLANS’ 2012,328 - 333

      [27]Alvarez D, Gonzalez R.C, Alvarez J.C. Comparison of Step Length Estimators fromWearable Accelerometer Devices [C]. Proc.IEEE EMBS, 2006:5964-5967.

      [28]劉長(zhǎng)征,李緯,丁辰等.多種定位技術(shù)融合構(gòu)建LBS體系[J].地理信息世界.2003(03)

      [29]張世.基于慣性傳感器和WiFi的室內(nèi)定位系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn)[D],北京,北京郵電大學(xué),2012.

      [30]周傲英,楊彬,金澈清等.基于位置的服務(wù):架構(gòu)與進(jìn)展[J].計(jì)算機(jī)學(xué)報(bào).2011(07)

      [31 ] W3C, Scalable Vector Graphics (SVG) [OL],

      [32] Eisa S, Peixoto J. Meneses F. Removing Useless APs and Fingerprints from WiFi IndoorPositioning Radio Maps [C]. Indoor Positioning and Indoor Navigation (IPIN), 2013, 1-7

      軟件工程碩士論文參考文獻(xiàn)二

      [1]Biun, A. Virtualization techniques : A methodical review of Xen and KVM [A]-Communication in Computer and Information Science [C],2011:399-410

      [2]Superman J,Venkitachalam G, Lim B. Virtualization I/O Devices on VMWare WorkstationHosted Virtual Machine Monitor [A]. In: Proceeding of the 2001 USENIX Annual TechnicalConference (USENIX ATC 2001) [C]5 Boston, MA, USA, 2001:16-30.

      [3]Quynh? Nguyen Anh. A real-time integrity monitor for Xen virtual machine [A]. InternationalConference on Networidng and Services 2006:110-123.

      [4]Fernandes, Natalia Castro> eto. XNetMon: A network monitor for seeming virtual networks[A]. IEEE International Conference on Communication [C]. 2011:351-356.

      [5]Payne B, Carbone M,Sharif M baxges: an architecture for secure active monitoring usingvirtualization [A], In: Proceeding of the IEEE Symposium on Security arid Privacy, IEEEComputer Society [Cj. Washington, DC, USA,2008:233-247

      [6]Carbone, Martim. Secure and robust monitoring of virtual machines through guest-assistedintrospection [A]. Lecture Notes in Computer Science, 2012: 22-4L

      [7]Ibrahim, Amani S. CloudSec: A security monitoring appliance for Hirtual Machines in thelaas cloud model [A]. International Conference on Network and System Security [C]- 2011:113-120.

      [8]Guofb Xiang, Hai Jin, Deqing Zou. A Comprehensive Monitoring Framework for VirtualtfiComputing Environment [A]. In: Proa of the 26 International Conference on InformationNetworking (IC01N2012 ) [C], poster, Bali, Indonesia, 2012:551 -556.

      [9]Vmitools project homepage. 2012. Available:

      [10]Payne, Bryan D. Secure and flexible monitoring of virtual machines [A]. Annual ComputerSecurity Applications Conference, ACSAC [C]. 2007:385-397.

      [11]K.Lawton, B.Denney, N.D.Guarneri, V.Ruppert, C.Bothamy. Bochs x86 PC Emulator UserManual [EB/OL].

      [12]Chandra Shekar, N.Fornesic. Analysis on QUME [A]. Communications in Computer andInformation Science [C], 2011,250:777-781.

      [13]Sharif M, Lee W,Cui W,Lanzi A. Secure in VM monitoring using hardware virtualization[A], In: Proc. of the 16* ACM Conf on Computer and Communications Security [C]. NewYork: ACM Press, 2009:477-487.

      [14]Garfinkel T,Rosenblum M. A virtual machine introspection based architecture for intrusiondetection [A], In: Proc. of the 10th Network and Distributed System Security Symp [C].Berkeley: USENIX Association, 2003:191-206.

      [15]Barham, Paul. Xen and the art of virtualization [A]. Operating System Review (ACM) [C].2003,275. :164-177.

      [16]P. Barham, B, Dragovic, K. Franser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A.Warfiele. Xen and the art of virtualization [A]. ACM symposium on Operating SystemsPrinciples (SISP19) [C]9 2003:164-180.

      [17]A. Srivastava and V. Ganapathy. Towards a Richer Model of Cloud App Markets [A]. ACMCCS Cloud Computing Security Workshop (CCSW'12) [C], 2012: 101-114.

      [19]項(xiàng)國(guó)富,金海,鄒德清,陳學(xué).基于虛擬化的安全監(jiān)控[J].軟件學(xué)報(bào),2012.

      [20]項(xiàng)國(guó)富.虛擬計(jì)算環(huán)境的安全監(jiān)控技術(shù)研究[DI,華中科技大學(xué),2009.

      [21]Bayer, Ulrich, et al. A ^ew on current malware behaviors [A]. USENIX workshop onlaige-scale exploits and emergent threats (LEET) [C]. 2009:189-203.

      [22]曲文濤,李明祿,翁楚良,跨虛擬機(jī)的`可信檢測(cè)[J],計(jì)算機(jī)科學(xué)與_索.2010-2.

      [23]Bryan D. Payen Martim D. P. de A. Carbone Wenke Lee. Secure and Flexible Monitoring ofVirtual Machines [A], Computer Security Applications Conference [C]. 2007:385-397.

      [24]Gerald J. Popek and Robert P. C^dberg. Formal requirements for virtualizable third‘generation architectures [A]. Communications of the ACM [C], 17,July 1974

      [25]李狗.一個(gè)基于硬件虛擬化的內(nèi)核完整性監(jiān)控方法[J].計(jì)算機(jī)科學(xué),2011,38,(12> 68-72.

      [26]Bovet D P, Cesati M. Understanding the Linux Kernel [M] (3rd Edition) ? Sebastopol:O'Reilly Media Press, 2006: 75-123.57

      [27]A. Somayaji and S. Forrest. Automated Response Using System-Call Delays [A]. InProceeding of the 9th USENIX Security Symposium [C],2000: 185-198.

      [28]宋寶華.Linux設(shè)備驅(qū)動(dòng)開(kāi)發(fā)詳解[M].第二版.北京:人民郵電出版社,2010,11.245-317.

      [29]WolfgangMauerer.深入Linux內(nèi)核架構(gòu)[M].第一版.北京:人民郵電出版社,2010.06.413-449.

      [30]Virus and threats descriptions. Rootkit [Z].Win32.Fu.

      [31]Tom Liston,Edskoudis. On the Cutting Edge: Thwarting Virtual Machine Detection [EB/OL].SANSFIRE, 2006.

      [32]Matthew Carpenter, Tom Liston, Edskoudis. Hiding Virtualization fromAttracters andMalware [A]. IEEE Security and Privacy [C]’ 2007.

      [33]Danny Quist, Val Smith. Further Down the VM Spiral [Z]. 2006.

      [34]Tal Garfinkel, Keith Adams, Andres Warfield, et al. Compatibility is Not Transparency:VMM Detection Myths and Realities [A]. Proceeding of the 11A USENIX workshop on Hottopics in operating systems [C]. 2007.

      [36]Neiger,Gil,el al. Intel Wtualization Technology: Hardware Support for Efficient Ptopessor^rtualization [J]. Intel Virtualization Technology, 2006,103. :170-171.

      [37]袁源,戴冠中_LKM后門綜述[J].計(jì)算機(jī)科學(xué),2008,35(7) :5-8.

      [38]湯小丹,梁紅兵.計(jì)算機(jī)操作系統(tǒng)[M].第三版.西安:西安電子科技大學(xué)出版社,2010,08. 18-20.

      軟件工程碩士論文參考文獻(xiàn)三

      [1]何龍.基于SOA架構(gòu)的JBI應(yīng)用研究.[學(xué)位論文].大連:大連海事大學(xué),2010.

      [2]劉新兵:基于NET平臺(tái)的分布式數(shù)據(jù)庫(kù)管理信息系統(tǒng)的研究與設(shè)計(jì)[學(xué)位論文].上海:上海交通大學(xué),2007.

      [3]劉振頂基于SOA的企業(yè)服務(wù)總線中SOAP消息路由機(jī)制的研究與實(shí)現(xiàn)[學(xué)位論文],山東,山東大學(xué),2008

      [4]俞曉鋒.基于SOA的企業(yè)信息系統(tǒng)集成架構(gòu)研究[學(xué)位論文].吉林大學(xué),2014.

      [5]李福盛基于企業(yè)服務(wù)總線的SOA框架研宂與應(yīng)用[學(xué)位論文],山東曲阜,曲阜師范大學(xué),2009

      [6]Naveen K,Vishal D.The Role of Service Granularity in A Successful SOARealization-A Case Study. SERVICES-1 2008 86 . 2008

      [7]Yang H,Zhao X,Qiu Z,Pu G.A formal model for Web Service choreographydescription language (WS-CDL). Proc. of the IEEE Int'l Conf.on Web Services . 2006

      [8] Erl T.Service-oriented architecture,concepts,technology,and design[M] :PearsonEducation,Inc,2004.

      [9]Sprott D. Understanding service oriented architecture[EB/OL].(2004).CBDIForum.

      [10]Chappell?DaneI.Enterprise Service Bus.Reilly,2004

      [11]徐瓊,魯鵬.用于實(shí)現(xiàn)Web服務(wù)的SOA編程模型[期刊].軟件導(dǎo)刊,2007,03:62-64.

      [12]楊杉基于ESB的企業(yè)信息集成方法研究及在電動(dòng)汽車領(lǐng)域的應(yīng)用[學(xué)位論文].北京:北京郵電大學(xué),2014

      [13]徐愷英,鞠彥輝.企業(yè)信息集成系統(tǒng)運(yùn)行機(jī)制研究[期刊].情報(bào)科學(xué),2005,06:900-904.

      [14]謝小軒,張浩,夏敬華,王堅(jiān),李琦.企業(yè)應(yīng)用集成綜述[期刊].計(jì)算機(jī)工程與應(yīng)用,2002,22:1-5.

      [15]鄭盡.基于ESB企業(yè)應(yīng)用集成架構(gòu)研究與應(yīng)用[學(xué)位論文].太原理工大學(xué),2013.

      [16]張馳,吳健,胡正國(guó),周淑莉.CORBA與Web服務(wù)的比較與集成[期刊].計(jì)算機(jī)工程與設(shè)計(jì),2005,08:2213-2215+2218.

      [17]余明哲基于SOA的企業(yè)應(yīng)用集成框架的研究及應(yīng)用[學(xué)位論文].北京,北京郵電大學(xué),2014

      [18]王軍基于JMS的'消息中間件設(shè)計(jì)與實(shí)現(xiàn)計(jì)算機(jī)應(yīng)用23(8) 2003年8月 64-67

      [19]龔報(bào)鈞.基于多Agent的企業(yè)信息集成理論及應(yīng)用研究[學(xué)位論文].浙江大學(xué),2001.

      [20]周航濱,夏安邦,張長(zhǎng)昊.基于Web服務(wù)的跨企業(yè)信息集成框架[期刊].計(jì)算機(jī)集成制造系統(tǒng)-CIMS,2003,01:1-5.

      [21]吳玉猛.基于本體的虛擬企業(yè)信息集成研究[學(xué)位論文].南京理工大學(xué),2009.

      [22]周競(jìng)濤,張樹(shù)生,趙寒,王明微,張超,王克飛,董小鋒.基于語(yǔ)義模型的總線式企業(yè)信息集成框架[期刊].計(jì)算機(jī)集成制造系統(tǒng),2006,03:407-412.

      [23]凌曉東.SOA綜述[期刊].計(jì)算機(jī)應(yīng)用與軟件,2007,10:122-124+199.

      [24]侯嘵麗.OpenESB在數(shù)字校園中的研宂與應(yīng)用[學(xué)位論文].北方工業(yè)大學(xué),2011.

      [25]姬楷基于SOA的企業(yè)服務(wù)總線研究及其應(yīng)用[學(xué)位論文],重慶,重慶大學(xué),2008

      [26]王洪祥面向服務(wù)架構(gòu)中的服務(wù)組合研究[學(xué)位論文],安徽合肥,合肥工業(yè)大學(xué),2010

      [27]周曉艷.企業(yè)服務(wù)總線(ESB)在SOA中的應(yīng)用研究[學(xué)位論文].大連海事大學(xué),2009.

      [28]杜攀,徐進(jìn).SOA體系下細(xì)粒度組件服務(wù)整合的探討[J].計(jì)算機(jī)應(yīng)用,2006,03:699-702.

      [29]Alahmari, S.; Zaluska, E.; De Roure, A Metrics Framework for Evaluating SOAService Granularity, Southampton, UK: Services Computing (SCC), 2011 IEEEInternational Conference,2011:512-519

      [30]Hong Ylng; Yu Wu; Fuming Liu. Notice of Retraction Research on theSOA-based Service Granularity ControlChongqing, China: InformationTechnology and Computer Science (ITCS), 2010 Second InternationalConference,2010:443-446

      [31]陳華,方丁,趙衛(wèi)東.SOA中業(yè)務(wù)服務(wù)粒度與流程柔性的關(guān)系研究[J].計(jì)算機(jī)工程與應(yīng)用,2009,27:7-10.

      [32]石允劍基于云計(jì)算技術(shù)的高校招生管理系統(tǒng)研究[學(xué)位論文;1,江蘇南京,南京航空航天大學(xué),2012

      [33]曹飛基于OpenESB的企業(yè)應(yīng)用集成研究[學(xué)位論文],湖北武漢,武漢理工大學(xué),2010

    【最新軟件工程碩士論文參考文獻(xiàn)】相關(guān)文章:

    軟件工程碩士論文參考文獻(xiàn)07-24

    軟件工程碩士論文參考文獻(xiàn)格式范例08-03

    emba碩士論文參考文獻(xiàn)06-08

    碩士論文的參考文獻(xiàn)格式07-28

    碩士論文參考文獻(xiàn)的格式10-13

    碩士論文參考文獻(xiàn)怎么寫09-17

    園林碩士論文參考文獻(xiàn)范例07-16

    碩士論文參考文獻(xiàn)標(biāo)準(zhǔn)范例10-04

    景觀建筑碩士論文參考文獻(xiàn)09-15

    碩士論文參考文獻(xiàn)格式示例10-21

    主站蜘蛛池模板: 国产精品 一区 在线| 日本精品久久久久中文字幕| 国产精品视频色拍拍| 国产精品无打码在线播放| 久久精品无码午夜福利理论片| 国产偷国产偷高清精品| 国产精品99久久久久久人| 中文字幕久久精品无码| 日韩精品系列产品| 久久er国产精品免费观看8| 久久99精品综合国产首页| 日韩精品一区二区三区中文| 久久久久人妻一区精品果冻| 老司机99精品99| 国产午夜福利精品一区二区三区 | 99国产精品永久免费视频| 亚洲精品国产高清嫩草影院| 在线电影国产精品| 国产成人精品免费视| 久久精品国产99久久无毒不卡| 久久精品国产精品亚洲| 国产福利电影一区二区三区,亚洲国模精品一区 | 一级成人精品h| 国产精品一区二区久久| 久久久久成人精品无码中文字幕| 亚洲精品乱码久久久久久蜜桃图片 | 国产精品极品美女自在线观看免费| 成人国内精品久久久久一区| 精品一区二区三区在线观看视频 | 国产成人精品a视频一区| 久久国产亚洲精品麻豆| 国产亚洲一区二区精品| 国产色婷婷五月精品综合在线 | 蜜臀AV无码国产精品色午夜麻豆| 国产精品免费看久久久香蕉 | 亚洲国产精品专区在线观看| 久久精品国产亚洲7777| 精品无码综合一区| 精品午夜福利1000在线观看| 精品无码人妻久久久久久| 精品伦精品一区二区三区视频 |