軟件工程碩士論文參考文獻範例

學識都 人氣:9.05K

參考文獻是指在撰寫或編輯論文、着作時對信息來源或其中一部分信息源進行精確和詳細着錄的一組數據,下面是小編蒐集整理的軟件工程碩士論文參考文獻範例,供大家閱讀查看。

軟件工程碩士論文參考文獻範例

 參考文獻一:

[1]SchillerJH,VoisardA.Location-BasedServices[C].SanFrancisco:MorganKaufmann,2004

[2]JiangB,YaoX.Location-basedservicesandGISinperspective[C].Computers,EnvironmentandUrbanSystem,2006,30(6):712-725[3]王惠南編著.GPS導航原理與應用[M].科學出版社,2003

[3]C.Drane,M.VfacnaughtanandC.Scott.PositioningGSMTelephones[J],IEEEComm.Magazine,pp.46-59,1998[4]R.Klukas,G.LachapeileandM.Fattouche.CellularTelephonePositioningUsingGPSTimeSynchronization[C],GPSWorld,pp.49-541998

[4]ChristieJ,FullerR,NicholsJ.DevelopmentanddeploymentofGPSwirelessdevicesforE911andlocationbasedservices.PositionLocationandNavigationSymposium[C],2002,60-65

[5]胡加豔,陳秀萬,吳雨航,吳才聰.移動位置服務在應急救援中的應用[J].中國應急救援.2008(05)

[6]馮錦海,楊連賀,劉軍發等.基於WLAN移動定位的個性化商品信總推薦平臺[J].計算機工程與科學.2014(10)

[7]張寅寶,張威巍,孫衛新.面向位置服務的室內空間數據模型研宂[J].測繪與空間地理信息.2014(11)

[8]ZhongLiangDeng,WeizhengRen,LianmingXu.LocalizationAlgorithmBasedonDifferenceEstimationforWirelessSensorNetworksinPervasiveComputingEnvironment.PervasiveComputingandApplications[C],2008,p.479-484.

[9]StoyanovaT,KerasiotisF,EfstathiouK.ModelingoftheRSSUncertaintyforRSS-BasedOutdoorLocalizationandTrackingApplicationsinWirelessSensorNetworks.SensorTechnologiesandApplications(SENSORCOMM)[C],2010,45-50

[10]Jun-yongYoon,Jae-WanKim,Won-HeeLee.ATDoA-BasedLocalizationUsingPreciseTime-Synchronization.AdvancedCommunicationTechnology(ICACT)[C]320121266-1271

[11]韓霜,羅海勇,陳穎等.基於TDOA的超聲波室內定位系統的設計與實現[J].傳感技術學報.2010(03)

[12]Hee-JoongKim,JihongLee.StereoAoAsystemforindoorSLAM[C].Control,AutomationandSystems(TCCAS),201313th,1164-1169

[13]張明華.基於WLAN的室內定位技術研究[D],上海,上海交通大學,2009,36-38

[14]WestonJL,TittertonDH.ModernTnertialNavigationTechnologyandItsApplication[J].Electronics&CommunicationEngineeringJournal,2000,12(2):49-64

[15]A.Taheri,A.Singh,A.Emmanuel.LocationFingerprintingonInfrastructure802.11WirelessLocalAreaNetworks(WLANS)UsingLocus[C],LocalComputerNetworks,2004.29thAnnualIEEEInternationalConferenceon.IEEE,2004,pp.676-683.

[16]王賽偉,徐玉濱,鄧志安等.基於概率分佈的室內定位算法研究[C].國際信息技與應用論壇文集,2009.

[17]寧靜.採用紅外織網的室內定位技術[J].激光與紅外.2011(07)

[18]卜英勇,王紀嬋,趙海鳴等.基於單片機的高精度超聲波測距系統[J].儀表技術與傳感器.2007(03)

[19]HyungSooLim,ByoungSukChoi,JangMyungLee.AnEfficientLocalizationAlgorithmforMobileRobotsbasedonRFIDSystem[C].SICE-ICCAS,Oct.2006pp.5945-5950

[20]N4airN,MahmoudQ.H.AcollaborativeBluetooth-BasedApproachtoLocalizationofMobileDevices[C].CollaborativeComputing:Networking,ApplicationsandWorksharing(CoIlaborateCom),2012,363-371

[21]SinanGezici,ZhiTian,GeorgiosB.Biannakis,etal.LocalizationviaUltra-WidebandRadios[C].IEEESignalProcessingMagazineJuly2005.

[22]陳文周.WiFi技術研究及應用[J].數據通信.2008(02)

[23]李紅,郭大羣.WiFi技術的優勢與發展前景分析[J],電腦知識與技術,2013(5)

[24]石欣,印愛民,張琦.基於K最近鄰分類的無線傳感器網絡定位算法[J].儀器儀表學報,2014(10)

[25]ChristopherJ.C.Burges.ATutorialonSupportVectorMachinesforPatternRecognition[J].DataMiningandKnowledgeDiscovery.1998(2)

[26]AsanoS,WakudaY’KoshizukaN.ArobustPedestrianDead-ReckoningPositioningBasedonPedestrianBehaviorandSensorValidity[C].PLANS’2012,328-333

[27]AlvarezD,GonzalezR.C,AlvarezJ.C.ComparisonofStepLengthEstimatorsfromWearableAccelerometerDevices[C].Proc.IEEEEMBS,2006:5964-5967.

[28]劉長征,李緯,丁辰等.多種定位技術融合構建LBS體系[J].地理信息世界.2003(03)

[29]張世.基於慣性傳感器和WiFi的室內定位系統的設計與實現[D],北京,北京郵電大學,2012.

[30]周傲英,楊彬,金澈清等.基於位置的服務:架構與進展[J].計算機學報.2011(07)

[31]W3C,ScalableVectorGraphics(SVG)[OL],

[32]EisaS,PeixotoJ.MenesesF.RemovingUselessAPsandFingerprintsfromWiFiIndoorPositioningRadioMaps[C].IndoorPositioningandIndoorNavigation(IPIN),2013,1-7

參考文獻二:

[1]Biun,A.Virtualizationtechniques:AmethodicalreviewofXenandKVM[A]-CommunicationinComputerandInformationScience[C],2011:399-410

[2]SupermanJ,VenkitachalamG,LimB.VirtualizationI/ODevicesonVMWareWorkstationHostedVirtualMachineMonitor[A].In:Proceedingofthe2001USENIXAnnualTechnicalConference(USENIXATC2001)[C]5Boston,MA,USA,2001:16-30.

[3]Quynh?NguyenAnh.Areal-timeintegritymonitorforXenvirtualmachine[A].InternationalConferenceonNetworidngandServices2006:110-123.

[4]Fernandes,NataliaCastro>eto.XNetMon:Anetworkmonitorforseemingvirtualnetworks[A].IEEEInternationalConferenceonCommunication[C].2011:351-356.

[5]PayneB,CarboneM,SharifMbaxges:anarchitectureforsecureactivemonitoringusingvirtualization[A],In:ProceedingoftheIEEESymposiumonSecurityaridPrivacy,IEEEComputerSociety[Cj.Washington,DC,USA,2008:233-247

[6]Carbone,Martim.Secureandrobustmonitoringofvirtualmachinesthroughguest-assistedintrospection[A].LectureNotesinComputerScience,2012:22-4L

[7]Ibrahim,AmaniS.CloudSec:AsecuritymonitoringapplianceforHirtualMachinesinthelaascloudmodel[A].InternationalConferenceonNetworkandSystemSecurity[C]-2011:113-120.

[8]GuofbXiang,HaiJin,DeqingZou.AComprehensiveMonitoringFrameworkforVirtualtfiComputingEnvironment[A].In:Proaofthe26InternationalConferenceonInformationNetworking(IC01N2012)[C],poster,Bali,Indonesia,2012:551-556.

[9]Vmitoolsprojecthomepage.2012.Available:

[10]Payne,BryanD.Secureandflexiblemonitoringofvirtualmachines[A].AnnualComputerSecurityApplicationsConference,ACSAC[C].2007:385-397.

[11]K.Lawton,B.Denney,N.D.Guarneri,V.Ruppert,C.Bothamy.Bochsx86PCEmulatorUserManual[EB/OL].

[12]ChandraShekar,N.Fornesic.AnalysisonQUME[A].CommunicationsinComputerandInformationScience[C],2011,250:777-781.

[13]SharifM,LeeW,CuiW,LanziA.SecureinVMmonitoringusinghardwarevirtualization[A],In:Proc.ofthe16*ACMConfonComputerandCommunicationsSecurity[C].NewYork:ACMPress,2009:477-487.

[14]GarfinkelT,RosenblumM.Avirtualmachineintrospectionbasedarchitectureforintrusiondetection[A],In:Proc.ofthe10thNetworkandDistributedSystemSecuritySymp[C].Berkeley:USENIXAssociation,2003:191-206.

[15]Barham,Paul.Xenandtheartofvirtualization[A].OperatingSystemReview(ACM)[C].2003,275.:164-177.

[16]P.Barham,B,Dragovic,K.Franser,S.Hand,T.Harris,A.Ho,R.Neugebauer,I.Pratt,andA.Warfiele.Xenandtheartofvirtualization[A].ACMsymposiumonOperatingSystemsPrinciples(SISP19)[C]92003:164-180.

[17]A.SrivastavaandV.Ganapathy.TowardsaRicherModelofCloudAppMarkets[A].ACMCCSCloudComputingSecurityWorkshop(CCSW'12)[C],2012:101-114.

[19]項國富,金海,鄒德清,陳學.基於虛擬化的安全監控[J].軟件學報,2012.

[20]項國富.虛擬計算環境的安全監控技術研究[DI,華中科技大學,2009.

[21]Bayer,Ulrich,etal.A^ewoncurrentmalwarebehaviors[A].USENIXworkshoponlaige-scaleexploitsandemergentthreats(LEET)[C].2009:189-203.

[22]曲文濤,李明祿,翁楚良,跨虛擬機的可信檢測[J],計算機科學與_索.2010-2.

[23]BryanD.PayenMartimD.P.deA.CarboneWenkeLee.SecureandFlexibleMonitoringofVirtualMachines[A],ComputerSecurityApplicationsConference[C].2007:385-397.

[24]GeraldJ.PopekandRobertP.C^dberg.Formalrequirementsforvirtualizablethird‘generationarchitectures[A].CommunicationsoftheACM[C],17,July1974

[25]李狗.一個基於硬件虛擬化的內核完整性監控方法[J].計算機科學,2011,38,(12>68-72.

[26]BovetDP,CesatiM.UnderstandingtheLinuxKernel[M](3rdEdition)?Sebastopol:O'ReillyMediaPress,2006:75-123.57

[27]A.SomayajiandS.Forrest.AutomatedResponseUsingSystem-CallDelays[A].InProceedingofthe9thUSENIXSecuritySymposium[C],2000:185-198.

[28]宋寶華.Linux設備驅動開發詳解[M].第二版.北京:人民郵電出版社,2010,11.245-317.

[29]WolfgangMauerer.深入Linux內核架構[M].第一版.北京:人民郵電出版社,2010.06.413-449.

[30]Virusandthreatsdescriptions.Rootkit[Z].Win32.Fu.

[31]TomListon,Edskoudis.OntheCuttingEdge:ThwartingVirtualMachineDetection[EB/OL].SANSFIRE,2006.

[32]MatthewCarpenter,TomListon,Edskoudis.HidingVirtualizationfromAttractersandMalware[A].IEEESecurityandPrivacy[C]’2007.

[33]DannyQuist,ValSmith.FurtherDowntheVMSpiral[Z].2006.

[34]TalGarfinkel,KeithAdams,AndresWarfield,etal.CompatibilityisNotTransparency:VMMDetectionMythsandRealities[A].Proceedingofthe11AUSENIXworkshoponHottopicsinoperatingsystems[C].2007.

[36]Neiger,Gil,elal.IntelWtualizationTechnology:HardwareSupportforEfficientPtopessor^rtualization[J].IntelVirtualizationTechnology,2006,103.:170-171.

[37]袁源,戴冠中_LKM後門綜述[J].計算機科學,2008,35(7):5-8.

[38]湯小丹,樑紅兵.計算機操作系統[M].第三版.西安:西安電子科技大學出版社,2010,08.18-20.

參考文獻三:

[1]何龍.基於SOA架構的JBI應用研究.[學位論文].大連:大連海事大學,2010.

[2]劉新兵:基於NET平臺的分佈式數據庫管理信息系統的研究與設計[學位論文].上海:上海交通大學,2007.

[3]劉振頂基於SOA的企業服務總線中SOAP消息路由機制的研究與實現[學位論文],山東,山東大學,2008

[4]俞曉鋒.基於SOA的企業信息系統集成架構研究[學位論文].吉林大學,2014.

[5]李福盛基於企業服務總線的SOA框架研宂與應用[學位論文],山東曲阜,曲阜師範大學,2009

[6]NaveenK,VishalD.TheRoleofServiceGranularityinASuccessfulSOARealization-ACaseStudy.SERVICES-1200886.2008

[7]YangH,ZhaoX,QiuZ,PuG.AformalmodelforWebServicechoreographydescriptionlanguage(WS-CDL).Proc.oftheIEEEInt'lConf.onWebServices.2006

[8]ErlT.Service-orientedarchitecture,concepts,technology,anddesign[M]:PearsonEducation,Inc,2004.

[9]SprottD.Understandingserviceorientedarchitecture[EB/OL].(2004).CBDIForum.

[10]Chappell?DaneI.EnterpriseServiceBus.Reilly,2004

[11]徐瓊,魯鵬.用於實現Web服務的SOA編程模型[期刊].軟件導刊,2007,03:62-64.

[12]楊杉基於ESB的企業信息集成方法研究及在電動汽車領域的應用[學位論文].北京:北京郵電大學,2014

[13]徐愷英,鞠彥輝.企業信息集成系統運行機制研究[期刊].情報科學,2005,06:900-904.

[14]謝小軒,張浩,夏敬華,王堅,李琦.企業應用集成綜述[期刊].計算機工程與應用,2002,22:1-5.

[15]鄭盡.基於ESB企業應用集成架構研究與應用[學位論文].太原理工大學,2013.

[16]張馳,吳健,胡正國,周淑莉.CORBA與Web服務的`比較與集成[期刊].計算機工程與設計,2005,08:2213-2215+2218.

[17]餘明哲基於SOA的企業應用集成框架的研究及應用[學位論文].北京,北京郵電大學,2014

[18]王軍基於JMS的消息中間件設計與實現計算機應用23(8)2003年8月64-67

[19]龔報鈞.基於多Agent的企業信息集成理論及應用研究[學位論文].浙江大學,2001.

[20]周航濱,夏安邦,張長昊.基於Web服務的跨企業信息集成框架[期刊].計算機集成製造系統-CIMS,2003,01:1-5.

[21]吳玉猛.基於本體的虛擬企業信息集成研究[學位論文].南京理工大學,2009.

[22]周競濤,張樹生,趙寒,王明微,張超,王克飛,董小鋒.基於語義模型的總線式企業信息集成框架[期刊].計算機集成製造系統,2006,03:407-412.

[23]凌曉東.SOA綜述[期刊].計算機應用與軟件,2007,10:122-124+199.

[24]侯嘵麗.OpenESB在數字校園中的研宂與應用[學位論文].北方工業大學,2011.

[25]姬楷基於SOA的企業服務總線研究及其應用[學位論文],重慶,重慶大學,2008

[26]王洪祥面向服務架構中的服務組合研究[學位論文],安徽合肥,合肥工業大學,2010

[27]周曉豔.企業服務總線(ESB)在SOA中的應用研究[學位論文].大連海事大學,2009.

[28]杜攀,徐進.SOA體系下細粒度組件服務整合的探討[J].計算機應用,2006,03:699-702.

[29]Alahmari,S.;Zaluska,E.;DeRoure,AMetricsFrameworkforEvaluatingSOAServiceGranularity,Southampton,UK:ServicesComputing(SCC),2011IEEEInternationalConference,2011:512-519

[30]HongYlng;YuWu;FumingLiu.NoticeofRetractionResearchontheSOA-basedServiceGranularityControlChongqing,China:InformationTechnologyandComputerScience(ITCS),2010SecondInternationalConference,2010:443-446

[31]陳華,方丁,趙衛東.SOA中業務服務粒度與流程柔性的關係研究[J].計算機工程與應用,2009,27:7-10.

[32]石允劍基於雲計算技術的高校招生管理系統研究[學位論文;1,江蘇南京,南京航空航天大學,2012

[33]曹飛基於OpenESB的企業應用集成研究[學位論文],湖北武漢,武漢理工大學,2010