軟體工程碩士論文參考文獻一
[1]Schiller J H, Voisard A. Location-Based Services [C]. San Francisco: Morgan Kaufmann,2004
[2]Jiang B, Yao X. Location-based services and GIS in perspective [C]. Computers,Environment and Urban System, 2006, 30(6): 712-725[3]王惠南編著.GPS導航原理與應用[M].科學出版社,2003
[3]C.Drane, M.Vfacnaughtan and C.Scott. Positioning GSM Telephones [J], IEEE Comm.Magazine, pp.46-59, 1998[4]R.Klukas, G.Lachapeile and M.Fattouche. Cellular Telephone Positioning Using GPS TimeSynchronization [C], GPS World, pp.49-54 1998
[4]Christie J, Fuller R, Nichols J. Development and deployment of GPS wireless devices forE911 and location based services. Position Location and Navigation Symposium [C], 2002, 60 - 65
[5]胡加豔,陳秀萬,吳雨航,吳才聰.移動位置服務在應急救援中的應用[J].中國應急救援.2008(05)
[6]馮錦海,楊連賀,劉軍發等.基於WLAN移動定位的個性化商品信總推薦平臺[J].計算機工程與科學.2014(10)
[7]張寅寶,張威巍,孫衛新.面向位置服務的室內空間資料模型研宂[J].測繪與空間地理資訊.2014(11)
[8]ZhongLiang Deng, Weizheng Ren, Lianming Xu. Localization Algorithm Based onDifference Estimation for Wireless Sensor Networks in Pervasive Computing Environment.Pervasive Computing and Applications [C], 2008, p.479-484.
[9]Stoyanova T, Kerasiotis F, Efstathiou K. Modeling of the RSS Uncertainty for RSS-BasedOutdoor Localization and Tracking Applications in Wireless Sensor Networks. Sensor Technologiesand Applications (SENSORCOMM) [C], 2010, 45 - 50
[10]Jun-yong Yoon, Jae-Wan Kim, Won-Hee Lee. A TDoA-Based Localization Using PreciseTime-Synchronization. Advanced Communication Technology (ICACT) [C]3 2012 1266-1271
[11]韓霜,羅海勇,陳穎等.基於TDOA的超聲波室內定位系統的設計與實現[J].感測技術學報.2010(03)
[12]Hee-Joong Kim, Jihong Lee. Stereo AoA system for indoor SLAM [C]. Control,Automation and Systems (TCCAS), 2013 13th, 1164-1169
[13]張明華.基於WLAN的室內定位技術研究[D],上海,上海交通大學,2009,36-38
[14]Weston J L, Titterton D H. Modern Tnertial Navigation Technology and Its Application [J].Electronics & Communication Engineering Journal, 2000, 12(2):49-64
[15] A.Taheri, A.Singh, A.Emmanuel. Location Fingerprinting on Infrastructure 802.11Wireless Local Area Networks (WLANS) Using Locus [C], Local Computer Networks, 2004. 29thAnnual IEEE International Conference on. IEEE, 2004, pp. 676-683.
[16]王賽偉,徐玉濱,鄧志安等.基於概率分佈的室內定位演算法研究[C].國際資訊技與應用論壇文集,2009.
[17]寧靜.採用紅外織網的室內定位技術[J].鐳射與紅外.2011(07)
[18]卜英勇,王紀嬋,趙海鳴等.基於微控制器的高精度超聲波測距系統[J].儀表技術與感測器.2007(03)
[19]HyungSoo Lim, ByoungSuk Choi, JangMyung Lee. An Efficient Localization Algorithmfor Mobile Robots based on RFID System [C]. SICE-ICCAS,Oct. 2006 pp. 5945-5950
[20]N4air N, Mahmoud Q.H. A collaborative Bluetooth-Based Approach to Localization ofMobile Devices [C]. Collaborative Computing: Networking, Applications and Worksharing(CoIlaborateCom), 2012,363 - 371
[21]Si nan Gezici, Zhi Tian, Georgios B. Biannakis, et al. Localization via Ultra-WidebandRadios [C]. IEEE Signal Processing Magazine July 2005.
[22]陳文周.WiFi技術研究及應用[J].資料通訊.2008(02)
[23]李紅,郭大群.WiFi技術的優勢與發展前景分析[J],電腦知識與技術,2013(5)
[24]石欣,印愛民,張琦.基於K最近鄰分類的無線感測器網路定位演算法[J].儀器儀表學報,2014(10)
[25]Christopher J.C. Burges. A Tutorial on Support Vector Machines for Pattern Recognition[J]. Data Mining and Knowledge Discovery. 1998 (2)
[26]Asano S,Wakuda Y’ Koshizuka N. A robust Pedestrian Dead-Reckoning PositioningBased on Pedestrian Behavior and Sensor Validity [C]. PLANS’ 2012,328 - 333
[27]Alvarez D, Gonzalez R.C, Alvarez J.C. Comparison of Step Length Estimators fromWearable Accelerometer Devices [C]. Proc.IEEE EMBS, 2006:5964-5967.
[28]劉長征,李緯,丁辰等.多種定位技術融合構建LBS體系[J].地理資訊世界.2003(03)
[29]張世.基於慣性感測器和WiFi的室內定位系統的設計與實現[D],北京,北京郵電大學,2012.
[30]周傲英,楊彬,金澈清等.基於位置的服務:架構與進展[J].計算機學報.2011(07)
[31 ] W3C, Scalable Vector Graphics (SVG) [OL],
[32] Eisa S, Peixoto J. Meneses F. Removing Useless APs and Fingerprints from WiFi IndoorPositioning Radio Maps [C]. Indoor Positioning and Indoor Navigation (IPIN), 2013, 1-7
軟體工程碩士論文參考文獻二
[1]Biun, A. Virtualization techniques : A methodical review of Xen and KVM [A]-Communication in Computer and Information Science [C],2011:399-410
[2]Superman J,Venkitachalam G, Lim B. Virtualization I/O Devices on VMWare WorkstationHosted Virtual Machine Monitor [A]. In: Proceeding of the 2001 USENIX Annual TechnicalConference (USENIX ATC 2001) [C]5 Boston, MA, USA, 2001:16-30.
[3]Quynh? Nguyen Anh. A real-time integrity monitor for Xen virtual machine [A]. InternationalConference on Networidng and Services 2006:110-123.
[4]Fernandes, Natalia Castro> eto. XNetMon: A network monitor for seeming virtual networks[A]. IEEE International Conference on Communication [C]. 2011:351-356.
[5]Payne B, Carbone M,Sharif M baxges: an architecture for secure active monitoring usingvirtualization [A], In: Proceeding of the IEEE Symposium on Security arid Privacy, IEEEComputer Society [Cj. Washington, DC, USA,2008:233-247
[6]Carbone, Martim. Secure and robust monitoring of virtual machines through guest-assistedintrospection [A]. Lecture Notes in Computer Science, 2012: 22-4L
[7]Ibrahim, Amani S. CloudSec: A security monitoring appliance for Hirtual Machines in thelaas cloud model [A]. International Conference on Network and System Security [C]- 2011:113-120.
[8]Guofb Xiang, Hai Jin, Deqing Zou. A Comprehensive Monitoring Framework for VirtualtfiComputing Environment [A]. In: Proa of the 26 International Conference on InformationNetworking (IC01N2012 ) [C], poster, Bali, Indonesia, 2012:551 -556.
[9]Vmitools project homepage. 2012. Available:
[10]Payne, Bryan D. Secure and flexible monitoring of virtual machines [A]. Annual ComputerSecurity Applications Conference, ACSAC [C]. 2007:385-397.
[11]K.Lawton, B.Denney, N.D.Guarneri, V.Ruppert, C.Bothamy. Bochs x86 PC Emulator UserManual [EB/OL].
[12]Chandra Shekar, N.Fornesic. Analysis on QUME [A]. Communications in Computer andInformation Science [C], 2011,250:777-781.
[13]Sharif M, Lee W,Cui W,Lanzi A. Secure in VM monitoring using hardware virtualization[A], In: Proc. of the 16* ACM Conf on Computer and Communications Security [C]. NewYork: ACM Press, 2009:477-487.
[14]Garfinkel T,Rosenblum M. A virtual machine introspection based architecture for intrusiondetection [A], In: Proc. of the 10th Network and Distributed System Security Symp [C].Berkeley: USENIX Association, 2003:191-206.
[15]Barham, Paul. Xen and the art of virtualization [A]. Operating System Review (ACM) [C].2003,275. :164-177.
[16]P. Barham, B, Dragovic, K. Franser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A.Warfiele. Xen and the art of virtualization [A]. ACM symposium on Operating SystemsPrinciples (SISP19) [C]9 2003:164-180.
[17]A. Srivastava and V. Ganapathy. Towards a Richer Model of Cloud App Markets [A]. ACMCCS Cloud Computing Security Workshop (CCSW'12) [C], 2012: 101-114.
[19]項國富,金海,鄒德清,陳學.基於虛擬化的安全監控[J].軟體學報,2012.
[20]項國富.虛擬計算環境的安全監控技術研究[DI,華中科技大學,2009.
[21]Bayer, Ulrich, et al. A ^ew on current malware behaviors [A]. USENIX workshop onlaige-scale exploits and emergent threats (LEET) [C]. 2009:189-203.
[22]曲文濤,李明祿,翁楚良,跨虛擬機器的可信檢測[J],電腦科學與_索.2010-2.
[23]Bryan D. Payen Martim D. P. de A. Carbone Wenke Lee. Secure and Flexible Monitoring ofVirtual Machines [A], Computer Security Applications Conference [C]. 2007:385-397.
[24]Gerald J. Popek and Robert P. C^dberg. Formal requirements for virtualizable third‘generation architectures [A]. Communications of the ACM [C], 17,July 1974
[25]李狗.一個基於硬體虛擬化的核心完整性監控方法[J].電腦科學,2011,38,(12> 68-72.
[26]Bovet D P, Cesati M. Understanding the Linux Kernel [M] (3rd Edition) ? Sebastopol:O'Reilly Media Press, 2006: 75-123.57
[27]A. Somayaji and S. Forrest. Automated Response Using System-Call Delays [A]. InProceeding of the 9th USENIX Security Symposium [C],2000: 185-198.
[28]宋寶華.Linux裝置驅動開發詳解[M].第二版.北京:人民郵電出版社,2010,11.245-317.
[29]WolfgangMauerer.深入Linux核心架構[M].第一版.北京:人民郵電出版社,2010.06.413-449.
[30]Virus and threats descriptions. Rootkit [Z].Win32.Fu.
[31]Tom Liston,Edskoudis. On the Cutting Edge: Thwarting Virtual Machine Detection [EB/OL].SANSFIRE, 2006.
[32]Matthew Carpenter, Tom Liston, Edskoudis. Hiding Virtualization fromAttracters andMalware [A]. IEEE Security and Privacy [C]’ 2007.
[33]Danny Quist, Val Smith. Further Down the VM Spiral [Z]. 2006.
[34]Tal Garfinkel, Keith Adams, Andres Warfield, et al. Compatibility is Not Transparency:VMM Detection Myths and Realities [A]. Proceeding of the 11A USENIX workshop on Hottopics in operating systems [C]. 2007.
[36]Neiger,Gil,el al. Intel Wtualization Technology: Hardware Support for Efficient Ptopessor^rtualization [J]. Intel Virtualization Technology, 2006,103. :170-171.
[37]袁源,戴冠中_LKM後門綜述[J].電腦科學,2008,35(7) :5-8.
[38]湯小丹,樑紅兵.計算機作業系統[M].第三版.西安:西安電子科技大學出版社,2010,08. 18-20.
軟體工程碩士論文參考文獻三
[1]何龍.基於SOA架構的JBI應用研究.[學位論文].大連:大連海事大學,2010.
[2]劉新兵:基於NET平臺的分散式資料庫管理資訊系統的研究與設計[學位論文].上海:上海交通大學,2007.
[3]劉振頂基於SOA的企業服務匯流排中SOAP訊息路由機制的研究與實現[學位論文],山東,山東大學,2008
[4]俞曉鋒.基於SOA的企業資訊系統整合架構研究[學位論文].吉林大學,2014.
[5]李福盛基於企業服務匯流排的SOA框架研宂與應用[學位論文],山東曲阜,曲阜師範大學,2009
[6]Naveen K,Vishal D.The Role of Service Granularity in A Successful SOARealization-A Case Study. SERVICES-1 2008 86 . 2008
[7]Yang H,Zhao X,Qiu Z,Pu G.A formal model for Web Service choreographydescription language (WS-CDL). Proc. of the IEEE Int'l Conf.on Web Services . 2006
[8] Erl T.Service-oriented architecture,concepts,technology,and design[M] :PearsonEducation,Inc,2004.
[9]Sprott D. Understanding service oriented architecture[EB/OL].(2004).CBDIForum.
[10]Chappell?DaneI.Enterprise Service Bus.Reilly,2004
[11]徐瓊,魯鵬.用於實現Web服務的SOA程式設計模型[期刊].軟體導刊,2007,03:62-64.
[12]楊杉基於ESB的'企業資訊整合方法研究及在電動汽車領域的應用[學位論文].北京:北京郵電大學,2014
[13]徐愷英,鞠彥輝.企業資訊整合系統執行機制研究[期刊].情報科學,2005,06:900-904.
[14]謝小軒,張浩,夏敬華,王堅,李琦.企業應用整合綜述[期刊].計算機工程與應用,2002,22:1-5.
[15]鄭盡.基於ESB企業應用整合架構研究與應用[學位論文].太原理工大學,2013.
[16]張馳,吳健,胡正國,周淑莉.CORBA與Web服務的比較與整合[期刊].計算機工程與設計,2005,08:2213-2215+2218.
[17]餘明哲基於SOA的企業應用整合框架的研究及應用[學位論文].北京,北京郵電大學,2014
[18]王軍基於JMS的訊息中介軟體設計與實現計算機應用23(8) 2003年8月 64-67
[19]龔報鈞.基於多Agent的企業資訊整合理論及應用研究[學位論文].浙江大學,2001.
[20]周航濱,夏安邦,張長昊.基於Web服務的跨企業資訊整合框架[期刊].計算機整合製造系統-CIMS,2003,01:1-5.
[21]吳玉猛.基於本體的虛擬企業資訊整合研究[學位論文].南京理工大學,2009.
[22]周競濤,張樹生,趙寒,王明微,張超,王克飛,董小鋒.基於語義模型的匯流排式企業資訊整合框架[期刊].計算機整合製造系統,2006,03:407-412.
[23]凌曉東.SOA綜述[期刊].計算機應用與軟體,2007,10:122-124+199.
[24]侯嘵麗.OpenESB在數字校園中的研宂與應用[學位論文].北方工業大學,2011.
[25]姬楷基於SOA的企業服務匯流排研究及其應用[學位論文],重慶,重慶大學,2008
[26]王洪祥面向服務架構中的服務組合研究[學位論文],安徽合肥,合肥工業大學,2010
[27]周曉豔.企業服務匯流排(ESB)在SOA中的應用研究[學位論文].大連海事大學,2009.
[28]杜攀,徐進.SOA體系下細粒度元件服務整合的探討[J].計算機應用,2006,03:699-702.
[29]Alahmari, S.; Zaluska, E.; De Roure, A Metrics Framework for Evaluating SOAService Granularity, Southampton, UK: Services Computing (SCC), 2011 IEEEInternational Conference,2011:512-519
[30]Hong Ylng; Yu Wu; Fuming Liu. Notice of Retraction Research on theSOA-based Service Granularity ControlChongqing, China: InformationTechnology and Computer Science (ITCS), 2010 Second InternationalConference,2010:443-446
[31]陳華,方丁,趙衛東.SOA中業務服務粒度與流程柔性的關係研究[J].計算機工程與應用,2009,27:7-10.
[32]石允劍基於雲端計算技術的高校招生管理系統研究[學位論文;1,江蘇南京,南京航空航天大學,2012
[33]曹飛基於OpenESB的企業應用整合研究[學位論文],湖北武漢,武漢理工大學,2010