当前位置: 简表范文网 > 专题范文 > 公文范文 >

2023年软件工程硕士论文参考文献,菁选2篇

| 来源:网友投稿

最新软件工程硕士论文参考文献1  [1]SchillerJH,VoisardA.Location-BasedServices[C].SanFrancisco:MorganKaufmann,2004下面是小编为大家整理的2023年软件工程硕士论文参考文献,菁选2篇,供大家参考。

2023年软件工程硕士论文参考文献,菁选2篇

最新软件工程硕士论文参考文献1

  [1]Schiller J H, Voisard A. Location-Based Services [C]. San Francisco: Morgan Kaufmann,2004

  [2]Jiang B, Yao X. Location-based services and GIS in perspective [C]. Com*rs,Environment and Urban System, 2006, 30(6): 712-725[3]王惠南编著.GPS导航原理与应用[M].科学出版社,2003

  [3]C.Drane, M.Vfacnaughtan and C.Scott. Positioning GSM Telephones [J], IEEE Comm.Magazine, pp.46-59, 1998[4]R.Klukas, G.Lachapeile and M.Fattouche. Cellular Telephone Positioning Using GPS TimeSynchronization [C], GPS World, pp.49-54 1998

  [4]Christie J, Fuller R, Nichols J. Development and deployment of GPS wireless devices forE911 and location based services. Position Location and Navigation Symposium [C], 2002, 60 - 65

  [5]胡加艳,陈秀万,吴雨航,吴才聪.移动位置服务在应急救援中的应用[J].*应急救援.2008(05)

  [6]冯锦海,杨连贺,刘军发等.基于WLAN移动定位的个性化商品信总推荐*台[J].计算机工程与科学.2014(10)

  [7]张寅宝,张威巍,孙卫新.面向位置服务的室内空间数据模型研宂[J].测绘与空间地理信息.2014(11)

  [8]ZhongLiang Deng, Weizheng Ren, Lianming Xu. Localization Algorithm Based onDifference Estimation for Wireless Sensor Networks in Pervasive Computing Environment.Pervasive Computing and Applications [C], 2008, p.479-484.

  [9]Stoyanova T, Kerasiotis F, Efstathiou K. Modeling of the RSS Uncertainty for RSS-BasedOutdoor Localization and Tracking Applications in Wireless Sensor Networks. Sensor Technologiesand Applications (SENSORCOMM) [C], 2010, 45 - 50

  [10]Jun-yong Yoon, Jae-Wan Kim, Won-Hee Lee. A TDoA-Based Localization Using PreciseTime-Synchronization. Advanced Communication Technology (ICACT) [C]3 2012 1266-1271

  [11]韩霜,罗海勇,陈颖等.基于TDOA的超声波室内定位系统的设计与实现[J].传感技术学报.2010(03)

  [12]Hee-Joong Kim, Jihong Lee. Stereo AoA system for indoor SLAM [C]. Control,Automation and Systems (TCCAS), 2013 13th, 1164-1169

  [13]张明华.基于WLAN的室内定位技术研究[D],上海,上海交通大学,2009,36-38

  [14]Weston J L, Titterton D H. Modern Tnertial Navigation Technology and Its Application [J].Electronics & Communication Engineering Journal, 2000, 12(2):49-64

  [15] A.Taheri, A.Singh, A.Emmanuel. Location Fingerprinting on Infrastructure 802.11Wireless Local Area Networks (WLANS) Using Locus [C], Local Com*r Networks, 2004. 29thAnnual IEEE International Conference on. IEEE, 2004, pp. 676-683.

  [16]王赛伟,徐玉滨,邓志安等.基于概率分布的室内定位算法研究[C].国际信息技与应用论坛文集,2009.

  [17]宁静.采用红外织网的室内定位技术[J].激光与红外.2011(07)

  [18]卜英勇,王纪婵,赵海鸣等.基于单片机的高精度超声波测距系统[J].仪表技术与传感器.2007(03)

  [19]HyungSoo Lim, ByoungSuk Choi, JangMyung Lee. An Efficient Localization Algorithmfor Mobile Robots based on RFID System [C]. SICE-ICCAS,Oct. 2006 pp. 5945-5950

  [20]N4air N, Mahmoud Q.H. A collaborative Bluetooth-Based Approach to Localization ofMobile Devices [C]. Collaborative Computing: Networking, Applications and Worksharing(CoIlaborateCom), 2012,363 - 371

  [21]Si nan Gezici, Zhi Tian, Georgios B. Biannakis, et al. Localization via Ultra-WidebandRadios [C]. IEEE Signal Processing Magazine July 2005.

  [22]陈文周.WiFi技术研究及应用[J].数据通信.2008(02)

  [23]李红,郭大群.WiFi技术的优势与发展前景分析[J],电脑知识与技术,2013(5)

  [24]石欣,印爱民,张琦.基于K最近邻分类的无线传感器网络定位算法[J].仪器仪表学报,2014(10)

  [25]Christopher J.C. Burges. A Tutorial on Support Vector Machines for Pattern Recognition[J]. Data Mining and Knowledge Discovery. 1998 (2)

  [26]Asano S,Wakuda Y’ Koshizuka N. A robust Pedestrian Dead-Reckoning PositioningBased on Pedestrian Behavior and Sensor Validity [C]. PLANS’ 2012,328 - 333

  [27]Alvarez D, Gonzalez R.C, Alvarez J.C. Comparison of Step Length Estimators fromWearable Accelerometer Devices [C]. Proc.IEEE EMBS, 2006:5964-5967.

  [28]刘长征,李纬,丁辰等.多种定位技术融合构建LBS体系[J].地理信息世界.2003(03)

  [29]张世.基于惯性传感器和WiFi的室内定位系统的设计与实现[D],北京,北京邮电大学,2012.

  [30]周傲英,杨彬,金澈清等.基于位置的服务:架构与进展[J].计算机学报.2011(07)

  [31 ] W3C, Scalable Vector Graphics (SVG) [OL],

  [32] Eisa S, Peixoto J. Meneses F. Removing Useless APs and Fingerprints from WiFi IndoorPositioning Radio Maps [C]. Indoor Positioning and Indoor Navigation (IPIN), 2013, 1-7

最新软件工程硕士论文参考文献2

  [1]Biun, A. Virtualization techniques : A methodical review of Xen and KVM [A]-Communication in Com*r and Information Science [C],2011:399-410

  [2]Superman J,Venkitachalam G, Lim B. Virtualization I/O Devices on VMWare WorkstationHosted Virtual Machine Monitor [A]. In: Proceeding of the 2001 USENIX Annual TechnicalConference (USENIX ATC 2001) [C]5 Boston, MA, USA, 2001:16-30.

  [3]Quynh? Nguyen Anh. A real-time integrity monitor for Xen virtual machine [A]. InternationalConference on Networidng and Services 2006:110-123.

  [4]Fernandes, Natalia Castro> eto. XNetMon: A network monitor for seeming virtual networks[A]. IEEE International Conference on Communication [C]. 2011:351-356.

  [5]Payne B, Carbone M,Sharif M baxges: an architecture for secure active monitoring usingvirtualization [A], In: Proceeding of the IEEE Symposium on Security arid Privacy, IEEECom*r Society [Cj. Washington, DC, USA,2008:233-247

  [6]Carbone, Martim. Secure and robust monitoring of virtual machines through guest-assistedintrospection [A]. Lecture Notes in Com*r Science, 2012: 22-4L

  [7]Ibrahim, Amani S. CloudSec: A security monitoring appliance for Hirtual Machines in thelaas cloud model [A]. International Conference on Network and System Security [C]- 2011:113-120.

  [8]Guofb Xiang, Hai Jin, Deqing Zou. A Comprehensive Monitoring Framework for VirtualtfiComputing Environment [A]. In: Proa of the 26 International Conference on InformationNetworking (IC01N2012 ) [C], poster, Bali, Indonesia, 2012:551 -556.

  [9]Vmitools project homepage. 2012. Available:

  [10]Payne, Bryan D. Secure and flexible monitoring of virtual machines [A]. Annual Com*rSecurity Applications Conference, ACSAC [C]. 2007:385-397.

  [11]K.Lawton, B.Denney, N.D.Guarneri, V.Ruppert, C.Bothamy. Bochs x86 PC Emulator UserManual [EB/OL].

  [12]Chandra Shekar, N.Fornesic. Analysis on QUME [A]. Communications in Com*r andInformation Science [C], 2011,250:777-781.

  [13]Sharif M, Lee W,Cui W,Lanzi A. Secure in VM monitoring using hardware virtualization[A], In: Proc. of the 16* ACM Conf on Com*r and Communications Security [C]. NewYork: ACM Press, 2009:477-487.

  [14]Garfinkel T,Rosenblum M. A virtual machine introspection based architecture for intrusiondetection [A], In: Proc. of the 10th Network and Distributed System Security Symp [C].Berkeley: USENIX Association, 2003:191-206.

  [15]Barham, Paul. Xen and the art of virtualization [A]. Operating System Review (ACM) [C].2003,275. :164-177.

  [16]P. Barham, B, Dragovic, K. Franser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A.Warfiele. Xen and the art of virtualization [A]. ACM symposium on Operating SystemsPrinciples (SISP19) [C]9 2003:164-180.

  [17]A. Srivastava and V. Ganapathy. Towards a Richer Model of Cloud App Markets [A]. ACMCCS Cloud Computing Security Workshop (CCSW"12) [C], 2012: 101-114.

  [19]项国富,金海,邹德清,陈学.基于虚拟化的安全监控[J].软件学报,2012.

  [20]项国富.虚拟计算环境的安全监控技术研究[DI,华中科技大学,2009.

  [21]Bayer, Ulrich, et al. A ^ew on current malware behaviors [A]. USENIX workshop onlaige-scale exploits and emergent threats (LEET) [C]. 2009:189-203.

  [22]曲文涛,李明禄,翁楚良,跨虚拟机的可信检测[J],计算机科学与_索.2010-2.

  [23]Bryan D. Payen Martim D. P. de A. Carbone Wenke Lee. Secure and Flexible Monitoring ofVirtual Machines [A], Com*r Security Applications Conference [C]. 2007:385-397.

  [24]Gerald J. Popek and Robert P. C^dberg. Formal requirements for virtualizable third‘generation architectures [A]. Communications of the ACM [C], 17,July 1974

  [25]李狗.一个基于硬件虚拟化的内核完整性监控方法[J].计算机科学,2011,38,(12> 68-72.

  [26]Bovet D P, Cesati M. Understanding the Linux Kernel [M] (3rd Edition) ? Sebastopol:O"Reilly Media Press, 2006: 75-123.57

  [27]A. Somayaji and S. Forrest. Automated Response Using System-Call Delays [A]. InProceeding of the 9th USENIX Security Symposium [C],2000: 185-198.

  [28]宋宝华.Linux设备驱动开发详解[M].第二版.北京:人民邮电出版社,2010,11.245-317.

  [29]WolfgangMauerer.深入Linux内核架构[M].第一版.北京:人民邮电出版社,2010.0*13-449.

  [30]Virus and threats descriptions. Rootkit [Z].Win32.Fu.

  [31]Tom Liston,Edskoudis. On the Cutting Edge: Thwarting Virtual Machine Detection [EB/OL].SANSFIRE, 2006.

  [32]Matthew Carpenter, Tom Liston, Edskoudis. Hiding Virtualization fromAttracters andMalware [A]. IEEE Security and Privacy [C]’ 2007.

  [33]Danny Quist, Val Smith. Further Down the VM Spiral [Z]. 2006.

  [34]Tal Garfinkel, Keith Adams, Andres Warfield, et al. Compatibility is Not Transparency:VMM Detection Myths and Realities [A]. Proceeding of the 11A USENIX workshop on Hottopics in operating systems [C]. 2007.

  [36]Neiger,Gil,el al. Intel Wtualization Technology: Hardware Support for Efficient Ptopessor^rtualization [J]. Intel Virtualization Technology, 2006,103. :170-171.

  [37]袁源,戴冠中_LKM后门综述[J].计算机科学,2008,35(7) :5-8.

  [38]汤小丹,梁红兵.计算机操作系统[M].第三版.西安:西安电子科技大学出版社,2010,08. 18-20.

推荐访问:软件工程 参考文献 硕士论文 软件工程硕士论文参考文献 菁选2篇 最新软件工程硕士论文参考文献1 最新软件工程硕士论文参考文献100字

热门文章

追梦筑梦圆梦演讲稿

最近发表了一篇名为《追梦筑梦圆梦演讲稿》的范文,感觉很有用处,这里给大家转摘到。演讲稿特别注重结构清楚,层次简明。在日新月异的现代社会中,在很多情况下需要用到演讲稿,如何写一份恰当的演讲稿呢?下面是小编为大家整理的追梦筑梦圆梦演讲稿,希望能够帮助到大家!追梦筑梦圆梦演讲稿1尊敬的

2022年度中考优秀作文素材别样美三篇

最近发表了一篇名为《中考优秀作文素材别样的美精选三篇》的范文,好的范文应该跟大家分享,看完如果觉得有帮助请记得(CTRL+D)收藏本页。雨过天晴,花坛边上,几只蜗牛缓缓的爬行着,留下一道彩虹般的痕迹,那柔软的外面,是坚硬的外壳,那也是一道的美丽。下面是小编为大家收集整理的关于素材别样的美精

《********大宣讲特别节目》直播观后感

最近发表了一篇名为《2022《********大宣讲特别节目》直播观后感【精选】》的范文,感觉写的不错,希望对您有帮助,希望对网友有用。,安全,在学校里,在校外,安全这个词恐怕是再熟悉不过了吧,让将安全铭记心中,时进刻刻都做到安全,让父母不再操心,让长辈不再担心,让安全从我做起,从身边

建团百周年活动策划

《2022建团百周年活动策划【精选】》是一篇好的范文,感觉很有用处,希望大家能有所收获。党的领导是共青团顺利发展的关键所在,无论是中国早期青年团的建立,还是中国共青团的正式成立,都离不开党的领导。下面小编为大家整理了2022建团百周年策划【精选】的相关内容,以供参考,希望给大家带来帮助!20

大一暑假社会实践报告(精选文档)

本页是最新发布的《2022大一暑假社会实践报告》的详细范文参考文章,感觉写的不错,希望对您有帮助,希望大家能有所收获。这个暑假过得是否充实呢,有些小伙伴在假期中参加了实践,那么如何做一份报告呢?下面是小编整理的2022大一暑假社会实践报告,仅供参考,希望能够帮助到大家。2022大一暑假社会

2022员工培训学习心得体会范本合集(范文推荐)

最近发表了一篇名为《员工培训学习心得体会范文》的范文,感觉写的不错,希望对您有帮助,为了方便大家的阅读。培训能让员工不断的提高,并清楚的意识到自己的缺点。经过员工培训,你一定有许多的收获,不妨来写一篇员工培训心得。你是否在找正准备撰写“员工培训心得体会范文”,下面小编收集了相关的素材,

2022不期而遇作文600字初中记叙文

《不期而遇作文600字初中记叙文》是一篇好的范文,感觉很有用处,希望对网友有用。,美词,像是袭袭的寒风慢慢轻掠大地,刺刺的,一缕****的阳光下有一小缕的橘红色静静的生长。下面是小编为大家收集整理的关于不期而遇600字初中记叙文,一起来看看吧!不期而遇作文600字篇一苏轼有语人间有味是清欢,或许正是

2022年度幼儿园清明节主题活动总结范本

《2022幼儿园清明节主题活动总结范文【精选】》是一篇好的范文,感觉很有用处,为了方便大家的阅读。,又称踏青节、行清节、三月节、祭祖节等,节期在仲春与暮春之交。清明节源自上古时代的祖先信仰与春祭礼俗,以下是小编整理的2022园清明节主题总结,希望可以提供给大家进行参考和借鉴。2022幼儿园清明节

2022年大学生档案自我鉴定300字10篇

2022年普通大学生个人社会实践实习报告精选服务社会做好思想准备和业务准备,公司内部电脑系统都是统一英文系统,就要求自己以职场……[详细]2022年党员思想汇报例文两篇【完整版】所以在以后的学习和生活中,经历过苦难的中国,工作以及生活中,特别是通过学习党章党纪……[详细]企业员工服务意识培训心得体会

以小见大作文500字范本(范文推荐)

最近发表了一篇名为《以小见大作文500字范文【精选】》的范文,感觉写的不错,希望对您有帮助,重新编辑了一下发到。一件事情的发生,离不开时间、地点、人物、事情的起因、经过和结果这六方面,即常说的六要素,只有交待清楚这几方面,才能使读者对所叙述的事,有个清楚、全面的了解。这里小编

2022年度有关安全学习心得合集(2022年)

本页是最新发布的《有关安全学习心得》的详细范文参考文章,感觉很有用处,看完如果觉得有帮助请记得(CTRL+D)收藏本页。有了一些收获以后,可以记录在心得体会中,这么做能够提升的书面表达能力。相信许多人会觉得心得体会很难写吧,下面是小编为大家收集的有关学习心得,供大家参考借鉴,希望可以帮

小学品德教师期末工作总结范本合集

最近发表了一篇名为《小学品德教师期末工作总结范文》的范文,感觉很有用处,重新整理了一下发到这里[http: www fwwang cn]。时光飞逝,如梭之日,回顾这段时间的工作,一定有许多的艰难困苦,是时候在工作总结中好好总结过去的成绩了。下面小编在这里为大家精心整理了几篇小学教师期