相似文献/References:
[1]周平东 陈榕.CAR构件的四种运行时形态[J].计算机技术与发展,2010,(04):1.
ZHOU Ping-dong,CHEN Rong.Running States of CAR in Elaura[J].,2010,(02):1.
[2]周毅敏 陈榕.Dalvik虚拟机进程模型分析[J].计算机技术与发展,2010,(02):83.
ZHOU Yi-min,CHEN Rong.Analysis about Process in Dalvik Virtual Machine[J].,2010,(02):83.
[3]包敬海 周小珠 樊东红.基于VMWare构建虚拟网络实验室的研究[J].计算机技术与发展,2010,(06):242.
BAO Jing-hai,ZHOU Xiao-zhu,FAN Dong-hong.Research of Building Virtual Network Laboratory Based on VMWare[J].,2010,(02):242.
[4]冯涛 宋成明.清剿Java程序中的内存泄漏[J].计算机技术与发展,2006,(07):123.
FENG Tao,SONG Cheng-ming.Exterminates Memory Leaks in Java Programs[J].,2006,(02):123.
[5]周峰.基于虚拟化的办公系统因特网安全访问[J].计算机技术与发展,2010,(10):184.
ZHOU Feng.High-Security Internet Accessing in OA Based on Virtualization Technology[J].,2010,(02):184.
[6]崔泽永 赵会群.基于KVM的虚拟化研究及应用[J].计算机技术与发展,2011,(06):108.
CUI Ze-yong,ZHAO Hui-qun.Research and Application of Virtualization Based on KVM[J].,2011,(02):108.
[7]朱团结 艾丽蓉.基于共享内存的Xen虚拟机间通信的研究[J].计算机技术与发展,2011,(07):5.
ZHU Tuan-jie,AI Li-rong.Research on Xen Inter Domain Communication Based on Shared Memory[J].,2011,(02):5.
[8]张文晓 戴航 黄东旭.基于虚拟机的Rootkit检测系统[J].计算机技术与发展,2012,(07):128.
ZHANG Wen-xiao,DAI Hang,HUANG Dong-xu.A New Rootkit Detection System Based on Virtual Machine[J].,2012,(02):128.
[9]曹伟杰 贺建民 孙志丹.IaaS模式下虚拟机部署机制研究[J].计算机技术与发展,2012,(10):105.
CAO Wei-jie,HE Jian-min,SUN Zhi-dan.Research on Mechanism of Deploying Virtual Machine in Mode of IaaS[J].,2012,(02):105.
[10]韩玲,蔡皖东.面向Microsoft Virtual PC的虚拟机远程检测方法[J].计算机技术与发展,2013,(12):134.
HAN Ling,CAI Wan-dong.Remote Detection Method Oriented Microsoft Virtual PC[J].,2013,(02):134.