相似文献/References:
[1]周平东 陈榕.CAR构件的四种运行时形态[J].计算机技术与发展,2010,(04):1.
ZHOU Ping-dong,CHEN Rong.Running States of CAR in Elaura[J].,2010,(12):1.
[2]周毅敏 陈榕.Dalvik虚拟机进程模型分析[J].计算机技术与发展,2010,(02):83.
ZHOU Yi-min,CHEN Rong.Analysis about Process in Dalvik Virtual Machine[J].,2010,(12):83.
[3]包敬海 周小珠 樊东红.基于VMWare构建虚拟网络实验室的研究[J].计算机技术与发展,2010,(06):242.
BAO Jing-hai,ZHOU Xiao-zhu,FAN Dong-hong.Research of Building Virtual Network Laboratory Based on VMWare[J].,2010,(12):242.
[4]段丹青 陈松乔 杨卫平.融合漏洞扫描的入侵检测系统模型的研究[J].计算机技术与发展,2006,(05):131.
DUAN Dan-qing,CHEN Song-qiao,YANG Wei-ping.An Intrusion Detection System Model Merged Vulnerability Scanner[J].,2006,(12):131.
[5]冯涛 宋成明.清剿Java程序中的内存泄漏[J].计算机技术与发展,2006,(07):123.
FENG Tao,SONG Cheng-ming.Exterminates Memory Leaks in Java Programs[J].,2006,(12):123.
[6]周峰.基于虚拟化的办公系统因特网安全访问[J].计算机技术与发展,2010,(10):184.
ZHOU Feng.High-Security Internet Accessing in OA Based on Virtualization Technology[J].,2010,(12):184.
[7]朱团结 艾丽蓉.基于共享内存的Xen虚拟机间通信的研究[J].计算机技术与发展,2011,(07):5.
ZHU Tuan-jie,AI Li-rong.Research on Xen Inter Domain Communication Based on Shared Memory[J].,2011,(12):5.
[8]林龙增 罗省贤.实现多个KVM虚拟机通信的串口转发器方法[J].计算机技术与发展,2012,(02):241.
LIN Long-zeng,LUO Sheng-xian.A Serial Forwarder Method for Communication of Multiple KVM Virtual Machines[J].,2012,(12):241.
[9]张文晓 戴航 黄东旭.基于虚拟机的Rootkit检测系统[J].计算机技术与发展,2012,(07):128.
ZHANG Wen-xiao,DAI Hang,HUANG Dong-xu.A New Rootkit Detection System Based on Virtual Machine[J].,2012,(12):128.
[10]曹伟杰 贺建民 孙志丹.IaaS模式下虚拟机部署机制研究[J].计算机技术与发展,2012,(10):105.
CAO Wei-jie,HE Jian-min,SUN Zhi-dan.Research on Mechanism of Deploying Virtual Machine in Mode of IaaS[J].,2012,(12):105.