相似文献/References:
[1]周平东 陈榕.CAR构件的四种运行时形态[J].计算机技术与发展,2010,(04):1.
ZHOU Ping-dong,CHEN Rong.Running States of CAR in Elaura[J].,2010,(10):1.
[2]周毅敏 陈榕.Dalvik虚拟机进程模型分析[J].计算机技术与发展,2010,(02):83.
ZHOU Yi-min,CHEN Rong.Analysis about Process in Dalvik Virtual Machine[J].,2010,(10):83.
[3]冯涛 宋成明.清剿Java程序中的内存泄漏[J].计算机技术与发展,2006,(07):123.
FENG Tao,SONG Cheng-ming.Exterminates Memory Leaks in Java Programs[J].,2006,(10):123.
[4]朱团结 艾丽蓉.基于共享内存的Xen虚拟机间通信的研究[J].计算机技术与发展,2011,(07):5.
ZHU Tuan-jie,AI Li-rong.Research on Xen Inter Domain Communication Based on Shared Memory[J].,2011,(10):5.
[5]林龙增 罗省贤.实现多个KVM虚拟机通信的串口转发器方法[J].计算机技术与发展,2012,(02):241.
LIN Long-zeng,LUO Sheng-xian.A Serial Forwarder Method for Communication of Multiple KVM Virtual Machines[J].,2012,(10):241.
[6]张文晓 戴航 黄东旭.基于虚拟机的Rootkit检测系统[J].计算机技术与发展,2012,(07):128.
ZHANG Wen-xiao,DAI Hang,HUANG Dong-xu.A New Rootkit Detection System Based on Virtual Machine[J].,2012,(10):128.
[7]曹伟杰 贺建民 孙志丹.IaaS模式下虚拟机部署机制研究[J].计算机技术与发展,2012,(10):105.
CAO Wei-jie,HE Jian-min,SUN Zhi-dan.Research on Mechanism of Deploying Virtual Machine in Mode of IaaS[J].,2012,(10):105.
[8]韩玲,蔡皖东.面向Microsoft Virtual PC的虚拟机远程检测方法[J].计算机技术与发展,2013,(12):134.
HAN Ling,CAI Wan-dong.Remote Detection Method Oriented Microsoft Virtual PC[J].,2013,(10):134.
[9]江雪,朱永强.基于分层权值的恶意程序仿真系统设计与实现[J].计算机技术与发展,2014,24(04):143.
JIANG Xue,ZHU Yong-qiang.Design and Implementation of One Malicious Program Simulation System Based on Stratification Weights[J].,2014,24(10):143.
[10]孟蒙,茅苏. 基于云计算的可反馈负载均衡策略的研究[J].计算机技术与发展,2014,24(10):135.
MENG Meng,MAO Su. Study on Feedback Load Balancing Strategy Based on Cloud Computing[J].,2014,24(10):135.
[11]包敬海 周小珠 樊东红.基于VMWare构建虚拟网络实验室的研究[J].计算机技术与发展,2010,(06):242.
BAO Jing-hai,ZHOU Xiao-zhu,FAN Dong-hong.Research of Building Virtual Network Laboratory Based on VMWare[J].,2010,(10):242.