相似文献/References:
[1]桂佳平 周雍恺 沈俊 蔡继文 刘功申.基于智能手机恶意代码防范模型的研究[J].计算机技术与发展,2010,(01):159.
GUI Jia-ping,ZHOU Yong-kai,SHEN Jun,et al.Research on Prevention Model of Malicious Code in Smart Phone[J].,2010,(08):159.
[2]李伟.人脸识别算法在智能手机上的实现[J].计算机技术与发展,2008,(01):161.
LI Wei.Implementation of Face Identification in Intelligent Mobile Telephone[J].,2008,(08):161.
[3]李君鹏 陈榕 闻英波.基于CAR构件的“Elastos”手机邮件系统设计和实现[J].计算机技术与发展,2008,(11):5.
LI Jun-peng,CHEN Rong,WEN Ying-bo.Design and Implementation of "Elastos"Smart Phone Email System Based on CAR[J].,2008,(08):5.
[4]周健 马志媛 杨宸.研究智能手机轻量级访问控制的探讨[J].计算机技术与发展,2011,(11):227.
ZHOU Jian,MA Zhi-yuan,YANG Chen.Research on Access Control of Smart Phone[J].,2011,(08):227.
[5]顾亦然 李绪强.基于蓝牙的手机病毒传播模型的研究[J].计算机技术与发展,2012,(04):246.
GU Yi-ran,LI Xu-qiang.Epidemic Model Research of Mobile Virus Based on Bluetooth[J].,2012,(08):246.
[6]杨雄,朱宇光.伪造接入点技术的智能手机拒绝服务攻防策略[J].计算机技术与发展,2013,(10):134.
YANG Xiong[],ZHU Yu-guang[].Strategy of Denial of Service Attack and Defense to Smart Phones of Faked Access Point[J].,2013,(08):134.
[7]王琴,王军.基于智能手机的移动学习系统关键技术研究[J].计算机技术与发展,2013,(10):216.
WANG Qin,WANG Jun.Research on Key Technology of Mobile Learning System Based on Smartphone[J].,2013,(08):216.
[8]李洋,陈小惠. 便携式多生理参数网络化监测研究与设计[J].计算机技术与发展,2015,25(10):187.
LI Yang,CHEN Xiao-hui. Design and Research of Portable Physiological Multi-parameters Network Monitoring[J].,2015,25(08):187.
[9]吴渊,史殿习,杨若松,等. 手机位置和朝向无关的活动识别技术研究[J].计算机技术与发展,2016,26(04):1.
WU Yuan,SHI Dian-xi,YANG Ruo-song,et al.Research on Activity Recognition Technique of Smart Phone Position and Orientation Independent[J].,2016,26(08):1.
[10]傅仁壮[][],吴坤悌[][],符传博[][],等. 基于Android的决策气象服务系统的设计与实现[J].计算机技术与发展,2016,26(08):125.
FU Ren-zhuang[][],WU Kun-ti[][],FU Chuan-bo[][],et al. Design and Implementation of Decision Making Meteorological Information Service Platform Based on Android[J].,2016,26(08):125.