相似文献/References:
[1]周平东 陈榕.CAR构件的四种运行时形态[J].计算机技术与发展,2010,(04):1.
ZHOU Ping-dong,CHEN Rong.Running States of CAR in Elaura[J].,2010,(增刊):1.
[2]周毅敏 陈榕.Dalvik虚拟机进程模型分析[J].计算机技术与发展,2010,(02):83.
ZHOU Yi-min,CHEN Rong.Analysis about Process in Dalvik Virtual Machine[J].,2010,(增刊):83.
[3]包敬海 周小珠 樊东红.基于VMWare构建虚拟网络实验室的研究[J].计算机技术与发展,2010,(06):242.
BAO Jing-hai,ZHOU Xiao-zhu,FAN Dong-hong.Research of Building Virtual Network Laboratory Based on VMWare[J].,2010,(增刊):242.
[4]曾蜀芳 郭兵 沈艳.μC/OS-Ⅱ中消息队列通信的数据安全问题[J].计算机技术与发展,2009,(08):151.
ZENG Shu-fang,GUO Bing,SHEN Yan.Data Security of Message Queue Communication in μC/OS-Ⅱ[J].,2009,(增刊):151.
[5]罗恒洋.IPSec在MPLS VPN中的应用[J].计算机技术与发展,2009,(03):168.
LUO Heng-yang.Application of IPSec in MPLS VPN[J].,2009,(增刊):168.
[6]冯涛 宋成明.清剿Java程序中的内存泄漏[J].计算机技术与发展,2006,(07):123.
FENG Tao,SONG Cheng-ming.Exterminates Memory Leaks in Java Programs[J].,2006,(增刊):123.
[7]汤亚玲 秦峰 崔志明..NET平台下库存管理系统的设计模式研究[J].计算机技术与发展,2006,(12):133.
TANG Ya-ling,QIN Feng,CUI Zhi-ming.Research on Design Pattern of Inventory Management Based on. NET Platform[J].,2006,(增刊):133.
[8]周峰.基于虚拟化的办公系统因特网安全访问[J].计算机技术与发展,2010,(10):184.
ZHOU Feng.High-Security Internet Accessing in OA Based on Virtualization Technology[J].,2010,(增刊):184.
[9]朱团结 艾丽蓉.基于共享内存的Xen虚拟机间通信的研究[J].计算机技术与发展,2011,(07):5.
ZHU Tuan-jie,AI Li-rong.Research on Xen Inter Domain Communication Based on Shared Memory[J].,2011,(增刊):5.
[10]林龙增 罗省贤.实现多个KVM虚拟机通信的串口转发器方法[J].计算机技术与发展,2012,(02):241.
LIN Long-zeng,LUO Sheng-xian.A Serial Forwarder Method for Communication of Multiple KVM Virtual Machines[J].,2012,(增刊):241.