|
[1] A. Beloglazov and R. Buyya, “Energy Efficient Allocation of Virtual Machines in Cloud Data Centers,” in Proceeding of 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 577-578, 2010. [2] R. Laurikainen, J. Laitinen, P. Lehtovuori, and J. K. Nurminen, “Improving the Efficiency of Deploying Virtual Machines in a Cloud Environment,” in Proceeding of 2012 International Conference on Cloud and Service Computing, pp. 232-239, 2012. [3] S. Sotiriadis, N. Bessis, and F. Xhafa, and N. Antonopoulos, “Cloud Virtual Machine Scheduling: Modelling the Cloud Virtual Machine Instantiation,” in Proceeding of 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Systems, pp. 233-240, 2012. [4] VMware Virtualization, 2011. http://www.vmware.com/virtualization/ [5] Windows Server 2012 R2, 2012. http://www.microsoft.com/zh-tw/server-cloud/products/windows-server-2012-r2/ [6] Proxmox Server Solution GmbH, 2012. http://www.proxmox.com/ [7] Google App Engine, 2010. https://developers.google.com/appengine/ [8] Amazon Web Services (AWS), 2010. http://aws.amazon.com/ [9] Windows Azure- A Microsoft Solution to Cloud, 2010. http://tech.cipper.com/index.php/archives/332 [10] IBM Cloud Compputing, 2010. http://www.ibm.com/ibm/cloud/ [11] OpenNebula, 2010. http://www.opennebula.org/ [12] Eucalyptus, 2010. http://open.eucalyptus.com/ [13] Welcome to Apache Hadoop, 2010. http://hadoop.apache.org/ [14] Sector/Sphere, National Center for Data Mining, 2009. http://sector.sourceforge.net/ [15] B. R. Chang, H. F. Tsai, Z.-Y. Lin, and C.-M. Chen, “Intelligent VVoIP Implementation in UEC Cloud Computing,”, in Proceeding of 2012 International Conference on Machine Learning and Cybernetics, Vol. 2, pp. 519-524, 2012. [16] B. R. Chang, H. F. Tsai, Z.-Y. Lin, and C.-M. Chen, “Access-controlled Video/Voice over IP in Hadoop System With BPNN Intelligent Adaptation,” in Proceeding of 2012 International Conference on Information Security and Intelligence Control, pp. 325-328, 2012. [17] B. R. Chang, C.-P. Young, H. F. Tsai, and R.-Y. Fang, “Timed PR-SCTP for Fast Voice/Video over IP in Wired/Wireless Environments,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 4, pp. 320-331, 2011. [18] B. R. Chang, H. F. Tsai, C.-P. Young, and R.-Y. Fang, “Embedded System for Inter-Vehicle Heterogeneous-Wireless-based Real-Time Multimedia Streaming and Video/Voice over IP,” in Proceeding of 4th International Conference on Innovative Computing, Information and Control, Paper ID: B06-01, 2009. [19] B. R. Chang, H.-F. Tsai, Z.-Y. Lin, C.-M. Chen, and Chien-Feng Huang, “Adaptive Performance for VVoIP Implementation in Cloud Computing Environment,” Lecture Notes in Artificial Intelligence, Vol. 7198, Part III, pp. 356-365, 2012. [20] C. Metz, “AAA Protocols: Authentication, Authorization, and Accounting for the Internet,” Internet Computing (IEEE), Vol. 3, No. 6, pp. 75-79, 1999. [21] Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, pp. 4-20, 2004. [22] Josh Harguess, Changbo Hu and J. K. Aggarwal, “Fusing Face Recognition from Multiple Cameras,” in Proceeding of 2009 Workshop on Applications of Computer Vision, pp. 1-7, 2009. [23] Xudong Jiang, Manhua Liu and Alex Chichung Kot, “Reference Point Detection for Fingerprint Recognition,” in Proceeding of the 17th International Conference on Pattern Recognition, Vol. 1, pp. 540-543, 2004. [24] Christoph Böhm and Maximilian Hofer, Physical Unclonable Functions in Theory and Practice, Springer Verlag, USA, 2012. [25] Aur´elien Mayoue, Biosecure Tool-Performance Evaluation of a Biometric Verification System, 2007, https://www.google.com.tw/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CBwQFjAA&url=http%3A%2F%2Fsvnext.it-sudparis.eu%2Fsvnview2-eph%2Fref_syst%2FTools%2FPerformanceEvaluation%2Fdoc%2FhowTo.pdf&ei=iEEFVMmfD4eC8gXwwIKAAw&usg=AFQjCNFInH2b5cdXfNRLnY-lz3-lqOUhCA&bvm=bv.74115972,d.dGc&cad=rja.
|