|
[1]S. Zhang, X. Chen, and S. Wu, “Analysis and Research of Cloud Computing System Instance,” International Conference on Future Networks, 2010. ICFN '10. Second, pp.88-92, Jan. 2010. [2]C. Gong, J. Liu, Q. Zhang, H. Chen, and Z. Gong, “Analysis and Research of Cloud Computing System Instance,” International Conference on Parallel Processing Workshops, Vol.39, pp.275-279, Sep. 2010. [3]L. Zhang, and Q. Zhou, “CCOA: Cloud Computing Open Architecture,” IEEE International Conference on Web Services, pp.607-616, July 2009. [4]L. Gen, D. Fu, Z. Jinzy, and G. Dasmalchi, “Cloud Computing- IT as a Service,” IT Professional, IEEE Computer Society, Vol. 11, pp.10-13, Mar. 2009. [5]W. Hanqian, D. Yi, C. Winer, and Y. Li, “ Network Security for Virtual Machine in cloud computing,” Proc. Of 5th ICCIT Conference, pp.18-21, Dec. 2010. [6]S. Ramgovind, M.M. Eloff, and E. Smith, “The Management of Security in Cloud Computing,” Information Security for South Africa (ISSA), pp.1-7, Sep. 2010. [7]A. Tripathi, and A. Mishra, “Cloud Computing Security Considerations, ”IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp.1-5, Sep. 2011. [8]Y. Chu, Y. Chen, Y. Chou, and M. Tseng, “A simplified cloud computing network architecture using future internet technologies,” Asia-Pacific Network Operations and Management Symposium (APNOMS), Vol. 13, pp.1-4, Sep. 2011. [9]I. Pratt, K. Fraser, S. Hand, C. Limpach, and A. Warfield, “Xen 3.0 and the Art of Virtualization,” Linux Symposium, pp.65-77, July 2005. [10]S.B. Nigmandjanovich, and A. Chang-Won, “Policy-based dynamic resource allocation for virtual machines on Xen-enabled,” Proc. of 2nd ICACC Conference, pp.353-355, June. 2010. [11]A. Lenk, and M. Klems, “What’s inside the cloud? an architectural map of the cloud landscape,” Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing , May. 2009. [12]R. P. Goldberg, “Architecture of virtual machines,” Honeywell Information Systems, pp.32-38, July 1973. [13]I. Kim, T. Kim, and Y. Eom, “NHVM: Design and Implementation of Linux Server Virtual Machine Using Hybrid Virtualization Technology,” Proc. Of Computational Science and Its Applications (ICCSA), 2010 International Conference, pp. 171-175, June. 2010. [14]Y.C. Cho, and J.W. Jeon, “Sharing Data Between Processes Running on Different Domains,” Control, Automation and Systems, 2007, International Conference, pp.1255-1260, Dec. 2007. [15]X. Shi , C. Liu , S. Wu , H. Jin , X. Wu, and D. Li ,“A Cloud Service Cache System Based on Memory template of virtual machine,” Chinagrid Conference (ChinaGrid), 2011 Sixth Annual, pp.168-173, Oct. 2011. [16]B. Adamczyk, and A. Chydzinski,“On the performance isolation across virtual network adapters in Xen,” Institute of Computer Sciences, Silesian University of Technology, pp.1-11,Dec. 2010. [17]Q. Li, S. Chen, W. Wang, and L. Li, “AnDevice Case Temperature Closed-loop Control System During Burn-in Test,” International Conference on (ICRMS),Vol. 9,pp.1048-1051,June. 2011. [18]M. Ku, D. Min,and E. Choi, “Analysis of Virtual Machine Creation Characteristics on Virtualized Computing Environment,” International Conference on Networked Computing and Advanced Information Management (NCM),PP. 1-6 ,June. 2011. [19]PassMark Software, http://www.passmark.com/. [20]Linux/Unix nbench http://www.tux.org/~mayer/linux/bmark.html. [21]Nbench-維基百科, http://en.wikipedia.org/wiki/NBench. [22]Information technology-維基百科 http://en.wikipedia.org/wiki/Information_Technology.
|