|
[1]蔡政修, “雲端系統中異質虛擬資源之低耗能動態管理機制”,行政院國家科學委員會補助大專學生參與專題研究計畫研究成果報告,2012. [2]“Linux KVM 研究室”, http://linuxkvm.blogspot.tw/2012/10/linux-container-linux.html [3]“Linux 核心虛擬技術 – 容器篇”, http://tobala.net/download/lxc/ [4]“LXC”,https://help.ubuntu.com/lts/serverguide/lxc.html#lxc-cgroups [5]“Comparison between OS virtualization and Hypervisor-based virtualization (container vs. virtual machine)”,http://www.servernest.com/container-virtual-machine.html [6]“Docker”, https://docs.docker.com/ [7]“R (programming language)”, http://en.wikipedia.org/wiki/R_(programming_language) [8]“R”,http://www.r-project.org/ [9]“RStudio Server Administrator’s Guide”, https://s3.amazonaws.com/rstudio-server/ rstudio-server-pro-0.98.501-admin-guide.pdf [10]“RStudio”, http://www.rstudio.com/products/rstudio/ [11]“Advanced Encryption Standard”, http://en.wikipedia.org/wiki/Advanced_Encryption_ Standard [12]“The RSA Algorithm”,https://www.math.washington.edu/~morrow/336_09/papers/ Yevgeny.pdf [13]“TurnKey”, http://en.wikipedia.org/wiki/Turnkey [14]姜林杰祐,“程式交易:觀念、方法、技術與解決方案”, 新陸書局出版, 2009. [15]“Nginx”,http://nginx.com/ [16]“apache / lighttpd / nginx 三大開放WEB伺服器比較”, http://mike7120.blogspot.tw/ 2011/02/apache-lighttpd-nginx-web.html [17]H. Shafi, P.J. Bohrer and J. Phelan, Design and validation of a performance and power simulator for PowerPC systems. IBM Journal of Research and Development,47 5–6 (2003), pp. 641–652 [18]Michael L. Pinedo, “Scheduling: theory, algorithms, and systems Forth Edition”, 2012. [19]W.Richard Stevens, “TCP/IP Illustrated, Volume 1: The Protocols”, March, 2011. [20]W. Stevens, “TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms”, January 1997. [21]“Google APP Engine – Google Developers”, https://developers.google.com/appengine/ [22]“Azure: Microsoft’s Cloud Platform”, http://azure.microsoft.com/en-us/ [23]“MariaDB”, https://mariadb.org/ [24]“Redis”, http://redis.io/ [25]S. Patidar, D. Rane and P. Jain, “Challenges of Software Development on Cloud Platform,” World Congress on Information and Communication Technologies (WICT), Mumbai, 11-14 December 2011, pp. 1009-1013. [26]Shuai Zhang; Shufen Zhang; Xuebin Chen. Cloud Computing Research and Development Trend. Future Networks, 2010. ICFN ''10. JAN 2010. Pages 93-97 [27]W. Liu, “Research on Cloud Computing Security Problem and Strategy,”2nd International Conference on Consumer Electronics, Communications and Networks, YiChang, 21-23 April 2012, pp. 1216-1219. [28]C. Tsai, U. Lin, A. Chang and C. Chen, “Information Security Issue of Enterprises Adopting the Application of Cloud Computing,” 6th International Conference on Networked Computing and Advanced Information Management (NCM), Seoul, 16-18 August 2010, pp. 645-649. [29]“xts: Extensible Time Series”, http://cran.r-project.org/web/packages/xts/vignettes/ xts.pdf [30]Liu, Wentao. "Research on cloud computing security problem and strategy." Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on. IEEE, 2012. [31]Mohamed, E. M., Abdelkader, H. S., &; El-Etriby, S. (2012, May). Enhanced data security model for cloud computing. In Informatics and Systems (INFOS), 2012 8th International Conference on (pp. CC-12). IEEE. [32]Baba, Norio, and Kou Nin. "Prediction of Golden Cross and Dead Cross by artificial neural networks could contribute a lot for constructing an intelligent decision support system for dealing stocks." Control, Automation and Systems, 2008. ICCAS 2008. International Conference on. IEEE, 2008. [33]Liao, Raymond R-F., and Andrew T. Campbell. "Dynamic core provisioning for quantitative differentiated services." IEEE/ACM Transactions on Networking (TON) 12.3 (2004): pp. 429-442. [34]Buyya, Rajkumar, et al. "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility." Future Generation computer systems 25.6 (2009): pp. 599-616. [35]Gorlach, Katharina, and Frank Leymann. "Dynamic service provisioning for the cloud." Services Computing (SCC), 2012 IEEE Ninth International Conference on. IEEE, 2012. [36]Zaman, Sharrukh, and Daniel Grosu. "An online mechanism for dynamic VM provisioning and allocation in clouds." Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE, 2012. [37]Boampong, Philogene A., and Luay A. Wahsheh. "Different facets of security in the cloud." Proceedings of the 15th Communications and Networking Simulation Symposium. Society for Computer Simulation International, 2012. [38]Floréal Morandat, Brandon Hill, Leo Osvald, and Jan Vitek. 2012. Evaluating the design of the R language: objects and functions for data analysis. In Proceedings of the 26th European conference on Object-Oriented Programming (ECOOP''12), James Noble (Ed.). Springer-Verlag, Berlin, Heidelberg, pp. 104-131. [39]Esfahanipour, Akbar, and Somayeh Mousavi. "A genetic programming model to generate risk-adjusted technical trading rules in stock markets." Expert Systems with Applications 38.7 (2011): 8438-8445. [40]Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, and Luigi Lo Iacono. 2011. All your clouds are belong to us: security analysis of cloud management interfaces. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop (CCSW ''11). ACM, New York, NY, USA, pp. 3-14.
|