[1] Howe D, Costanzo M, Fey P, et al. Big data[J]. Nature, 2008, 455(7209):1-136.
[2] Science Staff. Special online collection: dealing with data[J]. Science, 2011, 331(6018):692-693.
[3] James M, Michael C, Brad B, et al. Big data: the next frontier for innovation, competition, and productivity[R]. Washington, DC: McKinsey Global Institute, 2011:27-36.
[4] 王珊,王会举,覃雄派,等.架构大数据:挑战、现状与展望[J].计算机学报, 2011, 34(10):1741-1752. Wang Shan, Wang Huiju, Tan Xiongpai, et al. Architecting big data: challenges, studies and forecasts[J]. Chinese Journal of Computers, 2011, 34(10):1741-1752.
[5] 陈丽娜,王小乐,邓苏,等.CPS体系结构设计[J].计算机科学,2011,38(5):295-300. Chen Lina, Wang Xiaole, Deng Su, et al. Cyber-physical system architecture design[J]. Computer Science, 2011, 38(5):295-300.
[6] West R, Parmer G. A software architecture for next-generation cyber-physical systems[C]//Wei Zhao, Usha V. The NSF Cyber-Physical Systems Workshop. Austin, Texas(USA): National Science Foundation, 2006.
[7] 陈树勇,宋书芳,李兰欣,等.智能电网技术综述[J].电网技术,2009,33(8):1-7. Chen Shuyong, Song Shufang, Li Lanxin, et al. Summary of smart grid technologies[J]. Power System Technology, 2009,33(8):1-7.
[8] Jennifer C H, Liu Sha. A reference architecture for building cyber physical space for independent/assisted living[C]//Wei Zhao, Usha V. The NSF Cyber-Physical Systems Workshop. Austin, Texas(USA): National Science Foundation, 2006.
[9] Hull B, Bychkovsky V, Zhang Y, et al. Cartel: a distributed mobile sensor computing system[C]//Andrew Campbell. Proc of the 4th Int Conf on Embedded Networked Sensor Systems. New York: Association for Computing Machinery, 2006:125-138.
[10] Work D, Alexandre B, Quinn J. Automotive cyber physical system in the context of human mobility[C]//Robert Baillargeon. Proc of National Workshop on High-Confidence Automotive Cyber-Physical System. Troy, Michigan(USA),IEEE,2008.
[11] 袁超伟,张金波,姚建波.三网融合的现状与发展[J].北京邮电大学学报, 2010, 33(6):1-8. Yuan Chaowei, Zhang Jinbo, Yao Jianbo. Present status and development of network convergence[J].Journal of Beijing University of Posts and Telecommunications,2010,33(6):1-8.
[12] Kinne B J. IGO membership, network convergence, and credible signaling in militarized disputes[J]. Journal of Peace Research, 2013, 50(6):659-676.
[13] Lee G M, Lee C S, Rhee W S, et al. Functional architecture for NGN-based personalized IPTV services[J].Broadcasting, 2009, 55(2):329-342.
[14] Aggelou G, Tafazoli R. On the relaying capacity of next-generation GSM cellular networks[J]. IEEE Personal Communication, 2001, 8(1):40-47.
[15] Mohamed A R, Kumar P V, Abhilash S, et al. Design and development of an online database management system (agri-techbase): for agricultural technologies of ICAR[J]. Driving the Economy through Innovation and Entrepreneurship, 2013:869-877.
[16] 任海兰, 罗志会, 刘德明. 基于GMPLS的光突发交换网络的仿真研究[J].计算机科学, 2011, 38(2):114-118. Ren Hailan, Luo Zhihui, Liu Deming. Simulation of GMPLS-based OBS network[J]. Computer Science,2011,38(2):114-118.
[17] Li S, Mo Y. Research and optimization of virtual scene roaming implementation in electronic image processing[J].Advances in Mechanical and Electronic Engineering, 2013: 463-468.
[18] Semersky M L, Huang F, Jan J, et al. Enhanced WLAN association for roaming[P]. USA: 11937854, 2007-11-09.
[19] Lin S H, Chiu J H. The performance evaluation of fast iterative localized re-authentication for 3G/UMTS-WLAN interworking networks[J]. Journal of Ambient Intelligence and Humanized Computing, 2013, 4(2):209-221.
[20] Hamdi M. Réseaux ad hoc aidés par satellites pour les communications d'urgence[D]. Télécom Bretagne, Université de Rennes 1, 2012.
[21] Tsukamoto N, Harada T. A No-Go Theorem for Rotating Stars of a Perfect Fluid without Radial Motion in Projectable Ho?ava–Lifshitz Gravity [J]. Galaxies, 2013,1(3): 261-274.
[22] 钱春丽,张兴敢.用于矿井环境监测的无线传感器网络[J]. 电子技术应用, 2006, 32(9):21-23. Qian Chunli, Zhang Xianggan. Mine environmental monitoring for wireless sensor networks[J]. Application of Electronic Technique, 2006, 32(9):21-23.
[23] 李丽芬,张君艳,朱永利,等.基于多蚁群算法的无线传感器网络路由的跨层设计[J].计算机科学,2011,38(2):59-62. Li Lifen, Zhang Junyan, Zhu Yongli, et al. Cross-layer routing design for wireless sensor networks based on multiple ant colony algorithm[J].Computer Science, 2011, 38(2):59-62.
[24] 董荣胜,马争先,郭云川,等.一种基于马尔可夫博弈的能量均衡路由算法[J].计算机学报, 2013, 36(7):1500-1508. Dong Rongsheng, Ma Zhengxian, Guo Yunchuan, et al. A Markov game theory-based energy balance routing algorithm[J]. Chinese Journal of Computers, 2013, 36(7):1500-1508.
[25] Mohan S, Bak S, Betti E, et al. S3A: Secure system simplex architecture for enhanced security and robustness of cyber-physical systems[C]//Proceedings of the 2nd ACM international conference on High confidence networked systems. Philadelphia, ACM, 2013: 65-74.
[26] 蒋建春,马恒太,任党恩,等.网络安全入侵检测:研究综述[J].软件学报, 2000, 11(11):1460-1466. Jiang Jianchun, Ma Hengtai, Ren Dangen, et al. A survey of intrusion detection research on network security[J]. Journal of Software, 2000, 11(11):1460-1466. |