参考文献
[1]黄永兵,陈明宇.移动设备应用程序的体系结构特征分析[J].计算机学报,2015,38(2):386-392.
[2]王谦,熊书明.一种面向移动云存储的可验证访问控制方案[J].计算机工程,2016,42(5):35-41.
[3]Abolfazli S,Sanaei Z,Ahmed E,et al.Cloud-based Augmentation for Mobile Devices:Motivation,Taxo-nomies,and Open Challenges[J].IEEE Com-munications Surveys & Tutorials,2014,16(1):337-368.
[4]Khan A R,Othman M,Madani S A,et al.A Survey of Mobile Cloud Computing Application Models[J].IEEE Communications Surveys & Tutorials,2014,16(1):393-413.
[5]王惠峰,李战怀,张晓,等.支持并发更新的云存储数据持有性审计方法[J].计算机工程,2016,42(2):15-20.
[6]杨波,冯登国,秦宇,等.基于TrustZone的可信移动终端云服务安全接入方案[J].软件学报,2016,27(6):1325-1327.
[7]Yang Lei,Cao Jiannong,Cheng Hui,et al.Multi-user Computation Partitioning for Latency Sensitive Mobile Cloud Applications[J].IEEE Transactions on Com-puters,2015,64(8):2253-2266.
[8]Tu Shanshan,Huang Yongfeng.Towards Efficient and Secure Access Control System for Mobile Cloud Com-puting[J].China Communications,2016,12(12):43-52.
[9]Ghao Chunhong,Liu Guohua,Wang Ning,et al.Text Data Integrity Detection Scheme in Outsourced Database Modal[J].Journal of Chinese Computer Systems,2010,31(9):1790-1796.
[10]Ananthi S,Sendil M S,Karthik S,et al.Privacy Preserving Keyword Search over Encrypted Cloud Data[J].Computer and lnformation Science,2011,190(5):480-487.
[11]Liu Fangming,Shu Peng,Jin Hai,et al.Gearing Resource-poor Mobile Devices with Powerful Clouds:Architectures,Challenges,and Applications[J].IEEE Wireless Communications,2013,20(3):14-22.
[12]杨芳萍.余度系统中的动态同步和表决控制[J].计算机工程,2014,40(4):313-317.
[13]丁强,陈祥献,黄海.基于状态表决的安全计算机数据库更新算法[J].计算机工程,2013,39(3):16-19.
[14]Martino L,Read J,Luengo D.Independent Doubly Adaptive Rejection Metropolis Sampling Within Gibbs Sampling[J].IEEE Transactions on Signal Processing,2015,63(12):3123-3138.
[15]Lan Fan,Pan Yun,Cheng Kwang-ting.An Efficient Network-on-Chip Yield Estimation Approach Based on Gibbs Sampling[J].IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems,2016,35(3):447-457.
编辑陆燕菲 |