[1] |
NASA. Space network users guide (SNUG) revision 10[R]. Goddard Space Flight Center, 2012.
|
[2] |
ETSI. Radio frequency and modulation standard for telemetry,command and ranging (TCR) of geostationary communications satellites[R]. 2002.
|
[3] |
CCSDS. Telemetry channel coding[S]. CCSDS 101.0-B-4.CCSDS, 1999.
|
[4] |
张军 . 面向未来的天地一体化网络技术[J]. 国际航空, 2009,3: 26-29.
|
|
ZHANG J . Air/space/ground networks,a bridge from today to tomorrow[J]. International Aviation, 2009,3: 26-29.
|
[5] |
Xilinx,Inc. Correcting single-event upsets through virtex partial configuration[R]. Xilinx Application Note; XAPP714 (v1.4), 2002: 1-56.
|
[6] |
MICHAEL A , ARMANDO F , REAN G ,et al. A view of transparence computing[J]. Communications of the ACM, 2010,53(4): 50-58.
|
[7] |
SANJAY G , HOWARD G , SHUNTAK L . The Google file system[C]// 19th ACM Symposium on Operating Systems Principles (SOSP 03). New York:ACM, 2003: 29-43.
|
[8] |
陈康, 郑纬民 . 云计算:系统实例与研究现状[J]. 软件学报, 2009,20(5): 1337-1348.
|
|
CHEN K , ZHENG W M . Cloud computing:system instances and current research[J]. Journal of Software, 2009,20(5): 1337-1348.
|
[9] |
王鹏 . 云计算的关键技术与应用实例[M]. 北京: 人民邮电出版社, 2010: 12-20.
|
|
WANG P . Key technologies and application examples of cloud computing[M]. Beijing: PTPRESS, 2010: 12-20.
|
[10] |
李梦君, 李舟军, 陈火旺 . 基于逻辑程序的安全协议验证[J]. 计算机学报, 2004,27(10): 1362-1368.
|
|
LI M J , LI Z J , CHEN H W . Verifying security protocols based on logic program[J]. Chinese Journal of Computers, 2004,27(10): 1362-1368.
|
[11] |
李亚琼, 宋莹, 黄永兵 . 一种面向虚拟化云计算平台的安全机制研究[J]. 计算机学报, 2011,34(4): 684-693.
|
|
LI Y Q , SONG Y , HUANG Y B . A memory global optimization approach in virtualized cloud computing environments[J]. Chinese Journal of Computers, 2011,34(4): 684-693.
|
[12] |
王庆波, 金滓, 何乐 ,等. 虚拟化与云计算[M]. 北京: 电子工业出版社, 2010: 30-80.
|
|
WANG Q B , JIN Z , HE L ,et al. Virtualization and cloud computing[M]. Beijing: Electronic Industry Press, 2010: 30-80.
|
[13] |
陈全, 邓倩妮 . 云计算及其关键技术[J]. 计算机应用, 2009,29(9): 2562-2567.
|
|
CHEN Q , DENG Q N . Cloud computing and its key techniques[J]. Journal of Computer Applications, 2009,29(9): 2562-2567.
|
[14] |
张尧学, 史美林, 张高 . 计算机操作系统教程(第 3 版)[M]. 北京: 清华大学出版社, 2006.
|
|
ZHANG Y X , SHI M L , ZHANG G . Computer operating system tutorial (third edition)[M]. Beijing: Tsinghua University Press, 2006.
|
[15] |
张尧学 . 透明计算:概念、结构和示例[J]. 电子学报, 2004,32(12A): 169-173.
|
|
ZHANG Y X . Transparence computing:concept,architecture and example[J]. Acta Electronic Sinica, 2004,32(12A): 169-173.
|
[16] |
郭道省, 张邦宁, 刘爱军 ,等. 基于透明转发器的卫星通信抗干扰技术及仿真系统[J]. 解放军理工大学学报(自然科学版), 2002,3(1): 40-44.
|
|
GUO D S , ZHANG B N , LIU A J ,et al. Anti-jamming technologies and simulation system for transparent transponder in satellite communication[J]. Journal of PLA University of Science and Technology, 2002,3(1): 40-44.
|