计算机专业论文参考文献
参考文献在各个学科、各种类型出版物都有着明确的标注法。以下是我为您整理的计算机专业论文参考文献,希望能提供帮助。
篇一:参考文献
[1] 刘韬,楼兴华.SQL Server2000 数据库系统开发实例导航. 北京:人民邮电出版社,2004.
[2] 丁宝康,董健全. 数据库实验教程. 北京:清华大学出版社, 2003:125-170.
[3] 孙强. 基于 的专题网站的研究与设计. 东北师范大学,2006.
[4] Michele Leroux your Apps and WCF services with Windows CardSpace. MSDN Magazine,April 2007.
[5] 肖建编. 编程实例与技巧集粹. 北京:北京希望电子出版社,2003.
[6] 巴兹拉等. 安全性高级编程. 北京:清华大学出版社,2003.
[7] Jesse C#中文版. 电子工业出版社,2006.
[8] 米切尔的等编著. 权威指南. 北京:中国电力出版社,2003.
[9] 曾登高编著..NET 系统架构与开发. 北京:电子工业出版社,2003.
[10] Jeffrey Richter. Applied Microsoft .NET Framework programming.北京:清华大学出版社, 2003.
[11] 张海藩. 软件工程导论. 北京:清华大学出版社, 2003.
篇二:参考文献
[1] 冯燕奎, 赵德奎. JSP实用案例教程[M] 清华大学出版社, 2004, 5: 70-100
[2] 王家华 软件工程[M] 东北大学出版社2001年3月303页
[3] 王宜贵 软件工程[M] 北京:机械工业出版社,2002:20-79
[4] 孙卫琴 精通struts[M]电子工业出版社 2004年8月 50-70
[5] 孙卫琴 精通hibernate[M]电子工业出版社 2005年4月 100-120
[6] 张洪斌 java2高级程序设计[M]中科多媒体出版社 2001年11月 85-90
[7] Jim Arlow and the Unified Process[M]机械工业出版社 2006年6月 30-40
[8] 林信良 技术手册[M]电子工业出版社 2006年6月 50-100
[9] 熊节、林仪明、峰、陈玉泉等主编[《CSDN社区电子杂志——Java杂志》创刊号]
[10]《程序员》杂志 2007 年第4期
[11] 耿祥义编著.JSP基础编程[M].清华大学出版社,
[12]徐建波,周新莲.Web设计原理于编程技术[M].中南大学出版社,
[13] 孙鑫编著.Java Web开发详解[M].电子工业出版社,
[14] 林上杰,林康司编著.技术手册[M].电子工业出版社,
[15] 萨师煊,王珊.数据库系统概论(第三版)[M].北京:高等教育出版社,1998.
[16] 蔡剑,景楠.Java Web应用开发:J2EE和Tomcat[M].北京:清华大学出版社,2004.
篇三:参考文献
[1]Booch G. Object-Oriented design[J]. ACM SIGAda Ada Letters. 1982,1(3): 64-76.
[2]建模的价值IBMRational技术白皮书[R].
[3]邵维忠.杨芙清.面向对象的系统分析[M].北京:清华大学出版社.2000
[4]郑红军.张乃孝.软件开发中的形式化方法[J].计算机科学.1997,24(6): 90-96.
[5]王一川,石纯一.基于n演算的一种Agent组织模型[J].计算机研宄与发展.2003, 40(2): 163-168.
[6]阿丽亚娜5型火箭发射失败的调查报告[R].
[7]Booch G. Object-Oriented design[J]. ACM SIGAda Ada Letters. 1982,1(3): 64-76.
[8]陈鑫,李宣东.基于设计演算的形式化用例分析建模框架[J].软件学报.2008,19(10): 2539-2549
[9]夏志翔,徐中伟,陈祖希等.UML模型形式化B方法转换的实现[J].计算机应用与软件.2011,28(11): 15-20.
[10]袁晓东,郑国梁的面向对象扩充COOZ的设计[J].软件学报.1997,8(9):694-700.
[11]周翔.邵志清.顺序图与状态图的递归语义一致性研宄[J].计算机科学.2010,37(8):172-174.
[12]周翔,邵志清,薛炳蔚.基于ASM的活动图一致性规则研究[J].计算机工程与设计.2009,30(19): 4536-4539
[13]王红英.基于Petri网的软件模型验证[D].华东师范大学,2007.
[14]黄正宝,张广泉.顺序图的XYZ/E时序逻辑语义研究[J].计算机科学.2006,33(8): 249-251.
[15]汪文元,沙基昌.谭东风.基于Petri网和UML活动图工作流建模比较[J].系统仿真学报.2006, 18(2): 504-510
[16]Kroll P,Kruchten P. The rational unified process made easy: a practitioner's guide to the RUP[M]. Addison-Wesley Professional. 2003.
[17]Seung Mo Cho,Hyung Ho Kim, Sung Deok Cha etc al. A semantics of sequence diagrams [J]. Information Processing Letters 84. 2002: 125-130
篇四:参考文献
[1]王仁宏,数值逼近(第2版),高等教育出版社,2012.
[2]姚永雷.Web服务自动协商机制研究(博士论文).北京邮电大学.2007.
[3]程昱.面向自治计算的自动服务协商研究(博士论文).浙江大学.2008.
[4]程皇.高济.基于机器学习的.自动协商决策模型.软件学报.2009,20(8):2160-2169.
[5]郭静.陈英武.1-多交互协议本体的描述.计算机工程.2008,34(12):162-166.
[6]翟社平.魏娟丽.李增智.基于概念语义协商的服务Agent划分.电子学报.2010,38(9):2030-2034.
[7]张林兰,电子市场中的双边同步自动协商研宄(博士论文),华中科技大学,2010.
[8]王斌.李艳.基于多Agent系统的自动协商机制及通用协商框架.计算机工程与科学.2009,31(1):95-98.
[10]甘早斌.朱春喜.马务等.基于遗传算法的关联议题并发谈判.软件学报.2012,23(11):2987-2999.
[11]侯薇.董红斌.印桂生.基于Bayesian学习的适应性优化协商模型.计算机研究与发展.2014,51(4):721-730.
[12]孙天昊.电子商务中一对多协商研宄(博士论文).重庆大学.2008.
[13]吴国全.基于模式的复合服务监管关键技术研宄(博士论文).中国科学技术大学.2009.
[14]程志文.赵俊.李田等.Web服务QoS数据多源采集方法及实现.计算机科学.2009,8(8):180-211.
[15]于卫红.基于JADE平台的多Agent系统开发技术.国防工业出版社.2011.
[16]甘健侯,姜跃,夏幼明,本体方法及其应用,科学出版社,2011.
篇五:参考文献
[1]徐福成.基于RSSI测距的无线传感器网络定位算法研宄[D].四川:西华大学,2014
[2]娄彦翔.移动无线传感器网络中节点复制攻击的高效分布式检测机制研究[D].上海交通大学、2012.
[3]孙琳.基于车载无线自俎网络的高速公路安全信息传输机制研究[D].天津:南开大学,2012.
[4]孙赫.物联网的发展与知识产权保护[D].北京:北京交通大学,2014.
[5]孙宏伟.田新广,李学春,等.一种改进的IDS异常检测模型[J].计算机学报,2004,26(11):1450-1455.
[6]詹杰,吴伶锡,唐志军.无线传感器网络RSSI测距方法与精度分析[J].电讯技术,2010,50(4):83-87.
[7]国务院发展研究中心产业经济研宄部,中国汽车工程学会,大众汽车集团(中国).汽车蓝皮书.中国汽车产业发展报告(2014) [M].北京:社会科学文献出版社,2014
[8]Chlamtac I, Conti M, Liu J J N. Mobile ad-hoc networking: imperatives and challenges[J]. Ad-hoc Networks,2003, 1(1): 13-64.
[9]Choi S J, Youn H Y. An efficient key pre-distribution scheme for secure distributed sensor networks[C]//Embedded and Ubiquitous Computing-EUC 2005 Workshops. Springer Berlin Heidelberg, 2005;1088-1097.[39]Naor M,Pinkas B. Efficient trace and revoke schemes[C]//Financial cryptography. Springer Berlin Heidelberg,2001:1-20.
[10]Katsaros D, Dimokas N,Tassiulas L. Social network analysis concepts in the design of wireless ad-hoc network protocoIs[J]. Network, IEEE, 2010,24(6): 23-29.
这个太难搞了!
Computer network virus and precautions With the new network technology and application of the continuous rapid development of the computer network should Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human More inseparable from the lives of the community's reliance on them will keep growing. With With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of Computer viruses make full use of certain commonly used operating systems and application software for protection of the weak low Spots have rampant in recent years as the popularity of the Internet in the world, will be attached document containing the virus The situation in the mail has been increasing spread of the virus through the Internet, making the spread of the virus speed Sharp also increased, by an ever-increasing scope of the infection. Therefore, the protection of the security of computer networks will be Will become increasingly important. A computer virus The definition of computer virus computer virus (Computer Virus) in the "people's republic of China The computer information system security protection regulations "which has been clearly defined, the virus" refers to the preparation or Computer program inserted in the damage or destruction of computer data functions, affecting computer use Self-replication and can a group of computer instructions, or code. " Second, network virus With the development of network and the Internet, a wider spread, the greater New harm The virus emerged This is the Internet virus. The virus is an emerging concept in the traditional The virus was not classified network virus this concept, because the development of networks, the traditional virus The network also has a number of characteristics. Today's Internet virus is a broad notion of a As as long as it is carried out using the Internet to spread destruction can be known as network viruses, such as: "Love the back door", "Panda burning incense." Third, network virus and the distinction between computer virus The original common computer virus is nothing more than the devastating formatted hard drive, delete system With the users documents, databases, etc. destruction. The mode of transmission is through nothing but also by virus infection Mutual copy of the software, carrying the virus, such as the use of pirated optical discs, such as infection disk systems The pilot virus and infected executable file virus, in addition to a network virus These are the common characteristics of the virus, but also steal users with remote data, remote control of the other side Computers and other damaged properties, such as Trojan and consumption of funding the operation of the network computer Source collapse of the network server worm. Fourth, the network against virus Network destructive virus, will directly affect the work of the network, ranging from lowering speed video Ring for the efficiency of the network, while in the collapse, undermining the server information to a multi-year work destroyed Dan. Because viruses and other network annually fraud led to economic losses of over 16 billion yuan, But this figure is constantly rising year by year. The next few years, the size of the market will reach Security 60 billion yuan. One antivirus software experts pointed out: "Network avian flu virus even more." Such as: "Xiong Cat burning incense "In addition to virus infection through the web site users, the latest virus also through QQ Loopholes in propagating itself through file-sharing networks, the default sharing, weak password systems, U disk and windows Forms bottom of the top mobile hard drives, and other means of communication. While LAN once a computer machine For infection, it can spread through the entire network instant, or even within a very short period of time can be infected Thousands of computers, can lead to serious networks. Symptoms of poisoning in the performance of computers There are enforceable. Exe files have become a strange pattern, the pattern shown as "Panda Burning incense, "and then System blue screen, restart the frequent, hard drive data destruction, serious entire company All computer LAN will all poisoning. "Panda burning incense," only more than half a month, a few varieties have high Of more than 50, and the number of its users infected constantly expanding. Makes infected, "Panda burn incense" disease The personal drug users has been as high as several million people infected with a few more corporate users is rising exponentially. Network More on the computer network the greater the harm caused by the virus. V. network transmission of the virus Features 1. Infection fast: single machine environment, the virus can only be passed from one computer diskette To another, and in the network can be adopted by the rapid spread of network communication mechanism. According to measurement Set against a typical PC network use in normal circumstances, once a computer workstation sick Drugs, and will be online within 10 minutes in the several hundreds of all infected computers. 2. Proliferation of a wide range: in the network due to the spread of the virus very quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in一瞬 Inter spread to thousands of miles away. 3. Dissemination in the form of complex and varied: computer viruses in general through the network " Station server workstation "channels of communication, but in the form of complex and diverse communication. 4. Difficult to completely wipe: the standalone computer virus carriers sometimes can be deleted documents Or low-level formatted drives, and other measures to eliminate the virus completely, and the network once a computer work Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal The work of a workstation is likely to be on-line by another workstation virus infection. Therefore, Only workstations in addition to killing viruses, and can not solve the virus harm to the network is. 6, the type of network virus As the network increasingly developed, the type of network virus has been increasing, generally summed up as The following categories: 1. Worm It is the use of the transmission mechanism of replication and dissemination network, the mode of transmission is through the network And e-mail, the prefix is Worm. For example, in recent years the great harm "Nimda" virus is Demodex A worm virus. The virus used Microsoft's Windows operating system, computer flu With this virus, will continue to automatically dial-up Internet access and use information in the document or the address Sharing network spreads, and ultimately undermine the most important user data. 2. Macro Virus Hong virus is a Storage in the document or template in the Acer computer virus. The prefix Macro, once open such documents, which Acer will be implemented, then the virus would Acer Been enabled transferred to the computer, and in the presence of the Normal template. From then on, all since The document will be kept moving "infection" that the Hong virus, and if other users opened the flu Documents with the virus, the Hong virus will be transferred to his computer. 3. Destructive procedures virus The prefix destructive virus program is: Harm. The characteristics of this virus is a good in itself Look at the user clicks on icons to temptation, when the user clicks on the virus, the virus will direct users Computer generated destruction. If C formatted disk (), the killer orders (Harm. ). 4. System virus The prefix system for the virus: Win32, PE, Win95, W32, W95, and so on. These viruses The characteristics of the general public can be infected with the windows operating system *. exe and *. dll file, And through these documents for dissemination. If the CIH virus. 5. Backdoor virus Backdoor virus prefix is Backdoor. The total of such virus through network - Sowing, opened the back door to the system to the user and potential safety problems. 6. Bundling machine virus Bundled-virus prefix is: Binder. The characteristics of this virus is the virus writers will use Specific procedures will be bundled with a number of applications such as QQ, IE bundled up on the surface It is normal to see the paper, when users run these bundled virus, will run these applications on the surface Procedures, and then tied to the operation of hidden virus, which caused harm to the user. Such as: baled Tied QQ (), the system killer (). 7. Script virus The virus is usually JavaScript scripting code prepared by the malicious code, prefix is usually Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information, Computer user inconvenience caused. 8. Planting procedures virus virus This virus is of the public will run from the in vivo release of one or several new Under the virus to the system directory, by the release of a new virus damage. If the glaciers are sowing (), MSN striker (). 9. Joke virus The prefix is the virus joke: Joke. Also called prank virus. The characteristics of this virus is itself a nice user clicks on icons to temptation, When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact The virus did not destroy any computer user. Such as: ghost () virus. 10. Trojan hacking virus Trojan its prefix is: Trojan, hackers virus prefix General for Hack. Public special Sex is through the network or system loopholes into the user's system and hidden, and then leaked to the outside world User information, hackers virus there is a visual interface to the user's computer remotely Control. Trojans, hackers often paired virus emerging, Trojan horse virus responsible for the invasive power users Brain, and hackers virus will be passed to the Trojan horse virus control. . General Trojan such as QQ News tail Trojan , there are big . Virus Form A PSW or anything like PWD general said that the virus has stolen password function, If some hacker programs, such as network枭雄. 7, the mode of transmission and network anti-virus Through the above, we can see that e-mail viruses spread Click homepage, users download, Others implant, implant, and other loopholes through five computer transmission, so long as holding these five A thoroughfare, we will be able to live better anti-virus network.
155 浏览 2 回答
235 浏览 2 回答
223 浏览 6 回答
122 浏览 3 回答
187 浏览 3 回答
102 浏览 5 回答
232 浏览 5 回答
98 浏览 3 回答
112 浏览 5 回答
309 浏览 3 回答
281 浏览 3 回答
157 浏览 5 回答
235 浏览 4 回答
344 浏览 6 回答
344 浏览 3 回答