参考文献(References):
[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1): 71-83.
QIN Deng-guo, ZHANG Min, ZHANG Yan, et al. Cloud computing security research [J]. Journal of Software, 2011, 22 (1): 71-83.
[2] 赵瑞芹,宋振峰.亚健康问题的研究进展[J].国外医学:社会学分册,2002,21(4): 10-13.
ZHAO Rui-qin, SONG Zhen-feng. The research progress of sub health problems [J]. Foreign Medical Sciences: Section of Social Medicine, 2002, 21 (41):10-13.
[3] 倪红梅,方盛泉,何裕民,等.试析亚健康状态与心身病证的相关性[J].上海中医药大学学报,2008,22(1):13-15.
NI Hong-mei, FANG Sheng-quan, HE Yu-min, et al. Correlation analysis of sub-health status and psychosomatic diseases [J]. Journal of Shanghai University of Traditional Chinese Medicine, 2008, 22 (1): 13-15.
[4] 贾平.关注网络的“亚健康”[J].兵团教育学院学报,2004,14(2): 78-79.
JIA Ping. Concern on the sub-health state of networks [J]. Journal of Bingtuan Education Institute, 2004,14 (2): 78-79.
[5] 黄大荣,汪鹏.网络系统“亚健康”状态的性能退化评估模型[J].南京航空航天大学学报,2011,43(7): 60-63.
HUANG Da-rong, WANG Peng. Performance degradation assessment model of "sub health" state of network system [J]. Journal of Nanjing University of Aeronautics and Astronautics, 2011, 43 (7): 60-63.
[6] 王光辉,王琦,薛俊宏,等.亚健康干预的现状与进展[J].世界中西医结合杂志,2010,5(10): 908-913.
WANG Guang-hui, WANG Qi, XUE Jun-hong, et al. Current situation and development of sub health intervention [J]. World Journal of Integrated Traditional and Western Medicine, 2010, 5(10): 908-913.
[7] 胡镜清,江丽杰,彭锦,等.现代医学模式下亚健康概念特征属性的思考及意义[J].中国中医基础医学杂志,2011,17(6): 683-690.
HU Jing-qing, JIANG Li-jie, PENG Jin, et al. Thinking and meaning of the characteristics of subhealth concept in modern medical mode [J]. China Journal of Basic Medicine in Traditional Chinese Medicine, 2011, 17 (6): 683-690.
[8] 黄鹂,原嘉民,欧爱华,等.基于决策树的亚健康状态影响因素模型[J].使用医学杂志,2011,27(1): 121-124.
HUANG Li, YUAN Jia-min, OU Ai-hua, et al. Influence factors model of sub health state based on decision tree [J]. The Journal of Practical Medicine, 2011,27(1): 121-124.
[9] 王利敏,曲彬彬,赵歆,等.基于结构方程模型的亚健康状态中医症候量化分析研究[J].中华中医药杂志,2011, 26(5): 1033-1036.
WANG Li-min, QU Bin-bin, ZHAO Xin, et al. Quantitative analysis and research of TCM symptoms of sub-health status based on the structural equation model [J]. China Journal of Traditional Chinese Medicine and Pharmacy, 2011, 26(5): 1033-1036.
[10] 罗晓芳.基于模糊集与神经网络的亚健康诊断[J].杭州师范学院学报,2004,3(2): 105-109.
LUO Xiao-fang. Diagnosis of the quasi-health state based on the fuzzy sets and neural networks [J]. Journal of Hangzhou Teachers College, 2004, 3(2):105-109.
[11] 林森.复杂系统评价方法研究——以科研系统评价为例[D].山东:青岛大学, 2007.
LIN Sen. Research on the evaluation method of complex systems: taking the evaluation of scientific research system as an example [D]. Shandong: Qingdao University, 2007.
[12] 郭东强, 王志江. 管理信息系统综合评价的数学模型\[J\]. 运筹与管理, 2000,9(3): 74-80.
GUO Dong-qiang,WANG Zhi-jiang. The mathematical model of thecomprehensive evalua tion on MIS. Operations Research and Management Science[J]. 2000,9(3): 74-80.
[13] 闵文杰,陈建明,张仲义.信息系统评价指标体系及方法的研究[J].铁道学报,2000,22(5): 37-41.
MIN Wen-jie, CHEN Jian-ming, ZHANG Zhong-yi. Research on index system and method of information system evaluation [J]. Railway Transaction, 2000,22(5): 37-41.
[14] 汤志伟,符萍.基于小波神经网络的信息系统综合评价模型[J].电子科技大学学报,2005, 34(5): 672-675.
TANG Zhiwei, FU Ping. Integrated evaluation model of information system based on wavelet neural network [J]. Journal of University of Electronic Science and Technology of China, 2005, 34(5): 672-675.
[15] BALSAMO S, MARCO A D, INVERARDI P, et al. Modelbased performance prediction in software development: a survey [J], IEEE Transactions on Software Engineering, 2004, 30(5): 295-310.
[16] LIU X, ZHU X, SINGHAL S, et al. Adaptive entitlement control of resource containers on shared Servers [C] ∥ Proceedings of 9th IFIP/IEEE International Symposium on Integrated Network Management. Nice: IEEE, 2005: 163-176.
[17] XING F, YOU H, LU C D. Statistical performanceanalysis for scientific applications [C] ∥ ACM Conference on Extreme Science and Engineering Discovery Environment. Atlanta: ACM, 2014: 1-8.
[18] SHEN S, VAN BEEK V, IOSUP A. Statistical characterization of business-critical workloads hosted in cloud datacenters [C] ∥ IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. Shenzhen: IEEE, 2015: 465-474.
[19] OZISIKYILMAZ B, MEMIK G, CHOUDHARY A. Machine learning models to predict performance of computer system design alternatives [C] ∥ Proceedings of the 37th International Conference on Parallel Processing, Portland: IEEE, 2008: 495-502.
[20] GANAPATHI A, KUNO H, DAYAL U, et al. Predicting multiple metrics for queries: better decisions enabled by machine learning [C] ∥ Proceedings of the 2009 IEEE International Conference on Data Engineering. Shanghai: IEEE, 2009: 592-603.
[21] KWONG R H, YONGE-MALLO D L. Fault diagnosis in discrete-event systems with incomplete models: learnability and diagnosability [J]. IEEE Transactions on Cybernetics, 2015, 45(7): 1236-1249.
[22] 欧阳丹彤,李江娜,耿雪娜.离散事件系统故障的极小观测序列[J].湖南大学学报:自然科学版,2016,43(4): 147-152.
OU YANG Dan-tong, LI Jiang-na, GENG Xue-na. Minimal observation sequence of discrete event system fault [J]. Journal of Hunan University: Natural Science Edition, 2016, 43(4): 147-152.
[23] Google App Engine. Google Inc. [EB/OL]. [2017-01-10]. http:∥code.google.com/appengine/.
[24] Cloudstatus. Hyperic Inc. [EB/OL].[2017-01-10]. http:∥www.cloudstatus.com/.
[25] WARD J S, BARKER A. Observing the clouds: a survey and taxonomy of cloud monitoring [J]. Journal of Cloud Computing, 2014, 3(1): 1-30.
[26] ALHAMAZANI K, RANJAN R, MITRA K, et al. An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art [J]. Computing, 2013, 97(4): 357-377.
[27] HUANG H, WANG L. P&P: a combined pushpull model for resource monitoring in cloud computing environment [C] ∥ IEEE 3rd International Conference on Cloud Computing. Miami: IEEE, 2010: 260-267.
[28] LI D Z, LIU J H, DONG X, et al. Application-oriented cloud monitoring data distribution mechanism [J]. Journal of Shanghai Jiaotong University, 2015, 20(2): 149-155.
[29] BRUMMETT T, SHEINIDASHTEGOL P, SARKAR D, et al. Performance metrics of local cloud computing architectures [C] ∥ IEEE International Conference on Cyber Security and Cloud Computing. New York: IEEE, 2015: 25-30.
[30] CAO B Q, LI B, XIA Q M. A service-oriented qos-assured and multiagent cloud computing architecture [J]. Cloud Computing, 2009: 644-649.
[31] PAPAZOGLOU M P, VAN D H W. Blueprinting the cloud [J]. IEEE Internet Computing, 2011, 15(6):74-79.
[32] COOPER B F, SILBERSTEIN A, TAM E, et al. Benchmarking cloud serving systems with YCSB [C] ∥ Proceedings of ACM Symposium on Cloud Computing. Indianapolis: ACM, 2010: 143-154.
[33] CHHETRI M B, CHICHIN S, VO Q B, et al. Smart CloudBench: a framework for evaluating cloud infrastructure performance [J]. Information Systems Frontiers, 2016, 18(3): 413-428.
[34] HWANG K, BAI X, SHI Y, et al. Cloud performance modeling with benchmark evaluation of elastic scaling strategies [J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(1): 130-143.
[35] CHEN P, XIA Y, PANG S, et al. A probabilistic model for performance analysis of cloud infrastructures [J]. Concurrency and Computation Practice and Experience, 2015, 27(17): 4784-4796.
[36] HEALTH T, DINIZ B, CARRERA E V, et al. Energy conservation in heterogeneous server clusters [C] ∥ Proceedings of the ACM SIGPLAN Symp osium on Principles and Practice of Parallel Programming. Chicago: ACM, 2005: 186-195.
[37] CHEN G, HE W B, LIU J, et al. Energy-Aware server provisioning and load dispatching for connectionintensive Internet services [C] ∥ Proceedings of the NSDI. San Francisco: ACM, 2008: 337-350.
[38] 基于电压动态调整技术设计的启发式调度算法. [EB/OL]. [2010-3-26]. http:∥www.searchdatacenter.com.cn/showcontent_33068.htm.
[39] GHOR HE,CHETTO M. EDeg-fs: a heuristic for scheduling and dynamic power management in embedded energy harvesting systems with DVFS facilities [C] ∥2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS), Dubai: WASET, 2015: 1-6.
[40] PADALA P, ZHU X Y, WANG Z K, et al. Performance evaluation of virtualization technologies for server consolidation[J].Virtualization with VMware Esx Server, 2007(9): 161-196.
[41] SONG Y, ZHANG Y W, SUN Y Z, et al. Utilityanalysis for Internet-oriented server consolidation in VM-based data centers [C]∥ Proceedings of the CLUSTER, New Orleans: IEEE, 2009: 1-10.
[42] 宋杰,李甜甜,阎振兴,等.一种云计算环境下的能效模型和度量方法[J].软件学报,2012, 23(2): 200-214.
SONG Jie, ZHANG Tian-tian, YAN Zhen-xing, et al. A model of energy efficiency and measurement method in cloud computing environment [J]. Journal of Software, 2012, 23(2): 200-214.
[43] OpenSolaris VPC Gateway. Oracle Inc. [EB/OL]. (2009-12-07) [2017-01-10]. http:∥kenai.com/projects/osolvpc/pages/Home.
[44] MEDHIOUB M, HAMDI M, KIM T H. Requirements capture and comparative analysis of cloud security techniques [J]. International Journal of Grid and Distributed Computing, 2015, 8(2): 285-308.
[45] SONI D, PATEL H. Privacy preservation using novel identity management scheme in cloud computing [C] ∥ Fifth International Conference on Communication Systems and Network Technologies. Gwalior: IEEE 2015: 714-719.
[46] MUHAMMAD A, SHAKEEL H. Virtualization security: analysis and open challenges [J]. International Journal of Law and Information Technology, 2015,8(2): 237-246.
[47] RAJ H, NATHUJI R, SINGH A, et al. Resource management for isolation enhanced cloud services [C] ∥ Proceedings of the 2009 ACM Workshop on Cloud Computing Security. Chicago: ACM, 2009: 77-84.
[48] SEN P, SAHA P, KHATUA S. A distributed approach towards trusted cloud computing platform [C] ∥ Applications and Innovations in Mobile Computing. Kolkata: IEEE, 2015: 146-151. |