[1] Voith T,Oberle K,Stein M.Quality of service provisioning for distributed data center inter-connectivity enabled by network virtualization[J].Future Generation Computer Systems,2012,28(3):554-562.
[2] 杨芙清,吕建,梅宏.网构软件技术体系:一种以体系结构为中心的途径[J].中国科学:信息科学,2008,38(6):818-828.
[3] Li H,Zhao H,Cai W,et al.A modular attachment mechanism for software network evolution[J].Physica A:Statistical Mechanics and its Applications,2013,392(9):2025-2037.
[4] Fujii K,Suda T.Semantics-based context-aware dynamic service composition[J].ACM Transactions on Autonomous and Adaptive Systems,2009,4(2):article 12:1-31.
[5] Zhou J,Gilman E,Palola J,et al.Context-aware pervasive service composition and its implementation[J].Personal and Ubiquitous Computing,2011,15(3):291-303.
[6] Zeng L Z,Banatallah B,Ngu A H H,et al.QoS-Aware middleware for web services composition[J].IEEE Trans on Software Engineering,2004,30(5):311-327.
[7] Upadhyaya B,Zou Y,Ng J,et al.Towards quality of experience driven service composition[A].2014 IEEE World Congress on Services (SERVICES)[C].Anchorage,USA,2014.18-20.
[8] 王怀民,尹刚,谢冰,等.基于网络的可信软件大规模协同开发与演化[J].中国科学:信息科学,2014,44(1):1-19.
[9] 刘书雷,刘云翔,张帆,等.一种服务聚合中QoS全局最优服务动态选择算法[J].软件学报,2007,18(3):646-656. Liu Shulei,Liu Yunxiang,Zhang Fan,et al.A dynamic web services selection algorithm with QoS global optimal in web services composition[J].Journal of Software,2007,18(3):646-656.
[10] Korkmaz T,Krunz M.Multi-constrained optimal path selection[A].Proceedings of INFOCOM 2001.Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies[C].Anchorage,USA:IEEE,2001.2:834-843.
[11] Liu L,Feng G.Simulated annealing based multi-constrained QoS routing in mobile ad hoc networks[J].Wireless Personal Communications,2007,41(3):393-405.
[12] Yu T,Zhang Y,Lin K J.Efficient algorithms for Web services selection with end-to-end QoS constraints[J].ACM Transactions on the Web (TWEB),2007,1(1):6.
[13] 马跃勇,王海梅,廖建军.多约束最优路径算法比较研究[J].南京理工大学学报:自然科学版,2012,35(6):749-754. Ma Yueyong,Wang Haimei,Liao Jianjun.Comparative study of multi-constrained optimal path algorithms[J].Journal of Nanjing University of Science and Technology,2012,35(6):749-754.(in Chinese)
[14] 朱强,王慧强,吕宏武,等.VNE-AFS:基于人工鱼群的网络虚拟化映射算法[J].通信学报,2012(S1):170-177. Zhu Qiang,Wang Huiqiang,Lü Hongwu,et al.VNE-AFS:virtual network embedding based on artificial fish swarm[J].Journal on Communications,2012(S1):170-177.(in Chinese)
[15] 王怀民,刘旭东,郎波.软件可信分级规范[EB/OL].http://www.trustie.com/clinks/trustiecriterion.jsp,2009. Wang Huaimin,Liu Xudong,Lang Bo.Software Trustworthiness Classification Specification[EB/OL].http://www.trustie.com/clinks/trustiecriterion.jsp,2009. (in Chinese)
[16] 邹世辰,王慧强,冯光升,等.基于Moran过程的认知中继网络多策略信任演化模型[J].小型微型计算机系统,2014,35(10):2209-2214. Zou Shichen,Wang Huiqiang,Feng Guangsheng,et al.A multi-strategy trust evolution model for cognitive relay network based on Moran process[J].Journal of Chinese Computer Systems,2014,35(10):2209-2214.(in Chinese)
[17] R Miller,D Perlman.Intimate Relationships[M].McGraw Hill Higher Education,New York,USA,2012.
[18] Enron Email Dataset[EB/OL].http://www.cs.cmu.edu/~enron/,2015.
[19] Salama H F.Multicast Routing for Real-Time Communication of High-Speed Networks[M].North Carolina State University,Raleigh,USA,1996.
[20] Cormen T H.Introduction to Algorithms[M].MIT press,Cambridge,USA,2009. |