[1]
Zhang Ji-gang. Technology of Multi-ensor Data Fusion and its Application on the Exertion of Networking Radar's Combat Effectiveness. Fire Control & Command Control, 9(2009).
Google Scholar
[2]
Almorsy, M. ; Grundy, John ; Ibrahim, A.S. Collaboration-Based Cloud Computing Security Management Framework . 2011 IEEE International Conference on Cloud Computing (CLOUD 2011), pp.364-371(2011).
DOI: 10.1109/cloud.2011.9
Google Scholar
[3]
Lejiang Guo, Yuanmin Tang, Zhuo Liu, Wei Xiong. The Theory and Architecture of Network Control System, In: 2010 International Conference on Intelligent Computing and Cognitive Informatics (ICICCI 2010), pp.183-186(2010).
DOI: 10.1109/icicci.2010.25
Google Scholar
[4]
Zhang Xin ; Lai Song-qing ; Liu Nai-wen. Research on cloud computing data security model based on multi-dimension. 2012 International Symposium on Information Technology in Medicine and Education (ITME 2012), 2, pp.897-900(2012).
DOI: 10.1109/itime.2012.6291448
Google Scholar
[5]
Lejiang GUO, Wei WANG, Fangxin CHEN, Xiao TANG, Weijiang WANG. A Similar Duplicate Data Detection Method Based on Fuzzy Clustering for Topology Formation. Electrical Review, 01b, pp.26-31(2012).
Google Scholar
[6]
Kwang Mong Sim. Agent-Based Cloud Computing . IEEE Transactions on Services Computing, 5( 4), pp.564-577 (2012).
DOI: 10.1109/tsc.2011.52
Google Scholar
[7]
Francisco Garijo, JuanTous, Jose Mmatias Stephen Corley, Marius Tesselaar. Development of a Multi-Agent System for cooperative work with network negotiation capabilities, 1437: 206-221(1988).
Google Scholar
[8]
Shufen Zhang ; Shuai Zhang ; Xuebin Chen ; Shangzhuo Wu. Analysis and Research of Cloud Computing System Instance, 2010. Second International Conference on Future Networks (ICFN. 2010), pp.88-92(2010).
DOI: 10.1109/icfn.2010.60
Google Scholar