[1] Candea G, Cutler J, Fox A. Improving availability with recursive micro-reboots: a soft-state system case study[J]. Performance Evaluation Journal, 2004, 56(1-3): 213-248. [2] 张永铮, 方滨兴, 迟悦, 等. 网络风险评估中网络节点关联性的研究[J].计算机学报, 2007,30(2):234~240. ZHANG Yong-zheng, FANG Bin-xing, CHI Yue, et al. Research on network node correlation in network risk assessment[J]. Chinese Journal of Computers, 2007, 30(2):234-240. (in Chinese) [3] You Jing, Xu Jian, Zhao Xuelong,et al. Modeling and availability analysis of nested software rejuvenation policy[C]∥Systems, Man and Cybernetics, 2005 IEEE International Conference on, 2005: 34-38. [4] 钱鸿生, 黄立平. 基于风险管理的软件生命周期模型研究[J]. 通信学报, 2006, 27(5):135-140. QIAN Hong-sheng, HUANG Li-ping. Research on software lifecycle model based on risk management[J]. Journal on Communications, 2006,27(5):135-140. (in Chinese) [5] 王元彪. 智能交通系统中Dijkstra算法的高效实现[J]. 计算机工程,2007, 33(6): 256-258. WANG Yuan-biao. Efficient implementation to Dijkstra arithmetic in ITS[J]. Computer Engineering, 2007,33(6): 256-258. (in Chinese) [6] 鲍培明. 距离寻优中Dijkstra算法的优化[J]. 计算机研究与发展,2001,38(3):307-311. BAO Pei-ming. A optimization algorithm based on Dijkstra’s algorithm in search of shortcut[J]. Journal of Computer Research & Development, 2001,38(3):307-311. (in Chinese) [7] 徐凤生. 求最短路径的新算法[J]. 计算机工程与科学, 2006,8(2):27-29. XU Feng-sheng. The new algorithm for finding the shortest paths[J]. Computer Engineering & Science,2006,8(2):27-29. (in Chinese) |