4Masahiko Mori.Optical network-based technology to reduce power consumption[J].AIST Today,2010,2(36):7-8.
5Denatious D K,John A.Survey on data mining techniques to enhance intrusion detection[C]//International Conference on Computer Communication and Informatics (ICCCI).Coimbatore (India):[s.n.],2012:1-5.
6Lawton K,Denney B,Guarneri N D,et al.Bochs User Manual[DB/OL].(2012-09-17)[2013-08-12].SourceForge.http://sar.informatik.hu-berlin.de/teaching/neu-etc/osp1/labs/references/bochs-user_manual.htm.
7Klaiber A,The Technology Behind Crusoe? Processors[R/OL]// Santa Clara(USA):Transmeta Corporation,2000.http://www.cs.ucf.edu/~ lboloni/Teaching/EEL5708_2004/slides/paper_aklaiber_19jan00.pdf.
8Nanda S,Li W,Lam L C,et al.BRID:binary interpretation using runtime disassembly[C]//Proceeding of the International Symposium on Code Generation and Optimization.New York (USA):[s.n.].2006:26-29.
10Whitaker A,Shaw M,Gribble S D.Denali:Lightweight virtual machines for distributed and networked applications[C]// In Proceedings of the USENIX Annual Technical Conference.Monterey (USA):USENIX,2002:1-14.