The reference document of the bi-establishment

Source: Internet
Author: User

Article One

[1] Li Gangbiao. Research and implementation of database encryption technology [D]. Taiyuan University of Technology, 2010:18-78.

[2] Yang Yunjun. The design and implementation of Android [M]. Beijing: Mechanical industry Press, 2013:5-65.

[3] Qin Mingfu. Research on digital Image encryption based on chaos theory [D]. Chongqing University, 2009:34-48.

[4] Ke New Year's Day. Anatomy of the Android kernel [M]. Beijing: Electronic industry Press, 2011:67-98.

[5] Li Gang. Crazy Android Handout [M]. Beijing: Electronic industry Press, 2013:12-87.

[6] Wu Ming Air. Research on DES and RSA hybrid encryption algorithm [D]. Harbin Institute of Technology, 2013:13-56.

[7] The peak. Design and implementation of Linux memory management [D]. Shenyang University of Technology, 2007:45-89

[8] Chen is the most. Research and implementation of mobile terminal transparent encryption system based on Android platform [D]. Chongqing University of Technology, 2012:108-150.

[9] Shaoyun, Wang Yu, Duyu, Yue Silver. Research on hybrid encryption technology based on software security [J]. Computer Engineering, 2004,23 (33): 98-100.

[10] Cheng, object, Shi-state. A data encryption scheme based on DES and RSA algorithm [J]. Journal of Henan Institute of Education (Natural Science Edition), 2003,22 (3): 69-71.

[One] Xin chen,songwe i ma,bingli Guo,yan wang,juhao Li, Zhangyuan Chen,yongqi He. A novel Fragmentation-aware spectrum allocation algorithm in flexible bandwidth optical networks[j]. Optical Switching and networking,2014 (12): 6-22.

[12] The Li Zhongxin, Wang. Two kinds of image and video encryption schemes based on partial encryption [J]. Computer Engineering, 2004,4 (11): 11-34.

[Zhu], Zhiwu Liu, Xu Li, Xiangyu. Ratcheting behaviors of the Carbon fiberreinforced PEEK composites:experimenta l Study and numerical simulation[j]. Polymers & Polymer Composite, 2014, (221): 45-230.

Chapter Two

[1] Li Gang. Crazy Android Handout [M]. Beijing: Electronic industry Press, 2013:25-42.

[2] yang is rich. Android Technology Insider [M]. Beijing: Mechanical industry Press, 2011:77-89.

[3] Yang Yunjun. The design and implementation of Android [M]. Beijing: Mechanical industry Press, 2013:45-49.

[4] Ke New Year's Day. Anatomy of the Android kernel [M]. Beijing: Electronic industry Press, 2011:59-70.

[5] Fengsengjiang. Android software security and reverse analysis [M]. Beijing: People's post and telecommunications press, 2013:78-90.

[6] Yu Chengfeng, Li Daiping, Mao Yonghua. ANDROID3.0 memory management mechanism analysis [M]. Computer application and software, 2013:55-80.

[7] with ice ice. Design and implementation of Launcher Launcher under Android platform [D]. Harbin Institute of Technology, 2012:108-150.

[8] Dugizhi, Xu Mingkun. Research and optimization of memory management in Android system [J]. Software, 2012,24 (5): 69-80.

[9] Ma Yue. Android Architecture and applications [D]. Beijing: China University of Geosciences, 2008:330-357.

[10] Yao, Liu Weiguo. Architecture and application development of Android [J]. Computer system applications, 2008,77 (11): 99-111.

[11] Gooweel. Design and implementation of software Automation test scheme for Android operating system [D]. Beijing: China posts and telecommunications, 2012:440-479.

[12] Sun Jian. Design and implementation of application-on-demand loading mechanisms on Android systems [M]. Peking University, 2011:99-110.

[13] Luna. Design and implementation of mobile desktop information system based on Android platform [M]. Xidian University, 2011:290-300.

[14] Gao. Google Android Application Framework principles and programming 36 meters [M]. Misoo,2010:8-13.

[15] Shong, Wang Mingwen. Software design Patterns and their use [J]. Computer Applications, 2002,22 (8): 32-33.

The reference document of the bi-establishment

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.