Security and middleware
暂无分享,去创建一个
[1] Daniel G. Bobrow,et al. Book review: The Art of the MetaObject Protocol By Gregor Kiczales, Jim des Rivieres, Daniel G. and Bobrow(MIT Press, 1991) , 1991, SGAR.
[2] Armin Liebl,et al. Authentication in distributed systems: a bibliography , 1993, OPSR.
[3] Mario Tokoro,et al. Al-1/d: a distributed programming system with multi-model reflection framework , 1992 .
[4] Philip A. Bernstein,et al. Middleware: a model for distributed system services , 1996, CACM.
[5] Gordon S. Blair,et al. The Design and Implementation of Open ORB 2 , 2001, IEEE Distributed Syst. Online.
[6] Randy H. Katz,et al. Adaptation and mobility in wireless information systems , 2002, IEEE Communications Magazine.
[7] Per Brinch Hansen,et al. Operating System Principles , 1973 .
[8] Deng Chun. Three-Tiers Client/Server Architecture and Its Application in 3D Terrain VR , 2003 .
[9] Massachusett Framingham,et al. The Common Object Request Broker: Architecture and Specification Version 3 , 2003 .
[10] Brian Cantwell Smith,et al. Procedural reflection in programming languages , 1982 .