参考文献/References:
[1] 张国亮,王展妮,王田.应用计算机视觉的动态手势识别综述[J].华侨大学学报(自然科学版),2014,35(6):653-657.
[2] 钟必能,陈雁,沈映菊,等.在线机器学习跟踪算法的研究进展[J].华侨大学学报(自然科学版),2014,35(1):41-45.
[3] HEISER G.The role of virtualization in embedded systems[C]//Proceedings of the 1st Workshop on Isolation and Integration in Embedded Systems.New York:Association for Computing Machinery,2008:11-16.
[4] 韦照川,李德明.嵌入式系统发展概述[J].科技信息,2010(1):839.
[5] MASMANO M,RIPOLL I,CRESPO A,et al.Xtratum: A hypervisor for safety critical embedded systems[C]//Proceedings of the 11th Real Time Linux Workshop.Nanjing:Real Time Linux Workshop,2009:153-159.
[6] STEINBERG U,KAUER B.NOVA: A microhypervisor based secure virtualization architecture[C]//Proceedings of the 5th European Conference on Computer Systems.Paris:EuroSys,2010:209-222.
[7] 叶常春.嵌入式虚拟化技术[J].计算机工程与科学,2012,34(3):41-45.
[8] 叶存奎.USB设备协议栈的设计与实现[D].武汉:华中科技大学,2011:1-60.
[9] 周亦敏,隋伟鑫.ARM架构中TrustZone 安全处理技术的研究[J].微计算机信息,2009,24(36):69-71.
[10] VARANASI P,HEISER G.Hardware supported virtualization on ARM[C]//Proceedings of the Second Asia Pacic Workshop on Systems.Tokyo:User Evaluation,2011:231-236.
[11] HERLIHY M,SHAVIT N.多处理器编程的艺术[M].金海,译.北京:机械工业出版社,2009:218-220.
[12] 林小茶,李光.基于嵌入式技术的信任根研究[J].计算机工程与应用,2007,43(16):165-168.
[13] 任爱芝.基于ARM 的可信嵌入式系统设计[J].电脑编程技巧与维护,2011(20):24-25.
[14] ALVES T,FELTON D.TrustZone: Integrated hardware and software security[J].ARM White Paper,2004,3(4):18-24.
[15] FRENZEL T,LACLPRZUMSLI A,WARG A,et al.ARM TrustZone as a virtualization technique in embedded systems[J].Twelfth Real Time Linux Workshop,2010(6):76-79.