[1] Rayburn D. Content delivery networking pricing, costs for outsourced video delivery[EB/OL]. http://www.scribemedia.org/2007/12/12/cdn-pricing-video/. [2] Elson J, Howell J. Handling flash crowds from your garage[C]// Proceedings of the USENIX Annual Technical Conference. Santa Clara, USA: USENIX Association, 2008: 171-184. [3] Gottfrid D. Self-service, prorated super computing fun![EB/OL]. http://open.blogs.nytimes.com/2007/11/01/self-service-prorated-super-com-putting-fun(0). [4] MacAskill D. Scalability: Set Amazons servers on fire, not yours[EB/OL]. hhttp:// blogs.smugmug.com/don/files/ETech-SmugMug-Amazon-2007.pdfi (0). [5] Broberg J, Buyya R, Tari Z. MetaCDN: Harnessing storage clouds for high performance content delivery[J]. Journal of Network and Computer Applications, 2009, 32(5): 1 012-1 022. [6] Li B, Golin M J, Italiano G F, et al. On the optimal placement of web proxies in the internet[C]// Proceedings of the 8th Annual Joint Conference of the IEEE Computer and Communications Societies. IEEEPress, 1999, 3: 1 282-1 290. [7] Krishnan P, Raz D, Shavitt Y. The cache location problem[J]. IEEE/ACM Transactions on Networking, 2000, 8(5): 568-582. [8] Qiu L, Padmanabhan V N, Voelker G M. On the placement of web server replicas[C]// Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies. Anchorage, USA: IEEE Press, 2001: 1 587-1 596. [9] Radoslavov P, Govindan R, Estrin D. Topology-informed internet replica placement[J]. Computer Communications, 2002, 25(4): 384-392. [10] Cronin E, Jamin S, Cheng J, et al. Constrained mirror placement on the internet[J]. IEEE Journal on Selected Areas in Communications, 2002, 20(7): 1 369-1 382. [11] Xu J, Li B, Lee D L. Placement problems for transparent data replication proxy services[J]. IEEE Journal on Selected Areas in Communications, 2002, 20(7): 1 383-1 398. [12] Jia X, Li D, Hu X, et al. Placement of web-server proxies with consideration of read and update operations on the internet[J]. The Computer Journal, 2003, 46(4): 378-390. [13] Cidon I, Kutten S, Soffer R. Optimal allocation of electronic content[C]// Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies. Anchorage, USA: IEEE Press, 2001, 3: 1 773-1 780. [14] Kalpakis K, Dasgupta K, Wolfson O. Optimal placement of replicas in trees with read, write, and storage costs[J]. IEEE Transactions on Parallel and Distributed Systems, 2001, 12(6): 628-637. [15] Tang X Y, Xu J L. QoS-aware replica placement for content distribution[J]. IEEE Transactions on Parallel and Distributed Systems, 2005, 16(10): 921-932. [16] Wang H, Liu P, Wu J J. A QoS-aware heuristic algorithm for replica placement[C]// Proceedings of the 7th IEEE/ACM International Conference on Grid Computing. Bacelona, Spain: IEEE Computer Society, 2006: 96-103. [17] Rodolakis G, Siachalou S, Georgiadis L. Replicated server placement with QoS constraints[J]. IEEE Transactions on Parallel and Distributed Systems, 2006, 17(10): 1 151-1 162. [18] He J, Wu D, Zeng Y P, et al. Towards optimal deployment of cloud-assisted video distribution services[J]. IEEE Transactions on Circuit and System for Video Technologies, 2013, 23(10): 1 717-1 728. [19] Zhu W, Luo C, Wang J, et al. Multimedia cloud computing: Directions and applications[J]. Signal Processing Magazine, 2011, 28(3): 59-69. [20] Wu Y, Wu C, Li B, et al. CloudMedia: When cloud on demand meets video on demand[C]// Proceedings of the 31st International Conference on Distributed Computing Systems. Minneapolis, USA: IEEE Press, 2011: 268-277. [21] Li H T, Zhong L L, Liu J C, et al. Cost-effective partial migration of VoD services to content clouds[C]// Proceedings of the International Conference on Cloud Computing. Washington, USA: IEEE Press, 2011: 203-210. [22] Wang F, Liu J C, Chen M H. CALMS: Cloud-assisted live media streaming for globalized demands with time/region diversities[C]// Proceedings IEEE INFOCOM. Orlando, USA: IEEE Press, 2012: 199-207. [23] Chen F F, Guo K, Lin J, et al. Intra-cloud lightning: Building CDNs in the cloud[C]// Proceedings IEEE INFOCOM. Orlando, USA: IEEE Press, 2012: 433-441. [24] 郭成城, 晏蒲柳. 一种异构 Web 服务器集群动态负载均衡算法[J]. 计算机学报, 2005, 28(2): 179-184. [25] Godfrey B, Lakshminarayanan K, Surana S, et al. Load balancing in dynamic structured P2P systems[C]// Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies. Hong Kang, China: IEEE Press, 2004, 4: 2 253-2 262.
(上接第553页)
[11] Gkoulalas-Divanis A, Verykios V S, Mokbel M F. Identifying unsafe routes for network-based trajectory privacy[C]// Proceedings of the SIAM International Conference on Data Mining. Sparks, USA: SIAM Press, 2009: 942-953. [12] Chow C Y, Mokbel M F, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]// Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems. New York: ACM Press, 2006: 171-178. [13] Chow C Y, Mokbel M F. Enabling private continuous queries for revealed user locations[C]// Proceedings of the 10th International Symposium on Advances in Spatial and Temporal Databases. Boston, USA: Springer, 2007: 258-273. [14] Ghinita G, Kalnis P, Skiadopoulos S. MobiHide: A mobile peer-to-peer system for location-based queries[C]// Proceedings of the 10th International Symposium on Advances in Spatial and Temporal Databases. Boston, USA: Springer, 2007, 221-238. [15] Gkoulalas-Divanis A, Verykios V S. A free terrain model for trajectory k-anonymity[C]// Proceedings of the 19th International Conference on Database and Expert Systems Applications. Turin, Italy: Springer, 2008: 49-56. [16] Mokbel M F, Chow C Y, Aref W G. The new Casper: Query processing for location services without compromising privacy[C]// Proceedings of the 32nd International Conference on Very Large Data Bases. Seoul, Korea: ACM Press, 2006: 763-774. [17] Gedik B, Liu L. Location privacy in mobile systems: A personalized anonymization model[C]// Proceedings of the 25th International Conference on Distributed Computing Systems. Columbus, USA: IEEE Press, 2005, 620-629. [18] Pan X, Xu Ji L, Meng X F. Protecting location privacy against location-dependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(8): 1 506-1 519. [19] 潘晓,郝兴,孟小峰.基于位置服务中的连续查询隐私保护研究[J].计算机研究与发展,2010,47(1): 121-129. [20] 杨晓春,王雅哲,王斌,等.数据发布中面向多敏感属性的隐私保护方法[J].计算机学报,2008,31(4): 574-586. |