6Kopetz H, Verissimo P. Reai Time and Dependability Concepts[M]. New York: Addison-Wesley, 1993.
7WuT. A Real-World Analysis of Kerberos Password Security [A]. I n Proceedings of the 1999 NetWork and Distributed ystemSecurity Symposium[C]. San Diego California:NDSS , 1999:97-111.
8Raoufi A, Shams M, Farzaneh M, et al. Numerical simulation and optimization of fluid flow in cyclone vortex finder[J]. Chemical E ngineering and Processing, 2008, 47(1):128-137.