1"CacheLogic Press and Analyst Presentation July2004",http://www.cachelogic.com/research/.
2M.R and 1.Foster,"Mapping the Gnutella network",IEEE Internet Computing,vol.6,pp.50~57,Jan.2002.
3S.Saroiu,P.K.Gummadi,S.D.Gribble,"A Measurement Study of Peer-to-Peer File Sharing Systems",Multimedia Computing and Networking 2002 (MMCN 02).
4S.Sen and J.Wang,"Analyzing Peer-to-Peer Traffic Across Large Networks",ACM/IEEE Transactions on Networking,Vol.12,No.2,April 2004,pp.137 ~ 150.
5D.Stutzbach and R.Rejaie."Towards a Better Understanding of Chum in Peer-to-Peer Networks",Technical Report UO-CIS-TR-04-06,Department of Computer Science,University of Oregon,November 2004.
6Ben Azzouna,N.,Guillemin,F.,"Impact of Peer-to-Peer Applications on Wide Area.Network Traffic:An Experimental Approach ",IEEE Globecom 2004,Dallas,.USA,29 Nov-3 Dec 2004.
7Faloutsos M,Faloutsos P,Faloutsos C."On power-law relationships of the Intemet topology",ACM SIGCOMM Computer Communication Review,1999,29(4):251 ~ 262.