1Sen S, Spatscheck O, Wang D. Accurate scalable in network identification of P2P traffic using application signatures [ C ] ff Proceedings of WWW Conference. NY: ACM, 2004: 512-521.
2Karagiannis T, Broido A, Brownlee N, et al. File sharing in the Internet. a characterization of P2P traffic in the backbone [OB/OL]. 2004 [2007-01-15 ]. http://www. cs. ucr. edu/- tkarag.
3Kostas Pagiamtzis, Ali Sheikholeslami. Content addressable memory (CAM) circuits and architectures: a tutorial and survey [J]. IEEE Journal of Solid-State Circuits, 2006, 41(3): 712-727.
4Mahajan R, Floyd S, Wetherall D. Controlling high- bandwidth flows at the congested router [ C]//ICNP 2001. Washington: IEEE, 2001: 192.
5Padhye J, Firoiu V, Towsley D, et al. Modeling TCP throughput:a simple model and its empirical validation [J ]. IEEE/ACM Trans on Networking, 2000, 8 (2) : 133-145.