3University College London, 26 Gordon Square, London, WC1.The bentham project [J/OL]. URL: http:∥www. ucl.ac.uk/Bentham-Project/index.htm.
4The internet encyclopedia of philosophy [J/OL]. URL: http:∥www. utm.edu/research/iep/m/millj s.htm#Utilitarianism.
5Denning, Dorothy E. Concerning hackers who break into computer systems[J/OL].Paper presented at the 13th National Computer Security Conference, Washington, 1990, (10): 1-4. URL:http:∥www. cpsr. org/cpsr/privacy/crime/denning.hackers.html.
8Yossef B Z, Keidar I, Schonfeld U. Do Not Crawl in the DUST: Different URLs with Similar Text[C]//Proc. of the 15th International Conference on World Wide Web. Edinburgh, UK.. ACM Press, 2006.
9Soon Lay-Ki, Lee SancHo. Identifying Equivalent URLs Using URL Signatures[C]//Proc. of 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems. Washington D. C. , USA: IEEE Computer Society, 2008.
10Manku G S, Jain A, Sarma A D. Detecting Near-duplicates for Web Crawling [C]//Proc. of the 16th International Conference on World Wide Web. Banff, Alberta, Canada: ACM Press, 2007.