1Kendall K. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems [D].USA:MIT (Massachusettes Institute of Technology),Department of Electrical Engineering and Computer Science, 1999-06.
5David B Kirk, Wenmei W. Hwu. Programming mas- sively parallel processors[M]. San Francisco: Morgan Kaufmann, 2010.
6Uzi Vishkin. Optimal parallel pattern--matching in strings[J]. Information and control, 1985,67 (1/3): 91-113.
7Nevill-- Manning, Craig G. Protein is incompressible[C]//Proceedings of the 1999 Data Compression Con- ference. Snowbird, UT, USA: IEEE, 1999: 257- 266.