1Sen S, Spatscheck O, Wang D. Accurate, scalable in-network identification of P2P traffic using application signatures[C]//in Proceedings of the 13th International Conference on World Wide Web. New York, 2004.
2Angelo Spognardi, Alessandro Lucarelli. A methodology for P2P file-sharing traffic detection[ C]//in Proceedings of the 2005 Second International Workshop on Hot Topics in Peer-to-Peer Systems (HOT-P2P05). 2005.
3Karagiannis T, Broido A, Brownlee N. Is P2P dying or just hiding? [ C]// IEEE Global Telecommunications Conference Proceeding, v3, Institute of Electrical and Electronics Engineers Inc. Dallas, TX, 2004:1532 - 1538.
4Sen S, Spatscheck O, Wang D. Accurate scalable in network identification of P2P traffic using application signatures [ C ] ff Proceedings of WWW Conference. NY: ACM, 2004: 512-521.
5Karagiannis T, Broido A, Brownlee N, et al. File sharing in the Internet. a characterization of P2P traffic in the backbone [OB/OL]. 2004 [2007-01-15 ]. http://www. cs. ucr. edu/- tkarag.
6Kostas Pagiamtzis, Ali Sheikholeslami. Content addressable memory (CAM) circuits and architectures: a tutorial and survey [J]. IEEE Journal of Solid-State Circuits, 2006, 41(3): 712-727.
7Mahajan R, Floyd S, Wetherall D. Controlling high- bandwidth flows at the congested router [ C]//ICNP 2001. Washington: IEEE, 2001: 192.
8Padhye J, Firoiu V, Towsley D, et al. Modeling TCP throughput:a simple model and its empirical validation [J ]. IEEE/ACM Trans on Networking, 2000, 8 (2) : 133-145.