3Napster Home Page, Inc. , http://www. napster. com/
4Gnutella Home Page, http://www. gnutella. co. uk/
5Aglets Software Development Kit, http://prdownloads.sourceforge. net/aglets/aglets-2. 0. 2. jar
6Benno J. Overeinder, Etienne Posthumus, and Frances M.T. Brazier Integrating Peer - to- Peer Networking and Computing in the AgentScape Framework
7Lange DB, Oshima M. Programming and Deploying Java Mobile Agents with Aglets. MA: Addison- Wesley,1998.
8Feng XY, Cao JN, Lu J, Chan H. An efficient mailbox -based algorithm for message delivery in mobile Agent systems. In: Picco JP,ed. Proceedings of the MA 2001.LNCS2240, Berlin :Spring Verlag, 2001. 135 - 151.
2[2]Bressan S, Goh CL, Ooi BC, Tan KL. Supporting extensible buffer replacement strategies in database system. In: Delis A, et al., eds. Proceedings of the ACM SIGMOD International Conference on Management of Data. Philadelphia: ACM Press, 1999. 52~64.
3[3]Wong D, Paciorek N, Walsh T, DiCelie J, Young M, Peet B. Concordia: an infrastructure for collaborating mobile agents. In: Rothermel K, et al., eds. Mobile Agents, First International Workshop. Berlin: Springer-Verlag, 1998. 86~97.
4[4]Freenet Home Page. http://freenet.sourceforge.com.
5[5]Gnutella Development Home Page. http://gnutella.wego.com.
6[6]Goh CL, Bressan S, Ooi BC, Anirban M. Storm: a 100% java peersistent storage manager. In: Chaudhri AB, ed. Proceedings of the OOPSLA Worshop on Java and Object. Denver: Hermes Penton Science, 1999. 12~13.
7[7]Gribble S, Halevy A, Ives Z, Rodrig M, Suciu D. What can database do for peer-to-peer. In: Mecca G, et al., eds. Proceedings of the 4th International Workshop on the Web and Databases. Santa Barbara, 2001. 31~36.
8[8]ICQ Home Page. http://www.icq.com.
9[9]Karjoth G, Lange DB, Oshima M. A security model for aglets. Lecture Notes in Computer Science, 1997,1419:188~205.
10[10]Karnik NM, Tripathi AR. Security in the Ajanta mobile agent system. Software-Practice and Experience, 2001,31(4):301~329.