[1]
M Ishiyama, M Kunishi, F Teraoka. An Analysis of Mobility Handling in LIN6[A]. In: International Symposium on Wireless Personal Multimedia Communication[C], (2001).
Google Scholar
[2]
Eriksson J. PeerNet: Pushing peer-to-peer down the stack[A]. In: Proc. of the Int'l Workshop on Peer-To-Peer Systems 2003 (IPTPS 2003)[C], Berkeley, CA, USA, 2003: 268−277.
DOI: 10.1007/978-3-540-45172-3_25
Google Scholar
[3]
Hongbin Luo, Yajuan Qin, et al. A DHT-Based Identifier-to-Locator Mapping Approach for a Scalable Internet[J], IEEE Transactions on Parallel and Distributed Systems, 2009, 20(12): 1790-1802.
DOI: 10.1109/tpds.2009.30
Google Scholar
[4]
Zhang Jianwei. A Network Locality Aware Algorithm Based on Identity Mapping [A]. In: The 2nd International Conference on Signal Processing Systems (ICSPS 2010) [C], (2010).
DOI: 10.1109/icsps.2010.5555859
Google Scholar
[5]
Zhang Hong-ke, Su Wei. Fundamental Research on the Architecture of New Network—Universal Network and Pervasive Services[J]. ACTA ELECTRONICA SINICA, 2007, 35(4): 593-598(in Chinese).
Google Scholar
[6]
Dong Ping, Qin Ya-juan, Zhang Hong-ke. Research on Universal Network Supporting Pervasive Services[J]. ACTA ELECTRONICA SINICA, 2007, 35(4): 599-606(in Chinese).
Google Scholar
[7]
Pind Dong, Hongchao Wang, et al. Evaluation of Scalable Routing Architecture Based on Locator/Identifier Separation[J], Globecom, (2009).
DOI: 10.1109/glocomw.2009.5360746
Google Scholar
[8]
Ying Zhang, Houkuan Huang, et al. A hierarchical and Chord-based semantic service discovery system in the Universal Network[J], International Journal of Innovative Computing, Information and Control, 2009, 5(11): 3745-3753.
Google Scholar
[9]
Balamash A, Krunz M. An overview of web caching replacement algorithms[J]. IEEE Communications Surveys and Tutorials, 2004, 6(2): 44-56.
DOI: 10.1109/comst.2004.5342239
Google Scholar
[10]
Rizzo L, Vicisano L. Replacement Policies for a Proxy Cache [J]. IEEE/ACM Transactions on Networking, 2000, 8(2): 158-170.
DOI: 10.1109/90.842139
Google Scholar
[11]
He Chen, Chen Zhaoxiong, Heyan H. Summary of web caching technology[J]. Mini-Micro Systems, 2004, 25(5): 836-842. (in Chinese).
Google Scholar
[12]
Podlipnig S, Boszormenyi L. A survey of web cache replacement strategies[J]. ACM Computing Surveys, 2003, 35 (4): 374-398.
DOI: 10.1145/954339.954341
Google Scholar
[13]
PENG Yan-Bing GONG Jian DING Wei XU Jia-Ling. Route Lookup in Fractal Active Subnet Prefix Space [J]. CHINESE JOURNAL OFCOMPUTERS, 2005, 28(8): 107-115 (in Chinese).
Google Scholar
[14]
Kihong Park, Walter Willinger. Self-similar Network Traffic and Performance Evaluation[M]. Wiley-Inter science Publication, by John Wiley & Sons, Inc., 2000, 531~553.
Google Scholar
[15]
Gabor Szabo, Bernardo A. Huberman. Predicting the popularity of online content [EB/OL]. http: /www. hpl. hp. com/research/idl/papers/predictions/predictions. pdf.
Google Scholar
[16]
Carlos Cunha, Azer Bestavros, Mark Crovella. Characteristics of WWW client-based traces[R]. Technical Report TR-95-010, Boston University, CS Dept, Boston, MA 02215, April (1995).
Google Scholar
[17]
Jianwei Zhang, Yunfei Guo. Identifier Mapping Buffer Management Based on Markov-Repeated-using -Probability Prediction[A]. In: The 6th International Conference on Wireless Communications, Networking and Mobile Computing ( WiCOM 2010) [C], 2010. 09.
DOI: 10.1109/wicom.2010.5600781
Google Scholar