[1]
RIPEANU M, Book title, Peer-to-peer architecture case study: Gnutella network[C] / / Pros of the 1st International Conference on Peer-to-Peer Computing. Linkoping: IEEE Computer Society, 2001: 99-100.
DOI: 10.1109/p2p.2001.990433
Google Scholar
[2]
M ITZENM ACHER M, Compressed B loom filters [J]. IEEE /ACMTrans on Networking, 2002, 10(5): 604- 612.
Google Scholar
[3]
FENET S, SOLN ON Searching for maximum cliques with ant colony optimization [J]. Applications of Evolutionary Computing, 2003, 26(11): 236- 245.
DOI: 10.1007/3-540-36605-9_22
Google Scholar
[4]
HUA Zhen, FAN Hui, L I J in- jiang, et al. Solving point covering problem by ant algorithm [C] / /Proc of International Conference on Machine Learning and Cybernetics. Shanghai [s. n. ] , 2004: 3501-3504.
DOI: 10.1109/icmlc.2004.1380395
Google Scholar
[5]
CAIDA working group. CAIDA Measurement and Analysis Tools. http: / www. caida. Org /tools /measurement/. (2008).
Google Scholar
[6]
IPPM working group. IP Performance Metrics Working Group. http: / datatracker. ietf. org /wg/ ippm /charter/ . (2009).
Google Scholar
[7]
Cisco. Sampled NetFlow Cisco. http: /www. cisco. com /en/US/docs/ios/ 12_0s/ feature/ guide/ 12s_sanf. html . (2008).
Google Scholar
[8]
Manish Jain, Constantinos Dovrolis. End-to-end Estimation of the Available Bandwidth Variation Range. Proc. ACMS IGMETRICS 2005. (2005).
DOI: 10.1145/1064212.1064242
Google Scholar
[9]
Seong Soo Kim, Narasimha Reddy, As tudy of Analyzing Network Trafficas ImagesinReal-Time. Proc. J2EE INFOCOM2005. (2005).
Google Scholar
[10]
Joel Sommers, Paul Barford, Nick Dufield, Amos Ron. Improving Accuracyin End-to-End Packet Loss Messuarment. Proc. ACM SIGCOMM 2005. (2005).
DOI: 10.1145/1090191.1080111
Google Scholar