LU Xiangchen.P2P technology and application[EB/OL].http://www.huihoo.com/p2p/p2p_2.html,2003-10-07(in Chinese).[吕向辰.P2P技术与应用[EB/OL].http://www.huihoo.com/p2p/p2p_2.html,2003-10-07.]
[2]
CHARLES C,XAVIER P.Peer-to-peer meets web services:a powerful convergence[J]. ComTec,2002,(8):13-17.
[3]
MICHAEL H. Peer pressure:securing P2P networking[J]. Network Magazine,2002,17 (2):62-64.
[4]
SHAY K,DAVID P.Asynchronous resource discovery in peer to peer networks[A].Proceedings of the IEEE Symposium on Reliable Distributed Systems[C].New York:ACM Press,2002.224-231.
[5]
WILLIAM A R,FRANCIS X M. Enterprise application integration[M]. Beijing:China Machine Press,2003(in Chinese).[WILLIAM A R,FRANCIS X M. Enterprise application integration[M].北京:机械工业出版社,2003.]
[6]
YIN Xiaolan, FU Yuanbin, LI Jing. The study of integrating method for enterprise data[J].Computer Engineering and Application,2002,38(12):253-255(in Chinese).[殷晓岚,付远彬,李京.企业数据集成模式的研究[J].计算机工程与应用,2002,38(12):253-255.]
[7]
Peer-to-Peer Working Group.Bidirectional peer-to-peer communication with interposing firewalls and NATs[EB/OL].http://www.peer-to-peerwg.org/tech/nat/Docs/NATWhitePaperv095.pdf,2001-08-17.