2[2]Bressan S, Goh CL, Ooi BC, Tan KL. Supporting extensible buffer replacement strategies in database system. In: Delis A, et al., eds. Proceedings of the ACM SIGMOD International Conference on Management of Data. Philadelphia: ACM Press, 1999. 52~64.
3[3]Wong D, Paciorek N, Walsh T, DiCelie J, Young M, Peet B. Concordia: an infrastructure for collaborating mobile agents. In: Rothermel K, et al., eds. Mobile Agents, First International Workshop. Berlin: Springer-Verlag, 1998. 86~97.
4[4]Freenet Home Page. http://freenet.sourceforge.com.
5[5]Gnutella Development Home Page. http://gnutella.wego.com.
6[6]Goh CL, Bressan S, Ooi BC, Anirban M. Storm: a 100% java peersistent storage manager. In: Chaudhri AB, ed. Proceedings of the OOPSLA Worshop on Java and Object. Denver: Hermes Penton Science, 1999. 12~13.
7[7]Gribble S, Halevy A, Ives Z, Rodrig M, Suciu D. What can database do for peer-to-peer. In: Mecca G, et al., eds. Proceedings of the 4th International Workshop on the Web and Databases. Santa Barbara, 2001. 31~36.
8[8]ICQ Home Page. http://www.icq.com.
9[9]Karjoth G, Lange DB, Oshima M. A security model for aglets. Lecture Notes in Computer Science, 1997,1419:188~205.
10[10]Karnik NM, Tripathi AR. Security in the Ajanta mobile agent system. Software-Practice and Experience, 2001,31(4):301~329.