[1] Garmeli B.Gap appliance enhance security [M].Network World, 2001:36-39.
[2] Northcutt S, Zeltzer L, Winters S, et al.Inside network perimeter security [M].New Riders, 2003:78-83.
[3] Zhang Sida.Information ferrying system [J].Journal of Chengdu University of Information Technology, 2004, 19(1):62-65.(in Chinese)
[4] Soumen Chakrabarti.Mining the web [M].San Francisco:Morgan Kaufmann Publishers, 2003:118-120.
[5] Yan T W, Garcia-Molina H.Duplicate removal in information dissemination [C]//Proceedings of the 21st International Conference on Very Large Data Bases(VLDB’95).San Francisco, CA, USA, 1995:66-77.
[6] Di Iorio E, Diligenti M, Gori M, et al.Detecting near-replicas on the web by content and hyperlink analysis [C]//Proceedings of the IEEE/WIC International Conference on Web Intelligence. New York:IEEE Computer Society Press, 2003:249-255.
[7] Fogaras D, Racz B.Practical algorithms and lower bounds for similarity search in massive graphs [J].IEEE Transactions on Knowledge and Data Engineering, 2007, 19(5):585-598.
[8] Monika H.Finding near-duplicate web pages:a large-scale evaluation of algorithms [C]//Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. Seattle, 2006:284-291.
[9] Dean J, Henzinger M R.Finding related pages in the world wide web [J].Computer Networks, 1999, 31(11):1467-1479.
[10] Haveliwala T, Gionis A, Klein D, et al.Evaluating strategies for similarity search on the web [C]//Proceedings of the 11th International World Wide Web Conference. Hawaii, USA, 2002:432-442.