[1]吳明蔚,林盈達,「對等式(P2P)網路技術」,電腦與通訊期刊第一零三期,工研院電通所,March 2003。[2]吳晉賢,結合分散式及對等式的優點去實作檔案分享系統,台灣大學資訊工程學研究所碩士論文,2001。[3]張俊傑,應用關鍵字搜尋於使用繞送為基準之資源定位方法的對等式資源分享網路,清華大學資訊工程學研究所碩士論文,2002。[4]Androutsellis-Theotokis, S. , Spinellis, D. , ”A Survey of Peer-to- peer Content Distribution Technologies”, ACM Computing Surveys, Vol. 36, No. 4,2004, pp. 335-371.
[5]Bhattacharya, I. , Kashyap, S. R. , and Parthasarathy, S. , “Similarity Searching in Peer-to-peer Databases”, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05), 2005, pp. 329–338.
[6]Botros, S. , Waterhouse, S. , “Search in JXTA and Other Distributed Networks”, Proceedings of the First International Conference on Peer-to-Peer Computing, IEEE Press, 2002.
[7]Damiani, E. , Paraboschi, S. , Samarati, P. , and Violante, F. , “A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks”, Proceedings of the Computer & Communications Security, 2002.
[8]Gai, A. T. , Viennot, L. , “Optimizing and Balancing Load in Fully Distributed p2p File Sharing Systems”, Proceedings of the Internet and Web Applications and Services/Advanced International Conference, 2006.
[9]Ganesan, P. , Gummadi, K. , and Garcia -Molina, H. , “Canon in G Major: Designing DHTs with Hierarchical Structure”, Proceedings of the 24th IEEE International Conference on Distributed Computing Systems, 2004.
[10]Gelbukh, A. , Sidorov, G. , “Zipf and Heaps Laws』 Coefficients Depend on Language”, Proc. CICLing-2001, Proceedings of the Conference on Intelligent Text Processing and Computational Linguistics, 2001. Lecture Notes in Computer Science 2004, ISSN 0302-9743, ISBN 3-540-41687-0, Springer-Verlag, pp. 332–335.
[11]How Peer-to-peer (p2p) and Kazaa Media Desktop Work, Kazaa Website: http://www.kazaa.com/us/help/guideaboutp2p.htm, 2003.
[12]Joung, Y. J. , Fang, C. T. , and Yang, L. W. , “Keyword Search in DHT-based Peer-to-peer Networks”, Proceedings of the Intertaional Conference on Distributed Computing Systems, 2005.
[13]Liu, L. , Ryu, K. D. , and Lee, K.W. , “Supporting Efficient Keyword-based File Search in Peer-to-peer file sharing systems”, Proceedings of the Global Telecommunications Conference, 2004.
[14]Li, W. , “Random Texts Exhibit Zipf's-law-like Word Frequency Distribution”, IEEE Transactions on Information Theory, 38(6), 1992, pp. 1842-1845.
[15]Lu, T. , Sinha, S. , and Sudan, A. , “Panache: A Scalable Distributed. Index for Keyword Search”, Technical Report, MIT, 2003.
[16]Ratnasamy, S. , Francis, P. , Handley, M. , and Karp, R. M. , “A Scalable Content-Addressable Network”, Proceedings of the ACM Special Interest Group on Data Communications, 2001, pp. 161–172.
[17]Rowstron, A. , Druschel, P. , “Pastry: Scalable, Distributed Object Location and Routing for Large-scale Peer-to-peer Systems”, Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, 2001, p.329-350.
[18]Sahin, O. D. , Antony, S. , Agrawal, D. , and Abbadi, A. El, “PRoBe: Multi-Dimensional Range Queries in P2P Networks”, Lecture Notes in Computer Science, 2005.
[19]Schmidt, C., Parashar, M., “Enabling Flexible Queries with Quarantees in P2P Systems,” IEEE Internet Computing (Special Issue on Information Dissemination on the Web), vol. 8, no. 3, 2004, pp. 19-26.
[20]Shneiderman, B., “Universal Usability”, Communications of the ACM, Vol. 43, Issue. 5, 2000.
[21]Steinmetz, R. , Wehrle, K. , ”Peer-to-peer System and Application”, ISBN: 3-540-29192-X, Lecture Notes in Computer Science, Volume 3485, 2005.
[22]Stoica, I. , Morris, R. , Karger, D. , Kaashoek, M. F. , and Balakrishnan, H. , “Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications”, Proceedings of the ACM Special Interest Group on Data Communications, 2001.
[23]The Gnutella protocol specification, 2000,
http://www.gnutella.co.uk/library/pdf/gnutella_protocol_0.4.pdf.
[24]Zhao, B. Y. , Kubiatowicz, J. D. , and Joseph, A. D. , ”Tapestry: An Infrastructure for Fault-resilient Wide-area Location and Routing”, Technical Report UCB//CSD-01-1141, 2001.
[25]Zipf, G. K. , “Human Behavior and the Principle of Least- Effort”, Addison-Wesley, Cambridge, MA, 1949.
[26]Zhang, Z. , Zhou, S. , Qian, W. , and Zhou, A. , “KEYNOTE: Keyword Search by Node Selection for Text Retrieval on DHT - based P2P Networks”, Lecture Notes in Computer Science, 2006.