[1] 刘乃文,刘芳爱,刘书昌.环-皮特森簇网格的资源搜索机制[J].北京邮电大学学报,2010,33(4): 59-63.Liu Naiwen,Liu Fang'ai,Liu Shuchang.Research on resource search mechanism of ring Petersen(k) cluster grid[J].Journal of Beijing University of Posts and Telecommunications,2010,33(4): 59-63.[2] Ion Stoica,Robert Morris,David Liben Nowell,et al.Chord: a scalable peer-to-peer lookup protocol for Internet applications[J].IEEE/ACM Transactions on Networking,2003: 17-32.[3] 张翀.基于对等计算的分布式时空索引技术研究[D].长沙: 国防科技大学,2011.[4] Mario Bisignano,Giuseppe Di Modica,Orazio Tomarchio.JaxSON: a semantic P2P overlay network for webservice discovery[C]//Proceedings of IEEE Congress on Services Part I,USA: IEEE,2009: 438-445.[5] 孙名松,刘杰,李胜利.基于语义划分的P2P 搜索技术研究[J].计算机技术与发展,2010,20(8): 75-78.Sun Mingsong,Liu Jie,Li Shengli.Research on P2P searching technology based on semantic division[J].Computer Technology and Development,2010,20(8): 75-78.[6] Indrajit Bhattachary,Srinivas R Kashya,Srinivasan Parthasarathy.Similarity searching in peer-to-peer databases[C]//Proceedings of International Conference on Distributed Computing Systems(ICDCS).USA: IEEE Computer Society,2005: 329-338.[7] Zheng Weishi,Gong Shaogang,Tao Xiang.Person re-identification by probabilistic relative distance comparison//Proceedings of Computer Vision and Pattern Recognition(CVPR).USA: IEEE Computer Society,2011: 649-656.[8] Nolan,John.Stable distributions: models for heavy-tailed data[M].Birkhauser:,2003: 18-20.[9] Najim Dehak,Patrick Kenny,Réda Dehak,et al.Front-end factor analysis for speaker verification[J].Audio,Speech,and Language Processing,IEEE Transactions on 19,2011(4): 788-798. |