【正文】
參考文獻(xiàn)[1] , and . “Mapping the Gnutella Network”. IEEE Internet Computing, 2002[2] Faloutsos M, Faloutsos P, Faloutsos C. “On Powerlaw Relationships of the Internet Topology”. ACM SIGCOMM Computer Communication Review, 1999, 29(4): 251262[3] and , “Social Network Analysis”. Cambridge , Cambridge, 1994[4] and , “Emergence of Scaling in Random Networks”. Science, 1999, 286(5439):509512[5] Lada , Rajan , Amit , et al. “Search in Powerlaw Networks”. Physical Review E, 2001, 64:046135[6] Nima Sarshar, Boykin and Vwani . “Percolation Search in Power Law Networks: Making Unstructured PeertoPeer Networks Scalable”, Proceedings of the 4th IEEE international conference on Peertopeer networks(P2P’04), 2004[7] Subhabrata Sen, and Jia Wang. “Analyzing PeertoPeer Traffic Across Large Networks”. IEEE/ACM Transactions on Networking, 2004, 12(2)[8] Gnutella, Revisit the P2P Network TopologyZhang Guoqiang(1,2) Yuan Bin(1,2) Zhang Guoqing(1)(1) Network Research Division, Institute of Computing Technology, Chinese Academy of Sciences,Beijing, 100080(2)Graduate University of Chinese Academy of Sciences, 北京, 100080Abstract: In recent years, powerlaw phenomenon has been widely observed in various real network