[ 1] M o linaM, N icco lini S, Du ffie ld N G. A com para tive expe rim ental study o f hash functions applied to packe t samp ling [ C ] / /Interna tiona l Teletra ffic Congress( ITC- 19). Be ijing: 2005.
[ 2] M o linaM, Tartare lli S, Raspa llm F, et a.l Imp lementation o f an IPFIX com pliant flow trafficm ete r: cha llenges and pe rfo rmance assessm ent[ C] / / IEEEW orkshop on IP Operations andM anagem ent, 2003: 61-67.
[ 3] 程光, 龚俭, 丁伟, 等. 面向IP流测量的哈希算法研究[ J]. 软件学报, 2005, 16( 5): 652-658.
Cheng Guang, Gong Jian, D ingW e,i et a.l A hash a lgo rithm for IP flow m easurem ent[ J] . Journa l of So ftw are, 2005, 16( 5): 652-658. ( in Ch inese)
[ 4] W hang K, Vander Zanden B, Taylor H. A L inear- tim e probabilistic counting a lgo rithm for database applica tions[ J]. ACM Trans on Da tabase System s, 1990, 15( 2): 208-229.
[ 5] Zseby T, M olinaM, Raspa ll F, et a.l Sam pling and filte ring techn iques fo r IP packet selection[ EB /OL] . IETF 2004: 32-33.http: / / too ls. iet.f org /htm l/draft- ie tf- psam p- samp le- tech- 05# section- 17.
[ 6] Jenkins B. A lgor ithm A lley, Dr. Dobb’ s Journa,l September 1997[ J /OL]. http: / /burtleburtle. net/bob /hash /doobs. html.