Hi all.

Another reason to do research 'on' eDonkey is that it is a good place
to collect traces of a large running system: it 'suffices' to record the
queries managed by a given server. This is a key point for the analysis
of user behaviors, which in turn is crucial for protocol design.

We have done a few papers in this spirit, using eDonkey traces:
 http://www.liafa.jussieu.fr/~latapy/Publis/iwdc04.pdf
 http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
 http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
but this is only a start.

Best regards,
ML
-- 

---------------
Matthieu Latapy
http://www.liafa.jussieu.fr/~latapy/
------------------------------------
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to