Hi all. Another reason to do research 'on' eDonkey is that it is a good place to collect traces of a large running system: it 'suffices' to record the queries managed by a given server. This is a key point for the analysis of user behaviors, which in turn is crucial for protocol design.
We have done a few papers in this spirit, using eDonkey traces: http://www.liafa.jussieu.fr/~latapy/Publis/iwdc04.pdf http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf but this is only a start. Best regards, ML -- --------------- Matthieu Latapy http://www.liafa.jussieu.fr/~latapy/ ------------------------------------ _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
