On Wednesday, November 29, 2006 Matthieu LATAPY wrote:
> We have done a few papers in this spirit, using eDonkey traces:
> http://www.liafa.jussieu.fr/~latapy/Publis/iwdc04.pdf
> http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
> http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
Matthieu, the second and third links are identical - did you
mean to provide just two articles, or the third one should have been
different?
Best wishes -
S.Osokine.
29 Nov 2006.
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Matthieu LATAPY
Sent: Wednesday, November 29, 2006 1:31 AM
To: theory and practice of decentralized computer networks
Subject: Re: [p2p-hackers] Do people stop studying eDonkey/Overnet ?
Hi all.
Another reason to do research 'on' eDonkey is that it is a good place
to collect traces of a large running system: it 'suffices' to record the
queries managed by a given server. This is a key point for the analysis
of user behaviors, which in turn is crucial for protocol design.
We have done a few papers in this spirit, using eDonkey traces:
http://www.liafa.jussieu.fr/~latapy/Publis/iwdc04.pdf
http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
but this is only a start.
Best regards,
ML
--
---------------
Matthieu Latapy
http://www.liafa.jussieu.fr/~latapy/
------------------------------------
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers