On Wednesday, November 29, 2006 Matthieu LATAPY wrote:
> We have done a few papers in this spirit, using eDonkey traces:
> http://www.liafa.jussieu.fr/~latapy/Publis/iwdc04.pdf
> http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
> http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf

        Matthieu, the second and third links are identical - did you 
mean to provide just two articles, or the third one should have been
different?

        Best wishes -
        S.Osokine.
        29 Nov 2006.


-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Matthieu LATAPY
Sent: Wednesday, November 29, 2006 1:31 AM
To: theory and practice of decentralized computer networks
Subject: Re: [p2p-hackers] Do people stop studying eDonkey/Overnet ?


Hi all.

Another reason to do research 'on' eDonkey is that it is a good place
to collect traces of a large running system: it 'suffices' to record the
queries managed by a given server. This is a key point for the analysis
of user behaviors, which in turn is crucial for protocol design.

We have done a few papers in this spirit, using eDonkey traces:
 http://www.liafa.jussieu.fr/~latapy/Publis/iwdc04.pdf
 http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
 http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
but this is only a start.

Best regards,
ML
-- 

---------------
Matthieu Latapy
http://www.liafa.jussieu.fr/~latapy/
------------------------------------
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to