[1] compares Gnutella and Overnet. Thomas
[1] Structured and unstructured overlays under the microscope A measurement-based view of two P2P systems that people use Yi Qiao and Fabian E. Bustamante USENIX 2006 ? On Fri, Dec 08, 2006 at 11:34:53PM +0000, Tien Tuan Anh Dinh wrote: > Hi all, > It's been long time ago, but i want to thank Serguei for his > informative and very useful comments. > A more practical cause of the limited researches on eDonkey as well as > Kazaa is their closed-source, proprietary and poorly-documented > protocol. Most studies had to use simulations or crawlers based on > reverse-engineered clients, which would result in lots of > incompatiblities and might have caused bias in the results. > > Cheers > > > > Matthieu LATAPY wrote: > > Oooups, this is the missing link: > > http://www.liafa.jussieu.fr/~latapy/Publis/europar05.pdf > > > > Best wishes, and thanks for all your interesting comments. > > ML > > > > On Wed, Nov 29, 2006 at 10:50:36AM -0800, Serguei Osokine wrote: > >> On Wednesday, November 29, 2006 Matthieu LATAPY wrote: > >>> We have done a few papers in this spirit, using eDonkey traces: > >>> http://www.liafa.jussieu.fr/~latapy/Publis/iwdc04.pdf > >>> http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf > >>> http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf > >> Matthieu, the second and third links are identical - did you > >> mean to provide just two articles, or the third one should have been > >> different? > >> > >> Best wishes - > >> S.Osokine. > >> 29 Nov 2006. > >> > >> > >> -----Original Message----- > >> From: [EMAIL PROTECTED] > >> [mailto:[EMAIL PROTECTED] Behalf Of Matthieu LATAPY > >> Sent: Wednesday, November 29, 2006 1:31 AM > >> To: theory and practice of decentralized computer networks > >> Subject: Re: [p2p-hackers] Do people stop studying eDonkey/Overnet ? > >> > >> > >> Hi all. > >> > >> Another reason to do research 'on' eDonkey is that it is a good place > >> to collect traces of a large running system: it 'suffices' to record the > >> queries managed by a given server. This is a key point for the analysis > >> of user behaviors, which in turn is crucial for protocol design. > >> > >> We have done a few papers in this spirit, using eDonkey traces: > >> http://www.liafa.jussieu.fr/~latapy/Publis/iwdc04.pdf > >> http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf > >> http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf > >> but this is only a start. > >> > >> Best regards, > >> ML > >> -- > >> > >> --------------- > >> Matthieu Latapy > >> http://www.liafa.jussieu.fr/~latapy/ > >> ------------------------------------ > >> _______________________________________________ > >> p2p-hackers mailing list > >> [email protected] > >> http://lists.zooko.com/mailman/listinfo/p2p-hackers > >> _______________________________________________ > >> p2p-hackers mailing list > >> [email protected] > >> http://lists.zooko.com/mailman/listinfo/p2p-hackers > > > _______________________________________________ > p2p-hackers mailing list > [email protected] > http://lists.zooko.com/mailman/listinfo/p2p-hackers -- http://www.cs.ucr.edu/~trep
pgpEXcEn0rSy0.pgp
Description: PGP signature
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
