[1] compares Gnutella and Overnet.

Thomas

[1]
Structured and unstructured overlays under the microscope
A measurement-based view of two P2P systems that people use
Yi Qiao and Fabian E. Bustamante
USENIX 2006                                            ?

On Fri, Dec 08, 2006 at 11:34:53PM +0000, Tien Tuan Anh Dinh wrote:
> Hi all,
>   It's been long time ago, but i want to thank Serguei for his
> informative and very useful comments.
>   A more practical cause of the limited researches on eDonkey as well as
> Kazaa is their closed-source, proprietary and poorly-documented
> protocol. Most studies had to use simulations or crawlers based on
> reverse-engineered clients, which would result in lots of
> incompatiblities and might have caused bias in the results.
> 
> Cheers
> 
> 
> 
> Matthieu LATAPY wrote:
> > Oooups, this is the missing link:
> >   http://www.liafa.jussieu.fr/~latapy/Publis/europar05.pdf
> > 
> > Best wishes, and thanks for all your interesting comments.
> > ML
> > 
> > On Wed, Nov 29, 2006 at 10:50:36AM -0800, Serguei Osokine wrote:
> >> On Wednesday, November 29, 2006 Matthieu LATAPY wrote:
> >>> We have done a few papers in this spirit, using eDonkey traces:
> >>> http://www.liafa.jussieu.fr/~latapy/Publis/iwdc04.pdf
> >>> http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
> >>> http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
> >>    Matthieu, the second and third links are identical - did you 
> >> mean to provide just two articles, or the third one should have been
> >> different?
> >>
> >>    Best wishes -
> >>    S.Osokine.
> >>    29 Nov 2006.
> >>
> >>
> >> -----Original Message-----
> >> From: [EMAIL PROTECTED]
> >> [mailto:[EMAIL PROTECTED] Behalf Of Matthieu LATAPY
> >> Sent: Wednesday, November 29, 2006 1:31 AM
> >> To: theory and practice of decentralized computer networks
> >> Subject: Re: [p2p-hackers] Do people stop studying eDonkey/Overnet ?
> >>
> >>
> >> Hi all.
> >>
> >> Another reason to do research 'on' eDonkey is that it is a good place
> >> to collect traces of a large running system: it 'suffices' to record the
> >> queries managed by a given server. This is a key point for the analysis
> >> of user behaviors, which in turn is crucial for protocol design.
> >>
> >> We have done a few papers in this spirit, using eDonkey traces:
> >>  http://www.liafa.jussieu.fr/~latapy/Publis/iwdc04.pdf
> >>  http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
> >>  http://www.liafa.jussieu.fr/~latapy/Publis/iptps05.pdf
> >> but this is only a start.
> >>
> >> Best regards,
> >> ML
> >> -- 
> >>
> >> ---------------
> >> Matthieu Latapy
> >> http://www.liafa.jussieu.fr/~latapy/
> >> ------------------------------------
> >> _______________________________________________
> >> p2p-hackers mailing list
> >> [email protected]
> >> http://lists.zooko.com/mailman/listinfo/p2p-hackers
> >> _______________________________________________
> >> p2p-hackers mailing list
> >> [email protected]
> >> http://lists.zooko.com/mailman/listinfo/p2p-hackers
> > 
> _______________________________________________
> p2p-hackers mailing list
> [email protected]
> http://lists.zooko.com/mailman/listinfo/p2p-hackers

-- 
http://www.cs.ucr.edu/~trep

Attachment: pgpEXcEn0rSy0.pgp
Description: PGP signature

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to