{"title":"驴资源分布的研究","authors":"Qi Wu, Xingshu Chen, Wenxian Wang, Q. Lv","doi":"10.1109/WCSE.2009.37","DOIUrl":null,"url":null,"abstract":"The eDonkey servers implement a number of protective mechanisms against observation and attacks in order to maintain stability of eDonkey network. we introduce a new crawling technique which can breakthrough these restrictions to gather information. On the basis of the technique, we collect data from the edonkey network by using an experimental client. Based on collected information, the paper analyze the data from the edonkey network and summarize the server distribution characteristics and the distribution characteristics of shared files.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Study on Resource Distribution of the Edonkey\",\"authors\":\"Qi Wu, Xingshu Chen, Wenxian Wang, Q. Lv\",\"doi\":\"10.1109/WCSE.2009.37\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The eDonkey servers implement a number of protective mechanisms against observation and attacks in order to maintain stability of eDonkey network. we introduce a new crawling technique which can breakthrough these restrictions to gather information. On the basis of the technique, we collect data from the edonkey network by using an experimental client. Based on collected information, the paper analyze the data from the edonkey network and summarize the server distribution characteristics and the distribution characteristics of shared files.\",\"PeriodicalId\":331155,\"journal\":{\"name\":\"2009 WRI World Congress on Software Engineering\",\"volume\":\"2014 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 WRI World Congress on Software Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCSE.2009.37\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 WRI World Congress on Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSE.2009.37","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The eDonkey servers implement a number of protective mechanisms against observation and attacks in order to maintain stability of eDonkey network. we introduce a new crawling technique which can breakthrough these restrictions to gather information. On the basis of the technique, we collect data from the edonkey network by using an experimental client. Based on collected information, the paper analyze the data from the edonkey network and summarize the server distribution characteristics and the distribution characteristics of shared files.