Quoting Loic Dachary <l...@dachary.org> from ml.p2p.hackers: :Thanks for sharing this document. Is there a reference implementation :matching the paper ?
There is, but if I trust Thibault's statements (the main author of the paper), it is implemented in Python and done by graduate students or interns. Code is not commented. I recommend you look at the C implementation in gtk-gnutella which is clearly commented and can be exercised easily (by running gtk-gnutella and activating the necessary debugging traces to see the algorithm run). Grab the source code via this command: $ svn co https://gtk-gnutella.svn.sourceforge.net/svnroot/gtk-gnutella/trunk/gtk-gnutella/ Then look in src/dht/lookup.c: * Passive protection of the lookup path is done in lookup_node_is_safe(). * Active protection using the K-L divergence is in lookup_path_is_safe(). Cheers, Raphael _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers