Warning: download the powerpoint version to get animations. Animated slides in the PDF version may look cluttered.
-
March 12, 2013 (v1)PublicationUploaded on: April 5, 2025
-
January 20, 2012 (v1)Publication
Cette thèse présente deux axes de recherche que j'ai menés entre 2004 et 2011. Le premier axe est sur la compréhension sur protocole BitTorrrent. Il recouvre des travaux expérimentaux et de mesures montrant l'efficacité de BitTorrent et expliquant les variations de performances observées dans la littérature et interprétées à tort comme un...
Uploaded on: April 5, 2025 -
October 31, 2013 (v1)Publication
Warning: download the powerpoint version to get animations. Animated slides in the PDF version may look cluttered.
Uploaded on: April 5, 2025 -
December 7, 2010 (v1)Publication
Warning: download the powerpoint version to get animations. Animated slides in the PDF version may look cluttered.
Uploaded on: April 5, 2025 -
July 2012 (v1)Journal article
Linking a social identity such as a name to an IP address is generally believed to be difficult for anindividual with no dedicated infrastructure or privileged information. Although an individual's ISP hasaccess to this information, it is kept private except in the case of a legal decision. Similarly, somebig Internet companies such as Facebook...
Uploaded on: April 5, 2025 -
December 10, 2012 (v1)Conference paper
In this work, we collected the entire Twitter social graph that consists of 537 million Twitter accounts connected by 23.95 billion links, and performed a preliminary analysis of the collected data. In order to collect the social graph, we implemented a distributed crawler on the PlanetLab infrastructure that collected all information in 4...
Uploaded on: April 5, 2025 -
August 25, 2010 (v1)Conference paper
Network latency and packet loss are considered to be an important requirement for realistic evaluation of Peer-to-Peer protocols. Dedicated clusters, such as Grid'5000, do not provide the variety of network latency and packet loss rates that can be found in the Internet. However, compared to the experiments performed on testbeds such as...
Uploaded on: April 5, 2025 -
December 17, 2014 (v1)Publication
Online social networks (OSNs) are an important source of information for scientists in different fields such as computer science, sociology, economics, etc. However, it is hard to study OSNs as they are very large. For instance, Facebook has 1.28 billion active users in March 2014 and Twitter claims 255 million active users in April 2014. Also,...
Uploaded on: April 5, 2025 -
June 16, 2014 (v1)Conference paper
Twitter is one of the largest social networks using exclusively directed links among accounts. This makes the Twitter social graph much closer to the social graph supporting real life communications than, for instance, Facebook. Therefore, understanding the structure of the Twitter social graph is interesting not only for computer scientists,...
Uploaded on: April 5, 2025 -
March 17, 2025 (v1)Report
Bitcoin burn addresses are addresses where bitcoins can be sent but never retrieved, resulting in the permanent loss of those coins. Given Bitcoin's fixed supply of 21 million coins, understanding the usage and the amount of bitcoins lost in burn addresses is crucial for evaluating their economic impact. However, identifying burn addresses is...
Uploaded on: April 5, 2025 -
May 9, 2011 (v1)Conference paper
This paper studies economic utilities and quality of service (QoS) in a two-sided non-neutral market where Internet service providers (ISPs) charge content providers (CPs) for the content delivery. We propose new models that involve a CP, an ISP, end users and advertisers. The CP may have either a subscription revenue model (charging end users)...
Uploaded on: April 5, 2025 -
July 29, 2019 (v1)Publication
The number of connected devices is increasing every day, creating smart homes and shaping the era of the Internet of Things (IoT), and most of the time, end-users are unaware of their impacts on privacy. In this work, we analyze the ecosystem around a Philips Hue smart white bulb in order to assess the privacy risks associated to the use of...
Uploaded on: December 4, 2022 -
2010 (v1)Conference paper
In this paper, we study the impact of network latency on the time required to download a file distributed using BitTorrent. This study is essential to understand if testbeds can be used for experimental evaluation of BitTorrent. We observe that the network latency has a marginal impact on the time required to download a file; hence, BitTorrent...
Uploaded on: April 5, 2025 -
September 18, 2012 (v1)Report
Additive Increase Multiplicative Decrease (AIMD) is a widely used congestion control algorithm that is known to be fair and efficient in utilizing the network resources. In this paper, we revisit the performance of the AIMD algorithm under realistic conditions by extending the seminal model of Chui~\etal. We show that under realistic conditions...
Uploaded on: December 4, 2022 -
2006 (v1)Report
Peer-to-peer protocols play an increasingly instrumental role in Internet content distribution. Consequently, it is important to gain a full understanding of how these protocols behave in practice and how their parameters impact overall performance. We present the first experimental investigation of the peer selection strategy of the popular...
Uploaded on: April 5, 2025 -
2006 (v1)Report
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rarest first and choke algorithms. Whereas it is commonly admitted that BitTorrent performs well, recent studies have proposed the replacement of the rarest first and choke...
Uploaded on: April 5, 2025 -
October 2006 (v1)Conference paper
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rarest first and choke algorithms. Whereas it is commonly admitted that BitTorrent performs well, recent studies have proposed the replacement of the rarest first and choke...
Uploaded on: April 5, 2025 -
May 2, 2014 (v1)Conference paper
In this paper, we consider how to maximize users' influence in Online Social Networks (OSNs) by exploiting social relationships only. Our first contribution is to extend to OSNs the model of Kempe et al. [1] on the propagation of information in a social network and to show that a greedy algorithm is a good approximation of the optimal algorithm...
Uploaded on: April 5, 2025 -
March 2012 (v1)Conference paper
{BitTorrent, one of the most widespread used P2P application for file- sharing, recently got rid of TCP by introducing an application-level congestion control protocol named uTP. The aim of this new protocol is to efficiently use the available link capacity, while minimizing its interference with the rest of user traffic (e.g., Web, VoIP and...
Uploaded on: April 5, 2025