2014
DOI: 10.1007/s12083-014-0268-0
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the policy selection of the P2P VoD system: A simulation-based research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…The base case, i=2, it is simple to see the lemma is true. We assume that it is true for S l , where 2 ≤ l<n. (5) Consider LCA(s i , s l+1 ) for some 1 ≤ i ≤ l-1. Then,…”
Section: Slca(s): Set Of Lcas Of All Subsets Of S Lemma 1 Let Be a Romentioning
confidence: 99%
See 1 more Smart Citation
“…The base case, i=2, it is simple to see the lemma is true. We assume that it is true for S l , where 2 ≤ l<n. (5) Consider LCA(s i , s l+1 ) for some 1 ≤ i ≤ l-1. Then,…”
Section: Slca(s): Set Of Lcas Of All Subsets Of S Lemma 1 Let Be a Romentioning
confidence: 99%
“…The purpose of peer selection is to construct the best subset of peers so that the service quality is maximized and the network congestion is minimized. Because the swarming performance depends on the participating peers, a selection algorithm is essential for the swarming technique [5].…”
Section: Introductionmentioning
confidence: 99%
“…Perhaps the most related works to ours are the following two. Xu et al [18] investigated the performance of different piece-and peer selection policies, as well as solutions to replica management. However, they did not take mixed swarms into consideration.…”
Section: Related Workmentioning
confidence: 99%
“…Contrasting this service with live streaming, different users in VoD systems are usually interested in different parts of the media content, which appears to be similar to the dynamics of users in traditional P2P file-sharing. Thus, recently, much attention has been paid to the VoD extensions of the BitTorrent protocol [5,11,13,18,19].…”
Section: Introductionmentioning
confidence: 99%