2012
DOI: 10.1016/j.comcom.2012.02.012
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing SopCast client behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
2

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 29 publications
0
11
0
2
Order By: Relevance
“…This behavior suggests that the use of client-side caching during sessions might be of limited benefit. Finally, some components of our client behavior model, notably session durations and data transfer times, present similarities, in terms of distribution models, with other multimedia and Web systems [17], [18]. However, the parameter values are very different.…”
Section: Summary and Future Workmentioning
confidence: 91%
See 1 more Smart Citation
“…This behavior suggests that the use of client-side caching during sessions might be of limited benefit. Finally, some components of our client behavior model, notably session durations and data transfer times, present similarities, in terms of distribution models, with other multimedia and Web systems [17], [18]. However, the parameter values are very different.…”
Section: Summary and Future Workmentioning
confidence: 91%
“…Despite these differences, Figure 2 shows that the measured data in all three campuses is best-fitted by a Weibull distribution, with parameter values (see caption) depending on the dataset. This is a statistical distribution that has been used to model client active periods in other systems (e.g., Peer-to-Peer live streaming systems [17]). …”
Section: A Session Layermentioning
confidence: 99%
“…This is important as with that information a bad intentioned entity can direct attacks such as DDoS to those servers in order to harm the live streaming session. In [2,23] a characterization of traffic generated by SopCast is presented. One of the conclusions is that a malicious peer was able to compromise 50% of the network peers and 30% of the download bandwidth.…”
Section: Related Workmentioning
confidence: 99%
“…Despite the number of works characterizing P2P live streaming application [2][3][4][5][6], we are not aware of any public available dataset. Moreover, most of these works characterize a static view of the P2P systems, ignoring important dynamic aspects.…”
Section: Introductionmentioning
confidence: 99%
“…The datasets have been used in important works from our team. For instance, we have characterized the SopCast client behavior [2,8], producing models that researchers can use to test their own P2P live streaming systems. We discuss deeply our crawling methodology and present a brief SopCast characterization.…”
Section: Introductionmentioning
confidence: 99%