2013
DOI: 10.1007/s11042-013-1621-7
|View full text |Cite
|
Sign up to set email alerts
|

Joint bandwidth allocation, data scheduling and incentives for scalable video streaming over peer-to-peer networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…The English auction is the simplest auction type we found in the reviewed P2P systems [21,29,33,85,86,123,129,131,147]. This auction type generates high profits for the seller but results in overpaying, especially if bids are private.…”
Section: Auctionmentioning
confidence: 99%
“…The English auction is the simplest auction type we found in the reviewed P2P systems [21,29,33,85,86,123,129,131,147]. This auction type generates high profits for the seller but results in overpaying, especially if bids are private.…”
Section: Auctionmentioning
confidence: 99%
“…The auction mechanism is primarily used to ensure that good quality links are utilized in flow routing and replaces the tree‐based approaches for media distribution. In , a simple auction is designed to resolve the contention on bandwidth resources in each video overlay. Authors in model the problem of dynamic resource allocation in complex and autonomous networks as a double‐sided auction and find the upper bound of performance metrics through the classical optimization techniques.…”
Section: Review Of Prior Artmentioning
confidence: 99%
“…Note that in contrast with many similar schemes, overhead calculation is only related to the design time of GaMe‐PLive. For example, in some schemes such as and , authors used auction method to address resource allocation in P2P video streaming that imposes a high overhead to exchange the proposed prices at the execution time periodically. Also in this approach, the traffic caused by finding chunk holders is significantly reduced via piggybacking required information on request or response messages.…”
Section: Introductionmentioning
confidence: 99%