2014
DOI: 10.1007/s00530-014-0434-5
|View full text |Cite
|
Sign up to set email alerts
|

Predicting the level of cooperation in a Peer-to-Peer live streaming application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 43 publications
0
7
0
Order By: Relevance
“…In the following, we discuss the application domains and incentive enforcement types, i.e., Individual Reciprocity, Clustered Cooperation, Local Denylisting, and Global Denylisting, of reputation mechanisms. Reviewed works predominantly applied reputation-based incentives for file sharing [5,11,42,43,58,62,63,75,77,84,92,109,117,127] and media streaming [6,11,30,36,42,52,65,72,79,87,93,101,117,118,132,136]. Only two articles covered peerto-peer computing [76,97,102], and service discovery [24,98], respectively.…”
Section: Reputationmentioning
confidence: 99%
See 1 more Smart Citation
“…In the following, we discuss the application domains and incentive enforcement types, i.e., Individual Reciprocity, Clustered Cooperation, Local Denylisting, and Global Denylisting, of reputation mechanisms. Reviewed works predominantly applied reputation-based incentives for file sharing [5,11,42,43,58,62,63,75,77,84,92,109,117,127] and media streaming [6,11,30,36,42,52,65,72,79,87,93,101,117,118,132,136]. Only two articles covered peerto-peer computing [76,97,102], and service discovery [24,98], respectively.…”
Section: Reputationmentioning
confidence: 99%
“…Peers are assigned to super peers based on their reputation value, physical proximity, thematic similarity, common interest, or at random. Other approaches put peers on a global, i.e., network-wide, denylist [6,36,52,55,127], or allow peers to dismiss uncooperative peers locally [19,24,30,57,92,98,111,121,[140][141][142]. An approach that allows global peer penalties requires a single source of truth available to all participants.…”
Section: Reputationmentioning
confidence: 99%
“…Most works apply machine learning techniques to explore traffic features and improve the classification performance. For example, Goncalves et al [15] used a regressionbased model to divide the traffic into Peer-to-Peer (P2P) traffic and non-P2P traffic. Tang et al [16] employed the fractal features to identify video traffic and good results were obtained by different machine learning based classifiers.…”
Section: A Machine Learning Based Traffic Classificationmentioning
confidence: 99%
“…A successful trust management system that uses this approach is [20]. The [16], [21] are other examples of trust management systems. EigenTrust is the name of an approach proposed In [16].…”
Section: Related Workmentioning
confidence: 99%
“…EigenTrust is able to decrease the number of inauthentic files on the network, even under a variety of conditions where malicious peers cooperate in an attempt to subvert the system. In [21], the authors have introduced an approach to predict a peer's cooperation level, focusing on the cooperation induced by the P2P protocol rather than the cooperation that results from user behavior or bandwidth limitation. This method mainly focuses on live streaming applications.…”
Section: Related Workmentioning
confidence: 99%