The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video 2008
DOI: 10.1145/1496046.1496050
|View full text |Cite
|
Sign up to set email alerts
|

Selection strategies for peer-to-peer 3D streaming

Abstract: In multi-user networked virtual environments such as Second Life, 3D streaming techniques have been used to progressively download and render 3D objects and terrain, so that a full download or prior installation is not necessary. As existing client-server architectures may not scale easily, 3D streaming based on peer-to-peer (P2P) delivery is recently proposed to allow users to acquire 3D content from other users instead of the server. However, discovering the peers who possess relevant data and have enough ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(17 citation statements)
references
References 17 publications
0
17
0
Order By: Relevance
“…Different supplying partner protocols and schemes [4], [10], [12] were developed and can be found in the literature aiming to discover the suitable peer that possesses the relevant data. Each protocol has different effects on the system performance.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Different supplying partner protocols and schemes [4], [10], [12] were developed and can be found in the literature aiming to discover the suitable peer that possesses the relevant data. Each protocol has different effects on the system performance.…”
Section: Related Workmentioning
confidence: 99%
“…However, this approach may suffer from latency and invalid requests if the selected supplying partner is new. Moreover, Cavagna et al's approach [6] may cause the request contention problem [12]. Royan et al [5] improved Cavagna et al's solution [6] by addressing the invalid requests issue.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, to generate digital signature for each piece is not practical because public key cryptosystem consumes a lot of computation power. Some efficient stream signing mechanisms [8], [12] are proposed to avoid generating digital signature for each piece. Below in this subsection, we introduce a protocol proposed in [8] using hash chains to achieve very low computation cost.…”
Section: B Authenticated 3d Streamingmentioning
confidence: 99%