An Incentive mechanism for VOD Streaming Under Insufficient System Resources |
Shin, Kyuyong
(Dept. of Electrical Engineering and Computer Science, Korea Military Academy)
Lee, Jongdeog (Dept. of Electrical Engineering and Computer Science, Korea Military Academy) Shin, Jinhee (Dept. of Electrical Engineering and Computer Science, Korea Military Academy) Park, Chanjin (Dept. of Electrical Engineering and Computer Science, Korea Military Academy) |
1 | Cisco visual networking index : Forecast and methodology, http://www.cisco.com/ |
2 | The bittorrent protocol specification. http://www.bittorrent.org/ |
3 | B. Cohen, Incentives build robustness in bittorrent, In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, June 2003. |
4 | A. Vlavianos, M. Iliofotou, M. Faloutsos, Bitos: enhancing bittorrent for supporting streaming applications, IEEE International Conference on Computer Communications, pp. 1-6, April 2006 |
5 | J. J. D. Mol, J. A. Pouwelse, M. Meulpolder, D. H. J. Epema, H. J. Sips, Give-to-get: free-riding resilient video-on-demand in p2p systems, In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 6818, January 2008, |
6 | M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, A. Venkataramani, Do incentives build robustness in bittorrent?, USENIX NSDI, April 2007. |
7 | K. Shin, D. S. Reeves, I. Rhee, Treat-before- trick : Free-riding prevention for bittorrent-like peer-to-peer networks, IEEEInternational Symposiumon Parallel& Distributed Processing, pp. 1-12, May 2009. |
8 | T. Locher, P. Moor, S. Schmid, R. Wattenhofer, Free riding in bittorrent is cheap, In FifthWorkshop onHot Topics in Networks, November 2006. |
9 | M. Sirivianos, J. H. Park, R. Chen, X. Yang, Free-riding in bittorrent networks with the large view exploit, International workshop on Peer-To-Peer Systems, February 2007. |
10 | M. Feldman, K. Lai, I. Stoica, J. Chuang, Robust incentive techniques for peer-to-peer networks, Proceedings of the 5th ACMconference on Electronic commerce, pp. 102-111, May 2004. |
11 | S. D. Kamvar,M. T. Schlosser,H. Garcia -molina, The eigentrust algorithmfor reputationmanagement in p2p networks, Proceedings of the 12th international conference onWorldWideWeb, pp. 640-651,May 2003. |
12 | J. R. Douceur, The sybil attack, International workshop on Peer-To-Peer Systems, March 2002. |
13 | K. Shin, Preventing misbehavior in cooperative distributed systems, Ph.D. thesis, North Carolina State University, December 2009. |
14 | R. Landa, D. Griffin, R. G. Clegg, E. Mykoniati, M. Rio, A sybilproof indirect reciprocity mechanism for peer-to-peer networks, IEEE Conference on Computer Communications, pp. 343 - 351, April 2009. |
15 | M. Feldman, J. Chuang, Overcoming free-riding behavior in peer-to-peer systems, ACMSigecom Exchanges, Vol. 5, July 2005 |
16 | G. Hardin, Tragedy of the commons, Science 162. |
17 | L. Jian, J. K.MacKie-Mason,Why share in peer-to-peer networks?, International Conference on Electronic Commerce, August 2008. |
18 | Redhat 9 torrent tracker trace. http://mikel.tlm.unavarra.es/-mikel/bt_pam2004/ |