Peer-to-peer video-on-demand in future internet
The advance in broadband access technology is improving at the proverbial lightning fast speed. As a consequence, in the near future, we can expect to have 40G/100G bandwidth and Ultra High Definition Television (UHDTV) with a resolution of 4320p in contrast with today's 1080p technologies. In...
| Main Authors: | Fouda, Mostafa M., Fadlullah, Zubair Md., Pathan, Al-Sakib Khan, Kato, Nei |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
CRC Press, USA
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/24257/ http://irep.iium.edu.my/24257/1/Zub_Sakib_P2PVideo-On-Demand%20in%20Future%20Internet.pdf |
Similar Items
Adaptable Topology For Peer-To-Peer Live Video
Streaming
by: Mahmood, Ammar Waysi
Published: (2015)
by: Mahmood, Ammar Waysi
Published: (2015)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
Information integrity in smart grid systems
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
Internet call delay on peer to peer and phone to phone VoIP network
by: A.M., Said, et al.
Published: (2009)
by: A.M., Said, et al.
Published: (2009)
Linearizing peer-to-peer systems with Oracles
by: Mohd. Nor, Rizal, et al.
Published: (2013)
by: Mohd. Nor, Rizal, et al.
Published: (2013)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
Quality of service for video packet over peer to peer network using active measurement
by: Joni, Muhammad Affan
Published: (2008)
by: Joni, Muhammad Affan
Published: (2008)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
The impact of file sharing based on the peer-to-peer technology
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
Minimization of Internet Service Providers' inability to control peer-to-peer traffic by using peer-to-peer and software defined network based web search engine (TOC, Abstract, Chapter 1 and Reference only)
by: Chang , Choong Ching
Published: (2014)
by: Chang , Choong Ching
Published: (2014)
Models of Interaction as a Grounding for Peer to Peer Knowledge Sharing
by: Robertson, D., et al.
Published: (2008)
by: Robertson, D., et al.
Published: (2008)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Peer-to-peer application using Microsoft .Net Framework / Tan Boon Yin
by: Tan, Boon Yin
Published: (2004)
by: Tan, Boon Yin
Published: (2004)
Query routing using query feedback and similarity in unstructured peer to peer networks
by: Ishak, Iskandar, et al.
Published: (2008)
by: Ishak, Iskandar, et al.
Published: (2008)
Guest editorial: Special issue on integration of IoT with future Internet
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Peered content delivery network through request routing peering system for video-on-demand
by: Kee, Hwaai Shian
Published: (2012)
by: Kee, Hwaai Shian
Published: (2012)
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
Implications of caching for JXTA peers
by: Rozlina, Mohamed
Published: (2014)
by: Rozlina, Mohamed
Published: (2014)
Agent-Based Resource Discovery In Peer-To-Peer Networks
by: Sedaghat, Mina
Published: (2010)
by: Sedaghat, Mina
Published: (2010)
Video On Demand System For Heterogeneous
Wireless Mobile Networks
by: Al-Omari, Saleh Ali Khattap
Published: (2013)
by: Al-Omari, Saleh Ali Khattap
Published: (2013)
The Adaptation of Cloud Solution for Peer Collaboration Work among Teachers in Maktab Nasional Secondary School
by: Romella Marie Sipaul,
Published: (2021)
by: Romella Marie Sipaul,
Published: (2021)
Study of intelligence peer selection in enhancing p2p using artificial neural network
by: Cham, Hui
Published: (2014)
by: Cham, Hui
Published: (2014)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Implementing peer to peer technology for ISE virtual community knowledge sharing / Shafizol Bakhtiar Mokhtar
by: Mokhtar, Shafizol Bakhtiar
Published: (2006)
by: Mokhtar, Shafizol Bakhtiar
Published: (2006)
Static and self-scalable filter range selection algorithms for peer-to-peer networks
by: Kweh, Yeah Lun
Published: (2011)
by: Kweh, Yeah Lun
Published: (2011)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Computer science and IT today: research issues and publication tips
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov Models
by: Toral-Cruz, Homero, et al.
Published: (2012)
by: Toral-Cruz, Homero, et al.
Published: (2012)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
by: Sinnanaidu, Subba Rao
Published: (2004)
by: Sinnanaidu, Subba Rao
Published: (2004)
Similar Items
-
Adaptable Topology For Peer-To-Peer Live Video
Streaming
by: Mahmood, Ammar Waysi
Published: (2015) -
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013) -
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012) -
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012) -
Information integrity in smart grid systems
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)