scholarly journals Cooperative Buffering Schemes for Time-Shifted Live Streaming of Distributed Appliances

2021 ◽  
Vol 11 (23) ◽  
pp. 11527
Author(s):  
Eunsam Kim ◽  
Yunho Cho ◽  
Hyoseop Shin

Distributed appliances connected to the Internet have provided various multimedia services. In particular, networked Personal Video Recorders (PVRs) can store broadcast TV programs in their storage devices or receive them from central servers, enabling people to watch the programs they want at any desired time. However, the conventional CDNs capable of supporting a large number of concurrent users have limitations in scalability because more servers are required in proportion to the increased users. To address this problem, we have developed a time-shifted live streaming system over P2P networks so that PVRs can share TV programs with each other. We propose cooperative buffering schemes to provide the streaming services for time-shifted periods even when the number of PVRs playing back at the periods is not sufficient; we do so by utilizing the idle resources of the PVRs playing at the live broadcast time. To determine which chunks to be buffered, they consider the degree of deficiency and proximity and the ratio of playback requests to chunk copies. Through extensive simulations, we show that our proposed buffering schemes can significantly extend the time-shifting hours and compare the performance of two buffering schemes in terms of playback continuity and startup delay.

Author(s):  
Nick Bowman ◽  
Mark Richard Johnson ◽  
Jamie Woodcock ◽  
Will Partin ◽  
Nathan Jackson

This panel presents ongoing research into online “live streaming” platforms, which offer the live broadcast of individuals’ activities - primarily but not exclusively digital gameplay - over the internet to potentially massive worldwide audiences. The largest platform in this area (on which we focus) is Twitch.tv, already the 30th most-viewed website in the world, with comparable platforms boasting large viewing numbers in China, Korea, and Japan. Our first talk examines Twitch as the dominant leading live streaming platform, outlining its evolution and historical origins while unpacking some of the fundamental user-platform relationships manifested on the site. The second addresses itself to the sociality of live streaming, which unlike traditional video media formats enables a rapid live exchange of comments and conversation between live streaming producers and consumers. The third paper presents an overview and typology of monetization methods in live streaming, focusing in particular on the gamified and “gamblified” elements of making money through the practice, as well as how these practices have evolved through a three-way dialogue between viewers, “streamers”, and platforms. The fourth paper builds on this by examining the on-platform currency of Twitch, known as “Bits”, and how the platform captured donations from viewers through the implementation of this currency system. The fifth and final paper will then further develop these critical enquiries into monetization methods and platform dynamics by presenting a number of extremely contemporary developments in this area on Twitch, exploring new the routes for capital flow enabled by new platform infrastructures and technological systems.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5616
Author(s):  
Daniel V. C. da Silva ◽  
Antonio A. de A. Rocha ◽  
Pedro B. Velloso

Video streaming on the Internet is constantly changing and growing. New devices and new video delivery mechanisms generate huge gaps in the understanding of how video application works. From exploratory research of one among the largest streaming services in Brazil, this work presents a comparison between mobile and non-mobile users, in large-scale lives. This work focuses on metrics such as engagement, interruption, churn, and payload. This work also presents a report-overview of mobile-users, considering the operating system, geolocation, network access, interruption, and engagement. These results might offer potential information for streaming improvement, in addition to serving as a historical mark.


2001 ◽  
Vol 101 (1) ◽  
pp. 19-31 ◽  
Author(s):  
Gerard Goggin ◽  
Catherine Griff

Much of the present debate about content on the internet revolves around how to control the distribution of different sorts of harmful or undesirable material. Yet there are considerable issues about whether sufficient sorts of desired cultural content will be available, such as ‘national’, ‘Australian’ content. In traditional broadcasting, regulation has been devised to encourage or mandate different types of content, where it is believed that the market will not do so by itself. At present, such regulatory arrangements are under threat in television, as the Productivity Commission Broadcasting Inquiry final report has noted. But what of the future for certain types of content on the internet? Do we need specific regulation and policy to promote the availability of content on the internet? Or is such a project simply irrelevant in the context of gradual but inexorable media convergence? Is regulating for content just as quixotic and fraught with peril as regulating of content from a censorship perspective often appears to be? In this article, we consider the case of Australian content for broadband technologies, especially in relation to film and video, and make some preliminary observations on the promotion and regulation of internet content.


2008 ◽  
Vol 67 (1) ◽  
pp. 69-91 ◽  
Author(s):  
Arthur Chaskalson

There are two themes that recur in previous Sir David Williams lectures. First, that it is a considerable honour to be invited to give the lecture. Secondly, that it is a daunting task to do so in the presence of Sir David, particularly in a field in which he has expertise. Since that covers most of the law there is no escape from this dilemma. Let me then acknowledge the privilege of having been asked to give this year's lecture, and confess that it is with some trepidation that I do so. The subject, terrorism and human rights, is not exactly uncharted territory. When I looked into the internet for some guidance on what might be relevant to terrorism and human rights, the response to my Google search informed me that in .03 seconds 32,900,000 references had been found. This seemed to indicate that it was unlikely that I would be able to say anything that has not already been said. But there are some subjects that are of such importance that there is value in reminding ourselves of the issues that are at stake, and if necessary for that purpose, repeating what others have said. And it is with that in mind that I approach my chosen topic.


2020 ◽  
Vol 4 (3) ◽  
pp. 217
Author(s):  
Brenda Allana Santos De Paula ◽  
Miriam Leite Farias ◽  
Salomão Alencar de Farias ◽  
Ilda Maria Moraes e Silva

This study aimed to analyse whether sensory and symbolic elements used in perfume descriptions in internet sales can positively influence the level of involvement and consumer buying intention. To do so, a quasi-experimental design was adopted with the creation of three scenarios: one control group and two experimental groups.  Each participant was presented to only one of the scenarios created, characterizing the model between subjects. Regarding the results, it was found that it is not possible to perceive differences between the means of the groups in relation to the dependent variables, except for a negative association between sensory aspects and the level of involvement. Therefore, it was concluded that it may not be advantageous to invest in sensory and symbolic aspects present in the product description in internet sales, it is necessary to rethink this strategy due the fact that this environment has a certain limitation with hedonics products.


Author(s):  
Savinay Mengi ◽  
Astha Gupta

A Blockchain protocol operates on top of the Internet, on a P2P network of computers that all run the protocol and hold an identical copy of the ledger of transactions, enabling P2P value transactions without a middleman though machine consensus. The concept of Blockchain first came to fame in October 2008, as part of a proposal for Bitcoin, with the aim to create P2P money without banks. Bitcoin introduced a novel solution to the age-old human problem of trust. The underlying blockchain technology allows us to trust the outputs of the system without trusting any actor within it. People and institutions who do not know or trust each other, reside in different countries, are subject to different jurisdictions, and who have no legally binding agreements with each other, can now interact over the Internet without the need for trusted third parties like banks, Internet platforms, or other types of clearing institutions. Ideas around cryptographically secured P2P networks have been discussed in the academic environment in different evolutionary stages, mostly in theoretical papers, since the 1980s. “Proof-of-Work” is the consensus mechanism that enables distributed control over the ledger. It is based on a combination of economic incentives and cryptography. Blockchain is a shared, trusted, public ledger of transactions, that everyone can inspect but which no single user controls. It is a distributed database that maintains a continuously growing list of transaction data records, cryptographically secured from tampering and revision.


2021 ◽  
Vol 10 (1) ◽  
pp. 73-88
Author(s):  
Enrique Orduña-Malea ◽  
Cristina I. Font-Julian ◽  
José Antonio Ontalba-Ruipérez ◽  
Raúl Compés-López

Globalisation, the Internet and social media have changed the kind of actors with influence in the wine industry and the way these actors create signals to communicate credible information about experience and trust attributes. Among the most prestigious experts in the world of wine are the Masters of Wine (MW). Although initially devoted to international trade, they have spread their activities and their opinion is more and more appreciated by producers and consumers. The main objective of this article is to determine this community of experts’ behaviour on Twitter. In order to do so, four factors (presence, activity, impact and community) have been considered. All Twitter profiles belonging to users awarded with the MW qualification were identified and analysed. In addition, a set of 35,653 tweets published by the MWs were retrieved and analysed through descriptive statistics. The results show MWs on Twitter as high attractors (number of followers), moderate publishers (original contents published), moderate influencers (number of likes and retweets), and low interactors (number of friends and mentions to other users). These findings reveal that the MW community is not using Twitter to gain or reinforce their reputation as an accredited expert in the wine industry, giving more influential space on Twitter to consumers and amateurs.


2015 ◽  
Vol 4 (1) ◽  
pp. 17-28
Author(s):  
Renée Ridgway

‘Cybercapitalism’, commonly termed ‘digital capitalism’, refers to the Internet, or ‘cyber- space’ and seeks to engage in business models within this territory in order to make financial profit. Cybercapitalism is structured by a highly intricate series of communication networks, which connect us through our participation on social platforms, but outside of these platforms how do we navigate and explore this information superhighway? We do so predominantly through search requests. Algorithms ostensibly know what we want before we even type them, as with Google’s ‘autocomplete’. Thus search is not merely an abstract logic but a lived practice that helps manage and sort the nature of information we seek as well as the direction of our queries. Nowadays it has become clear that users pay for such services with their data, which is increasingly the means to finance various corporations’ growth as they sell this data to third party advertisers. It is a transaction and in the exchange we get relevance. But is this really true? 


Comunicar ◽  
2016 ◽  
Vol 24 (46) ◽  
pp. 67-76 ◽  
Author(s):  
David Dueñas-Cid ◽  
Paloma Pontón-Merino ◽  
Ángel Belzunegui-Eraso ◽  
Inma Pastor-Gosálbez

In the framework of the «Project I: CUD» (Internet: Creatively Unveiling Discrimination), carried out in the United Kingdom, Italy, Belgium, Romania and Spain, we conducted a study into the expressions of discrimination used by young people on social network sites (SNS). To do so we designed a methodological strategy for detecting discriminatory content in 493 Facebook profiles and used this strategy to collect 363 examples for further analysis. Our aims were to compile information on the various types of discriminatory content and how they function online in order to create tools and strategies that can be used by trainers, teachers and families to combat discrimination on the Internet. Through this study we have detected patterns between young men and young women that reveal that there is a feminine and a masculine way of behaving on the Internet and that there are different ways of expressing discrimination on SNS. Men tend to be more direct in their posting and sharing of messages. Their messages, which are also more clearly discriminatory, focus more on discrimination towards ethnic groups and cultural minorities. Women, on the other hand, tend to use indirect (reactive) discriminatory strategies with a less obvious discriminatory component that mainly focuses on sociocultural status and physical appearance. En el marco del Proyecto «I:CUD» (Internet: Desenmascarando la discriminación creativamente), llevado a cabo en el Reino Unido, Italia, Bélgica, Rumanía y España, hemos desarrollado una investigación sobre las expresiones de discriminación utilizadas por los jóvenes en las redes sociales (SNS). Para la realización de esta investigación, se ha diseñado una estrategia metodológica de detección de contenidos discriminatorios en 493 perfiles de Facebook que ha permitido encontrar 363 ejemplos para su análisis. El objetivo de la misma ha sido la obtención de información acerca de los tipos de contenidos discriminatorios y su forma de funcionamiento on-line, para facilitar la creación de herramientas y estrategias para luchar contra la discriminación en la Red, y su utilización por parte de formadores, docentes y familias. Como resultado, hemos detectado algunos patrones diferenciales entre hombres y mujeres jóvenes que nos permiten afirmar la existencia de una forma femenina y otra masculina de comportarse en Internet y un uso diferencial de las SNS en relación con la discriminación. En cuanto a ésta, los hombres tienden a tener más actividad directa (publicando y compartiendo mensajes), con contenidos más claramente discriminatorios y, sobretodo, centrados en la discriminación hacia grupos étnicos y minorías culturales. Las mujeres, por su parte, tienden a utilizar estrategias de discriminación no directas (reactivas), con una menor evidencia del componente discriminatorio. Ellas, mayoritariamente, dirigen las actitudes discriminatorias hacia la situación sociocultural y la apariencia física.


Sign in / Sign up

Export Citation Format

Share Document