Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
Looking to rent a book? Rent Behavior Dynamics in Media-Sharing Social Networks [ISBN: 9780521197274] for the semester, quarter, and short term or search our site for other textbooks by H. Vicky Zhao , W. Sabrina Lin , K. J. Ray Liu. Renting a textbook can save you up to 90% from the cost of buying.
Preface | p. xi |
Introduction | p. 1 |
Introduction to media-sharing social networks | p. 3 |
Quantitative analysis of social networks | p. 5 |
Understanding media semantics in media-sharing networks | p. 10 |
Overview of multimedia fingerprinting | p. 14 |
Traitor-tracing multimedia fingerprinting | p. 15 |
Scalable video coding system | p. 17 |
Scalable video fingerprinting | p. 18 |
Overview of mesh-pull peer-to-peer video streaming | p. 24 |
Mesh-pull structure for P2P video streaming | p. 25 |
User dynamics in peer-to-peer video streaming | p. 33 |
Game theory for social networks | p. 41 |
Noncooperative and cooperative games | p. 42 |
Noncooperative games | p. 43 |
Bargaining games | p. 50 |
Behavior forensics in media-sharing social networks | p. 55 |
Equal-risk fairness in colluder social networks | p. 57 |
Equal-risk collusion | p. 57 |
Influence on the detector's side: collusion resistance | p. 63 |
Traitor-tracing capability of scalable fingerprints | p. 75 |
Chapter summary and bibliographical notes | p. 82 |
Leveraging side information in colluder social networks | p. 85 |
Probing and using side information | p. 85 |
Game-theoretic analysis of colluder detector dynamics | p. 93 |
Equilibrium analysis | p. 94 |
Simulation results | p. 103 |
Chapter summary and bibliographical notes | p. 109 |
Risk-distortion analysis of multiuser collusion | p. 111 |
Video fingerprinting | p. 112 |
Risk-distortion modeling | p. 113 |
Strategies with side information | p. 117 |
Parameter estimation | p. 122 |
Simulation results | p. 122 |
Chapter summary and bibliographical notes | p. 127 |
Fairness and cooperation stimulation | p. 129 |
Game-theoretic modeling of colluder social networks | p. 131 |
Multiuser collusion game | p. 132 |
Feasible and Pareto optimal collusion | p. 137 |
When to collude | p. 139 |
How to collude: the bargaining model | p. 150 |
How to collude: examples | p. 155 |
Maximum payoff collusion | p. 160 |
Chapter summary and bibliographical notes | p. 167 |
Cooperation stimulation in peer-to-peer video streaming | p. 169 |
Incentives for peer cooperation over the Internet | p. 170 |
Wireless peer-to-peer video streaming | p. 178 |
Optimal cooperation strategies for wireless video streaming | p. 181 |
Optimal chunk request algorithm for P2P video streaming with scalable coding | p. 189 |
Chapter summary and bibliographical notes | p. 193 |
Optimal pricing for mobile video streaming | p. 195 |
Introduction | p. 195 |
System model | p. 196 |
Optimal strategies for single secondary buyer | p. 198 |
Multiple secondary buyers | p. 206 |
Optimal pricing for the content owner | p. 208 |
Chapter summary and bibliographical notes | p. 217 |
Misbehaving user identification | p. 219 |
Cheating behavior in colluder social networks | p. 221 |
Traitors within traitors via temporal filtering | p. 222 |
Traitors within traitors in scalable fingerprinting systems | p. 227 |
Chapter summary | p. 245 |
Attack resistance in peer-to-peer video streaming | p. 247 |
Attack-resistant cooperation strategies in P2P video streaming over the Internet | p. 248 |
Attack-resistant cooperation strategies in wireless P2P video streaming | p. 261 |
Chapter summary and bibliographical notes | p. 273 |
Media-sharing social network structures | p. 275 |
Misbehavior detection in colluder social networks with different structures | p. 277 |
Behavior dynamics in colluder social networks | p. 278 |
Centralized colluder social networks with trusted ringleaders | p. 280 |
Distributed peer-structured colluder social networks | p. 289 |
Chapter summary and bibliographical notes | p. 306 |
Structuring cooperation for hybrid peer-to-peer streaming | p. 308 |
System model and utility function | p. 309 |
Agent selection within a homogeneous group | p. 311 |
Agent selection within a heterogeneous group | p. 317 |
Distributed learning algorithm for ESS | p. 320 |
Simulation results | p. 320 |
Chapter summary and bibliographical notes | p. 325 |
References | p. 326 |
Index | p. 335 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.