scispace - formally typeset
X

Xiaojun Hei

Researcher at Huazhong University of Science and Technology

Publications -  118
Citations -  2918

Xiaojun Hei is an academic researcher from Huazhong University of Science and Technology. The author has contributed to research in topics: The Internet & Testbed. The author has an hindex of 18, co-authored 116 publications receiving 2644 citations. Previous affiliations of Xiaojun Hei include Hong Kong University of Science and Technology & Sun Yat-sen University.

Papers
More filters
Journal ArticleDOI

A Measurement Study of a Large-Scale P2P IPTV System

TL;DR: In this paper, an in-depth measurement study of one of the most popular P2P IPTV systems, namely, PPLive, has been conducted, which enables the authors to study the global characteristics of the mesh-pull peer-to-peer IPTV system.

Insights into PPLive: A Measurement Study of a Large-Scale P2P IPTV System

TL;DR: An in-depth measurement study of one of the most popular IPTV systems, namely, PPLive, using a dedicated PPLiv crawler, which enables the study of the global characteristics of the mesh-pull P2P IPTV system.
Journal ArticleDOI

Inferring Network-Wide Quality in P2P Live Streaming Systems

TL;DR: This paper remotely harvest buffer maps from many peers and then process these buffer maps to estimate the video playback quality, and presents results for network-wide playback continuity, startup latency, playback lags among peers, and chunk propagation patterns.
Journal ArticleDOI

IPTV over P2P streaming networks: the mesh-pull approach

TL;DR: This article provides an overview of the general mesh-pull streaming architecture and review various challenges, design issues, and interesting research problems in this approach, and outlines a measurement technique for monitoring the video playback quality of mesh- pull streaming systems.
Proceedings ArticleDOI

The pollution attack in P2P live video streaming: measurement results and defenses

TL;DR: This paper examines the applicability of four possible defenses to the pollution attack: blacklisting, traffic encryption, hash verification, and chunk signing, and concludes that the chunk signing solutions are most suitable.