X
Xiaojun Hei
Researcher at Huazhong University of Science and Technology
Publications - 118
Citations - 2918
Xiaojun Hei is an academic researcher from Huazhong University of Science and Technology. The author has contributed to research in topics: The Internet & Testbed. The author has an hindex of 18, co-authored 116 publications receiving 2644 citations. Previous affiliations of Xiaojun Hei include Hong Kong University of Science and Technology & Sun Yat-sen University.
Papers
More filters
Journal ArticleDOI
A Measurement Study of a Large-Scale P2P IPTV System
TL;DR: In this paper, an in-depth measurement study of one of the most popular P2P IPTV systems, namely, PPLive, has been conducted, which enables the authors to study the global characteristics of the mesh-pull peer-to-peer IPTV system.
Insights into PPLive: A Measurement Study of a Large-Scale P2P IPTV System
TL;DR: An in-depth measurement study of one of the most popular IPTV systems, namely, PPLive, using a dedicated PPLiv crawler, which enables the study of the global characteristics of the mesh-pull P2P IPTV system.
Journal ArticleDOI
Inferring Network-Wide Quality in P2P Live Streaming Systems
TL;DR: This paper remotely harvest buffer maps from many peers and then process these buffer maps to estimate the video playback quality, and presents results for network-wide playback continuity, startup latency, playback lags among peers, and chunk propagation patterns.
Journal ArticleDOI
IPTV over P2P streaming networks: the mesh-pull approach
TL;DR: This article provides an overview of the general mesh-pull streaming architecture and review various challenges, design issues, and interesting research problems in this approach, and outlines a measurement technique for monitoring the video playback quality of mesh- pull streaming systems.
Proceedings ArticleDOI
The pollution attack in P2P live video streaming: measurement results and defenses
TL;DR: This paper examines the applicability of four possible defenses to the pollution attack: blacklisting, traffic encryption, hash verification, and chunk signing, and concludes that the chunk signing solutions are most suitable.