32,240 research outputs found

    Analyzing Peer Selection Policies for BitTorrent Multimedia On-Demand Streaming Systems in Internet

    Get PDF
    The adaptation of the BitTorrent protocol to multimedia on-demand streaming systems essentially lies on the modification of its two core algorithms, namely the piece and the peer selection policies, respectively. Much more attention has though been given to the piece selection policy. Within this context, this article proposes three novel peer selection policies for the design of BitTorrent-like protocols targeted at that type of systems: Select Balanced Neighbour Policy (SBNP), Select Regular Neighbour Policy (SRNP), and Select Optimistic Neighbour Policy (SONP). These proposals are validated through a competitive analysis based on simulations which encompass a variety of multimedia scenarios, defined in function of important characterization parameters such as content type, content size, and client interactivity profile. Service time, number of clients served and efficiency retrieving coefficient are the performance metrics assessed in the analysis. The final results mainly show that the novel proposals constitute scalable solutions that may be considered for real project designs. Lastly, future work is included in the conclusion of this paper.Comment: 19 PAGE

    PRHOLO: 360Âș Interactive Public Relations

    Get PDF
    In the globalized world, possessing good products may not be enough to reach potential clients unless creative marketing strategies are well delineated. In this context, public relations are also important when it comes to capture the client’s attention, making the first contact between the clients and the company’s products, while being persuasive enough to make them confident that the company has the right products to fit their needs. Three virtual public relations installations were purposed in this chapter, combining technology with a human like public relations ability, capable of interacting with potential clients located in front of the installation, at angles of up to 57Âș (degrees), 180Âș and 360Âș, respectively. From one to several Microsoft Kinects were used to develop the three interaction models, which allows tracking and recognition of users’ gestures and positions (heat map), sound sources, voice commands and face and body extraction of the user interacting with the installation.info:eu-repo/semantics/publishedVersio

    Overconfidence and excess entry: a comparison between students and managers

    Get PDF
    Overconfidence can lead to excessive business entry. Here we replicate the pioneer experiment finding this nexus (Camerer and Lovallo 1999) and extend it in two major directions: (1) to consider managers as well as student subjects and (2) to explicitly take into account selected characteristics of the manager subjects. We find that managers are more prone to the nexus overconfidence-excess entry than students are. In particular, we find that left-handed, married, and emotionally aroused managers are more prone to excess entry.excess business entry, overconfidence, unrealistic optimism

    Improving BitTorrent's Peer Selection For Multimedia Content On-Demand Delivery

    Get PDF
    The great efficiency achieved by the BitTorrent protocol for the distribution of large amounts of data inspired its adoption to provide multimedia content on-demand delivery over the Internet. As it is not designed for this purpose, some adjustments have been proposed in order to meet the related QoS requirements like low startup delay and smooth playback continuity. Accordingly, this paper introduces a BitTorrent-like proposal named as Quota-Based Peer Selection (QBPS). This proposal is mainly based on the adaptation of the original peer-selection policy of the BitTorrent protocol. Its validation is achieved by means of simulations and competitive analysis. The final results show that QBPS outperforms other recent proposals of the literature. For instance, it achieves a throughput optimization of up to 48.0% in low-provision capacity scenarios where users are very interactive.Comment: International Journal of Computer Networks & Communications(IJCNC) Vol.7, No.6, November 201

    Realizing the supersymmetric inverse seesaw model in the framework of R-parity violation

    Get PDF
    If, on one hand, the inverse seesaw is the paradigm of TeV scale seesaw mechanism, on the other it is a challenge to find scenarios capable of realizing it. In this work we propose a scenario, based on the framework of R-parity violation, that realizes minimally the supersymmetric inverse seesaw mechanism. In it the energy scale parameters involved in the mechanism are recognized as the vacuum expectation values of the scalars that compose the singlet superfields N^C\hat N^C and S^\hat S. We develop also the scalar sector of the model and show that the Higgs mass receives a new tree-level contribution that, when combined with the standard contribution plus loop correction, is capable of attaining 125125GeV without resort to heavy stops.Comment: Minor modification of the text. Final version to be published in PL
    • 

    corecore