This application claims the benefit, under 35 U.S.C. §365 of International Application PCT/EP2008/067080, filed Dec. 9, 2008, which was published in accordance with PCT Article 21(2) on Jun. 18, 2009 in English and which claims the benefit of European patent application No. 07301657.8, filed Dec. 11, 2007 and European patent application No. 08305196.1, filed May 23, 2008.
The present invention relates to content distribution services, such as Video-on-Demand (VOD) services for instance.
One means here by “content distribution service” a service allowing a client to download content(s) that are provided by a service provider through a communication network.
As it is known by the man skilled in the art, a traditional architecture to provide content distribution services, such as VOD services to Internet-connected users, is a Client-Server architecture in which users (clients) download the desired content(s) from a server managed by a service provider and connected to a communication network.
More recently, solutions based on a peer-to-peer (P2P) approach have been developed. In the first generation of such peer-to-peer solutions the users were only authorized to store the content(s) they download for their own use, on a temporary basis. As a result, users might download a content of interest only from other users currently consuming the same content, or from the content servers.
In the last few years, a more powerful peer-to-peer architecture has been proposed. In this architecture, users can proactively download content(s) that they are not immediately interested in, but that they might serve to other interested users in the future. This architecture is intended for reducing the amount of infrastructure (server) resources that is required to meet a target quality of service, and hence for reducing the overall cost of infrastructure deployment.
This last architecture can be used, for instance, in the two following specific contexts.
In an “open Internet” context (or open uncontrolled environment), users interact with one another and with the infrastructure servers via their personal computers (or more generally communication equipments) that are connected to the Internet. So, a proactive storage of content(s), managed by the users themselves, can be easily done on the hard disk of the user's personal computer (or equipment).
In an “edge device network” context, the interacting components are either home gateways (connected through DSL or cable) or set-top boxes (STBs) that are located in the user's home premises. In this context, all the edge devices can be controlled by the Internet service provider(s) (ISP(s)) to which the users subscribe. So a proactive storage of content(s) can be done on hard disks of these edge devices.
To reap all the benefits of the last mentioned P2P architecture, it is critical to make adequate decisions regarding which content to proactively store, and where to store it. This issue has been notably considered in the article of K. Suh et al., “Push-to-Peer Video-on-Demand system: design and evaluation”, IEEE Journal in Selected Areas in Communications, December 2007. In this article two strategies have been proposed, namely the “full striping” and the “coding based” placement strategies. These strategies achieve optimal performance but only when the same amount of data is stored for each content and when no information is available on user's preferences.
The prior art document WO 2007/080345 (Thomson Licensing) discloses a multimedia content delivery method and system. The method disclosed in this prior PCT patent application comprises:
So the object of this invention is to improve the situation.
For this purpose, the invention provides a control device, for a network equipment connected to a communication network to which are coupled communication equipments of users capable of storing contents, and comprising:
The control device according to the invention may include additional characteristics considered separately or combined, and notably:
The invention also provides a network equipment, for a communication network to which are coupled communication equipments of users capable of storing contents, and comprising a control device such as the one above introduced.
The invention also provides a method, intended for optimizing the access to contents by users comprising communication equipments coupled to a communication network, and comprising the steps of:
Other features and advantages of the invention will become apparent on examining the detailed specifications and Annexes hereafter and the appended drawing, wherein the unique FIGURE schematically illustrates a control server comprising an example of embodiment of a control device according to the invention, and connected to a communication network to which are also coupled a content server and communication equipments of users.
The appended drawing may serve not only to complete the invention, but also to contribute to its definition, if need be.
The invention aims at offering a control device, and an associated method, intended for optimizing the access to contents by users which are equipped with communication equipments CE that are coupled to a communication network CN.
In the following description it will be considered that contents are videos (or movies) which can be transmitted to user communication equipments CE that are connected to Internet through at least one DSL (or optical fiber or else cable) communication network CN. But the invention is not limited to this application. Indeed, it concerns any type of digital content and notably audio (or music) files and data files.
Moreover, the user communication equipments CE may be of any type as soon as, on the one hand, they comprise, or are coupled to, a memory means MM intended for storing contents, and on the other hand, they are capable of establishing communications therebetween in a peer-to-peer (P2P) mode. So a user communication equipment CE may be a fixed personal computer, a laptop, a content receiver (for instance a home gateway or a set-top box (STB) located in the user's home premise), a mobile or cellular telephone, or a personal digital assistant (PDA), provided that it comprises a communication modem (or any equivalent communication means). So, the communication network(s) CN, to which user communication equipments CE are connected, may be of any type (fixed or wireless), provided that it is capable of offering content distribution services, such as video-on-demand (VOD) services for instance.
In the following description it will be considered that the user communication equipments CE are home gateways of users that are clients of a content provider comprising at least one content server CTS coupled to the communication network CN.
As it is schematically illustrated in the unique FIGURE, a control device D according to the invention comprises at least a computation module CM and a first analyzing module A1 and/or a second analyzing module A2. In other words, a control device D comprises either a computation module CM, a first analyzing module A1 and a second analyzing module A2, or a computation module CM and a first analyzing module A1, or else a computation module CM and a second analyzing module A2.
As illustrated in the non limiting example, a control device D may be localized into a network equipment CS, such as a control server, connected (or coupled to) the communication network CN. But, such a control device D may be also coupled to a network equipment CS.
Moreover, a control device D is preferably made of software modules, at least partly. But it could be also made of electronic circuit(s) or hardware modules, or a combination of hardware and software modules (in this case the control device D comprises also a software interface allowing interworking between the hardware and software modules). In case where it is exclusively made of software modules it can be stored in a memory of a network equipment or in any computer software product, such as a CD-ROM, for instance, which can be read by a network equipment.
In the following description it will be considered that the control device D is dedicated to the optimization of the access to a single collection of contents that “belongs” to only one content provider. But a control device D may be dedicated to the optimization of the access to several collections of contents belonging to several content providers.
The first analyzing module A1 (of a control device D) is notably intended for determining respective popularities of contents of a collection from at least user information.
One means here by “user information” an information which defines a relation between a content and a user. So, it may be a past use of content by a user, a user appreciation relative to a previously accessed content or the forecast use of a content by a user.
It is important to note that at least some of the user information may be provided to the control device D (or its control server CS) by the users themselves, through reports. For instance, a user report may comprise user information relative to its past uses of contents and/or its appreciations of previously accessed contents. Such user reports may be transmitted by the user (communication) equipments CE to the control device D (or its control server CS) either spontaneously (for instance periodically) or on request of the control device D. But at least some of the user information may be also provided by the service provider, possibly after an analysis of the data relative to the content consumption of its clients it has collected near its own network equipments and/or near any other network access provider. This last user information may be the forecast uses of contents by the users that may be determined by a content provider before putting them at the user's disposal based on additional information.
It is also important to note that the first analyzing module A1 may determine the content popularities not only from the user information but also from additional information which is for instance relative to network topology, such as communication capacities and storage capacities of the user equipments CE.
When the first analyzing module A1 has determined the content popularities of a collection, it is arranged for determining a number of replicas for each content of the collection from at least its own determined content popularity.
For this purpose, the first analyzing module A1 may, for instance, first determine the number of concurrent content requests that are expected from the users for each content of the collection, taking into account its own determined content popularity. Then, it may determine a partition of these contents into a chosen number of groups, from the determined numbers of concurrent content requests and from communication capacities and storage capacities of the user equipments CE.
In this first method the partition of contents may be carried out into three groups. A first group may be dedicated to “hot” contents. It comprises contents whose replicas must be stored into the equipments CE of each user of at least one chosen user group. A second group may be dedicated to “warm” contents. It comprises contents whose replicas must be stored into the equipment CE of one user of at least one chosen user group. A third group may be dedicated to “cold” contents. It comprises contents whose replicas do not need to be stored into the user premises, and therefore are stored into at least one chosen network equipment, such as the content server CTS, and can only be obtained near the latter, at least for the first access.
The above mentioned first method is optimal when the predictions of the number of concurrent requests for each content are exact. When this is not the case, the first analyzing module A1 must implement a second method. For instance, it may determine the partition of the contents in a variable number of groups, from the communication capacities and storage capacities of the user equipments CE and from the mean value and variance of the numbers of concurrent content requests that are expected from the users for each content.
More detailed examples of implementation of the two above mentioned methods are described in Annex 1.
The second analyzing module A2 (of a control device D) is arranged for determining content preference(s) of users from content ratings. These content ratings, which are representative of the user appreciations of each previously accessed content, may be transmitted to the control device D (or its control server CS) either by the user equipments CE (spontaneously (for instance periodically) or on request of the control device D) or by the service provider.
To determine the user content preference(s), the second analyzing module A2 may, for instance, first determine a partition of the users into clusters, from the user content ratings.
For this purpose, based on the collected ratings of contents by users, the second analyzing module A2 may, for instance, create a “conflict graph” in which two users who gave markedly distinct ratings to the same content are linked by a “conflict edge”. This graph is then processed to partition users into disjoint clusters which are intended for capturing distinct user profiles.
This clustering can be done by using a novel “spectral clustering” algorithm based on an extraction of spectral features (eigenvalues and associated eigenvectors) of the conflict graph, and more precisely of the so-called Laplacian matrix which is associated with the conflict graph.
When the clustering has been determined, the second analyzing module A2 may, for instance, determine a model of user preference(s) for each cluster.
This last determination of the user preference model of each cluster may be, for instance, based on the application of a maximum likelihood approach to the user content ratings. This is in some sense the most likely model of a particular class of statistical models. For instance one may choose each user preference model into the so-called “Tree-Structured Markov Random Fields class”.
Once the model for a given cluster is determined, the second analyzing module A2 may, for instance, use it to determine the contents that are most likely to be of interest to each of its users.
More details of the above described method for determining the user content preference(s) are given in Annex 2.
The computation module CM (of a control device D) is arranged for determining location(s) for storing the replica(s) of each content, from the content replica numbers (determined by the first analyzing module A1) and/or the user's content preferences (determined by the second analyzing module A2). This last determination aims at maximizing the number of times that a given content is stored in the equipment CE of a user who is expected to appreciate it, and therefore it aims at optimizing the access to the contents by the users.
It is important to note that, when the computation module CM has determined each storing location of each content replica, it is preferably arranged for generating recommendations which signal the content(s) to be stored for at least some of the users. In this case, it is also arranged for requiring the transmission of these recommendations to the equipments CE of the corresponding users, through the communication network CN, from its network equipment CS.
A user equipment CE can then follow its dedicated recommendation of content(s) by downloading such content(s), either from at least another user equipment CE (designated in the recommendation) or from at least one content server CTS (designated in the recommendation). This downloading may be possibly subjected to the authorization of the user.
But, the computation module CM may be also arranged for requiring the transmission of the replicas of each content in their corresponding locations from its network equipment CS. In other words the content replica transmission can be done automatically without informing the user equipments CE.
However, it is of interest to couple this automatic transmission (of at least some of the contents) with an explicit recommendation to the user intended for signaling the contents that have been “proactively” (automatically) stored in the memory of its equipment CE.
The invention can also be considered in terms of a method intended for optimizing the access to contents by users comprising communication equipments CE coupled to a communication network CN.
Such a method may be implemented by means of a device D such as the one above described with reference to the unique FIGURE. Therefore, only its main characteristics will be mentioned hereafter.
The method according to the invention comprises the main following steps:
The invention is not limited to the embodiments of method and control device described above, only as examples, but it encompasses all alternative embodiments which may be considered by one skilled in the art within the scope of the claims hereafter.
I-Assumptions and Notations
One considers a system comprising P peer nodes (or user equipments CE) and I infrastructure nodes or content distribution nodes (CDN) (or content servers CTS) intended for allowing users to access F distinct contents (such as movies) (f=1 to F). Movie f is assumed to last for Tf seconds, and to be encoded at some fixed rate Bf. One assumes that duration and encoding rates are movie-independent. So, they are denoted by T and B respectively.
Each peer node (CS) offers a storage space of size M and an uplink bandwidth capacity BP to the system. Each infrastructure node (CTS) offers an uplink bandwidth capacity BI. Moreover one assumes that each infrastructure node (CTS) has sufficient storage capacities to keep copies of all F movies.
The amount of memory devoted to movie f is denoted by Mf. One assumes this is independent of the peer (user). This is motivated by a scenario where there is no available knowledge of which peer node (CS) is more likely to view one of the F contents (movie). In this context, one considers a flash-crowd scenario where Nf concurrent viewings (or requests) of movie f are initiated for all f=1, . . . , F.
II-Results
II.1—In the first method, i.e. when the Nf concurrent content requests are known in advance, and are sorted in decreasing order (Nf≧Nf+1), then an optimal use of memory consists in partitioning the movies into three groups: the most popular movies (f≦f1), the movies with intermediate popularity (fε{f1+1, . . . , f2}) and the least popular movies (f>f2). The most popular movies are cached in full, i.e. Mf=BT for all f≦f1. The movies with intermediate popularity are cached minimally, i.e. Mf=(BT)/P, fε{f1+1, . . . , f2}. Finally the least popular movies are not cached at all, i.e. Mf=0, f>f2. The numbers f1 and f2 are determined so that the memory usage of each peer is precisely M, and that the movies with intermediate popularity can be served from other peer nodes (CS), using their dedicated uplink bandwidths BP.
For a total number of concurrent viewings of ΣfNf=εP (which corresponds to a fraction ε of peer nodes (CS) concurrently using the system), the requirements in terms of CDN node bandwidth are the largest when all Nf content popularities are equal. In that case, one can show that the total requirement in CDN node bandwidth reads (approximately):
Thus in this conservative scenario, one can show that a sufficient condition for the system to be self-sufficient, i.e. to not rely on CDN node support, is that:
Under more realistic models of popularity, assuming the Pareto-Zipf distribution Nf∝(f+f0)α, for some positive parameters f0 and α, one can show that the condition for the system to be self-sufficient is:
when α is large. In the preceding inequality, the value f1 is determined by:
This captures qualitatively the savings due to skewed popularity distributions.
II.2—In the second method, i.e. when the Nf content requests are not known beforehand, but are each defined by random variables, with known expectation μf and variance σ2f, one can show that the optimal content partitioning is no longer determined by a fixed partitioning into three groups of different popularities. Instead, the optimal memory placements Mf are now a function of the stochastic parameters of the requests which can be defined as follows:
where a and b are two positive parameters that do not depend on movie f. This differs significantly from the first method (perfectly known Nf content requests) where one need to cache either fully or minimally any movie f. Here, the optimal amount of caching can vary continuously with average popularity μf and the volatility of their popularities, reflected by σ2f.
One assumes there is a set of n users uεU and a set of m items (contents) iεI. Each user u gives marks (or ratings) ranging from 1 to k to some of the items i. Based on this rating information, one wants to infer future user preference. More specifically one wants to answer questions such as “which rating (or mark) will user u assign to item i, given that all of the user's previous ratings are known?”. One denotes by Mu(i) the true value of this rating (or mark).
I-Technique for Defining a Variable Number of Disjoints Clusters
A technique for separating users u into disjoint clusters is described below. Several methods relying on spectral properties of suitable matrices have been developed in the past. The closest to the present technique is that of R. B. Boppana, described in “Eigenvalues and Graph Bisection: An Average-case Analysis”, Proc. FOCS 1987, pages 280-285.
One assumes that a conflict matrix A is given. Matrix A is assumed to be symmetric, each entry Aij is assumed to be non-negative, and interpreted as a measure of the disagreement over content ratings between two users i and j in the present “collaborative filtering” context. Diagonal entries Aii all equal 0. For instance, Aij could be set to 1 if the two users issue distinct ratings on at least T different items (movies), for some threshold T. Alternatively, Aij could count the fraction of distinct ratings made by users i and j over the collection of movies they both rated, in which case Aij could take any value between 0 and 1.
The goal is to partition the index set into clusters, so that most conflicts are between indices from distinct clusters. In this context, one considers the Laplacian L of the conflict matrix A, defined by:
It is well known that the Laplacian matrix L is non-negative definite, since for any vector x, it holds that
Let p1≧p2 . . . ≧pK−1 denote its K−1 largest eigenvalues, and z(1), . . . , z(K−1) denote orthonormal associated eigenvectors. In order to split the index set into K distinct clusters, one proposes the following algorithm called “Spectral-Clustering”:
One will now show that this algorithm successfully recovers some hidden cluster structure under specific statistical assumptions. Namely, one considers a “planted partition” model which is a generalization of the model considered in the above mentioned document of Boppana and in the document of A. Condon et al., “Algorithms for Graph Partitioning on the Planted Partition Model”, Proc. 3rd Int. Workshop on Approx. Algorithms for Comb. Opt. Prob.: RANDOM-APPROX '99.
The planted partition model is as follows. Indices are partitioned into K distinct clusters C1, . . . , CK. The conflict values Aij are assumed to be random, with values in [0, 1], and independent across all index pairs (i, j), i<j. Moreover, for all i<j, these variables are assumed to verify the following:
p designates the intra-cluster average conflict, and q designates the inter-cluster average conflict, with typically q>p.
In this context, one has the following Theorem: “Consider a conflict matrix A distributed according to the above planted partition model. Assume that the number of clusters K is fixed, the initial number of indices N is large, and the size of cluster Ck verifies |Ck|˜αkN for some fixed positive parameters αk such that mink αk>0. Assume that the parameters p and q are such that q>p, q−p=Ω(p) (6),
where limN→∞ωN=+∞, and
Let the initial number of candidate cluster representatives M be fixed. Then with probability 1−K(1−minkαk)M−o(1), the above algorithm partitions indices into the original clusters, except for at most o(N) mis-classified indices.
II-Technique for Determining a Probabilistic Model of User's Preference(s) for Each Cluster
One adopts a probabilistic approach in which it is assumed that there exists a set of m random variables associated with the items {X1, . . . , Xm} spanning over the rating space R*={1, . . . , k} and describing true user preference(s). For each user u one considers its ratings in the form of a rating vector ru=(r1(u), . . . , rm(u)). This rating vector will be regarded as a sample of the multivariate law of all of the items X=(X1, . . . , Xm)˜P(•). One assumes namely that a user rates items (movies) by sampling this law.
At this stage it is important to note that the observed rating vectors are incomplete. So, one aim of the present method is to predict the missing user valuations. As a workaround, one chooses to introduce an extra state in the rating space: the unobserved state 0. The rating space becomes R=R*∪{0}. One denotes by H(u) the set of items rated by user u: H(u)={iεI:ri(u)>0}. So, H(u) can be considered as the history of user u.
The problem to solve takes the following form: for some user u one has to find the probability of unobserved item i getting a mark (or rating) lεR* given the incomplete rating vector ru. This probability is denoted by:
σui:R*→[0,1]σui(l)=P[Mu(i)=l]=P└Xi=l|Xj=rj(u),∀jεH(u),l≠0┘ (1).
One now gives the form of the proposed prediction {circumflex over (M)}u(i) for Mu(i). Consider that {circumflex over (σ)}ui is an estimation of σui and a random variable ξ having {circumflex over (σ)}ui as its probability distribution function. Then its expectation E{circumflex over (σ)}ui[ξ] can be considered as the prediction of the mark (rating) assigned by user u to item i. This estimator minimizes the quadratic error function (or RMSE).
Using the observed rating vectors one builds the empirical probabilities {tilde over (p)}i(l) estimating P[Xi=l], where lεR, as well as the joint probabilities {tilde over (p)}ij(li,lj) estimating P[Xi=li and Xj=lj], where li, ljεR. Note that one takes into account the possibility of an item i which has not been rated. If now one executes an algorithm, such as the so-called Chow-Liu algorithm, with the rating vectors {r1, . . . , rn} as inputs, one finds a best tree law estimate T.
Next, one must find {circumflex over (M)}u(i), for some user u and some unrated item i. Using the notation Ā=I/A to denote the complementary of A in I and vA to denote (vi)iεA, one sets
However, {tilde over (σ)}ui describes a probability distribution over the space R. So one needs to eliminate its unobserved state and find {circumflex over (σ)}ui. This can be easily done by considering the random variable “avoiding” 0. In other words, one finds
This is a natural way of defining {circumflex over (σ)}ui, since σui has the form of the expression (1). In order to give a complete description of the present method, an efficient way of computing expression (2) is given below.
One needs to marginalise the tree law with respect to the set of items unobserved by user u, excluding the item of interest i. To do that, one starts at the periphery of the tree. If an unobserved item j is a leaf in T, then it appears in only one factor
in T's formula
where π(v) denotes the parent of node v in tree T. Therefore one can easily integrate T with respect to xj. Thanks to the consistency property Tu(xu)=∫Tuv(xu,xv)dxv, ∀v≠u (5) of the marginal joint laws, the resulting marginal law of {X{j}} will have the same form as formula (4), the only difference being the replacement of the dependency function π(•) with the one corresponding to the pruned tree T-{j}. By repeating this pruning process, one is left with a subtree which contains item i “surrounded” by a set of items belonging to H(u). This subtree shows however a particular case, as the “interior” (i.e. nodes which are not leaves) of this subtree contains unobserved items, but may also contain rated items. Once one has obtained this tree, continuing the actual marginalisation becomes hard. An analytic approach does not seem feasible for the general formula (4). So, a new technique is used to approach the problem in a different manner.
This new technique is quite straightforward. Since one wishes to find Ti|H(u)(l|rH(u)(u)), the marginal and pairwise joint laws of the items in T are conditioned on the rated items, one rated item at a time in an iterative procedure. At each step one propagates the “conditioning” through the tree. However, because of the Markov property, one does not need to apply this procedure to the entire tree. One only needs to do so on the subtree containing the item of interest i, which has rated items as leaves and does not contain any rated item within its “interior”.
Another way of characterizing this subtree is that any path from a rated item (which is necessarily a leaf) to the item of interest i does not contain any other rated item. Finding this subtree is not difficult. One has simply to do a tree search starting from the node corresponding to i and to stop exploring this tree as soon as a rated node is encountered. Let denote this subtree by T*. At the end of this procedure, one has found exactly the searched conditional probability. It is possible to bring slight improvements to this algorithm, such as eliminating all the unobserved nodes on the longest chain from f instead of a single node. However the worst case complexity will remain roughly the same: quadratic in the number of items and linear in the number of marks (or ratings).
The same procedure can be also used to compute the marginal law of the leaves of T*, XF.
Since at each iteration one finds conditional laws with respect to one more leaf, it makes sense to write T(xF)=Tf1(xf1)Tf2|f1(xf2|xf1) . . . Tfφ|f1, . . . , fφ−1(xfφ|xf1, . . . ,fφ−1), where φ=|F|. One initialises T(xF) to 1 and in a main loop, one keeps updating it by multiplying the current law of the current leaf.
So a probabilistic model of user's preference(s) can be determined for each cluster of users (determined according to the technique described in I).
Number | Date | Country | Kind |
---|---|---|---|
07301657 | Dec 2007 | EP | regional |
08305196 | May 2008 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2008/067080 | 12/9/2008 | WO | 00 | 6/10/2010 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2009/074558 | 6/18/2009 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6003030 | Kenner et al. | Dec 1999 | A |
6067565 | Horvitz | May 2000 | A |
8549150 | Roseman | Oct 2013 | B1 |
8676862 | Kushwah et al. | Mar 2014 | B2 |
20030172163 | Fujita et al. | Sep 2003 | A1 |
20040010588 | Slater | Jan 2004 | A1 |
20040064832 | Tsukidate et al. | Apr 2004 | A1 |
20040237097 | Covell et al. | Nov 2004 | A1 |
20040260769 | Yamamoto | Dec 2004 | A1 |
20060179001 | Kim et al. | Aug 2006 | A1 |
20060271972 | Pai et al. | Nov 2006 | A1 |
20070124781 | Casey | May 2007 | A1 |
20070208751 | Cowan et al. | Sep 2007 | A1 |
20090083394 | Diot et al. | Mar 2009 | A1 |
20090089433 | Kisel et al. | Apr 2009 | A1 |
Number | Date | Country |
---|---|---|
2342186 | Mar 2000 | CA |
2308280 | Dec 2000 | CA |
20060012633 | Nov 2004 | KR |
20070022335 | Feb 2007 | KR |
20060090139 | Aug 2016 | KR |
WO2006059476 | Jun 2006 | WO |
WO2007080345 | Jul 2007 | WO |
Entry |
---|
Kyoungwon et al., “Push-to-Peer Video-on-Demand System: Design and Evaluation” IEEE Journal on Selected Areas in Communications, vol. 25, No. 9, Dec. 1, 2007, pp. 1706-1716. |
Search Report dated Jun. 4, 2009. |
Kawasaki, Yohei et al., “Popularity-Based Content Replication in Peer-to-Peer Networks”, Computational Science—ICCS 2006 Lecture Notes in Computer Science, Springer, Berlin, Jan. 1, 2006, pp. 436-443. |
Boppana, et al., “Eigenvalues and Graph Bisection: An Average-case Analysis”, IEEE, Oct. 1987, pp. 280-285. |
Condon, et al., “Algorithms for Graph Partitioning on the Planted Partition Model”, Mar. 1999, pp. 221-232. |
Loeser, et al., Content Distribuition in Heterogenous Video on Demand P2P Networks with ARIMA Forecasts, Institute of Computer Science, University of Padeborn, Germany, Apr. 2005, 10 Pages. |
“Push-to-Peer VoD-System Dimensioning”, Appendix A, 9 Pages. |
“Spectral-Clustering-and-Markov-Tree-Models-for-Collaborative-Filtering”, Appendix B, 12 Pages. |
Xu, et al., Optimal Replica Placement on Transparent Replication Proxies for Read Write Data, IEEE, Sep. 2002, pp. 103-110. |
Number | Date | Country | |
---|---|---|---|
20100274760 A1 | Oct 2010 | US |