2 options
Behavior Dynamics in Media-Sharing Social Networks / H. Vicky Zhao, W. Sabrina Lin, K. J. Ray Liu.
- Format:
- Book
- Series:
- Cambridge books online.
- Language:
- English
- Subjects (All):
- Social networks.
- Consumer behavior.
- Human behavior.
- Game theory.
- Physical Description:
- 1 online resource (350 pages) : digital, PDF file(s)
- Place of Publication:
- Cambridge : Cambridge University Press, 2011.
- System Details:
- Mode of access: World Wide Web.
- text file
- Summary:
- In large-scale media-sharing social networks, where millions of users create, share, link, and reuse media content, there are clear challenges in protecting content security and intellectual property, and in designing scalable and reliable networks capable of handling high levels of traffic.
- This comprehensive resource demonstrates how game theory can be used to model user dynamics and optimize design of media-sharing networks. It reviews the fundamental methodologies used to model and analyze human behavior, using examples from real-world multimedia social networks. With a thorough investigation of the impact of human factors on multimedia system design, this accessible book shows how an understanding of human behavior can be used to improve system performance.
- Bringing together mathematical tools and engineering concepts with ideas from sociology and human behavior analysis, this one-stop guide will enable researchers to explore this emerging field further and ultimately design media-sharing systems with more efficient, secure, and personalized services. Book jacket.
- Contents:
- Part I Introduction 1
- 1 Introduction to media-sharing social networks 3
- 1.1 Quantitative analysis of social networks 5
- 1.2 Understanding media semantics in media-sharing networks 10
- 2 Overview of multimedia fingerprinting 14
- 2.1 Traitor-tracing multimedia fingerprinting 15
- 2.2 Scalable video coding system 17
- 2.3 Scalable video fingerprinting 18
- 3 Overview of mesh-pull peer-to-peer video streaming 24
- 3.1 Mesh-pull structure for P2P video streaming 25
- 3.2 User dynamics in peer-to-peer video streaming 33
- 4 Game theory for social networks 41
- 4.1 Noncooperative and cooperative games 42
- 4.2 Noncooperative games 43
- 4.3 Bargaining games 50
- Part II Behavior forensics in media-sharing social networks 55
- 5 Equal-risk fairness in colluder social networks 57
- 5.1 Equal-risk collusion 57
- 5.2 Influence on the detector's side: collusion resistance 63
- 5.3 Traitor-tracing capability of scalable fingerprints 75
- 5.4 Chapter summary and bibliographical notes 82
- 6 Leveraging side information in colluder social networks 85
- 6.1 Probing and using side information 85
- 6.2 Game-theoretic analysis of colluder detector dynamics 93
- 6.3 Equilibrium analysis 94
- 6.4 Simulation results 103
- 6.5 Chapter summary and bibliographical notes 109
- 7 Risk-distortion analysis of multiuser collusion 111
- 7.1 Video fingerprinting 112
- 7.2 Risk-distortion modeling 113
- 7.3 Strategies with side information 117
- 7.4 Parameter estimation 122
- 7.5 Simulation results 122
- 7.6 Chapter summary and bibliographical notes 127
- Part III Fairness and cooperation stimulation 129
- 8 Game-theoretic modeling of colluder social networks 131
- 8.1 Multiuser collusion game 132
- 8.2 Feasible and Pareto optimal collusion 137
- 8.3 When to collude 139
- 8.4 How to collude: the bargaining model 150
- 8.5 How to collude: examples 155
- 8.6 Maximum payoff collusion 160
- 8.7 Chapter summary and bibliographical notes 167
- 9 Cooperation stimulation in peer-to-peer video streaming 169
- 9.1 Incentives for peer cooperation over the Internet 170
- 9.2 Wireless peer-to-peer video streaming 178
- 9.3 Optimal cooperation strategies for wireless video streaming 181
- 9.4 Optimal chunk request algorithm for P2P video streaming with scalable coding 189
- 9.5 Chapter summary and bibliographical notes 193
- 10 Optimal pricing for mobile video streaming 195
- 10.1 Introduction 195
- 10.2 System model 196
- 10.3 Optimal strategies for single secondary buyer 198
- 10.4 Multiple secondary buyers 206
- 10.5 Optimal pricing for the content owner 208
- 10.6 Chapter summary and bibliographical notes 217
- Part IV Misbehaving user identification 219
- 11 Cheating behavior in colluder social networks 221
- 11.1 Traitors within traitors via temporal filtering 222
- 11.2 Traitors within traitors in scalable fingerprinting systems 227
- 11.3 Chapter summary 245
- 12 Attack resistance in peer-to-peer video streaming 247
- 12.1 Attack-resistant cooperation strategies in P2P video streaming over the Internet 248
- 12.2 Attack-resistant cooperation strategies in wireless P2P video streaming 261
- 12.3 Chapter summary and bibliographical notes 273
- Part V Media-sharing social network structures 275
- 13 Misbehavior detection in colluder social networks with different structures 277
- 13.1 Behavior dynamics in colluder social networks 278
- 13.2 Centralized colluder social networks with trusted ringleaders 280
- 13.3 Distributed peer-structured colluder social networks 289
- 13.4 Chapter summary and bibliographical notes 306
- 14 Structuring cooperation for hybrid peer-to-peer streaming 308
- 14.1 System model and utility function 309
- 14.2 Agent selection within a homogeneous group 311
- 14.3 Agent selection within a heterogeneous group 317
- 14.4 Distributed learning algorithm for ESS 320
- 14.5 Simulation results 320
- 14.6 Chapter summary and bibliographical notes 325.
- Notes:
- Title from publishers bibliographic system (viewed on 02 Mar 2012).
- Other Format:
- Print version:
- ISBN:
- 9780511973369
- 9780521197274
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.