Measurement Study of Multi-party Video Conferencing

被引:0
|
作者
Lu, Yue [1 ]
Zhao, Yong [1 ]
Kuipers, Fernando [1 ]
Van Mieghem, Piet [1 ]
机构
[1] Delft Univ Technol, NL-2600 GA Delft, Netherlands
来源
NETWORKING 2010, PROCEEDINGS | 2010年 / 6091卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
More and more free multi-party video conferencing applications are readily available over the Inter net and both Server-to-Client (S/C) or Peer-to-Peer (P2P) technologies are used investigating their mechanisms, analyzing their system performance, and measuring their quality are important objectives for researchers, developers and end users In tins paper, we take four representative video conferencing applications and reveal their characteristics and different aspects of Quality of Experience Based on our observations and analysis, we recommend to incorporate the following aspects when designing video conferencing applications 1) Traffic load control/balancing algorithms to better use the limited bandwidth resources and to have a stable conversation, 2) Use traffic shaping policy or adaptively re-encode streams in real time to limit the overall traffic This work is, to our knowledge, the first measurement work to study and compare mechanisms and performance of existing free multi-party video conferencing systems
引用
收藏
页码:96 / 108
页数:13
相关论文
共 50 条
  • [21] Dealing With User Heterogeneity in P2P Multi-Party Video Conferencing: Layered Distribution Versus Partitioned Simulcast
    Kurdoglu, Eymen
    Liu, Yong
    Wang, Yao
    IEEE TRANSACTIONS ON MULTIMEDIA, 2016, 18 (01) : 90 - 101
  • [22] Threshold quantum secret sharing between multi-party and multi-party
    YANG YuGuang1
    2 State Key Laboratory of Integrated Services Network
    3 State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences)
    4 State Key Laboratory of Networking and Switching Technology
    Science China(Physics,Mechanics & Astronomy), 2008, (09) : 1308 - 1315
  • [23] Threshold quantum secret sharing between multi-party and multi-party
    Yang YuGuang
    Wen QiaoYan
    SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2008, 51 (09): : 1308 - 1315
  • [24] Threshold quantum secret sharing between multi-party and multi-party
    YuGuang Yang
    QiaoYan Wen
    Science in China Series G: Physics, Mechanics and Astronomy, 2008, 51 : 1308 - 1315
  • [25] Multi-Party Campaigning
    Koutecky, Martin
    Talmon, Nimrod
    THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 5506 - 5513
  • [26] Multi-party audio conferencing based on a simpler MCU and client-side echo cancellation
    Li, Junlin
    He, Li-wei
    Florencio, Dinei
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 84 - +
  • [27] A study of secure multi-party ranking problem
    Liu, Wen
    Luo, Shou-Shan
    Chen, Ping
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 727 - +
  • [28] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [29] A study of secure multi-party statistical analysis
    Luo, WJ
    Li, X
    2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 377 - 382
  • [30] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)