The following publications are possibly variants of this publication:
- Peer-to-Peer 3D StreamingShun-Yun Hu, Jehn-Ruey Jiang, Bing-Yu Chen. internet, 14(2):54-61, 2010. [doi]
- Secure peer-to-peer 3D streamingMo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang. mta, 45(1-3):369-384, 2009. [doi]
- Selection strategies for peer-to-peer 3D streamingWei-Lun Sung, Shun-Yun Hu, Jehn-Ruey Jiang. nossdav 2008: 15-20 [doi]
- Bandwidth-aware Peer-to-Peer 3D streamingChien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang, Chuan-Wei Cheng. ijamc, 4(4):324-342, 2010. [doi]
- FLoD: A Framework for Peer-to-Peer 3D StreamingShun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-Lun Sung, Jehn-Ruey Jiang, Bing-Yu Chen. infocom 2008: 1373-1381 [doi]
- Detecting malicious nodes in peer-to-peer streaming by peer-based monitoringXing Jin, S.-H. Gary Chan. tomccap, 6(2), 2010. [doi]