Search results for " PEER-TO-PEER"

showing 8 items of 8 documents

Iterative altitude-aiding algorithm for improved GNSS positioning

2011

The system proposed in this study relies on a WAVE P2P network, which is a proper standard to fit the vehicular environment wireless communications requests. Starting from the chance to exchange information given by this infrastructure, the possibility to improve the performance of a global navigation satellite system (GNSS) receiver based on a Kalman filter is considered. This improvement is obtained exploiting the external altitude measurements provided by other peers in the network, equipped with GNSS receivers. The topic of an altitude-aided system has been described in a previous work, that highlighted the need for a parameter that points out the effectiveness and the consistency of th…

GNSS augmentationKalman filters; iterative methods; peer-to-peer computing; satellite navigationsatellite navigationComputer sciencebusiness.industryIterative methodReal-time computingSatellite systemKalman filterGNSS applicationspeer-to-peer computingPhysics::Space PhysicsWirelessiterative methodsSatellite navigationElectrical and Electronic EngineeringbusinessKalman filtersReliability (statistics)Simulation
researchProduct

Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining

2021

This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…

020203 distributed computingInformation privacyDistributed databasesDistributed databaseSettore ING-INF/03 - TelecomunicazioniComputer scienceReliability (computer networking)Secure Multi-Party Computation02 engineering and technologycomputer.software_genreSecret sharingData Mining; Data privacy; Distributed databases; Peer-to-peer computing; Secret sharing; Secure Multi-Party ComputationComputational Theory and MathematicsHardware and ArchitectureServerSignal Processing0202 electrical engineering electronic engineering information engineeringSecure multi-party computationData MiningData miningPeer-to-peer computingC-means data mining Privacy secret sharing secure multi-party computationSecret sharingcomputerData privacy
researchProduct

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

2020

Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…

Theoretical computer scienceFacebookComputer scienceInformation privacyCyber SecurityGroup communicationJoinsEncryptionEncryptioncomputer.software_genreKey managementSet (abstract data type)Peer-to-peer computingElectrical and Electronic EngineeringFocus (computing)VegetationSocial networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)Composition (combinatorics)Decentralized Online Social NetworksDecentralized Online Social Networks; Encryption; Facebook; Group communication; Information privacy; Key management; Peer-to-peer computing; Privacy; Vegetation; Electrical and Electronic EngineeringPrivacyContent (measure theory)Decentralized online social networkData miningbusinesscomputerData privacy
researchProduct

The Protection of the Weaker Parties in the Platform Economy

2018

Known by many names – platform, sharing, peer-to-peer (p2p), collaborative economy, and so on - entirely new business models have emerged in recent years, whereby online platforms use digital technologies to connect distinct groups of users in order to facilitate transactions for the exchange of assets and services. This dramatic shift in business organisation and market structure has opened an intense debate on the persisting need for those regulatory measures that typically protect the weaker party in bilateral business-to-consumer transactions. Widespread calls for a more “levelled playing field” makes a strong argument for reconsidering the scope of regulation and delegating regulatory …

PLATFORM ECONOMY SHARING COLLABORATIVE PEER-TO-PEER CONSUMER PROTECTION BOILERPLATE STANDARD FORM CONTRACT BARGAINING POWER MARKET FAILUREMarket economySettore IUS/01 - Diritto PrivatoBusinessSettore IUS/02 - Diritto Privato Comparato
researchProduct

Formative assessment in higher education: analysis of the experience

2015

<p>Currently the learning is in the center of the education therefore the methods and techniques that promote learning become topical, inter alia higher education. Formative assessment is a significant part of the study process as a factor for promotion of the learning. The article analyzes the experience of formative assessment at the study course aimed at the development of writing competence and ensuring appropriate skills development.</p>

Formative assessmentEngineeringHigher educationbusiness.industryPedagogySignificant partCreative writingformative assessment; assessment for learning; feedback; peer-to-peer assessment; creative writingbusinessKnowledge surveyAssessment for learningCompetence (human resources)SOCIETY, INTEGRATION, EDUCATION. Proceedings of the International Scientific Conference
researchProduct

Il paradigma proprietario e l'appropriazione dell'immateriale

2014

Uno studio sui paradigmi dell'appropriazione materiale e immateriale, con particolare attenzione per il diritto privato europeo e dalle prospettive dei limiti dei diritti e dell'evoluzione tecnologica. A study on the paradigms of the material and immaterial appropriation, with particular attention to the european private law and from the perspective of limitations to the rights and technological innovation.

Proprietà proprietà intellettuale diritto d'autore proprietà europea diritto privato europeo diritto dell'unione europea funzione sociale pubblico dominio beni comuni open source internet cloud software peer-to-peer social network streaming open patentSettore IUS/01 - Diritto Privato
researchProduct

A Technical Approach to the Energy Blockchain in Microgrids

2018

The present paper considers some technical issues related to the “energy blockchain” paradigm applied to microgrids. In particular, what appears from the study is that the superposition of energy transactions in a microgrid creates a variation of the power losses in all the branches of the microgrid. Traditional power losses allocation in distribution systems takes into account only generators while, in this paper, a real-time attribution of power losses to each transaction involving one generator and one load node is done by defining some suitable indices. Besides, the presence of P–V nodes increases the level of reactive flows and provides a more complex technical perspective. For this re…

Settore ING-INF/03 - TelecomunicazioniComputer science020209 energy02 engineering and technologyAC powerBlockchain energy blockchain micro-grids peer-to-peer (P2P) power losses reactive power transactive energyComputer Science ApplicationsReliability engineeringPower (physics)Settore ING-IND/33 - Sistemi Elettrici Per L'EnergiaGenerator (circuit theory)Control and Systems Engineering0202 electrical engineering electronic engineering information engineeringRemunerationNode (circuits)Resource managementMicrogridElectrical and Electronic EngineeringInformation SystemsVoltageIEEE Transactions on Industrial Informatics
researchProduct

Privacy-preserving data allocation in decentralized online social networks

2016

International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…

Service (systems architecture)ExploitComputer sciencePrivacy policyControl (management)02 engineering and technologyPeer-to-peercomputer.software_genreComputer securityTheoretical Computer ScienceSet (abstract data type)[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Privacy policySocial networkSettore INF/01 - Informaticabusiness.industryComputer Science (all)020206 networking & telecommunicationsService providerDecentralized online social network Data availability Privacy policy Peer-to-peerData availabilityPeer-to-peerDecentralized online social network020201 artificial intelligence & image processingbusinesscomputerComputer network
researchProduct