Search results for "Peer-to-peer"

showing 10 items of 54 documents

P2PRealm - Peer-to-Peer Network Simulator

2006

Peer-to-peer realm (P2PRealm) is an efficient peer-to-peer network simulator for studying algorithms based on neural networks. In contrast to many simulators, which emphasize on detailed network simulation, the speed of simulation in P2PRealm is essential, because neural networks require a time consuming training phase. Efficiency has been obtained by optimizing training loops inside the simulator, using Java native interface (JNI) as well as distributing the simulator to hundreds of workstations using the P2PDisCo platform. In this paper we describe the architecture of P2PRealm and its input/output interfaces. Also, we present the mechanisms used for internally optimizing the implementatio…

JavaComputer architecture simulatorWorkstationArtificial neural networkComputer scienceJava Native InterfaceDistributed computingPeer-to-peercomputer.software_genreNetwork simulationlaw.inventionvertaisverkkosimulaattorilawcomputerPower system simulator for engineeringcomputer.programming_language2006 11th Intenational Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks
researchProduct

Providing Full Awareness to Distributed Virtual Environments Based on Peer-to-Peer Architectures

2006

In recent years, large scale distributed virtual environments (DVEs) have become a major trend in distributed applications, mainly due to the enormous popularity of multiplayer online games in the entertainment industry. Since architectures based on networked servers seems to be not scalable enough to support massively multiplayer applications, peer-to-peer (P2P) architectures have been proposed as an efficient and truly scalable solution for this kind of systems. However, the main challenge of P2P architectures consists of providing each avatar with updated information about which other avatars are its neighbors. We have denoted this problem as the awareness problem. Although some proposal…

MultimediaComputer scienceScale (chemistry)ServerScalabilityEntertainment industryPeer-to-peerUnicastcomputer.software_genrecomputerPopularity
researchProduct

A secret sharing scheme for anonymous DNS queries

2013

Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…

Name serverInformation privacyComputer scienceRound-robin DNSecret sharing schemeOverlay networkServersServernsupdateISPDNS spoofingPeer-to-peer computingDNS hijackingdomain name systemInternetdata privacyender anonymitybusiness.industrySettore ING-INF/03 - TelecomunicazioniDomain Name Systemquery processinguser privacyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSmultiple nodeIP networkInternet service provideranonymous DNS queryPrivacyecurity of dataCryptographybusinessComputer networkDSN serverRadiation detector
researchProduct

Interest-based topology management in unstructured peer-to-peer networks

2012

P2Pverkkotopologiatiedonhakujärjestelmätneuroverkottiedonsiirtopeer-to-peer networksoverlay topologyvertaisverkotoptimointialgoritmittopology managementself-organizingsimulointitietoverkotresource discovery
researchProduct

The Protection of the Weaker Parties in the Platform Economy

2018

Known by many names – platform, sharing, peer-to-peer (p2p), collaborative economy, and so on - entirely new business models have emerged in recent years, whereby online platforms use digital technologies to connect distinct groups of users in order to facilitate transactions for the exchange of assets and services. This dramatic shift in business organisation and market structure has opened an intense debate on the persisting need for those regulatory measures that typically protect the weaker party in bilateral business-to-consumer transactions. Widespread calls for a more “levelled playing field” makes a strong argument for reconsidering the scope of regulation and delegating regulatory …

PLATFORM ECONOMY SHARING COLLABORATIVE PEER-TO-PEER CONSUMER PROTECTION BOILERPLATE STANDARD FORM CONTRACT BARGAINING POWER MARKET FAILUREMarket economySettore IUS/01 - Diritto PrivatoBusinessSettore IUS/02 - Diritto Privato Comparato
researchProduct

A secure architecture for P2PSIP-based communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…

PastryComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer securitycomputer.software_genreCommunications systemEncryptionDistributed hash tableContent addressable networkDistributed System Security ArchitectureSystems architecturebusinessChord (peer-to-peer)computerComputer networkProceedings of the 2nd international conference on Security of information and networks - SIN '09
researchProduct

Peer to Consumer Lending

2022

Peer to consumer lending represents an alternative form of financing characterized, within the crowdfunding genus, by the collecting of credit offers to be matched with borrowing demand through a digital platform. The essay focuses on legal analysis of some aspects of the structure and the functioning of lending marketplaces operating in the sector at stake. The Author argues how this business model – especially when the phenomenon involves consumers and, more generally, non-professionals counterparts – may be critical as regards to the classical cathegories and concepts ruling the lending/borrowing discourse.

Peer-To-Peer Lending Lending Marketplace Consumer Protection.Settore IUS/05 - Diritto Dell'EconomiaSettore IUS/01 - Diritto Privato
researchProduct

Il paradigma proprietario e l'appropriazione dell'immateriale

2014

Uno studio sui paradigmi dell'appropriazione materiale e immateriale, con particolare attenzione per il diritto privato europeo e dalle prospettive dei limiti dei diritti e dell'evoluzione tecnologica. A study on the paradigms of the material and immaterial appropriation, with particular attention to the european private law and from the perspective of limitations to the rights and technological innovation.

Proprietà proprietà intellettuale diritto d'autore proprietà europea diritto privato europeo diritto dell'unione europea funzione sociale pubblico dominio beni comuni open source internet cloud software peer-to-peer social network streaming open patentSettore IUS/01 - Diritto Privato
researchProduct

An Adaptive Routing Mechanism for Efficient Resource Discovery in Unstructured P2P Networks

2005

The widespread adoption of large-scale decentralized peer-to-peer (P2P) systems imposes huge challenges on distributed search and routing. Decentralized and unstructured P2P networks are very attractive because they require neither centralized directories, nor precise control over network topology or data placement. However their search mechanisms are extremely unscalable, generating large loads on the network participants. In this paper, to address this major limitation, we propose and evaluate the adoption of an innovative algorithm for routing user queries. The proposed approach aims at dynamically adapting the network topology to peer interests, on the basis of query interactions among …

Resource (project management)Computer scienceMechanism (biology)Distributed computingControl (management)Resource managementTopology (electrical circuits)Peer-to-peerAdaptive routingRouting (electronic design automation)computer.software_genreNetwork topologycomputer
researchProduct

Privacy-preserving data allocation in decentralized online social networks

2016

International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…

Service (systems architecture)ExploitComputer sciencePrivacy policyControl (management)02 engineering and technologyPeer-to-peercomputer.software_genreComputer securityTheoretical Computer ScienceSet (abstract data type)[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Privacy policySocial networkSettore INF/01 - Informaticabusiness.industryComputer Science (all)020206 networking & telecommunicationsService providerDecentralized online social network Data availability Privacy policy Peer-to-peerData availabilityPeer-to-peerDecentralized online social network020201 artificial intelligence & image processingbusinesscomputerComputer network
researchProduct