Search results for "Peer-to-peer"
showing 10 items of 54 documents
P2PRealm - Peer-to-Peer Network Simulator
2006
Peer-to-peer realm (P2PRealm) is an efficient peer-to-peer network simulator for studying algorithms based on neural networks. In contrast to many simulators, which emphasize on detailed network simulation, the speed of simulation in P2PRealm is essential, because neural networks require a time consuming training phase. Efficiency has been obtained by optimizing training loops inside the simulator, using Java native interface (JNI) as well as distributing the simulator to hundreds of workstations using the P2PDisCo platform. In this paper we describe the architecture of P2PRealm and its input/output interfaces. Also, we present the mechanisms used for internally optimizing the implementatio…
Providing Full Awareness to Distributed Virtual Environments Based on Peer-to-Peer Architectures
2006
In recent years, large scale distributed virtual environments (DVEs) have become a major trend in distributed applications, mainly due to the enormous popularity of multiplayer online games in the entertainment industry. Since architectures based on networked servers seems to be not scalable enough to support massively multiplayer applications, peer-to-peer (P2P) architectures have been proposed as an efficient and truly scalable solution for this kind of systems. However, the main challenge of P2P architectures consists of providing each avatar with updated information about which other avatars are its neighbors. We have denoted this problem as the awareness problem. Although some proposal…
A secret sharing scheme for anonymous DNS queries
2013
Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…
Interest-based topology management in unstructured peer-to-peer networks
2012
The Protection of the Weaker Parties in the Platform Economy
2018
Known by many names – platform, sharing, peer-to-peer (p2p), collaborative economy, and so on - entirely new business models have emerged in recent years, whereby online platforms use digital technologies to connect distinct groups of users in order to facilitate transactions for the exchange of assets and services. This dramatic shift in business organisation and market structure has opened an intense debate on the persisting need for those regulatory measures that typically protect the weaker party in bilateral business-to-consumer transactions. Widespread calls for a more “levelled playing field” makes a strong argument for reconsidering the scope of regulation and delegating regulatory …
A secure architecture for P2PSIP-based communication systems
2009
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…
Peer to Consumer Lending
2022
Peer to consumer lending represents an alternative form of financing characterized, within the crowdfunding genus, by the collecting of credit offers to be matched with borrowing demand through a digital platform. The essay focuses on legal analysis of some aspects of the structure and the functioning of lending marketplaces operating in the sector at stake. The Author argues how this business model – especially when the phenomenon involves consumers and, more generally, non-professionals counterparts – may be critical as regards to the classical cathegories and concepts ruling the lending/borrowing discourse.
Il paradigma proprietario e l'appropriazione dell'immateriale
2014
Uno studio sui paradigmi dell'appropriazione materiale e immateriale, con particolare attenzione per il diritto privato europeo e dalle prospettive dei limiti dei diritti e dell'evoluzione tecnologica. A study on the paradigms of the material and immaterial appropriation, with particular attention to the european private law and from the perspective of limitations to the rights and technological innovation.
An Adaptive Routing Mechanism for Efficient Resource Discovery in Unstructured P2P Networks
2005
The widespread adoption of large-scale decentralized peer-to-peer (P2P) systems imposes huge challenges on distributed search and routing. Decentralized and unstructured P2P networks are very attractive because they require neither centralized directories, nor precise control over network topology or data placement. However their search mechanisms are extremely unscalable, generating large loads on the network participants. In this paper, to address this major limitation, we propose and evaluate the adoption of an innovative algorithm for routing user queries. The proposed approach aims at dynamically adapting the network topology to peer interests, on the basis of query interactions among …
Privacy-preserving data allocation in decentralized online social networks
2016
International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…