Search results for "peer-to-peer"

showing 10 items of 54 documents

Peer-to-peer cooperative GNSS-based localization for stationary reference nodes in wireless sensor networks

2017

Most localization algorithms in wireless sensor networks rely on a few reference nodes with known locations to estimate the locations of unknown nodes. The locations of reference nodes can be either manually configured or, more practically, obtained by means of some satellite-based positioning system(s). However, satellite-based locations may be inaccurate and imprecise, which results in reduced location accuracy of localization algorithms. This paper proposes a peer-to-peer cooperative GNSS-based localization algorithm for stationary reference nodes to improve their relative location accuracy and precision. The algorithm applies simple statistical methods and GNSS-based information from mu…

020203 distributed computingAccuracy and precisionPositioning systemSIMPLE (military communications protocol)Computer sciencebusiness.industryReal-time computing020206 networking & telecommunications02 engineering and technologyPeer-to-peercomputer.software_genrelocalizationlokalisointiGNSS applicationsalgoritmit0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystemSatellitebusinesscomputerWireless sensor networklangattomat verkot
researchProduct

Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining

2021

This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…

020203 distributed computingInformation privacyDistributed databasesDistributed databaseSettore ING-INF/03 - TelecomunicazioniComputer scienceReliability (computer networking)Secure Multi-Party Computation02 engineering and technologycomputer.software_genreSecret sharingData Mining; Data privacy; Distributed databases; Peer-to-peer computing; Secret sharing; Secure Multi-Party ComputationComputational Theory and MathematicsHardware and ArchitectureServerSignal Processing0202 electrical engineering electronic engineering information engineeringSecure multi-party computationData MiningData miningPeer-to-peer computingC-means data mining Privacy secret sharing secure multi-party computationSecret sharingcomputerData privacy
researchProduct

An efficient adaptive strategy for searching in peer-to-peer networks

2005

One of the main technical challenges in Peer-to-Peer (P2P) networks is how to efficiently locate desired resources. Although structured systems, based on distributed hash tables, can achieve fair effectiveness, they are not suitable for widely deployed Internet applications. In fact, this kind of systems shows many severe limitations, such as ignoring the autonomous nature of peers, and supporting only weakly semantic functions. Unstructured P2P networks are more attractive for real applications, since they can avoid both the limitations of centralized systems, and the drawbacks of structured approaches. However, their search algorithms are usually based on inefficient flooding schemes, tha…

Adaptive strategiesGeneral Computer ScienceExploitbusiness.industryComputer scienceDistributed computingPeer-to-peercomputer.software_genreNetwork topologyHash tableFlooding (computer networking)Search algorithmThe InternetbusinesscomputerMultiagent and Grid Systems
researchProduct

An Adaptive Global-Local Memetic Algorithm to Discover Resources in P2P Networks

2007

This paper proposes a neural network based approach for solving the resource discovery problem in Peer to Peer (P2P) networks and an Adaptive Global Local Memetic Algorithm (AGLMA) for performing the training of the neural network. This training is very challenging due to the large number of weights and noise caused by the dynamic neural network testing. The AGLMA is a memetic algorithm consisting of an evolutionary framework which adaptively employs two local searchers having different exploration logic and pivot rules. Furthermore, the AGLMA makes an adaptive noise compensation by means of explicit averaging on the fitness values and a dynamic population sizing which aims to follow the ne…

Artificial neural networkProcess (engineering)Computer sciencebusiness.industryComputer Science::Neural and Evolutionary ComputationComputational intelligencePeer-to-peercomputer.software_genreMachine learningSizingResource (project management)Memetic algorithmNoise (video)Artificial intelligencebusinesscomputer
researchProduct

A Memetic-Neural Approach to Discover Resources in P2P Networks

2008

This chapter proposes a neural network based approach for solving the resource discovery problem in Peer to Peer (P2P) networks and an Adaptive Global Local Memetic Algorithm (AGLMA) for performing in training of the neural network. The neural network, which is a multi-layer perceptron neural network, allows the P2P nodes to efficiently locate resources desired by the user. The necessity of testing the network in various working conditions, aiming to obtain a robust neural network, introduces noise in the objective function. The AGLMA is a memetic algorithm which employs two local search algorithms adaptively activated by an evolutionary framework. These local searchers, having different fe…

Artificial neural networkbusiness.industryProcess (engineering)Computer scienceComputer Science::Neural and Evolutionary ComputationComputational intelligencePeer-to-peercomputer.software_genrePerceptronMachine learningResource (project management)Memetic algorithmLocal search (optimization)Artificial intelligencebusinesscomputer
researchProduct

Qualitative analysis on the driving force behind upcycling practices associated with mobile applications: Circular economy perspective

2022

Funding for open access charge: Universidad de Granada/CBUA

Circular economyStrategy and Managementcircular economyrural tourismUpcyclingRural tourismUNESCO::CIENCIAS ECONÓMICASManagement Science and Operations Researchmobile applicationsIndustrial and Manufacturing Engineeringpeer-to-peer platformsMobile applicationsManagement of Technology and InnovationPeer-to-peer platformsqualitative analysisupcyclingQualitative analysis
researchProduct

Ensuring the performance and scalability of peer-to-peer distributed virtual environments

2010

Large scale distributed virtual environments (DVEs) have become a major trend in distributed applications. Peer-to-peer (P2P) architectures have been proposed as an efficient and truly scalable solution for these kinds of systems. However, in order to design efficient P2P DVEs these systems must be characterized, measuring the impact of different client behavior on system performance. This paper presents the experimental characterization of P2P DVEs. The results show that the saturation of a given client has an exclusive effect on the surrounding clients in the virtual world, having no noticeable effect at all on the rest of clients. Nevertheless, the interactions among clients that can tak…

Computer Networks and CommunicationsHardware and ArchitectureComputer scienceDistributed computingScalabilityClientPeer-to-peercomputer.software_genrecomputerSoftwareFuture Generation Computer Systems
researchProduct

DSMAV: An improved solution for multi-attribute search based on load capacities

2016

DHT (Distributed Hash Table) such as CHORD or PARTRY facilitates information searching in scalable systems. Two popular DHT-based approaches for range or multi-attribute search are to rely on attribute-value tree and a combination of attributes and values. However, tradeoff between a load balancing mechanism and query efficiency is a challenging task for such information searching systems. In this paper, we propose improved algorithms for a system called DSMAV in which information resources are distributed fairly among nodes and found based on multi-attribute queries in a small number of hop counts. Our system creates identifiers from resource names, each of which is a combination of attrib…

Computer sciencebusiness.industryDistributed computingScalability0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processing02 engineering and technologyLoad balancing (computing)Chord (peer-to-peer)businessComputer networkDistributed hash table2016 IEEE Sixth International Conference on Communications and Electronics (ICCE)
researchProduct

Security Enhancement of Peer-to-Peer Session Initiation

2012

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advanta…

Computer sciencebusiness.industryInternet privacySecurity enhancementSession (computer science)Peer-to-peercomputer.software_genrebusinesscomputer
researchProduct

P2PStudio - Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research

2006

Peer-to-Peer Studio has been developed as a monitoring, controlling and visualization tool for peer-to-peer networks. It uses a centralized architecture to gather events from a peer-to-peer network and can be used to visualize network topology and to send different commands to individual peer-to-peer nodes. The tool has been used with Chedar Peer-to-Peer network to study the behavior of different peer-to-peer resource discovery and topology management algorithms and for visualizing the results of NeuroSearch resource discovery algorithm produced by the Peer-to-Peer Realm network simulator. This paper presents the features, the architecture and the protocols of Peer-to-Peer Studio and the ex…

Computer sciencebusiness.industryP2PStudioDistributed computingPeer-to-peerNetwork topologycomputer.software_genreNetwork simulationVisualizationResource (project management)vertaisverkkoArchitecturebusinesscomputervalvontatyökaluStudioNetwork management stationComputer network
researchProduct