11 resultados para Peer rejection

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The fact that most of new Personal Data Assistant (PDA) devices and smartphones have the ability to communicate via different wireless technologies has made several new applications possible. While traditional network model is based on the idea of static hosts, mobile devices can create decentralized, self-organizing ad-hoc networks and act as peers in the network. This kind of adapting network is suitable for mobile devices which can freely join and leave the networks. Because several different wireless communication technologies are involved, flexible changing of the networking technology must be handled in order to enable seamless communication between these networks. This thesis presents a transparent network interface to mobile Peer-to-Peer environment which is named as Virtual PeerHood. Different wireless technologies and aspects of providing a seamless connectivity between these technologies are explored. The result is a middleware platform for mobile Peer-to-Peer environment, capable of handling several networking technologies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During the last half decade the popularity of different peer-to-peer applications has grown tremendously. Traditionally only desktop-class computers with fixed line network connections have been powerful enough to utilize peer-to-peer. However, the situation is about to change. The rapid development of wireless terminals will soon enable peer-to-peer applications on these devices as well as on desktops. Possibilities are further enhanced by the upcoming high-bandwidth cellular networks. In this thesis the applicability and implementation alternatives of an existing peer-to-peer system are researched for two target platforms: Linux powered iPaq and Symbian OS based smartphone. The result is a peer-to-peer middleware component suitable for mobile terminals. It works on both platforms and utilizes Bluetooth networking technology. The implemented software platforms are compatible with each other and support for additional network technologies can be added with a minimal effort.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increase of computational power and emergence of new computer technologies led to popularity of local communications between personal trusted devices. By-turn, it led to emergence of security problems related to user data utilized in such communications. One of the main aspects of the data security assurance is security of software operating on mobile devices. The aim of this work was to analyze security threats to PeerHood, software intended for performing personal communications between mobile devices regardless of underlying network technologies. To reach this goal, risk-based software security testing was performed. The results of the testing showed that the project has several security vulnerabilities. So PeerHood cannot be considered as a secure software. The analysis made in the work is the first step towards the further implementation of PeerHood security mechanisms, as well as taking into account security in the development process of this project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this master’s thesis was to specify a system requiring minimal configuration and providing maximal connectivity in the vein of Skype but for device management purposes. As peer-to-peer applications are pervasive and especially as Skype is known to provide this functionality, the research was focused on these technologies. The resulting specification was a hybrid of a tiered hierarchical network structure and a Kademlia based DHT. A prototype was produced as a proof-of-concept for the hierarchical topology, demonstrating that the specification was feasible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this thesis is to find out whether all the peer to peer lenders are unworthy of credit and also if there are single qualities or combinations of qualities that determine the probability of default of a person or group of people. Distinguishing qualities are searched with self-organizing maps (SOM). Qualities and groups of people found by the self-organizing map are then compared to the average. The comparison is carried out by looking how big proportion of borrowers meeting the criteria is two months or more behind with their payments. Research data used is collected by an Estonian peer to peer lending company during the years of 2011-2014. Data consists of peer to peer borrowers and information gathered from them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the late 1990’s, a group of moral doctrines called prioritarianism has received a lot of interest from many moral philosophers. Many contemporary moral philosophers are attracted to prioritarianism to such an extent that they can be called prioritarians. In this book, however, I reject prioritarianism, including not only “pure” prioritarianism but also hybrid prioritarian views which mix one or more non-prioritarian elements with prioritarianism. This book largely revolves around certain problems and complications of prioritarianism and its particular forms. Those problems and complications are connected to risk, impartiality, the arbitrariness of prioritarian weightings and possible future individuals. On the one hand, I challenge prioritarianism through targeted objections to various specific forms of prioritarianism. All those targeted objections are connected to risk or possible future individuals. It seems to me that together they give good grounds for believing that prioritarianism is not the way to go. On the other hand, I challenge prioritarianism by pointing out and discussing certain general problems of prioritarianism. Those general problems are connected to impartiality and the arbitrariness of prioritarian weightings. They may give additional grounds for believing that all prioritarian views should be rejected. Prioritarianism can be seen as a type of weighted utilitarianism and thus as an extension of utilitarianism. Utilitarianism is morally ultimately concerned, and morally ultimately concerned only, with some kind of maximization of utility or expected utility. Prioritarianism, on the other hand, is morally ultimately concerned, and morally ultimately concerned only, with some kind of maximization of priority-weighted utility, expected priority-weighted utility or priority-weighted expected utility. Thus prioritarianism, unlike utilitarianism, is a distribution-sensitive moral view. Besides rejecting prioritarianism, I reject also various other distribution-sensitive moral views in this book. However, I do not reject distribution-sensitivity in morality, as I end up endorsing a type of distribution-sensitive hybrid utilitarianism which mixes non-utilitarian elements with utilitarianism.