808 resultados para Peer-to-peer markets
Resumo:
Peer-reviewed
Resumo:
Peer-reviewed
Resumo:
Peer-reviewed
Resumo:
Increase of computational power and emergence of new computer technologies led to popularity of local communications between personal trusted devices. By-turn, it led to emergence of security problems related to user data utilized in such communications. One of the main aspects of the data security assurance is security of software operating on mobile devices. The aim of this work was to analyze security threats to PeerHood, software intended for performing personal communications between mobile devices regardless of underlying network technologies. To reach this goal, risk-based software security testing was performed. The results of the testing showed that the project has several security vulnerabilities. So PeerHood cannot be considered as a secure software. The analysis made in the work is the first step towards the further implementation of PeerHood security mechanisms, as well as taking into account security in the development process of this project.
Resumo:
The aim of this master’s thesis was to specify a system requiring minimal configuration and providing maximal connectivity in the vein of Skype but for device management purposes. As peer-to-peer applications are pervasive and especially as Skype is known to provide this functionality, the research was focused on these technologies. The resulting specification was a hybrid of a tiered hierarchical network structure and a Kademlia based DHT. A prototype was produced as a proof-of-concept for the hierarchical topology, demonstrating that the specification was feasible.
Resumo:
The purpose of this thesis is to find out whether all the peer to peer lenders are unworthy of credit and also if there are single qualities or combinations of qualities that determine the probability of default of a person or group of people. Distinguishing qualities are searched with self-organizing maps (SOM). Qualities and groups of people found by the self-organizing map are then compared to the average. The comparison is carried out by looking how big proportion of borrowers meeting the criteria is two months or more behind with their payments. Research data used is collected by an Estonian peer to peer lending company during the years of 2011-2014. Data consists of peer to peer borrowers and information gathered from them.
Resumo:
The purpose of this study was to leam more about how EFL (English as Foreign Language) students interacted during peer feedback conferences. Thirty EFL students from Mexico aged 10 to 14 years old participated in this study. The following four main questions were addressed: 1 . What criteria did the students use to evaluate their peers' writing? 2. What revisions were made in relation to peer feedback comments? 3. What was the students' behaviour like during peer feedback conferences? 4. What were the students' perceived attitudes concerning peer feedback conferences? Each of the 30 students wrote a first and a second draft and then took part in a peer feedback conference. All students were interviewed and asked to rate a story and provide a peer feedback comment for the author during interview. The study found that the EFL students were able to provide comments to their peers' writing, but only after their third conference were they actually able to provide higher level comments. The majority of students said that they liked peer feedback sessions. The results also indicated that the students needed more practice with their revisions because they did not make a lot of revisions to make their writing clearer with fewer mistakes. This study concludes that there still needs to be further research. First of all, it would be useful to conduct a similar study with EFL students but one that is conducted over a longer period of time in order to determine if the students continued to develop their peer feedback comments and revision strategies.
Resumo:
The purpose of this study was to examine whether certain temperament characteristics (fearfulness, surgency, frustration, and effortful control) moderate the association between authoritative parenting dimensions (psychological autonomy granting, acceptance-involvement, and monitoring knowledge) or friends' antisocial behaviour, and self-reported antisocial behaviour among adolescents. Questionnaires on adolescent temperament and authoritative parenting were completed by 484 mothers and their adolescent children (54.8% female). In addition, the adolescents responded to measures regarding friends' antisocial behavior and their own antisocial behaviour. Adolescent participants ranged between 13 and 17 years of age (M = 14.96 years, SD = 1.39) and lived in a region of southern Ontario. As predicted, the results indicated that effortful control moderated the association between parental monitoring knowledge and adolescent antisocial behaviour. Also, as predicted, effortful control moderated the relation between friends' antisocial behaviour and adolescents' self-reports of antisocial behaviour although the relation was sex-specific to girls. Unexpected results included a significant monitoring knowledge by frustration by sex interaction, and a significant friends' antisocial behaviour by age interaction. In general, the findings were consistent with the expectation that the relation of parenting and peer factors to antisocial behaviour would depend on adolescents' temperamental predispositions. However, effortful control, which contributes to individual differences in self-regulation abilities, served this moderating role to a greater extent than the measures of temperamental reactivity, including fearfulness, surgency and frustration-proneness. Implications of these results are discussed with reference to parenting or classroom-based interventions that may be especially helpful for adolescents with poor self-regulation abilities.
Resumo:
Within the school setting, recess is often reported as a frequent context for bullying (Vaillancourt et al. 2010), but is currently understudied. The present study utilized a mixed-methods approach in order to examine the frequency of peer victimization at recess and explore how the current context of recess relates to children’s sense of belonging. Participants included 464 students between grades 4 to 8 from nine Southern Ontario elementary schools. Self-report measures on peer victimization and belongingness were completed, along with open-ended questions regarding the recess context. Results demonstrated the frequencies of peer victimization at recess, the relationship between victimization and belonging, contextual factors that promote and impede belongingness at recess, and solutions to support children who feel left out.These findings provide further insight for educators and administrators in order to better support children who experience victimization within the recess context.
Resumo:
Éditoral / Editorial
Resumo:
In this paper we investigate the problem of cache resolution in a mobile peer to peer ad hoc network. In our vision cache resolution should satisfy the following requirements: (i) it should result in low message overhead and (ii) the information should be retrieved with minimum delay. In this paper, we show that these goals can be achieved by splitting the one hop neighbours in to two sets based on the transmission range. The proposed approach reduces the number of messages flooded in to the network to find the requested data. This scheme is fully distributed and comes at very low cost in terms of cache overhead. The experimental results gives a promising result based on the metrics of studies.
Resumo:
Recording of the Elsevier Author Seminar by Dr Anthony Newman and Michaela Kurschildgen.