774 resultados para peer-to-peer (P2P) computing


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Internet Telephony (VoIP) is changing the telecommunication industry. Oftentimes free, VoIP is becoming more and more popular amongst users. Large software companies have entered the market and heavily invest into it. In 2011, for instance, Microsoft bought Skype for 8.5bn USD. This trend increasingly impacts the incumbent telecommunication operators. They see their main source of revenue – classic telephony – under siege and disappear. The thesis at hand develops a most-likely scenario in order to determine how VoIP is evolving further and it predicts, based on a ten-year forecast, the impact it will have on the players in the telecommunication industry.The paper presents a model combining Rogers’ diffusion and Christensen’s innovation research. The model has the goal of explaining the past evolution of VoIP and to isolate the factors that determine the further diffusion of the innovation. Interviews with industry experts serve to assess how the identified factors are evolving.Two propositions are offered. First, VoIP operators are becoming more important in international, corporate, and mobile telephony. End-to-end VoIP (IP2IP) will exhibit strong growth rates and increasingly cannibalize the telephony revenues of the classic operators. Second, fix-net telephony in SMEs and at home will continue to be dominated by the incumbents. Yet, as prices for telephony fall towards zero also they will implement IP2IP in order to save costs. By 2022, up to 90% of the calls will be IP2IP. The author recommends the incumbents and VoIP operators to proactively face the change, to rethink their business strategies, and to even be open for cooperation.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Eu analiso o papel que a interação entre pares tem na determinação do Locus de Controle, uma medida de quão pessoalmente responsável as pessoas se sentem com relação a diferentes aspectos de suas vidas. Eu estabeleço identificação através de variação no tamanho do grupo e de variáveis instrumentais baseadas na estrutura de painel dos dados. Eu estudo a questão no contexto escolar, utilizando os dados de alunos no Ensino Fundamental de um município brasileiro, que inclui o questionário de Tel Aviv de Locus de Controle. Minhas estimativas não apresentam sinais de peer effects endógenos ou contextuais.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Este projecto foi realizado na Universidade da Madeira, no âmbito do Mestrado em Engenharia Informática e tem como título “Plataforma para o suporte de Blended Peer Assisted Learning”. Ao longo da nossa pesquisa sobre os vários métodos de aprendizagem online, deparamo-nos com uma grande lacuna que abrange a maior parte dos sistema de ensino assistidos por computador, ou seja, todas elas preocupam-se com a passagem de conhecimentos, mas raras são aquelas que têm em atenção o tipo de utilizador, qual a seu percurso académico e profissional, qual a metodologia que fará com que o mesmo capte melhor os conteúdos, etc. Com este objectivo em mente, e tendo em atenção as diversas plataformas e metodologias de ensino existentes, optou-se por elaborar uma arquitectura de uma plataforma capaz de centralizar na mesma, um conjunto de funcionalidades e metodologias que possibilitassem um acompanhamento mais específico do utilizador, proporcionando um maior conhecimento, através do qual poderia encaminhar o utilizador para a estratégia de aprendizagem que mais se adequasse a um utilizador com as suas características. Como se poderá constatar no decorrer desta dissertação, a plataforma desenhada e o módulo desenvolvido têm como base teórica o Peer Assisted Learning (PAL) e as suas estratégias de aprendizagem. O PAL é um conceito relativamente novo, que se encontra em plena ascensão, sendo cada vez maior o número de instituições/organizações que adoptam o PAL como metodologia de ensino para a formação dos seus membros. Este crescimento deve-se em grande parte às várias estratégias PAL que visam uma maior adequação ao tipo de utilizador, contribuindo assim para uma aprendizagem mais rápida e eficaz. Uma vez que a implementação da plataforma na sua totalidade seria de todo impossível, optouse por desenvolver apenas um dos módulos referente à estratégia de PAL – Peer Tutoring (PT). No final, o objectivo principal, passa não só por fornecer as bases necessárias ao desenvolvimento da referida plataforma, mas também pela disponibilização do módulo de PT que servirá de referência para o desenvolvimento das restantes estratégias. Tendo em atenção toda a investigação efectuada, facilmente se depreende as inúmeras vantagens que podem advir da utilização do PAL, das quais se salienta, a adequação da estratégia PAL mais indicada para cada tipo de utilizador.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Internet applications such as media streaming, collaborative computing and massive multiplayer are on the rise,. This leads to the need for multicast communication, but unfortunately group communications support based on IP multicast has not been widely adopted due to a combination of technical and non-technical problems. Therefore, a number of different application-layer multicast schemes have been proposed in recent literature to overcome the drawbacks. In addition, these applications often behave as both providers and clients of services, being called peer-topeer applications, and where participants come and go very dynamically. Thus, servercentric architectures for membership management have well-known problems related to scalability and fault-tolerance, and even peer-to-peer traditional solutions need to have some mechanism that takes into account member's volatility. The idea of location awareness distributes the participants in the overlay network according to their proximity in the underlying network allowing a better performance. Given this context, this thesis proposes an application layer multicast protocol, called LAALM, which takes into account the actual network topology in the assembly process of the overlay network. The membership algorithm uses a new metric, IPXY, to provide location awareness through the processing of local information, and it was implemented using a distributed shared and bi-directional tree. The algorithm also has a sub-optimal heuristic to minimize the cost of membership process. The protocol has been evaluated in two ways. First, through an own simulator developed in this work, where we evaluated the quality of distribution tree by metrics such as outdegree and path length. Second, reallife scenarios were built in the ns-3 network simulator where we evaluated the network protocol performance by metrics such as stress, stretch, time to first packet and reconfiguration group time

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The demand for aesthetic restorations has increased during the last years. Dental ceramics are a successful alternative for some cases because of aesthetics and biocompatibility. Therefore, the aim of this literature review was to present the factors necessary to fabricate all-ceramic restorations with aesthetics similar to natural dentition. A search of English-language peer-review literature was completed using MEDLINE database from 1975 to 2009 including the keywords "aesthetic," "metal-free crown," "all-ceramic," and "color." It was observed that several factors influence aesthetics of all-ceramic restorations. Color scale, light source during color evaluation, characteristic of core material, color of supporting tooth, presence of root post, and type of cement are clinical factors that may influence color of the restorations. Laboratorial factors as technique for ceramic condensation, thickness, temperature, and number of firing cycles also influence the result of these crowns. Although several clinical and laboratorial factors influence aesthetics of all-ceramic restorations, the aesthetic success and longevity of these restorations depend on the integration with surrounding periodontal tissue.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Research on Blindsight, Neglect/Extinction and Phantom limb syndromes, as well as electrical measurements of mammalian brain activity, have suggested the dependence of vivid perception on both incoming sensory information at primary sensory cortex and reentrant information from associative cortex. Coherence between incoming and reentrant signals seems to be a necessary condition for (conscious) perception. General reticular activating system and local electrical synchronization are some of the tools used by the brain to establish coarse coherence at the sensory cortex, upon which biochemical processes are coordinated. Besides electrical synchrony and chemical modulation at the synapse, a central mechanism supporting such a coherence is the N-methyl-D-aspartate channel, working as a 'coincidence detector' for an incoming signal causing the depolarization necessary to remove Mg 2+, and reentrant information releasing the glutamate that finally prompts Ca 2+ entry. We propose that a signal transduction pathway activated by Ca 2+ entry into cortical neurons is in charge of triggering a quantum computational process that accelerates inter-neuronal communication, thus solving systemic conflict and supporting the unity of consciousness. © 2001 Elsevier Science Ltd.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Math in the Middle Institute Partnership, Action Research Project Report, In partial fulfillment of the MAT Degree. Department of Mathematics. University of Nebraska-Lincoln. July 2009.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The decreasing number of women who are graduating in the Science, Technology, Engineering and Mathematics (STEM) fields continues to be a major concern. Despite national support in the form of grants provided by National Science Foundation, National Center for Information and Technology and legislation passed such as the Deficit Reduction Act of 2005 that encourages women to enter the STEM fields, the number of women actually graduating in these fields is surprisingly low. This research study focuses on a robotics competition and its ability to engage female adolescents in STEM curricula. Data have been collected to help explain why young women are reticent to take technology or engineering type courses in high school and college. Factors that have been described include attitudes, parental support, social aspects, peer pressure, and lack of role models. Often these courses were thought to have masculine and “nerdy” overtones. The courses were usually majority male enrollments and appeared to be very competitive. With more female adolescents engaging in this type of competitive atmosphere, this study gathered information to discover what about the competition appealed to these young women. Focus groups were used to gather information from adolescent females who were participating in the First Lego League (FLL) and CEENBoT competitions. What enticed them to participate in a curriculum that data demonstrated many of their peers avoided? FLL and CEENBoT are robotics programs based on curricula that are taught in afterschool programs in non-formal environments. These programs culminate in a very large robotics competition. My research questions included: What are the factors that encouraged participants to participate in the robotics competition? What was the original enticement to the FLL and CEENBoT programs? What will make participants want to come back and what are the participants’ plans for the future? My research mirrored data of previous findings such as lack of role models, the need for parental support, social stigmatisms and peer pressure are still major factors that determine whether adolescent females seek out STEM activities. An interesting finding, which was an exception to previous findings, was these female adolescents enjoyed the challenge of the competition. The informal learning environments encouraged an atmosphere of social engagement and cooperative learning. Many volunteers that led the afterschool programs were women (role models) and a majority of parents showed support by accommodating an afterschool situation. The young women that were engaged in the competition noted it was a friendly competition, but they were all there to win. All who participated in the competition had a similar learning environment: competitive but cooperative. Further research is needed to determine if it is the learning environment that lures adolescent females to the program and entices them to continue in the STEM fields or if it is the competitive aspect of the culminating activity. Advisors: James King and Allen Steckelberg

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This is the promotional brochure from the March 2004 national conference, Making Learning Visible: Peer Review and the Scholarship of Teaching. This conference was hosted by the UNL Peer Review of Teaching project and the University of Nebraska-Lincoln.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Robust analysis of vector fields has been established as an important tool for deriving insights from the complex systems these fields model. Traditional analysis and visualization techniques rely primarily on computing streamlines through numerical integration. The inherent numerical errors of such approaches are usually ignored, leading to inconsistencies that cause unreliable visualizations and can ultimately prevent in-depth analysis. We propose a new representation for vector fields on surfaces that replaces numerical integration through triangles with maps from the triangle boundaries to themselves. This representation, called edge maps, permits a concise description of flow behaviors and is equivalent to computing all possible streamlines at a user defined error threshold. Independent of this error streamlines computed using edge maps are guaranteed to be consistent up to floating point precision, enabling the stable extraction of features such as the topological skeleton. Furthermore, our representation explicitly stores spatial and temporal errors which we use to produce more informative visualizations. This work describes the construction of edge maps, the error quantification, and a refinement procedure to adhere to a user defined error bound. Finally, we introduce new visualizations using the additional information provided by edge maps to indicate the uncertainty involved in computing streamlines and topological structures.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Gossip protocols have proved to be a viable solution to set-up and manage largescale P2P services or applications in a fully decentralised scenario. The gossip or epidemic communication scheme is heavily based on stochastic behaviors and it is the fundamental idea behind many large-scale P2P protocols. It provides many remarkable features, such as scalability, robustness to failures, emergent load balancing capabilities, fast spreading, and redundancy of information. In some sense, these services or protocols mimic natural system behaviors in order to achieve their goals. The key idea of this work is that the remarkable properties of gossip hold when all the participants follow the rules dictated by the actual protocols. If one or more malicious nodes join the network and start cheating according to some strategy, the result can be catastrophic. In order to study how serious the threat posed by malicious nodes can be and what can be done to prevent attackers from cheating, we focused on a general attack model aimed to defeat a key service in gossip overlay networks (the Peer Sampling Service [JGKvS04]). We also focused on the problem of protecting against forged information exchanged in gossip services. We propose a solution technique for each problem; both techniques are general enough to be applied to distinct service implementations. As gossip protocols, our solutions are based on stochastic behavior and are fully decentralized. In addition, each technique’s behaviour is abstracted by a general primitive function extending the basic gossip scheme; this approach allows the adoptions of our solutions with minimal changes in different scenarios. We provide an extensive experimental evaluation to support the effectiveness of our techniques. Basically, these techniques aim to be building blocks or P2P architecture guidelines in building more resilient and more secure P2P services.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Many research fields are pushing the engineering of large-scale, mobile, and open systems towards the adoption of techniques inspired by self-organisation: pervasive computing, but also distributed artificial intelligence, multi-agent systems, social networks, peer-topeer and grid architectures exploit adaptive techniques to make global system properties emerge in spite of the unpredictability of interactions and behaviour. Such a trend is visible also in coordination models and languages, whenever a coordination infrastructure needs to cope with managing interactions in highly dynamic and unpredictable environments. As a consequence, self-organisation can be regarded as a feasible metaphor to define a radically new conceptual coordination framework. The resulting framework defines a novel coordination paradigm, called self-organising coordination, based on the idea of spreading coordination media over the network, and charge them with services to manage interactions based on local criteria, resulting in the emergence of desired and fruitful global coordination properties of the system. Features like topology, locality, time-reactiveness, and stochastic behaviour play a key role in both the definition of such a conceptual framework and the consequent development of self-organising coordination services. According to this framework, the thesis presents several self-organising coordination techniques developed during the PhD course, mainly concerning data distribution in tuplespace-based coordination systems. Some of these techniques have been also implemented in ReSpecT, a coordination language for tuple spaces, based on logic tuples and reactions to events occurring in a tuple space. In addition, the key role played by simulation and formal verification has been investigated, leading to analysing how automatic verification techniques like probabilistic model checking can be exploited in order to formally prove the emergence of desired behaviours when dealing with coordination approaches based on self-organisation. To this end, a concrete case study is presented and discussed.