948 resultados para Skype, crittografia, sicurezza, intercettazioni, peer-to-peer.


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The quantification of uncertainty is an increasingly popular topic, with clear importance for climate change policy. However, uncertainty assessments are open to a range of interpretations, each of which may lead to a different policy recommendation. In the EQUIP project researchers from the UK climate modelling, statistical modelling, and impacts communities worked together on ‘end-to-end’ uncertainty assessments of climate change and its impacts. Here, we use an experiment in peer review amongst project members to assess variation in the assessment of uncertainties between EQUIP researchers. We find overall agreement on key sources of uncertainty but a large variation in the assessment of the methods used for uncertainty assessment. Results show that communication aimed at specialists makes the methods used harder to assess. There is also evidence of individual bias, which is partially attributable to disciplinary backgrounds. However, varying views on the methods used to quantify uncertainty did not preclude consensus on the consequential results produced using those methods. Based on our analysis, we make recommendations for developing and presenting statements on climate and its impacts. These include the use of a common uncertainty reporting format in order to make assumptions clear; presentation of results in terms of processes and trade-offs rather than only numerical ranges; and reporting multiple assessments of uncertainty in order to elucidate a more complete picture of impacts and their uncertainties. This in turn implies research should be done by teams of people with a range of backgrounds and time for interaction and discussion, with fewer but more comprehensive outputs in which the range of opinions is recorded.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper reports the results of a study comparing the interactional dynamics of face-to-face and on-line peer-tutoring in writing by university students in Hong Kong. Transcripts of face-to-face tutoring sessions, as well as logs of on-line sessions conducted by the same peer-tutors, were coded for speech functions using a system based on Halliday's functional-semantic view of dialogue. Results show considerable differences between the interactional dynamics in on-line and face-to-face tutoring sessions. In particular, face-to-face interactions involved more hierarchal encounters in which tutors took control of the discourse, whereas on-line interactions were more egalitarian, with clients controlling the discourse more. Differences were also found in the topics participants chose to focus on in the two modes, with issues of grammar, vocabulary, and style taking precedence in face-to-face sessions and more “global” writing concerns like content and process being discussed more in on-line sessions.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This thesis work concerns about the Performance evolution of peer to peer networks, where we used different distribution technique’s of peer distribution like Weibull, Lognormal and Pareto distribution process. Then we used a network simulator to evaluate the performance of these three distribution techniques.During the last decade the Internet has expanded into a world-wide network connecting millions of hosts and users and providing services for everyone. Many emerging applications are bandwidth-intensive in their nature; the size of downloaded files including music and videos can be huge, from ten megabits to many gigabits. The efficient use of network resources is thus crucial for the survivability of the Internet. Traffic engineering (TE) covers a range of mechanisms for optimizing operational networks from the traffic perspective. The time scale in traffic engineering varies from the short-term network control to network planning over a longer time period.Here in this thesis work we considered the peer distribution technique in-order to minimise the peer arrival and service process with three different techniques, where we calculated the congestion parameters like blocking time for each peer before entering into the service process, waiting time for a peers while the other peer has been served in the service block and the delay time for each peer. Then calculated the average of each process and graphs have been plotted using Matlab to analyse the results

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This project explores the potential of electronic communications to support peer-to-peer interaction between separate whole-school communities as a means of providing both authentic, situated, professional development for teachers, concurrent with the development of enhanced student learning outcomes, and the intentional sharing of school 'culture'.  The intense use of telecommunications by both teacher and students in a 'many-to-many' manner provides rich opportunities for teachers to rethink their pedagogy, reconceptualise their classroom culture, and for students to see teachers as learners 'in situ'.  An extensive trial between two schools some 120km apart has demonstrated the basic functionality of the model.  This paper discusses the origins of the project, findings from the trial, and the nature of the changes to be made to the model to enhance its effects.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This study investigated the nature of body image and body change strategies, as well as the sociocultural influences on these variables, among a group of 1,266 adolescents (622 males, 644 females). In particular, it investigated weight gain and increased muscle, as well as weight loss. It was found that females were less satisfied with their bodies and were more likely to adopt strategies to lose weight, whereas males were more likely to adopt strategies to increase weight and muscle tone. Respondents with higher body mass index (BMI) evidenced greater body dissatisfaction and more weight loss strategies, but there were no differences between BMI groups in weight gain or strategies to increase muscles. Weight gain and strategies to increase muscles were more likely to be undertaken by older adolescents, but there were no grade level differences in weight loss. Media influences to alter weight, as well as feedback from mother, father, and both male and female peers, were greater for females. There were few grade level or BMI differences in regard to any of the sociocultural influences. The importance of these findings in terms of providing a better understanding of factors which may lead to a disturbed body image and body change disorders, particularly among adolescent boys, is discussed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The availability of critical services and their data can be significantly increased by replicating them on multiple systems connected with each other, even in the face of system and network failures. In some platforms such as peer-to-peer (P2P) systems, their inherent characteristic mandates the employment of some form of replication to provide acceptable service to their users. However, the problem of how best to replicate data to build highly available peer-to-peer systems is still an open problem. In this paper, we propose an approach to address the data replication problem on P2P systems. The proposed scheme is compared with other techniques and is shown to require less communication cost for an operation as well as provide higher degree of data availability.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The peer-to-peer content distribution network (PCDN) is a hot topic recently, and it has a huge potential for massive data intensive applications on the Internet. One of the challenges in PCDN is routing for data sources and data deliveries. In this paper, we studied a type of network model which is formed by dynamic autonomy area, structured source servers and proxy servers. Based on this network model, we proposed a number of algorithms to address the routing and data delivery issues. According to the highly dynamics of the autonomy area, we established dynamic tree structure proliferation system routing, proxy routing and resource searching algorithms. The simulations results showed that the performance of the proposed network model and the algorithms are stable.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

With more and more multimedia applications on the Internet, such as IPTV, bandwidth becomes a vital bottleneck for the booming of large scale Internet based multimedia applications. Network coding is recently proposed to take advantage to use network bandwidth efficiently. In this paper, we focus on massive multimedia data, e.g. IPTV programs, transportation in peer-to-peer networks with network coding. By through study of networking coding, we pointed out that the prerequisites of bandwidth saving of network coding are: 1) one information source with a number of concurrent receivers, or 2) information pieces cached at intermediate nodes. We further proof that network coding can not gain bandwidth saving at immediate connections to a receiver end; As a result, we propose a novel model for IPTV data transportation in unstructured peer-to-peer networks with network coding. Our preliminary simulations show that the proposed architecture works very well.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This article describes a Chronic Illness Peer Support (ChIPS) programme designed to assist young people in their adjustment to life with a chronic medical condition. The ChIPS programme takes a non-categorical approach to participation, recognizing that young people with different medical conditions experience many similar concerns. Support groups are facilitated by a health professional and peer co-leader. Groups meet weekly for 8 weeks and typically include between six and eight young people. Young people can choose to remain involved in broader social, educational and recreational activities following completion of the 8-week programme. We discuss nine psychosocial mechanisms by which peer support groups such as ChIPS might act to improve resilience and well-being among participants. We also discuss some theoretical risks in running support groups for chronically ill young people, which emphasize the importance of training and support of group leaders, including the peer co-leaders. The article concludes with a personal testimony by a ChIPS participant that was prepared for the 2003 Australian and New Zealand Adolescent Health Conference.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Two main problems prevent the deployment of peer-to-peer application in a wireless sensor network: the index table, which should be distributed stored rather than uses a central server as the director; the unique node identifier, which cannot use the global addresses. This paper presents a multi-level virtual ring (MVR) structure to solve these two problems.

The index table in MVR is distributed stored by using the DHT technique. MVR is constructed decentralized and runs on mobile nodes themselves, requiring no central server or interruption. Naming system in MVR uses natural names rather than global addresses to identify sensor nodes. The MVR can route directly on the name identifiers of the sensor nodes without being aware the location. Some sensor nodes are selected as the backbone nodes by the backbone selection algorithm and are placed on the different levels of the virtual rings. MVR hashes nodes’ identifiers on the virtual ring, and stores them at the backbone nodes. Furthermore, MVR adopts cross-level routing to improve the routing efficiency.

Experiments using ns2 simulator for up to 200 nodes show that the storage and bandwidth requirements of MVR grow slowly with the size of the network. Furthermore, MVR has demonstrated as self-administrating, fault-tolerant, and resilient under the different workloads.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The existing sharable file searching methods have at least one of the following disadvantages: (1) they are applicable only to certain topology patterns, (2) suffer single point failure, or (3) incur prohibitive maintenance cost. These drawbacks prevent their effective application in unstructured Peer-to-peer (P2P) systems (where the system topologies are changed time to time due to peers' frequently entering and leaving the systems), despite the considerable success of sharing file search in conventional peer-to-peer systems. Motivated by this, we develop several fully dynamic algorithms for searching sharing files in unstructured peer to peer systems. Our solutions can handle any topology pattern with small search time and computational overhead. We also present an in-depth analysis that provides valuable insight into the characteristics of alternative effective search strategies and leads to precision guarantees. Extensive experiments validate our theoretical findings and demonstrate the efficiency of our techniques in practice.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network security research because of P2P worms' increasing complexity and sophistication. Due to the complexity of the problem, no existing work has solved the problem of modeling the propagation of P2P worms, especially when quarantine of peers is enforced. This paper presents a study on modeling the propagation of P2P worms. It also presents our applications of the proposed approach in worm propagation research.

Motivated by our aspiration to invent an easy-to-employ instrument for worm propagation research, the proposed approach models the propagation processes of P2P worms by difference equations of a logic matrix, which are essentially discrete-time deterministic propagation models of P2P worms. To the best of our knowledge, we are the first using a logic matrix in network security research in general and worm propagation modeling in particular.

Our major contributions in this paper are firstly, we propose a novel logic matrix approach to modeling the propagation of P2P worms under three different conditions; secondly, we find the impacts of two different topologies on a P2P worm's attack performance; thirdly, we find the impacts of the network-related characteristics on a P2P worm's attack performance in structured P2P networks; and fourthly, we find the impacts of the two different quarantine tactics on the propagation characteristics of P2P worms in unstructured P2P networks. The approach's ease of employment, which is demonstrated by its applications in our simulation experiments, makes it an attractive instrument to conduct worm propagation research.