Results 21 to 30 of about 3,883,810 (149)

Time-Critical Data Dissemination Under Flash Crowd Traffic

open access: yesIEEE Open Journal of the Computer Society, 2022
How to rapidly disseminate a large-sized file to many recipients in flash crowd arrival patterns is a fundamental challenge in many applications, such as distributing multimedia content.
Chi-Jen Wu, Jan-Ming Ho
doaj   +1 more source

Student Autonomy and Peer Learning – An Example

open access: yesHögre Utbildning, 2012
This short article presents and describes a transition from “traditional” teaching with knowledge transferred from the teacher to the students in a classroom to a peer-to-peer situation in which the students, with different support, learn from each other.
Stefan Hellmer
doaj   +4 more sources

Increasing the degree of acceptability for chatbots in technical support systems for educational sector by using ML and semantic web

open access: yesAlexandria Engineering Journal
Work on digital transformation is one of the main features of the fourth economic revolution, which tends to benefit from technology in various aspects of life.
Adel A. Bahaddad
doaj   +1 more source

The invisible politics of Bitcoin: governance crisis of a decentralised infrastructure

open access: yesInternet Policy Review, 2016
Bitcoin is a decentralised currency and payment system that seeks to eliminate the need for trusted authorities. It relies on a peer-to-peer network and cryptographic protocols to perform the functions of traditional financial intermediaries, such as ...
Primavera De Filippi, Benjamin Loveluck
doaj   +1 more source

Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions

open access: yesApplied Sciences, 2023
Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide.
Natalia Sánchez-Patiño   +2 more
doaj   +1 more source

Peer-to-Peer Secure Updates for Heterogeneous Edge Devices [PDF]

open access: yes, 2018
We consider the problem of securely distributing software updates to large scale clusters of heterogeneous edge compute nodes. Such nodes are needed to support the Internet of Things and low-latency edge compute scenarios, but are difficult to manage and
Band, Emily   +3 more
core   +1 more source

ANALYSIS OF WILLINGNESS TO LEND IN PEER-TO-PEER LENDING APPLICATIONS [PDF]

open access: yesRussian Journal of Agricultural and Socio-Economic Sciences, 2020
Peer-to-Peer Lending (P2P) applications were developed as an alternative funding solution, mainly for small-medium enterprises. P2P can also be a promising alternative investment instrument. The significant gap between the number of lenders and borrowers
Abdullatif Z.   +2 more
doaj   +1 more source

Peer mentoring experience on becoming a good doctor: student perspectives

open access: yesBMC Medical Education, 2020
Background PASS is a peer-led structured academic mentoring program designed to provide academic assistance for new students in their transition from college to university studies and also for students struggling in certain units.
Mohd Syameer Firdaus Mohd Shafiaai   +2 more
doaj   +1 more source

Joint associations of air pollutants during pregnancy, infancy, and childhood with childhood persistent asthma: Nationwide database study in Japan

open access: yesEcotoxicology and Environmental Safety
The joint effect of air pollutants at relatively low levels requires further investigation. Here, a database study was performed to evaluate the effects of exposure to mixtures of air pollutants during pregnancy, infancy, and childhood on childhood ...
Akihiro Shiroshita   +6 more
doaj   +1 more source

A branch hash function as a method of message synchronization in anonymous P2P conversations

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2016
Currently existing solutions rarely protect message integrity, authenticity and user anonymity without burdening the user with details of key management. To address this problem, we present Aldeon-a protocol for anonymous group conversations in a peer-to-
Kobusińska Anna   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy