Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
Since the turn of the century, the discipline of design has increasingly focused its attention on its ap- plication to projects and groups of users at a larger scale. Researchers and practitioners have tried to understand how design could... more
    • by 
    •   7  
      DesignCollaborationParticipationOpen Design
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct communication and collaboration between nodes. There are three main families of P2P networks: the... more
    • by 
    •   14  
      Social NetworksWireless CommunicationsAdHoc NetworksP2p(peer-2-Peer) Networks
Mobile Ad-hoc networks are categorized by multi-hop wireless connectivity and numbers of nodes are connecting each other through wireless network. It includes several routing protocols specifically designed for ad-hoc... more
    • by 
    •   11  
      AdHoc NetworksP2p(peer-2-Peer) NetworksP2P SystemsP2P Integration
The release of the open source 3-D printer known as the RepRap (a self-Replicating Rapid prototyper) resulted in the potential for distributed manufacturing of products for significantly lower costs than conventional manufacturing. This... more
    • by  and +3
    •   27  
      Electrical EngineeringMechanical EngineeringRenewable EnergyMechatronics
Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols in wireless sensor... more
    • by  and +1
    •   15  
      Computer ScienceSocial NetworksComputer EngineeringWireless Communications
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more
    • by 
    •   20  
      Social NetworksClusters & NetworksComputer NetworksWireless Mesh Networks
This article examines the bitcoin, at present the most popular cryptocurrency. The bitcoin grew on the major pillars of the neoliberal market economy, such as liberalization, deregulation and privatization. But in the end, it turned out... more
    • by 
    •   5  
      P2p(peer-2-Peer) NetworksEconomic DemocracyP2P SystemsCryptocurrency
Manufacturing in areas of the developing world that lack electricity severely restricts the technical sophistication of what is produced. More than a billion people with no access to electricity still have access to some imported... more
    • by 
    •   19  
      PhotovoltaicsInternational DevelopmentRenewable EnergySustainable Development
Distributed manufacturing even at the household level is now well established with the combined use of open source designs and self-replicating rapid prototyper (RepRap) 3-D printers. Previous work has shown substantial economic consumer... more
    • by  and +1
    •   32  
      Materials EngineeringEconomicsDigital FabricationRecycling
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more
    • by 
    •   16  
      Computer ScienceSocial NetworksComputer EngineeringComputer Networks
    • by 
    •   6  
      MusicP2P SystemsP2p Multimedia StreamingMüzik
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is sent along with the... more
    • by 
    •   11  
      Social NetworksComputer NetworksP2p(peer-2-Peer) NetworksArtificial Neural Networks
In recent years, the increasing concerns around the centralized cloud web services (e.g. privacy, governance, surveillance, security) have triggered the emergence of new distributed technologies, such as IPFS or the Blockchain. These... more
    • by 
    •   8  
      DecentralizationMulti-Agent SystemsAgent Oriented Software EngineeringP2P Systems
This part of the “Grundrisse” has been object of many different interpretations of what Marx really wanted to say with “general intellect”. Most of these interpretations understand it like a synonym of swarm intelligence or stigmergy. In... more
    • by 
    •   15  
      EconomicsMarxismHistory of Economic ThoughtCapitalism
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more
    • by 
    •   19  
      Wireless CommunicationsComputer NetworksCognitive Radio NetworksWireless Mesh Networks
P2P mesh-pull live video streaming applications – such as CoolStreaming, PPLive, and PPStream – have become popular in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks... more
    • by 
    •   12  
      Channel CodingVideo StreamingP2P SystemsHashing
Intelligent products are an undeniable asset for efficient product lifecycle management (PLM), providing ways to capture events related to physical objects at various locations and times. Today and more than ever before, PLM tools and... more
    • by 
    •   7  
      The Internet of ThingsP2p(peer-2-Peer) NetworksProduct Lifecycle ManagementP2P Systems
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Cloud... more
    • by 
    •   18  
      Computer ScienceComputer VisionComputer EngineeringMachine Learning
P2P applications suffer from free-riding. In economics terminology, free-riding is the rational behavior of the participants. So it’s feasible to use game theory to analyze this problem and design countermeasures. Tit-for-Tat is a... more
    • by 
    • P2P Systems
What is the participatory map, and when did it emerge? In the online world, we're in the middle of a renaissance of popular cartography, enabled by big data and the comparative cheapness of distributing graphic information on the web.... more
    • by 
    •   14  
      GeographyHuman GeographyCartographyInformation Technology
Makerspaces and their various declinations are a widespread initiative of workshops that offer open access to digital and traditional production equipment, with the aim of democratizing access to technologies and supporting bottom-up... more
    • by 
    •   11  
      Digital FabricationCommunity Engagement & ParticipationOpen InnovationP2P Systems
The classic mutual exclusion problem in distributed systems occurs when only one process should access a shared resource. Various algorithms are proposed in order to solve this problem. When using a permission based approach which consist... more
    • by 
    •   8  
      Distributed AlgorithmsSecurityPeer-to-PeerCritical Human Resource Development
Peer-to-Peer (P2P) systems have the ability to bond with millions of clients in business and knowledge scenario. The mechanism that leads users to distribute files without the need of centralized servers has achieved wide recognition... more
    • by 
    •   7  
      P2P SystemsProtocolsEconomics, p2pStructured P2P Systems,
It is well known that content distribution networks (CDN) are expensive technologies for distributing web contents. Universities and other non-profit organizations do not have enough financial means to deploy large web-servers or to use... more
    • by 
    •   7  
      P2p(peer-2-Peer) NetworksP2P SystemsContent Distribution Networks (CDN)P2p networks
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more
    • by 
    •   14  
      Social NetworksWireless CommunicationsComputer NetworksCognitive Radio Networks
This paper aims to shed light on a transversal phenomenon, as it affects both the scope of the law and the technology, ethics and certain legally recognized rights. This is the impact that the deep packet inspection technology has in the... more
    • by 
    •   5  
      Intellectual PropertyCopyrightISP LiabilityP2P Systems
    • by 
    •   11  
      CensorshipWeb TechnologiesWeb DevelopmentWeb Applications
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending... more
    • by 
    •   19  
      Network SteganographyCryptographySteganographyP2P Systems
Distributed Hash Tables (DHTs) have been used in several applications, but most DHTs have opted to solve lookups with multiple hops, to minimize bandwidth costs while sacrificing lookup latency. This paper presents D1HT, an original DHT... more
    • by 
    •   10  
      Distributed ComputingPeer-to-PeerP2p(peer-2-Peer) NetworksP2P Systems
In large scale peer-to-peer networks, it is impossible to perform a query request by visiting all peers. There are some works that try to find the location of resources probabilistically (i.e. non-deterministically). They all have used... more
    • by 
    •   3  
      P2P SystemsContent Distribution Networks (CDN)Proximity-aware
La FAO est convaincue que l’innovation, en général et en particulier dans le domaine de l'agriculture, est la force motrice essentielle pour parvenir à un monde libéré de la faim et de la malnutrition.L'innovation est généralement perçue... more
    • by 
    •   17  
      Agricultural EngineeringEconomicsInternational RelationsInternational Law
The massive consumer often has security concerns about Internet transmissions, and the remote access of the IP Camera is also full of challenges from the consumer market for privacy and security. In this context, when the user account of... more
    • by 
    •   4  
      Digital SignatureAuthenticationP2P SystemsIp Camera
Los sistemas P2P han adquirido en los últimos años una importancia extraordinaria entre los usuarios que comparten obras protegidas por derechos de explotación en exclusiva. El Código penal ha seguido el sentido que le marca la... more
    • by 
    •   4  
      Criminal LawP2P SystemsP2p networksP2P/Overlay Networks
A web operating system is an operating system that users can access from any hardware at any location. A peer-to-peer (P2P) grid uses P2P communication for resource management and communication between nodes in a grid and manages... more
    • by  and +1
    •   39  
      Operating SystemsDistributed ComputingGrid ComputingSemantic Web Technologies
    • by  and +1
    •   6  
      Network SecurityComputer SecurityP2p(peer-2-Peer) NetworksP2P
Service design projects done in organizations face constraints of resource, time and budgets. We discuss the blend Rapid Ethnography and Grounded Theory for the research conducted for the service experience of Rang De (www.rangde.org), a... more
    • by  and +1
    •   6  
      Service DesignGrounded Theory (Research Methodology)Financial InclusionP2P Systems
Chapter in the edited volume: Social Media in the Arab World: Communication and Public Opinion in the Gulf States. Published by I.B. Tauris. Elareshi, M., Al Jaber, & K., Gunter, B. (Eds). 2006.
    • by 
    •   10  
      EthicsPublic DiplomacyThe Persian GulfSocial Media
The growth of small devices using as cell phones and smartphones has requested for the development of applications in different areas. The users may perform different tasks in these devices as read e-mails and magazines, make financial... more
    • by 
    •   4  
      E-learningMobile LearningLearning Objects (Education)P2P Systems
7 th International Conference on Data Mining and Database Management Systems (DMDBS 2021) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. Authors are solicited to contribute to... more
    • by 
    •   20  
      BioinformaticsManagement Information SystemsData MiningSemantics
Peer-to-Peer (P2P) networking emerged as a disruptive business model displacing the server based networks within a point in time.P2P technologies are on the edge of becoming all-purpose in developing several... more
    • by 
    •   13  
      Social NetworksWireless CommunicationsComputer NetworksWireless Sensor Networks
An intrusion detection system plays a major role in network security. We propose a model "DB-OLS: An Approach for IDS" which is a Deviation Based-Outlier approach for Intrusion detection using Self Organizing Maps. In this model "Self... more
    • by 
    •   9  
      Wireless CommunicationsComputer NetworksWireless Sensor NetworksWireless networks
Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols in wireless sensor... more
    • by 
    •   9  
      Social NetworksWireless CommunicationsComputer NetworksWireless Sensor Networks
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous... more
    • by 
    •   10  
      Distributed AlgorithmsHybrid SystemsP2p(peer-2-Peer) NetworksP2P security
Estas notas que siguen las escribimos al rebufo de las primeras sentencias civiles (1) que, en España, han enjuiciado la responsabilidad de sendos usuarios de redes P2P por sus posibles conductas contrarias a la regulación de la propiedad... more
    • by 
    •   4  
      P2PP2P SystemsDERECHO PENALP2P/Overlay Networks
An introductory conceptual paper presentation for the event organized at FLACSO, September 3, 2015, Quito
    • by 
    •   4  
      Future citiesP2P SystemsP2p networksUrban Commons
Recently there has been an effort to build scalable and reliable application-level multicast solutions that combine the resilience of pure gossip-based with the efficiency of tree-based schemes. However, such solutions assume that... more
    • by 
    •   7  
      Broadcast & Multimedia TechnologyFault Tolerant SystemsBroadcastingGossip
Peer-to-peer systems have recently a remarkable success in the social, academic, and commercial communities. A fundamental problem in Peer-to-Peer systems is how to efficiently locate appropriate peers to answer a specific query (Query... more
    • by 
    •   6  
      E-learningOnline LearningP2P securityP2P
—The introduction of self-* properties has been proven to be a feasible approach for the management demands of Disruption-Tolerant Networks (DTNs). Among the properties of the self-* management vision, self-healing figures as a key... more
    • by  and +1
    •   3  
      P2P SystemsP2P/Overlay NetworksDTN Security
Commutative Replicated Data Type (CRDT) is a convergence philosophy invented as a new generation of technique that ensures consistency maintenance of replica in collaborative editors without any difficulty over Peer-to-Peer (P2P)... more
    • by 
    •   18  
      Semantic Web TechnologiesCollaborative SystemsSemantic WebDistributed System