1,471 Hits in 5.3 sec

Real-Time Decentralized knowledge Transfer at the Edge [article]

Orpaz Goldstein, Mohammad Kachuee, Derek Shiell, Majid Sarrafzadeh
2021 arXiv   pre-print
The proliferation of edge networks creates islands of learning agents working on local streams of data.  ...  This approach suits the decentralized architecture of edge networks, as a local edge node will serve a community of learning agents that will likely encounter similar data.  ...  Peer-to-Peer (P2P) agent communication over a defined network structure is described by Gossip Algorithms Shah (2009); Boyd et al. (2006) .  ... 
arXiv:2011.05961v4 fatcat:zjcpc5ipqzbkxpzyfrcegny7su

The Double-Edged Sword: Paternalism as a Policy in the Problems of Aging

Thomas Halper
1980 The Milbank Memorial Fund Quarterly Health and Society  
with peers he might never have chosen, his individuality is sacrificed to bureaucratic convenience and necessity, he no longer selects even the food he eats or the clothes he wears.  ...  The paternalistic approach to the problems of the aged, therefore, emerges as a weapon not wholly of good or evil, but rather like a double-edged sword that can damage either side with a chilling impartiality  ... 
doi:10.2307/3349735 pmid:6926734 fatcat:qgqpcnmahbgzvm45cci3txuxpe

Coming to the edge of the circle: a Wiccan initiation ritual

2006 ChoiceReviews  
Also, if unauthorized copyright material had to be removed, a note wiU indicate the deletion.  ...  ., maps, drawings, charts) are reproduced by sectioning th e original, beginning a t th e upper left-hand com er a n d continuing from left to right in equal sections with small overlaps.  ...  In the future, this power will shift to the coven as the Dedicant approaches the Circle's edge and the point of asking for initiation into the Craft.178 CHAPTERSCoining to the Edge of the Circle for  ... 
doi:10.5860/choice.43-3331 fatcat:aqmibmvlavahpnzgwnquboba7u

Random walk based node sampling in self-organizing networks

Ming Zhong, Kai Shen
2006 ACM SIGOPS Operating Systems Review  
With careful guidance, node samples following a desired probability distribution can be generated with the only requirement that the sampling probabilities of each visited node and its direct neighbors  ...  resulted walker losses, and the difficulty of pacing walk steps without synchronized clocks between network nodes.  ...  Peer-to-peer search The square-root principle [7] is known to achieve low search time for p2p search techniques that do not utilize query routing indices.  ... 
doi:10.1145/1151374.1151386 fatcat:sgzmu6e6fbcelpnjx5fao6wwhq

A Taxonomy of Rational Attacks [chapter]

Seth James Nielson, Scott A. Crosby, Dan S. Wallach
2005 Lecture Notes in Computer Science  
For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neither be expected nor enforced.  ...  The most effective solutions directly incentivize cooperative behavior, but when this is not feasible the common alternative is to incentivize evidence of cooperation instead. • Altruistic or obedient  ...  INTRODUCTION A significant challenge in peer-to-peer (p2p) computing is the problem of cooperation.  ... 
doi:10.1007/11558989_4 fatcat:k6ybsdfjm5e5hnd7y23qmsljeu

Cover feature - Toward internet distributed computing

M. Milenkovic, S.H. Robinson, R.C. Knauerhase, D. Barkai, S. Garg, V. Tewari, T.A. Anderson, M. Bowman
2003 Computer  
Intel P u b l i s h e d b y t h e I E E E C o m p u t e r S o c i e t y C O V E R F E A T U R E The confluence of Web services, peer-to-peer systems, and grid computing provides the foundation for Internet  ...  distributed computing-allowing applications to scale from proximity ad hoc networks to planetary-scale distributed systems.  ...  Clay for struggling to make our prose more readable.  ... 
doi:10.1109/mc.2003.1198235 fatcat:tvcck7n32jh3foue4s2adup744

Science's Big Problem, Reincarnation's Big Potential, and Buddhists' Profound Embarrassment

Ted Christopher
2017 Religions  
The larger test for science's paradigm, though, as well as for any potential general import from reincarnation -is the DNA (or genetics)-based model of heredity.  ...  Yet it is easy to find behavioral phenomena from the accepted literature that seriously challenge materialism. A number of these phenomena are very suggestive of reincarnation.  ...  The author also gratefully acknowledges the editing work of Cindi Rittenhouse. Beyond this the efforts and funding came solely from the author.  ... 
doi:10.3390/rel8080155 fatcat:7yqtflijn5bv7kwh725r2w3gw4

Rapid Software Evolution [chapter]

Borislav Iordanov
2012 Unifying Themes in Complex Systems VII  
A hypergraph is a graph where edges may point to more than two nodes. The generalization further allows edges to point to other edges.  ...  Assume a peer-to-peer communication layer between two given niches N and M and suppose that N promotes/publishes/offers an atom to M.  ... 
doi:10.1007/978-3-642-18003-3_14 fatcat:d6aemntdnnd6ldzcq3624ca6jy

Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies

Kanwal Janjua, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Carsten Maple, Ikram Ud Din
2020 Electronics  
Collecting and preserving the smart environment logs connected to cloud storage is challenging due to the black-box nature and the multi-tenant cloud models which can pervade log secrecy and privacy.  ...  The existing work for log secrecy and confidentiality depends on cloud-assisted models, but these models are prone to multi-stakeholder collusion problems.  ...  Moreover, Holochain is not dependent on the references to the proof-of-work, the proof-of-stake, or leading selection algorithms to ensure the data integrity for peer-to-peer applications.  ... 
doi:10.3390/electronics9071172 fatcat:x4wxsf5uu5eidla7dwlr64pyfq

Sk8ting the sinking city

Benjamin Shirtcliff
2015 Interdisciplinary Environmental Review  
The paper examines how settings afford prosocial behaviours amongst skateboarding adolescents. Young people have a unique capacity to improve settings for play.  ...  The research has broader implications for sustainability and environmental justice professionals working with vulnerable populations to transform degraded spaces into beneficial places.  ...  paint on rails left from the bottom of skateboards, waxed edges, steel rails glued to steps, and improvised ramps.  ... 
doi:10.1504/ier.2015.071016 fatcat:mcz6s6prsrh7rblnpjbxrqmhqu

Adaptive Distributed b-Matching in Overlays with Preferences [chapter]

Giorgos Georgiadis, Marina Papatriantafilou
2012 Lecture Notes in Computer Science  
Recent research proposed that this problem can be modeled and studied analytically as a many-to-many matching problem with preferences.  ...  The peers may maintain some private notion of how a "desirable" peer should look like and they share their bounded resources with peers that they prefer better than others.  ...  Unstructured overlays in particular aim at connecting peers with minimal assumptions on the protocols to be used, while addressing universal challenges: peers are willing to share both concrete resources  ... 
doi:10.1007/978-3-642-30850-5_19 fatcat:nujzj3xpdvd3hksldl7r25sm2u

The Convergence-Guaranteed Random Walk and Its Applications in Peer-to-Peer Networks

Ming Zhong, Kai Shen, Joel Seiferas
2008 IEEE transactions on computers  
Network structure construction and global state maintenance are expensive in large-scale, dynamic peer-to-peer (p2p) networks.  ...  In this paper, we investigate an approach for random walks to converge to application-desired node visitation probability distributions while only requiring information about direct neighbors of each peer  ...  The problem may become more severe when these edges happen to be bottlenecks for random walk movements as revealed by edge congestion.  ... 
doi:10.1109/tc.2007.70837 fatcat:qncanwsmujerzfbn3qk6rzz3uq

Overlays with Preferences: Distributed, Adaptive Approximation Algorithms for Matching with Preference Lists

Giorgos Georgiadis, Marina Papatriantafilou
2013 Algorithms  
In this work, we employ the notion of node satisfaction to suggest a novel modeling for matching problems, suitable for overlay networks.  ...  Subsequently, we show how to extend the algorithm in order to support and adapt to changes in the nodes' connectivity and preferences.  ...  in our modeling.  ... 
doi:10.3390/a6040824 fatcat:7q6t65w5svfdhbghuroswc4wne

Adversarial Collaboration on a Drake-S Equation for the Survival Question

Brian Laythe, James Houran
2022 Journal of Scientific Exploration  
The mathematical analysis found that known confounds did not account for 39% of survival-related phenomena that appear to attest directly to human consciousness continuing in some form after bodily death  ...  The equation that led to our verdict can also purposefully guide future research, which one day might finally resolve this enduring question scientifically.  ...  to peer review.  ... 
doi:10.31275/20222357 fatcat:gcmtohy5ejcgphnqjorwsauy4a

The Aboriginal Spring? Youth, Mobile Phones and Social Media in a Remote Aboriginal Community [chapter]

Kishan Kariippanon
2021 Indigenous Australian Youth Futures: Living the Social Determinants of Health  
Three o'clock in the morning was a typically youthful time to 'hang out' with peers.  ...  practices, often in economic exchanges, had transformed the new technology into a double-edged spear.  ... 
doi:10.22459/iayf.2021.08 fatcat:wnnmwcwrazdznn347y3v44sasq
« Previous Showing results 1 — 15 out of 1,471 results