scholarly journals May I sleep in your bed? Getting permission to book

2021 ◽  
Author(s):  
Logi Karlsson ◽  
Astrid Kemperman ◽  
Sara Dolnicar

Demand for tourist accommodation offered on peer-to-peer networks is skyrocketing. In such networks tourists can only book if the accommodation provider (host) gives their permission. Needing permission to book accommodation is radically new in tourism. No hotel, motel or B&B assesses a booking inquiry in detail before accepting their booking. But do peer-to-peer network hosts actually refuse permission to book and, if so, why? A choice experiment with Airbnb hosts shows that refusing permission to book is common and that specific attributes of the booking inquiry—such as the purpose of their trip—affect the likelihood of getting permission to book.

2011 ◽  
pp. 131-144
Author(s):  
Sridhar Asvathanarayanan

Computing strategies have constantly undergone changes, from being completely centralized to client-servers and now to peer-to-peer networks. Databases on peer-to-peer networks offer significant advantages in terms of providing autonomy to data owners, to store and manage the data that they work with and, at the same time, allow access to others. The issue of database security becomes a lot more complicated and the vulnerabilities associated with databases are far more pronounced when considering databases on a peer-to-peer network. Issues associated with database security in a peer-to-peer environment could be due to file sharing, distributed denial of service, and so forth, and trust plays a vital role in ensuring security. The components of trust in terms of authentication, authorization, and encryption offer methods to ensure security.


Author(s):  
Thomas Repantis ◽  
Vana Kalogeraki

In this chapter the authors study the problems of data dissemination and query routing in mobile peerto- peer networks. They provide a taxonomy and discussion of existing literature, spanning overlay topologies, query routing, and data propagation. They proceed by proposing content-driven routing and adaptive data dissemination algorithms for intelligently routing search queries in a peer-to-peer network that supports mobile users. In the authors’ mechanism, nodes build content synopses of their data and adaptively disseminate them to their most appropriate peers. Based on the content synopses, a routing mechanism is being built, to forward the queries to those peers that have a high probability of providing the desired results. The authors provide an experimental evaluation of different dissemination strategies, which shows that content-driven routing and adaptive data dissemination is highly scalable and significantly improves resource usage.


2008 ◽  
pp. 1070-1079
Author(s):  
Sridhar Asvathanarayanan

Computing strategies have constantly undergone changes, from being completely centralized to client-servers and now to peer-to-peer networks. Databases on peer-to-peer networks offer significant advantages in terms of providing autonomy to data owners, to store and manage the data that they work with and, at the same time, allow access to others. The issue of database security becomes a lot more complicated and the vulnerabilities associated with databases are far more pronounced when considering databases on a peer-to-peer network. Issues associated with database security in a peer-to-peer environment could be due to file sharing, distributed denial of service, and so forth, and trust plays a vital role in ensuring security. The components of trust in terms of authentication, authorization, and encryption offer methods to ensure security.


2011 ◽  
pp. 105-119
Author(s):  
Malu Roldan

In recent years, we have witnessed the rapid evolution of handheld computing devices from leading manufacturers, somewhat fueled by a battle being waged between Palm Computing and Microsoft Corporation. Handheld devices are attractive for educational settings, because they are inexpensive, portable, and customizable. Furthermore, most handheld devices come “out of the box” with infrared ports, enabling them to automatically form a peer-to-peer network with other handhelds. In this chapter, how such peer-to-peer networks could support the interplay of autonomy and coordination underlying current and emerging learning models will be discussed. Findings from a pilot study suggest that the information management and connectivity features of the machines make them ideal devices for such learning environments. The entertainment capabilities of the devices motivate students to learn how to use them. However, students found the machines and add-ons expensive, limited in capability, and difficult to use.


2013 ◽  
Vol 756-759 ◽  
pp. 2237-2242
Author(s):  
Wei Cheng ◽  
Zhen Hua Tan

A requester node requesting a service in a peer to peer network transmits a request to a service provider node. The request may include a communication history of the requester node identifying other nodes with which the requester node has previously communicated. The service provider node authenticates the requester node based on the communication history. The service provider node may ask other nodes with which the requester node has communicated for evaluation of the requester node. The other nodes may calculate a trust metric of the requester node and provide this metric to the service provider node. The service provider node may use this trust metric in combination with a similarity calculation of the requester node and the service provider node to make a determination whether the requester node is to be authenticated. The service provider node may evaluate the requester node and store the evaluation in its communication history.


Author(s):  
Thomas Repantis ◽  
Vana Kalogeraki

In this chapter the authors study the problems of data dissemination and query routing in mobile peerto- peer networks. They provide a taxonomy and discussion of existing literature, spanning overlay topologies, query routing, and data propagation. They proceed by proposing content-driven routing and adaptive data dissemination algorithms for intelligently routing search queries in a peer-to-peer network that supports mobile users. In the authors’ mechanism, nodes build content synopses of their data and adaptively disseminate them to their most appropriate peers. Based on the content synopses, a routing mechanism is being built, to forward the queries to those peers that have a high probability of providing the desired results. The authors provide an experimental evaluation of different dissemination strategies, which shows that content-driven routing and adaptive data dissemination is highly scalable and significantly improves resource usage.


2015 ◽  
Vol 22 (2) ◽  
pp. 156-169 ◽  
Author(s):  
Jeffrey Simser

Purpose – This paper aims to explore the challenge posed by Bitcoin to regulators, particularly anti-money laundering regulators. Bitcoin is a crypto-currency based on open-source software and protocols that operates in peer-to-peer networks as a private irreversible payment mechanism. The protocol allows cross-border payments, for large and small items, with little or no transactional costs. Design/methodology/approach – Case studies and case law are examined as are relevant reports by regulators. Findings – Bitcoin is based on complex computer code supported by a robust community in a peer-to-peer network. Unlike other virtual currencies, Bitcoin appears to have obtained purchase and as such poses unique challenges to regulators. Research limitations/implications – Bitcoin is at a nascent stage and the evolution of the virtual currency is difficult to predict. Practical implications – Those who study financial systems, anti-money laundering regimes and asset forfeiture laws will have an interest in this topic. Originality/value – This is a new and emerging currency; there is limited literature on the implications of this currency to anti-money laundering systems.


Author(s):  
Morteza Analoui ◽  
Mohsen Sharifi ◽  
Mohammad Hossein Rezvani

Nowadays, content distribution has received remarkable attention in distributed computing researches and its applications typically allow personal computers, called peers, to cooperate with each other in order to accomplish distributed operations such as query search and acquiring digital contents. In a very large network, it is impossible to perform a query request by visiting all peers. There are some works that try to find the location of resources probabilistically (i.e. non-deterministically). They all have used inefficient protocols for finding the probable location of peers who manage the resources. This paper presents a more efficient protocol that is proximity-aware in the sense that it is able to cache and replicate the popular queries proportional to distance latency. The protocol dictates that the farther the resources are located from the origin of a query, the more should be the probability of their replication in the caches of intermediate peers. We have validated the proposed distributed caching scheme by running it on a simulated peer-to-peer network using the well-known Gnutella system parameters. The simulation results show that the proximity-aware distributed caching can improve the efficiency of peer-to-peer resource location services in terms of the probability of finding objects, overall miss rate of the system, fraction of involved peers in the search process, and the amount of system load.


2014 ◽  
Vol 24 (8) ◽  
pp. 2132-2150
Author(s):  
Hong-Yan MEI ◽  
Yu-Jie ZHANG ◽  
Xiang-Wu MENG ◽  
Wen-Ming MA

2008 ◽  
Vol 19 (9) ◽  
pp. 2376-2388 ◽  
Author(s):  
Zhen-Hua LI ◽  
Gui-Hai CHEN ◽  
Tong-Qing QIU

Sign in / Sign up

Export Citation Format

Share Document