\relax 
\catcode`"\active
\select@language{italian}
\@writefile{toc}{\select@language{italian}}
\@writefile{lof}{\select@language{italian}}
\@writefile{lot}{\select@language{italian}}
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Sistemi distribuiti}{3}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Topologie di Rete}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1.1}Ring}{4}}
\@writefile{lof}{\contentsline {figure}{\numberline {1.1}{\ignorespaces Topologia di rete Ring}}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1.2}Star}{5}}
\@writefile{lof}{\contentsline {figure}{\numberline {1.2}{\ignorespaces Topologia di rete a Stella}}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1.3}Connessione completa}{5}}
\@writefile{lof}{\contentsline {figure}{\numberline {1.3}{\ignorespaces Topologia di rete a connessione completa}}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1.4}Mesh e Toro}{5}}
\@writefile{lof}{\contentsline {figure}{\numberline {1.4}{\ignorespaces Topologia a Toro}}{6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1.5}Tree e Fat Tree}{6}}
\@writefile{lof}{\contentsline {figure}{\numberline {1.5}{\ignorespaces Topologia di rete Tree}}{6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1.6}Hypercube}{7}}
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Algoritmo ADR}{7}}
\@writefile{lof}{\contentsline {figure}{\numberline {1.6}{\ignorespaces Topologia ad Albero}}{7}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Reti Overlay}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Introduzione}{10}}
\@writefile{toc}{\contentsline {section}{\numberline {1.4}File Sharing}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.1}Ricerca in una rete P2P}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.2}Affinamento del flooding}{11}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.3}Filtro di Bloom}{11}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.4.4}Gossiping}{13}}
\@writefile{toc}{\contentsline {section}{\numberline {1.5}Overlay Strutturati}{13}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.5.1}Chord}{13}}
\@writefile{lof}{\contentsline {figure}{\numberline {1.7}{\ignorespaces Rete Chord con 16 peer messi in evidenza}}{14}}
\@writefile{lof}{\contentsline {figure}{\numberline {1.8}{\ignorespaces Finger table di un nodo all'interno di Chord}}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.5.2}Problemi dovuti ad una rete dinamica}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.5.3}Realizzazione della Finger Table}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.5.4}Varianti di Finger Table}{16}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.5.5}Versione ottimizzata}{16}}
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Disponibilit\IeC {\`a} e Ridondanza}{18}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Sistema RAID}{19}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1.1}RAID-5}{19}}
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Erasure Code}{20}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Campi di Galois}{20}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Complessit\IeC {\`a}}{20}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Metodo di Vandermonde}{21}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Fountain Code}{21}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}Random Linear Fountain }{21}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.6}Eliminazione di Gauss e Gauss Jordan}{22}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.7}Codice Luby Transform}{22}}
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Raptor Code}{23}}
\@writefile{toc}{\contentsline {chapter}{\numberline {3}Cooperazione in P2P}{24}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Teoria dei Giochi}{24}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Strategia Dominata}{25}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.2}Dilemma del Prigioniero}{25}}
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Reciprocit\IeC {\`a} Indiretta}{26}}
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Valutazione della reputazione in reti P2P}{27}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Web of Trust}{27}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}EigenTrust}{28}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.1}Nodi pre-trusted}{28}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.2}Attacchi Collusivi}{29}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.3}Versioni sicure e distribuite}{29}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.4}Esempi di Eigen Trust}{29}}
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Simulazione}{30}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Approccio statistico}{31}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1.1}Modelli statici e dinamici}{31}}
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Modelli Statici}{31}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Il Metodo Monte Carlo}{31}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Modelli Dinamici}{31}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}Modello Continuo}{31}}
\@writefile{toc}{\contentsline {section}{\numberline {5.4}Componenti fondamentali di un simulatore}{31}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}Il Modello}{32}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}Il Generatore Random}{32}}
\@writefile{toc}{\contentsline {paragraph}{Tecnica di composizione}{33}}
\@writefile{toc}{\contentsline {paragraph}{Tecnica di rejezione}{33}}
\@writefile{toc}{\contentsline {paragraph}{Metodo della funzione inversa}{33}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}Il Motore}{34}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.4}L'analisi statistica}{34}}
\@writefile{toc}{\contentsline {paragraph}{Tecnica di tipo rigenerativo naturale}{35}}
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Anonimato}{36}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Anonimato dei partner in una comunicazione}{37}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}Tecniche}{37}}
\@writefile{toc}{\contentsline {subsubsection}{Livello 0: Cancellazione eager}{37}}
\@writefile{toc}{\contentsline {subsubsection}{Livello 1: Proxy anonimizzanti}{37}}
\@writefile{toc}{\contentsline {subsubsection}{Livello 2: Cifratura dei dati}{37}}
\@writefile{toc}{\contentsline {subsubsection}{Livello 3: Onion routing (TOR)}{38}}
\@writefile{lof}{\contentsline {figure}{\numberline {6.1}{\ignorespaces Inizio rete tor}}{38}}
\@writefile{lof}{\contentsline {figure}{\numberline {6.2}{\ignorespaces Instradamento random della richiesta}}{39}}
\@writefile{lof}{\contentsline {figure}{\numberline {6.3}{\ignorespaces Nuova richiesta}}{39}}
\@writefile{toc}{\contentsline {subsubsection}{Livello 4: Mixing}{39}}
\@writefile{toc}{\contentsline {subsubsection}{Livello 5: Steganografia}{40}}
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Freenet}{40}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}GUID}{40}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}L'instrademento delle richieste}{41}}
