paperId
stringlengths
40
40
text
stringlengths
51
184k
title
stringlengths
4
300
abstract
stringlengths
0
10k
year
stringclasses
49 values
publicationDate
stringlengths
0
19
url
stringlengths
78
78
venue
stringlengths
0
300
isOpenAccess
stringclasses
2 values
00c5185c5a5c68761ff4b22fb523d734af9c5c16
_Article_ # Down with the #Dogefather: Evidence of a Cryptocurrency Responding in Real Time to a Crypto-Tastemaker **Michael Cary** Division of Resource Economics and Management, West Virginia University, Morgantown, WV 26506, USA; macary@mix.wvu.edu **Abstract: Recent research in cryptocurrencies has considered the...
Down with the #Dogefather: Evidence of a Cryptocurrency Responding in Real Time to a Crypto-Tastemaker
Recent research in cryptocurrencies has considered the effects of the behavior of individuals on the price of cryptocurrencies through actions such as social media usage. However, some celebrities have gone as far as affixing their celebrity to a specific cryptocurrency, becoming a crypto-tastemaker. One such example o...
2021.0
2021-09-03 00:00:00
https://www.semanticscholar.org/paper/00c5185c5a5c68761ff4b22fb523d734af9c5c16
Journal of Theoretical and Applied Electronic Commerce Research
True
00cb943e73fce88d768f3891ad67fa48c6b70ed2
# Name Enhanced SDN Framework for Service Function Chaining of Elastic Network Functions ## Sameer G Kulkarni[∗], Mayutan Arumaithurai[∗], Argyrious Tasiopoulos[‡], Yiaonis Psaras[‡], K.K. Ramakrishnan[†], Xiaoming Fu[∗], George Pavlou[‡] _∗University of G¨ottingen, Germany, ‡University College London, †University of...
Name enhanced SDN framework for service function chaining of elastic Network functions
2016.0
2016-04-10 00:00:00
https://www.semanticscholar.org/paper/00cb943e73fce88d768f3891ad67fa48c6b70ed2
Conference on Computer Communications Workshops
True
00cf3d116538b3fbc71c113df890d54299369a61
## Universal Randomized Guessing with Application to Asynchronous Decentralized Brute–Force Attacks #### Neri Merhav[∗] Asaf Cohen[†] #### November 13, 2018 Abstract Consider the problem of guessing the realization of a random vector X by repeatedly submitting queries (guesses) of the form “Is X equal to x?” unti...
Universal Randomized Guessing With Application to Asynchronous Decentralized Brute–Force Attacks
Consider the problem of guessing the realization of a random vector <inline-formula> <tex-math notation="LaTeX">${X}$ </tex-math></inline-formula> by repeatedly submitting queries (guesses) of the form “Is <inline-formula> <tex-math notation="LaTeX">${X}$ </tex-math></inline-formula> equal to <inline-formula> <tex-math...
2020.0
2020-01-01 00:00:00
https://www.semanticscholar.org/paper/00cf3d116538b3fbc71c113df890d54299369a61
IEEE Transactions on Information Theory
True
00d0783da6191568a814381a0dc4db49262736e9
# entropy _Perspective_ ### On Global Quantum Communication Networking **Ivan B. Djordjevic** Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ 85721, USA; ivan@email.arizona.edu; Tel.: +1-520-626-5119 Received: 29 June 2020; Accepted: 28 July 2020; Published: 29 July 2020 [���...
On Global Quantum Communication Networking
Research in quantum communications networks (QCNs), where multiple users desire to generate or transmit common quantum-secured information, is still in its beginning stage. To solve for the problems of both discrete variable- and continuous variable-quantum key distribution (QKD) schemes in a simultaneous manner as wel...
2020.0
2020-07-29 00:00:00
https://www.semanticscholar.org/paper/00d0783da6191568a814381a0dc4db49262736e9
Entropy
True
00d1e468ebce3a3c6197b876c32330c2f54777a3
# applied sciences _Article_ ## BioShare: An Open Framework for Trusted Biometric Authentication under User Control **Quan Sun** **[1,2,]*, Jie Wu** **[1]** **and Wenhai Yu** **[2]** 1 School of Computer Science and Technology, Fudan University, No. 220 Handan Rd., Shanghai 200433, China 2 China UnionPay Co., Ltd.,...
BioShare: An Open Framework for Trusted Biometric Authentication under User Control
Generally, biometric authentication is conducted either by mobile terminals in local-processing mode or by public servers in centralized-processing mode. In the former mode, each user has full control of his/her biometric data, but the authentication service is restricted to local mobile apps. In the latter mode, the a...
2022.0
2022-10-25 00:00:00
https://www.semanticscholar.org/paper/00d1e468ebce3a3c6197b876c32330c2f54777a3
Applied Sciences
True
00d4ca5c46ab55cd82aff4fffd52b182c9a4ca34
DOI 10.1007/s12046 016 0545 0 # Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks ## V S JANANI[*] and M S K MANIKANDAN Department of Electronics and Communication Engineering, Thiagarajar College of Engineering, Madurai 625015, India e-mail: jananivs@tce.edu MS ...
Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks
2016.0
2016-10-01 00:00:00
https://www.semanticscholar.org/paper/00d4ca5c46ab55cd82aff4fffd52b182c9a4ca34
Sādhanā
True
00d793b0c383f3232ba96b73d6917925ebb75ebe
This paper has been accepted for publication in IEEE Robotics and Automation Letters. DOI:10.1109/LRA.2017.2715400 [IEEE Xplore: http://ieeexplore.ieee.org/document/7949041/](http://ieeexplore.ieee.org/document/7949041/) c 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained f...
Single-View and Multiview Depth Fusion
Dense and accurate 3-D mapping from a monocular sequence is a key technology for several applications and still an open research area. This letter leverages recent results on single-view convolutional network (CNN)-based depth estimation and fuses them with multiview depth estimation. Both approaches present complement...
2016.0
2016-11-22 00:00:00
https://www.semanticscholar.org/paper/00d793b0c383f3232ba96b73d6917925ebb75ebe
IEEE Robotics and Automation Letters
True
00de0b220e561f58bda5643968bf05822b7f896d
Received April 9, 2022, accepted April 24, 2022, date of publication April 28, 2022, date of current version May 9, 2022. _Digital Object Identifier 10.1109/ACCESS.2022.3170910_ # Experimental Evaluation of Transmitted Signal Distortion Caused by Power Allocation in Inter-Cell Interference Coordination Techniques for...
Experimental Evaluation of Transmitted Signal Distortion Caused by Power Allocation in Inter-Cell Interference Coordination Techniques for LTE/LTE-A and 5G Systems
Error vector magnitude (EVM) and out-of-band emissions are key metrics for evaluating in-band and out-band distortions introduced by all potential non-idealities in the transmitters of wireless systems. As EVM is a measure of the quality of the modulated signal/symbols, LTE/LTE-A and 5G systems specify mandatory EVM re...
2022.0
NaT
https://www.semanticscholar.org/paper/00de0b220e561f58bda5643968bf05822b7f896d
IEEE Access
True
00e55a9d00b3beab2f3a952e50d8a7359ae8f1c8
Received May 29, 2020, accepted June 15, 2020, date of publication June 29, 2020, date of current version July 20, 2020. _Digital Object Identifier 10.1109/ACCESS.2020.3005663_ # Consortium Blockchain-Based Decentralized Stock Exchange Platform HAMED AL-SHAIBANI, NOUREDDINE LASLA, (Member, IEEE), AND MOHAMED ABDALLA...
Consortium Blockchain-Based Decentralized Stock Exchange Platform
The global implementation architecture of the traditional stock market distributes responsibilities and data across different intermediaries, including financial and governmental organizations. Each organization manages its system and collaborates with the others to facilitate trading on the stock exchange platform, an...
2020.0
2020-06-29 00:00:00
https://www.semanticscholar.org/paper/00e55a9d00b3beab2f3a952e50d8a7359ae8f1c8
IEEE Access
True
00e65f396b4febdc799e03c997608fbeb1035905
# Achlys : Towards a framework for distributed storage and generic computing applications for wireless IoT edge networks with Lasp on GRiSP ### Igor Kopestenski ICTEAM Institute Universit´e catholique de Louvain igor.kopestenski@uclouvain.be **_Abstract—Internet of Things (IoT) continues to grow expo-_** **nentiall...
Achlys: Towards a Framework for Distributed Storage and Generic Computing Applications for Wireless IoT Edge Networks with Lasp on GRiSP
Internet of Things (IoT) continues to grow exponentially, in number of devices and the amount of data they generate. Processing this data requires an exponential increase in computing power. For example, aggregation can be done directly at the edge. However, aggregation is very limited; ideally we would like to do more...
2019.0
2019-01-15 00:00:00
https://www.semanticscholar.org/paper/00e65f396b4febdc799e03c997608fbeb1035905
2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
True
00e730f1a001c200cd93883e1cbeb0337c11faee
## MULTI-AGENT CONTINUAL COORDINATION VIA PROGRESSIVE TASK CONTEXTUALIZATION A PREPRINT **Lei Yuan[1,2], Lihe Li[1], Ziqian Zhang[1], Fuxiang Zhang[1,2], Cong Guan[1], Yang Yu[1,2,][∗]** 1 National Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China 2 Polixir.ai yuanl, lilh, zhangzq, zh...
Multiagent Continual Coordination via Progressive Task Contextualization
Cooperative multiagent reinforcement learning (MARL) has attracted significant attention and has the potential for many real-world applications. Previous arts mainly focus on facilitating the coordination ability from different aspects (e.g., nonstationarity and credit assignment) in single-task or multitask scenarios,...
2023.0
2023-05-07 00:00:00
https://www.semanticscholar.org/paper/00e730f1a001c200cd93883e1cbeb0337c11faee
IEEE Transactions on Neural Networks and Learning Systems
False
00ea729f4029076d418123a919825ae23de9932a
**EVOLUTION AND ANALYSIS OF SECURE HASH ALGORITHM (SHA) FAMILY** **_Burhan Ul Islam Khan[1*], Rashidah Funke Olanrewaju[2], Malik Arman Morshidi[3], Roohie Naaz Mir[4], Miss Laiha_** **_Binti Mat Kiah[5] and Abdul Mobeen Khan[6 ]_** 1,2,3Department of ECE, KOE, International Islamic University Malaysia (IIUM), Kuala...
EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY
With the rapid advancement of technologies and proliferation of intelligent devices, connecting to the internet challenges have grown manifold, such as ensuring communication security and keeping user credentials secret. Data integrity and user privacy have become crucial concerns in any ecosystem of advanced and inter...
2022.0
2022-07-27 00:00:00
https://www.semanticscholar.org/paper/00ea729f4029076d418123a919825ae23de9932a
Malaysian Journal of Computer Science
True
00eb6f6ebb68f199f12507a6bd585718f464d75d
# Revision and Enhancement of Two Three Party Key Agreement Protocols Vulnerable to KCI Attacks ### Maurizio Adriano Strangio Department of Mathematics, University of Rome “Roma Tre”, Rome, Italy _∗Corresponding Author: strangio@mat.uniroma3.it_ Copyright c⃝2014 Horizon Research Publishing All rights reserved. ##...
Revision and Enhancement of Two Three Party Key Agreement Protocols Vulnerable to KCI Attacks
In two recent papers, Zuowen Tan (Secu- rity and Communication Networks) and Chih-ho Chou et al. (Computers and Electronics) published three party key agreement protocols especially convenient for protecting communications in mobile-centric environ- ments such as e-payments, vehicular mobile networks (VMN), RFID applic...
2014.0
NaT
https://www.semanticscholar.org/paper/00eb6f6ebb68f199f12507a6bd585718f464d75d
True
00eb7acc1610d210d538de47fd9ca0cb75faf055
## Many-to-One Trapdoor Functions and Their Relation to Public-Key Cryptosystems Mihir Bellare 1 , Shai Halevi 2, Amit Sahai 3, and Salil Vadhan 3 1 Dept. of Computer Science & Engineering, University of California at San Diego, 9500 Gilman Drive, La Jolla, CA 92093, USA. E-Mail: mihir@cs.ucsd, edu. ``` ...
Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems
1998.0
1998-08-23 00:00:00
https://www.semanticscholar.org/paper/00eb7acc1610d210d538de47fd9ca0cb75faf055
Annual International Cryptology Conference
True
00eca0ba653718274f5b0593a06dda278759d534
# sensors _Article_ ## Adaptive Indoor Area Localization for Perpetual Crowdsourced Data Collection **Marius Laska** **[1,]*** **, Jörg Blankenbach** **[1]** **and Ralf Klamma** **[2]** 1 Geodetic Institute and Chair for Computing in Civil Engineering & Geo Information Systems, RWTH Aachen University, Mies-van-der-R...
Adaptive Indoor Area Localization for Perpetual Crowdsourced Data Collection
The accuracy of fingerprinting-based indoor localization correlates with the quality and up-to-dateness of collected training data. Perpetual crowdsourced data collection reduces manual labeling effort and provides a fresh data base. However, the decentralized collection comes with the cost of heterogeneous data that c...
2020.0
2020-03-01 00:00:00
https://www.semanticscholar.org/paper/00eca0ba653718274f5b0593a06dda278759d534
Italian National Conference on Sensors
True
00ed8311df8cd0e843ca8912bc76e6d365443859
Approved for public release; distribution is unlimited. _Title:_ A Comparison of TCP Automatic Tuning Techniques for ###### Distributed Computing _Author(s):_ Eric Weigle and Wu-Chun Feng _Submitted to:_ 1 1 th IEEE International Symposium on High-Performance ###### Distributed Computing Los Alamos NATIONAL LABO...
A comparison of TCP automatic tuning techniques for distributed computing
2002.0
2002-07-24 00:00:00
https://www.semanticscholar.org/paper/00ed8311df8cd0e843ca8912bc76e6d365443859
Proceedings 11th IEEE International Symposium on High Performance Distributed Computing
True
00ee11fd044876642ee1440432a33d7faa6d3292
# SCI Networking for Shared-Memory Computing in UPC: Blueprints of the GASNet SCI Conduit ## H. Su, B. Gordon, S. Oral, A. George {su, gordon, oral, george}@hcs.ufl.edu _High-performance Computing and Simulation (HCS) Research Lab, Dept. of Electrical and Computer Engineering,_ _University of Florida, Gainesville, Fl...
SCI networking for shared-memory computing in UPC: blueprints of the GASNet SCI conduit
2004.0
2004-11-16 00:00:00
https://www.semanticscholar.org/paper/00ee11fd044876642ee1440432a33d7faa6d3292
29th Annual IEEE International Conference on Local Computer Networks
True
00ef77f1162f6eed2595e569d716f963c181de21
# Classical zero-knowledge arguments for quantum computations #### Thomas Vidick[1] and Tina Zhang[2] 1Department of Computing and Mathematical Sciences, California Institute of Technology, USA 2Division of Physics, Mathematics and Astronomy, California Institute of Technology, USA We show that every language in ...
Classical zero-knowledge arguments for quantum computations
We show that every language in QMA admits a classical-verifier, quantum-prover zero-knowledge argument system which is sound against quantum polynomial-time provers and zero-knowledge for classical (and quantum) polynomial-time verifiers. The protocol builds upon two recent results: a computational zero-knowledge proof...
2019.0
2019-02-14 00:00:00
https://www.semanticscholar.org/paper/00ef77f1162f6eed2595e569d716f963c181de21
IACR Cryptology ePrint Archive
True
00f0072a48291ce27d5dfe10e00847d98a915d76
### Conservative Linear Unbiased Estimation Under Partially Known Covariances #### Forsling Robin, Anders Hansson, Fredrik Gustafsson, Zoran Sjanic, Johan Löfberg and Gustaf Hendeby The self-archived postprint version of this journal article is available at Linköping University Institutional Repository (DiVA): http:...
Conservative Linear Unbiased Estimation Under Partially Known Covariances
Mean square error optimal estimation requires the full correlation structure to be available. Unfortunately, it is not always possible to maintain full knowledge about the correlations. One example is decentralized data fusion where the cross-correlations between estimates are unknown, partly due to information sharing...
2022.0
NaT
https://www.semanticscholar.org/paper/00f0072a48291ce27d5dfe10e00847d98a915d76
IEEE Transactions on Signal Processing
True
00f0106e0a9ab64dcd4c0dabe5f1af1e5549f75e
Received January 29, 2021, accepted February 11, 2021, date of publication February 15, 2021, date of current version February 25, 2021. _Digital Object Identifier 10.1109/ACCESS.2021.3059473_ # Channel Load Aware AP / Extender Selection in Home WiFi Networks Using IEEE 802.11k/v TONI ADAME 1, MARC CARRASCOSA1, BORI...
Channel Load Aware AP / Extender Selection in Home WiFi Networks Using IEEE 802.11k/v
Next-generation Home WiFi networks have to step forward in terms of performance. New applications such as on-line games, virtual reality or high quality video contents will further demand higher throughput levels, as well as low latency. Beyond physical (PHY) and medium access control (MAC) improvements, deploying mult...
2020.0
2020-04-17 00:00:00
https://www.semanticscholar.org/paper/00f0106e0a9ab64dcd4c0dabe5f1af1e5549f75e
IEEE Access
True
00f030043a1ca3a957a37cdf03060a15fefeb932
Volume/Cilt: 6, Issue/Sayı: 4 Year/Yıl: 2023, pp. 243-253 E-ISSN: 2636-7718 [URL: https://journals.gen.tr/arts](https://journals.gen.tr/arts) DOI: https://doi.org/10.31566/arts.2163 Received / Geliş: 08/08/2023 Acccepted / Kabul: 27/09/2023 RESEARCH ARTICLE / ARAŞTIRMA MAKALESİ # Paradigm shift in the music indus...
Paradigm shift in the music industry: Adaptation of blockchain technology and its transformative effects
The music industry is undergoing a profound transformation thanks to blockchain technology. This article extensively examines how the core components of music – production, distribution, performance, and presentation – are undergoing radical changes through the integration of blockchain technology. The traditional musi...
2023.0
2023-10-23 00:00:00
https://www.semanticscholar.org/paper/00f030043a1ca3a957a37cdf03060a15fefeb932
JOURNAL OF ARTS
True
00f24857803eefcd0900689dda52c32505105132
http://www.journalofcloudcomputing.com/content/2/1/24 ## RESEARCH Open Access # THUNDER: helping underfunded NPO’s distribute electronic resources ### Gabriel Loewen[*], Jeffrey Galloway, Jeffrey Robinson, Xiaoyan Hong and Susan Vrbsky **Abstract** As federal funding in many public non-profit organizations (NPO’...
THUNDER: helping underfunded NPO’s distribute electronic resources
As federal funding in many public non-profit organizations (NPO’s) seems to be dwindling, it is of the utmost importance that efforts are focused on reducing operating costs of needy organizations, such as public schools. Our approach for reducing organizational costs is through the combined benefits of a high performa...
2013.0
2013-12-01 00:00:00
https://www.semanticscholar.org/paper/00f24857803eefcd0900689dda52c32505105132
Journal of Cloud Computing: Advances, Systems and Applications
True
00f2f02c7694836eb4950f4395aae455571d91c1
DOI: 10.1002/qua.27035 #### R E V I E W # Blockchain technology in quantum chemistry: A tutorial review for running simulations on a blockchain ## Magnus W. D. Hanson-Heine [1] | Alexander P. Ashmore [2] 1School of Chemistry, University of Nottingham, Nottingham, UK 2Oxinet, Bath, UK Correspondence Magnus W. D...
Blockchain technology in quantum chemistry: A tutorial review for running simulations on a blockchain
2022.0
2022-10-30 00:00:00
https://www.semanticscholar.org/paper/00f2f02c7694836eb4950f4395aae455571d91c1
International Journal of Quantum Chemistry
True
00f3a470a4e9d926afcc53cfcd5deeb000595e12
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 13, Number 1 (2023), pp. 1-6 © International Research Publications House https://dx.doi.org/10.37624/IJICT/13.1.2023.1-6 # A Secure Land Asset Transfer System using Blockchain **P.N. Ramya[1], Geetha Krishna Guruju[2], Ayushi Verma[...
A Secure Land Asset Transfer System using Blockchain
2023.0
2023-07-06 00:00:00
https://www.semanticscholar.org/paper/00f3a470a4e9d926afcc53cfcd5deeb000595e12
International Journal of Information &amp; Computation Technology
True
00f658832a6f1d5d53f20b9bc361594b72a8ddf8
## We are IntechOpen, the world’s leading publisher of Open Access books Built by scientists, for scientists # 6,700 Open access books available # 180,000 195M International authors and editors Our authors are among the Downloads # 12.2% # 154 TOP 1% Countries delivered to most cited scientists Contribut...
A Review of Dynamic Wireless Power Transfer for In‐Motion Electric Vehicles
2016.0
2016-06-29 00:00:00
https://www.semanticscholar.org/paper/00f658832a6f1d5d53f20b9bc361594b72a8ddf8
True
00f6cf73c647f116d7a23d17e8a4c45a0555dd81
## Phase transitions in distributed control systems with multiplicative noise **Nicolas Allegra[1][,][2], Bassam Bamieh[1], Partha Mitra[3]** **and Cl´ement Sire[4]** 1 Department of Mechanical Engineering, University of California, Santa Barbara, USA 3 Cold Spring Harbor Laboratory, Cold Spring Harbor, NY, USA 4 Lab...
Phase transitions in distributed control systems with multiplicative noise
Contemporary technological challenges often involve many degrees of freedom in a distributed or networked setting. Three aspects are notable: the variables are usually associated with the nodes of a graph with limited communication resources, hindering centralized control; the communication is subject to noise; and the...
2016.0
2016-10-03 00:00:00
https://www.semanticscholar.org/paper/00f6cf73c647f116d7a23d17e8a4c45a0555dd81
arXiv.org
True
00f77951251798ae562e1ebe066753594f4b37be
### Johannes Ernst* and Alexander Koch # Private Stream Aggregation with Labels in the Standard Model[†] **Abstract: A private stream aggregation (PSA) scheme** is a protocol of n clients and one aggregator. At every time step, the clients send an encrypted value to the (untrusted) aggregator, who is able to compute ...
Private Stream Aggregation with Labels in the Standard Model
Abstract A private stream aggregation (PSA) scheme is a protocol of n clients and one aggregator. At every time step, the clients send an encrypted value to the (untrusted) aggregator, who is able to compute the sum of all client values, but cannot learn the values of individual clients. One possible application of PSA...
2021.0
2021-07-23 00:00:00
https://www.semanticscholar.org/paper/00f77951251798ae562e1ebe066753594f4b37be
Proceedings on Privacy Enhancing Technologies
True
00f84366664c896ee112940dc12eaacef6189f89
# Distributed Volumetric Scene Geometry Reconstruction With a Network of Distributed Smart Cameras ## Shubao Liu † Kongbin Kang † Jean-Philippe Tarel ‡ David B. Cooper † †Division of Engineering, Brown University, Providence, RI 02912 {sbliu, kk, cooper}@lems.brown.edu ## ‡Laboratoire central des Ponts et Chauss´ees (...
Distributed volumetric scene geometry reconstruction with a network of distributed smart cameras
2009.0
2009-06-20 00:00:00
https://www.semanticscholar.org/paper/00f84366664c896ee112940dc12eaacef6189f89
2009 IEEE Conference on Computer Vision and Pattern Recognition
True
00fe625102de79328a9ee3bf867afa05f8be82d7
**Research Article** # Blockchain‑based multi‑organization taxonomy for smart cities **Ekleen Kaur[1] · Anshul Oza[1]** Received: 14 October 2019 / Accepted: 5 February 2020 / Published online: 18 February 2020 © Springer Nature Switzerland AG 2020 **Abstract** With the tremendous development in distributed ledger ...
Blockchain-based multi-organization taxonomy for smart cities
2020.0
2020-02-18 00:00:00
https://www.semanticscholar.org/paper/00fe625102de79328a9ee3bf867afa05f8be82d7
SN Applied Sciences
True
00ff024e0800db79a8f7c661b47357fc98e6c0af
## ADVERSARIAL-PLAYGROUND: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning #### Andrew P. Norton[*] Yanjun Qi[†] Department of Computer Science, University of Virginia **ABSTRACT** Recent studies have shown that attackers can force deep learning models to misclassify so-called “adversaria...
Adversarial-Playground: A visualization suite showing how adversarial examples fool deep learning
Recent studies have shown that attackers can force deep learning models to misclassify so-called “adversarial examples:” maliciously generated images formed by making imperceptible modifications to pixel values. With growing interest in deep learning for security applications, it is important for security experts and u...
2017.0
2017-08-01 00:00:00
https://www.semanticscholar.org/paper/00ff024e0800db79a8f7c661b47357fc98e6c0af
Visualization for Computer Security
True
0100d00584f7b6a2e3969fd57a9d164103f39a69
# ENHANCED DYNAMIC RESOURCE ALLOCATION SCHEME BASED ON PACKAGE LEVEL ACCESS IN CLOUD COMPUTING : A REVIEW ## Manpreet Kaur [(1)], Dr. Rajinder Singh[(2)] (1) Research Scholar, Department of Computer Science & Engineering, GGSCET, Bathinda, Punjab. ### manpreet12395@gmail.com (2) Assistant Professor, Department of ...
ENHANCED DYNAMIC RESOURCE ALLOCATION SCHEME BASED ON PACKAGE LEVEL ACCESS IN CLOUD COMPUTING : A REVIEW
Cloud computing is distributed computing, storing, sharing and accessing data over the Internet. It provides a pool of shared resources to the users available on the basis of pay as you go service that means users pay only for those services which are used by him according to their access times. This research work deal...
2017.0
2017-04-06 00:00:00
https://www.semanticscholar.org/paper/0100d00584f7b6a2e3969fd57a9d164103f39a69
Bioinformatics
True
0101445aec81d2dec8562a83e656ac6ccd633ee2
# Founding Cryptography on Tamper-Proof Hardware Tokens Vipul Goyal[1][,⋆], Yuval Ishai[2][,⋆⋆], Amit Sahai[3][,⋆⋆⋆], Ramarathnam Venkatesan[4], and Akshay Wadia[3] 1 UCLA and MSR India vipul.goyal@gmail.com 2 Technion and UCLA yuvali@cs.technion.ac.il 3 UCLA _{sahai,awadia}@cs.ucla.edu_ 4 Microsoft Research...
Founding Cryptography on Tamper-Proof Hardware Tokens
2010.0
2010-02-09 00:00:00
https://www.semanticscholar.org/paper/0101445aec81d2dec8562a83e656ac6ccd633ee2
IACR Cryptology ePrint Archive
True
01044c3e265ad414aec8cf608c24e1d1cf406077
Annales UMCS Informatica AI XII, 4 (2012) 11–22 DOI: 10.2478/v10065-012-0018-y ### Hardened Bloom Filters, with an Application to Unobservability Nicolas Bernard[1][∗], Franck Leprévost[1][†] ``` 1LACS, University of Luxembourg ``` 162 a, Avenue de la Faïencerie, L-1511 Luxembourg Abstract – Cla...
Hardened Bloom Filters, with an Application to Unobservability
Classical Bloom filters may be used to elegantly check if an element e belongs to a set S, and, if not, to add e to S. They do not store any data and only provide boolean answers regarding the membership of a given element in the set, with some probability of false positive answers. Bloom filters are often used in cach...
2012.0
NaT
https://www.semanticscholar.org/paper/01044c3e265ad414aec8cf608c24e1d1cf406077
Ann. UMCS Informatica
True
01060a62a51c08248abc0b204b4e255a09731ad8
# electronics _Article_ ## A Framework for Data Privacy Preserving in Supply Chain Management Using Hybrid Meta-Heuristic Algorithm with Ethereum Blockchain Technology **Yedida Venkata Rama Subramanya Viswanadham * and Kayalvizhi Jayavel** Department of Computer Science and Engineering, SRM Institute of Science and ...
A Framework for Data Privacy Preserving in Supply Chain Management Using Hybrid Meta-Heuristic Algorithm with Ethereum Blockchain Technology
Blockchain is a recently developed advanced technology. It has been assisted by a lot of interest in a decentralized and distributed public ledger system integrated as a peer-to-peer network. A tamper-proof digital framework is created for sharing and storing data, where the linked block structure is utilized to verify...
2023.0
2023-03-15 00:00:00
https://www.semanticscholar.org/paper/01060a62a51c08248abc0b204b4e255a09731ad8
Electronics
True
0106a389bab04617737f3a786e08e31fa4afe7e5
ERROR: type should be string, got "https://www.emerald.com/insight/2210-8327.htm\n\n# Why and how informatics and applied computing can still create structural changes and competitive advantage\n\n## Sarandis Mitropoulos\n### Regional Development, Ionian University, Lefkada, Greece, and\n## Christos Douligeris\n### Informatics, University of Piraeus, Piraeus, Greece\n\nAbstract\nPurpose – In the new digital age, enterprises are facing an increasing global competition. In this paper, we first\nexamine how Information Technology (IT) can play an important role in giving significant competitive\nadvantage in the modern enterprises. The business value of IT is examined, as well as the limitations and the\ntrade-offs that its applicability faces. Next, we present the basic principles for a successful IT strategy,\nconsidering the development of a long-term IT renovation plan, the strategic alignment of IT with the business\nstrategy, and the adoption of an integrated, distributed, and interoperable IT platform. Finally, we examine\nhow a highly functional and efficient IT organization can be developed.\nDesign/methodology/approach – Our methodological approach was based to the answers of the following\nquestions: 1. Does IT still matter? 2. What is the business value created by IT along with the corresponding\nlimitations and trade-offs? 3. How could a successful IT Strategy be build up? 4. How could an effective?\nT planning aligned with the business strategy be build up? 5. How could a homogenized and distributed\ncorporate IT platform be developed? and finally, 6. How could a high-performance IT-enabled enterprise be\nbuild up?\nFindings – The enterprises in order to succeed in the new digital area need to: 1. synchronize their IT strategy\nwith their business strategy, 2. formulate a long-term IT strategy, 3. adopt IT systems and solutions that are\nimplemented with elasticity, interoperability, distribution, and service-orientation. 4. keep a strategic direction\ntowards the creation of an exceptional organization based on IT.\nOriginality/value – This paper is original with respect to the integrated approach the overall problem is\nexamined. There is a prototype combined investigation of all perspectives for an effective enforcement of IT in\na way that causes acceleration in competitive advantage when conducting business.\nKeywords New technologies, IT strategy, Strategic alignment, Business value, SOA\nPaper type Research paper\n\n1. Introduction\nThe steadily increasing global market competition is significantly reducing the turnover time\nof innovation products. Information Technology (IT) can provide a significant competitive\nmarket advantage to an enterprise because it dynamically promotes relationships with its\ncustomers and suppliers, strengthens strategic alliances, promotes innovative products and\nservices, adapts existing solutions, and achieves lower operating costs, while it improves the\ninternal business processes. It is true that new technologies, such as the cloud, mobile\ncomputing, the Internet of Things (IoT), and the use of artificial intelligence (AI) have brought\n\n© Sarandis Mitropoulos and Christos Douligeris. Published in Applied Computing and Informatics.\nPublished by Emerald Publishing Limited. This article is published under the Creative Commons\nAttribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works\nof this article (for both commercial and non-commercial purposes), subject to full attribution to the\n[original publication and authors. The full terms of this licence may be seen at http://creativecommons.](http://creativecommons.org/licences/by/4.0/legalcode)\n[org/licences/by/4.0/legalcode](http://creativecommons.org/licences/by/4.0/legalcode)\n\n\n## Informatics and applied computing\n\nReceived 7 June 2021\nRevised 19 July 2021\n16 September 2021\nAccepted 17 September 2021\n\nApplied Computing and\nInformatics\nEmerald Publishing Limited\ne-ISSN: 2210-8327\np-ISSN: 2634-1964\n[DOI 10.1108/ACI-06-2021-0149](https://doi.org/10.1108/ACI-06-2021-0149)\n\n\n-----\n\n## ACI\n\n\naround structural changes in the way businesses operate as well as in the way markets\nfunction. For example, the internet has created hyperarchies that influence the creation of\nnew business models [1], by replacing the traditional enterprise hierarchies, while on the other\nhand it has necessitated a comprehensive review of the traditional business strategies. This\nrevision of the companies’ business strategies, as well as the new supply value chain have\nsignificantly increased the productivity, the quality of services offered to customers and the\noverall value proposition of the enterprises.\nNevertheless, there are many enterprises, which, despite investing a significant amount of\nmoney and human resources in applied computing, as well as in relevant research, have failed\nin having the initially expected advantages. This happened because these enterprises failed\nto adopt and then successfully implement the new e-business and e-governance models [2]. In\nthe context of rapidly responding to market needs and to their fierce competition, many\nenterprises have only pursued short-term benefits from applied computing and informatics\nby trying only to accelerate the development of new services and products at the lowest\npossible operating costs. But ignoring the fundamentals of strategy formulation has led to a\nconvergence of business practices based on cost leadership [3], something we have seen\nhappening in the past with the dotcom enterprises. This problem still exists with the latest\ninformatics technologies, where we see that enterprises still do not incorporate the\ninformatics and computing applications in their processes in the right way [2, 4, 5]. The main\nfaults that enterprises make regarding the adoption of informatics are that they do not:\n\n(1) synchronize their IT strategy with the goals of their business strategy,\n\n(2) formulate a long-term IT strategy,\n\n(3) keep a strategic direction towards the creation of an exceptional organization based\non IT,\n\n(4) adopt effective IT systems, and integrated IΤ solutions; instead these are\nimplemented hastily, inelastically and without interoperability.\n\nThe exponential growth of ubiquitous computing drives the need for new business models,\nwhich must serve an effective IT-enabled business strategy directly related to the Digital\nTransformation. The problem space here is how the effective adoption of new IT technologies\ncan be achieved which in turn drives the requirements of renewed business strategy and\nprocesses, and of culture change [29]. The main problem which modern enterprises face\nconcerns the right IT implementation along with the adaptation of the right strategy, process,\nand culture. This paper tries to answer all these requirements in a consistent and\nmethodological way. Even though a considerable body of research towards this direction\nexists, there is still a gap for the development of a perfect alignment between the strategy the\nenterprises must follow and an intelligent and effective way the new technologies are\nimplemented so that they create a competitive advantage [5]. Internet, cloud computing,\nmobile computing, software-oriented architectures (SOA), Internet of things (IoT), blockchain,\nserver virtualization and other modern technologies provide the enterprises with the\nopportunity to migrate from the traditional business models to new ones [30, 31, 35, 36].\nAlthough there exist theoretical frameworks in the literature [2–5], there is still a lack of of\nframeworks that combine the characteristics of hybrid, both research and practical methods\napproaches. The outcomes of the existing approaches show that the use of IT has not been\nproven fully effective, except from some exceptional cases.\nTo achieve an effective IT incorporation, this paper proposes a framework with very\nspecific suggestions. This framework can be used as a roadmap for future readiness and\ngrowth. The evaluation discussion shows the effectiveness of the proposed framework and\nmethodology. This framework in short consists of the following steps:\n\n\n-----\n\n(1) Examination of the expected business value to be created by IT along with any\nexpected limitations and necessary trade-offs.\n\n(2) Formulation of an effective IT strategy aligned with the overall business strategy.\n\n(3) Development of an effective IT planning.\n\n(4) Development of a homogenized, interoperable, and distributed IT platform.\n\n(5) Development of a high IT-enabled organization in all its dimensions.\n\n(6) Establishment of an on-going evaluation system for the continuous improvement of\nthe IT strategy and the corresponding infrastructure.\n\nThe issues and steps mentioned above are thoroughly analysed and potential solutions are\nproposed. A thorough and comprehensive investigation of whether IT can still make\nstructural changes in the operation of businesses is performed. In addition, it is examined how\nthis can be achieved with respect to the creation of business value considering the\ncorresponding limitations and necessary trade-offs. But since creating value without\ndeveloping a rational strategy is impossible the principles of a sound IT strategy are\nexamined, as well as how this can be effectively developed. Finally, implementation issues\nand evaluation results are discussed, as well as potential future work.\n\n2. IT still does matter\nMany researchers argue that IΤ no longer offers any innovation over the competition and\nhave, therefore, IΤ has reached the stage of maturing as a service [6]. This viewpoint has been\nexpressed without considering its high and disruptive evolution. Τhere is obviously a part of\nIT that is common to almost all enterprises, making this utility approach workable.\nNevertheless, this is only one side of the coin because IT is creating new situations that\naccelerate the developments in the operation of markets and enterprises. The concept of\nubiquitous computing, for example, is a new trend which will surely cause structural changes,\nwhile new ideas in virtual communities can create significant changes in corporate\ncollaboration by forming on-demand virtual business partner hyperarchies. In addition, new\nintelligent algorithms for machine learning, artificial intelligence and biotechnology are being\ndeveloped, thus facilitating research into new products (e.g. drugs and crystal solid materials)\nand services (e.g. telemedicine) with significant business and social benefits [7]. Thus, the new\ninformation technologies can leverage the capacity for innovation. Enterprises through the\nsmart and targeted use of IT will be able to create growth, and innovative products and\nservices at the right time.\nIn addition, enterprises need to focus on another perspective of IT, that of the growing\nbusiness value through digital culture. A well-designed business strategy, synchronized\nwith that of IT, creates an innovation-oriented corporate culture. Such a culture is not easy\nto be copied from the competition, thus, giving the enterprises that adopt it a clear lead.\nThere are many important examples that prove this to be true, such as the ones of Toyota\nand Dell – their supply chain and production chain management practices make them\nstand out [6].\nThe innovative and smart use of IT (e.g. green informatics) can create an additional\ncompetitive advantage which, most of the times, is closely connected with a change of culture\n\n[8]. However, the technology is not a panacea. In practice, many enterprises do not effectively\nenforce the new IT-enabled business models because their adoption of IT has not been\ndirected to develop a highly IT-enabled corporate culture, they have not integrated their\ndigital strategy with the overall business strategy, or they have not adequately understood\nthe new technology trends while developing a corresponding strategy.\n\n\n## Informatics and applied computing\n\n\n-----\n\n## ACI\n\n\n3. Business value creation: limitations and trade-offs\nNowadays, the relationship between business strategy and IT-based innovation is a strongly\ninteracting one. A successful business strategy must define an IT infrastructure driven by\ninnovation. Obviously, all of the expected benefits offer improved business performance and\nare, therefore, critical to the business success [5, 9].\nIT enables an increased control of the operating costs as well as of productivity. Indeed,\nthe assembly of products e.g. through the Computer Integrated Manufacturing (CIM) and the\nRobotics systems of the industry 4.0 era, increases productivity and quality, while reducing\ncosts. We also notice that information technology significantly increases the knowledge of\nthe business environment through monitoring systems, such as the ones used in the product\ndelivery status or in the stock levels of warehouses. IT systems can help develop staff skills\nthrough e-learning and on-the-job on-line assistance.\nNevertheless, there exist several criteria which need to be fulfilled for enterprises to be able\nto differentiate from competitors. Such criteria include among others the brand name visibility,\nthe quick-to-market response, and the service quality [10]. Despite these advantages, there are\nimportant limitations that need to be considered, such as the existence of isolated and\nproprietary software applications and databases. Outdated information (legacy) systems,\nwhich require high-cost adapters to bridge the newer applications, and the use of a wide range\nof different and heterogeneous technologies, are two other examples. The low utilization of\nthe existing IT resources is also a problem. All these limitations significantly reduce the\nefficiency of IT, the process support, the access and dissemination of information, the\nimplementation of new projects, and the staff adaptation to the new conditions, while they\nfurther increase the operating costs.\nThere are solutions to such problems, which enterprises are called upon to adopt, such as\ne.g. the Enterprise Application Integration (EAI), the rapid development of new applications,\nand the development of business process management systems By gradually adopting such\nsolutions an enterprise can in a reasonable time develop a much more integrated business\nenvironment, launch new services in a timely fashion, achieve world-wide access, improve its\nbusiness operations control, acquire resources on demand, work on a flexible infrastructure\nand lower costs [2, 10].\nMost of the times, the enforcement of these IT solutions requires the consideration of a\nvariety of trade-offs, while the main question is: “is there adequate capacity, qualities and\nstrategic direction for a change from the old economy environment to the new one?”. The\nanswer to this question includes: (1) the adoption of an innovation culture, which in turn\nrequires management of change and capability building up for the human resources, and (2)\nan elastic and interoperable infrastructure [11, 12].\nIn addition, the changing of an operational business model can drive the requirements\nfor higher adaptation in the application software portfolio creating another trade-off\namong efficiency, innovation, experimentation, and conformance to the relevant standards\n\n[11–13].\n\n4. The proposed methodological approach\nGiven that IT is still considered to be able to bring about significant structural changes and\nprovide a business competitive advantage in the modern markets along with all the related\noperational benefits, the question is how this goal can be achieved methodologically. This\ndevelopment can be considered to have the following four main dimensions:\n\n(1) Development of a successful IT strategy, whose goals should be synchronized with\nthe business strategy, e.g. there can be no strategy to penetrate global markets, while\nthe company’s information system cannot support the internationalization of the\ninformation it offers and manages.\n\n\n-----\n\n(2) The IT development plan which should consider the organizational structure of\nenterprise, the demanded quality of service to its customers, the firm’s human\nresources and the existing IT infrastructure and systems. Everything may need to be\nchanged partially or to a very large extent.\n\n(3) Development of the IT Infrastructure as a homogenized and distributed service\nplatform provided either to the internal customers of the company or to the external\nones.\n\n(4) Development of services and policies for management, research and innovation,\ntraining for the creation of a technologically high-performance enterprise,\n\nAll these key dimensions of development of innovation and IT solutions are shown in\nFigure 1 as phases.\n\n5. Building up a successful IT strategy\nA business strategy expresses the vision, the mission and the main business goals of a\nenterprise or organization. The business goals must be interpreted into subgoals that are\nenforced on specific high-level business domains, e.g. sales, customer relationships,\nproduction, and logistics. In fact, these domains, according to the balanced scorecard\n(BSC) approach [5], are influenced by the corporate strategy regarding the perspectives of the\nfuture readiness and the innovation, the internal process improvement, the customer\norientation, the cost control, and the financial goals. It is obvious that enterprises need to\neffectively approach these perspectives if they want to achieve a transition from the oldfashion business models to the new ones. Thus, the strategic components incorporated in\nthese perspectives, must be refined and improved.\nThese components, in fact, construct the high-level business domains upon which the\ngoals of the business strategy must be enforced. Of course, these domains must contain\nsubdomains or, in other words, lower-level domains that express the implementation\ncomponents of an enterprise or organization. Such components include among others\ntechnical processes, business data, operations, and informatics implementations. This topdown approach is very useful for the executives because it provides them with a tool for the\nsuccessful enforcement of a business strategy considering all its dimensions.\nThe IT potentiality in terms of new technologies and solutions, makes the IT strategy to be\nthe determinant while the business strategy to be the weak area which needs improvement\n\n[5]. This fact is expressed by the Strategic Alignment (SA) model [14] for the business and IT\nstrategies and the organisational and IT infrastructures.\nFor example, ubiquitous computing brings new capabilities to the enterprises and, thus, it\npushes for a revision of the corresponding business strategies. The goal is to achieve a\n\n\n## Informatics and applied computing\n\nFigure 1.\nThe basic dimensions\nof a high-performance\nenterprise based on\ninnovation and new\ntechnologies\n\n\n-----\n\n## ACI\n\n\ncompetitive advantage over the competition through the development of new products and\nthe appropriate modification of the business scope, the distinct competencies, and the\nbusiness governance, along with the improvement of the organizational infrastructure which\nconcerns the business processes, the human resource capability, and the administrative\nstructure. As mentioned, this approach helps enterprises to conform to the new requirements\nthat arise due to the new technological solutions and the potentialities created by them.\nTowards this direction, the following are proposed:\n\n(1) IT and business strategy alignment,\n\n(2) dimensioning of IT resource requirements,\n\n(3) adoption of new IT architectures and their management, based on innovation and\nadaptability, and\n\n(4) selection of Key Performance Indicators (KPI) for evaluation reasons.\n\nThe first point imposes an IT strategic plan fully aligned with the business strategy. The next\npoint asks for an open, interoperable, scalable, and distributed IT infrastructure, while the\nthird point relates to a high-performance IT-enabled enterprise [4, 5, 15]. Key performance\nmetrics are always required so that the evaluation of the adopted overall approach to be\npossible.\n\n6. Developing an effective IT planning aligned with the business strategy\nIT planning must incorporate the current as well as the future enterprise needs and\ntechnological trends. Thus, it must cover long-term issues as well as whatever is necessary\nfor future readiness. A Strategic Alignment (SA) between the business and IT strategies\naddresses four main areas: business strategy, IT strategy, organizational infrastructure, and\nIT infrastructure [5, 16]. These areas need to be aligned with each other according to the\nbusiness requirements and the type of enterprises. Namely, the requirement for alignment\nvaries from enterprise to enterprise and while it is generally very helpful, it may, however,\nlimit the degrees of freedom in some business cases. In fact, trade-offs and equilibria between\nstrategic alignment and flexibility must be addressed successfully. For example, the\nproduction and other business operations, like the customer relationship management (CRM),\nare positively affected by the Strategic Alignment. On the other hand, the business planning,\nthe marketing, and the sales are less influenced by the SA. Specifically, enterprises, whose\ncritical operations do not focus on IT, do not require such a strict SA. The more supportive\nand functional the role of IT is, the more SA it requires. On the contrary, where IT moves\nwithin a strategic role, the need for a strict SA decreases [17–19]. The following perspectives\ncan be considered in an IT environment [20]:\n\n(1) IT infrastructure: emerging IT infrastructure technologies and solutions call for the\nreformulation of the IT strategy, while the business strategy is implicitly impacted.\n\n(2) IT organization infrastructure: emerging IT calls for the reformulation of the\norganizational infrastructure, while the business strategy is implicitly impacted.\n\n(3) competitive potentiality: emerging IT capabilities, as well as new IT governance\npatterns call for the reformulation of the business strategy, while the organizational\ninfrastructure is implicitly impacted.\n\n(4) service level: the IT resources use, as well as the orientation to the customer calls for\nthe reformulation of the IT infrastructure, while the organizational infrastructure is\nimplicitly impacted.\n\n\n-----\n\n7. Developing a homogenized and distributed corporate IT platform\nThe following services can be offered in an enterprise network in an open and interoperable\nmanner [21, 22]:\n\n(1) electronic services for channel-management, as far as all the involved parties, like\nenterprises, clients, and suppliers, are concerned,\n\n(2) security, that concerns the IT resources protection,\n\n(3) communication mechanisms needed for the communication and interworking\nbetween all the internal/external business entities,\n\n(4) database and file management services, for the purpose of making the required data\nand files available over the enterprise network,\n\n(5) application services, for the purpose of making the required applications, like EPR,\nSCM and HRM, available over the enterprise network, and\n\n(6) management of IT facilities, needed for integration and synchronization of the\ninfrastructure layers and for provision of servers and platforms.\n\nNew trends in IT technologies call for the distribution, homogenization, integration, and\ninteroperability of systems and services [23]. Open IT standards and SOA are among the\ncurrent information systems technologies that enterprises need to move towards because\nthey offer increased interoperability, transfer of application services to heterogeneous\nenvironments, enterprise application integration, service reusability, high operational control\nand monitoring, and flexible service configuration and measurability in service\nperformance [24].\nA SOA helps to create networks of services for the purpose of their common management.\nService orientation here is mentioned as an architectural approach of the new IT systems\nwithout restricting its implementation to specific offered solutions, as it is the Enterprise\nService Bus (ESB). In most cases, service orientation must be followed due to the benefits\nmentioned above. Figure 2 introduces the conceptual approach of a service grid, where\napplication services are interacting each other through several underlying platform services,\nlike routing, message exchange and message queuing, data and knowledge management,\ndistributed API’s, security, accounting, QoS assurance, system monitoring and control.\nIndeed, the adoption of IT service grids can prove to be a key factor for enterprises in their\nefforts to gain a significant competitive advantage. New informatics and applied services\nneed to be distributed, scalable, open, and reliable in a low cost and quick-to-market\n\n**_Services_**\n\n**_Services_** **_Services_**\n\n**_Protocols:_**\n**_Rest, XML/SOAP, WSDL, UDDI_** **_Transportation:_**\n\n**_Routing, Queuing, MOM_**\n\n**_Utilities:_**\n\n**_Services_**\n\n**_Services_** **_Accounting, Security_**\n\n**_Data and Knowledge Management:_**\n\n**_Management:_** **_Directories, Discovery, DBMS, NFS_**\n**_QoS, SLA, Monitoring_**\n\n**_Services_** **_Services_**\n\n**_Services_**\n\n\n## Informatics and applied computing\n\nFigure 2.\nThe conceptual\napproach of SOA and\nthe Service Grid\n\n\n**_Services_**\n\n**_Services_**\n\n**_Protocols:_**\n**_Rest, XML/SOAP, WSDL, UDDI_**\n\n**_Utilities:_**\n\n**_Services_** **_Accounting, Security_**\n\n**_Management:_**\n**_QoS, SLA, Monitoring_**\n\n\n**_Services_** **_Services_**\n\n**_Services_**\n\n\n-----\n\n## ACI\n\nFigure 3.\nThe supply chain\n\n\ndeployment fashion. Furthermore, this adoption will cause channel enhancements, like\ndisintermediation, mitigation of information asymmetry, world-wide access, virtualization,\ncost reduction and control, efficient management information, economies of scale, and\nimproved strategic positioning.\nService grids will be enhanced with the new ubiquitous computing capabilities. For\nexample, mobile computing can effectively leverage the quality of service, as well as the\ncollaboration between employers, employees, customers, strategic partners, and third parties\n\n[25]. Furthermore, smartphones can provide a variety of functionalities, like user interaction,\ntask management, user online help, blogging, wiki, chatting, and remote access from trusteed\nparties or customers through appropriate authentication and authorizations, that can\nsignificantly leverage the operational effectiveness of modern enterprises. The dissemination\nof notifications (e.g. Google Cloud Messages) in mobile apps is another example which can\nfacilitate business operations.\n\n8. Developing a high-performance IT-enabled enterprise\nThe IT services implemented with technologies like SOA and ubiquitous computing, must be\nsupplemented by IT management services. Towards this direction [21, 24], the following\nmanagement services can be identified:\n\n(1) IT administration services, for the platforms, the IT systems planning and the project\nmanagement, the SLAs, and the negotiations with the IT suppliers,\n\n(2) IT architecture services, which need the incorporation of system management policies\nfor the effective management of IT resources,\n\n(3) IT R&D services, concerning new products, services, processes, and operations using\nIT, and\n\n(4) training services in the use of IT, strongly needed for the capacity building of\nenterprise’s staff.\n\nAlong with the management, the overall business processes as well as any activity involved\nin a process need to be designed effectively. It has been well-documented that business\nprocesses which are supported by IT, along with the right organizational and management\nservices, are significantly more efficient than those of the old economy [26, 27]. The supply\nchain is a classic example that proves the truth of the matter. Figure 3 illustrates the process\nof supply chain. In brief, creating a performance-oriented IT organization requires process\ninnovation and efficiency, effective communication with the customers, the partners, and the\nsuppliers, inventory management, development of new products and services, and agile\nadaptation of the existing ones.\nIT-enabled enterprises need to be supported by several key functionalities and\ntechnologies [22, 28, 33, 34]. Bridges between the different information systems via\nappropriate interfaces by using e.g. web services (XML or json-based approaches), are also\nrequired. Of course, the adoption of these technologies may raise critical security and risk\nmanagement issues., All the vulnerabilities and security holes must be eliminated in an way.\n\n\n-----\n\n9. Analysis discussion and evaluation\nHereafter, some examples are provided regarding the right way to employ new technologies\nin modern enterprises. As mentioned in the Accenture report “Improving Business ROI with\nDigital Technologies”[1], “to become a more efficient finance organization, considerable\ninvestments must be made to improve processes and technology”. According to this survey, the\nreasons of fail are that (1) there is no clear strategy and vision, (2) they do not deal effectively\nwith the legacy systems, and (3) they do not understand adequately the existing digital\ncapabilities. The outcomes of this survey are fully aligned with the assumptions of our\nresearch presented above.\nIn the report entitled “The ROI of IoT: The 7 benefits it can bring to your business”[2], it is\nstated that “if you know how your key equipment and assets are behaving, and how people are\ninteracting with them, you can unlock the value of that data through an IoT software program\nthat delivers actionable insights and improves business processes in future”. This is a key issue\nfor the development of an improved long-term planning and strategy, which in turn it is\nnecessary for the success of an IT investment project, according to our research.\nAccording to [32], 88% of companies reported that they already use cloud services, while\n50% of companies expect to have all their data stored in the cloud for a period of two years.\nThe same survey revealed that most enterprises already have applications in production\nbased on cloud at a level of about 47%, while a significant percentage intend to develop such\napplications. However, these enterprises are almost entirely concerned with the security of\ntheir data, which requires a high-performance IT-enabled enterprise accordingto our research.\nFinally, according to the study conducted in [22], by adopting virtualization technology\nfor a computer centre, the cost of investing in it gradually yielded positive profits over the\nannual investment cost over a period of five years. Also, the return on investment (ROI)\nbecame positive after the second year, while during the fourth year, the total investment cost\nbecame significantly lower than the projected profits.\nItshould benotedthat fora continuousevaluation of theITstrategy and its implementation,\nit is necessary to define critical success factors of the organizational and the IT infrastructures\nthat are linked to certain KPIs. These indicators will assess not only the effectiveness of\ninternal processes, customer satisfaction or financial gains, but also the achievement of the\nstructural changes necessary to adapt the organization to an ever-evolving environment.\n\n10. Conclusions and future work\nThis paper presented in a concise and detailed way, the very important role that IT still plays\nnowadays in modern enterprises, giving them a competitive advantage in modern globalized\nmarkets. It was posited that enterprises that adopt IT in a smart and innovative way have a\nsignificant capacity building capability, improved future readiness, and better strategic\npositioning.\nIn the future, we intend to evaluate our approach in an enterprise. The process of analysis\nwill include the business strategy, processes and practices, organizational structures, IT\ninfrastructure, etc. The whole task faces the restrictions of the confidentiality of business\ninformation making access to all this information rather difficult, especially when this\ninformation may be made public. An organization before the application of our methodology\nrequires an adequate mapping (a master plan), while then a road map should be developed\nwith all the technical details of integration of practices, plans, technological solutions,\nevaluations, etc. Evaluations could be based among others in the implementation of a\nbalanced scorecard, where the results will be expressed via Key Performance Indicators\nconcerning crucial success factors (CSF) in all, the internal processes, the quality of services to\nthe customers, and the financial profit which is essentially the main motivation of every\nenterprise.\n\n\n## Informatics and applied computing\n\n\n-----\n\n## ACI\n\n\nNotes\n[1. https://www.accenture.com/nl-en/blogs/insights/how-digital-technologies-improve-business-roi](https://www.accenture.com/nl-en/blogs/insights/how-digital-technologies-improve-business-roi)\n\n(last access: 14/7/2021).\n\n[2. https://blog.worldsensing.com/critical-infrastructure/roi-iot/ (last access 14/7/2021).](https://blog.worldsensing.com/critical-infrastructure/roi-iot/)\n\nReferences\n\n1. Naved K, Tabassum F. Reinventing business organizations: the information culture framework.\nSingapore Management Rev. 2005; 27(2): 37-63.\n\n2. Porter ME, Heppelmann JE. How smart, connected products are transforming competition. Harv\nBusiness Rev Spotlight Managing Internet Things. 2014, November 2014.\n\n3. Teece DJ. A capability theory of the firm: an economics and (strategic) management perspective.\nTaylor & Francis Online. 2017, New Zealand Economic Papers; 53(1) 2019.\n\n4. Tiwana A. IT strategy for non-IT managers. MIT Press. 2017, London, England.\n\n5. Mitropoulos S. An integrated model for formulation, alignment, execution and evaluation of\nbusiness and IT strategies. Int J Business Syst Res. 2021; 15(1): 90.\n\n6. Vandenbosch B, Lyytinen K. Much ado about IT: a response to “the corrosion of IT advantage”\nby Carr’ NG, J Business Strategy. 2004; 25(6): 10-12.\n\n7. Schmidt J, Marques MRG, Botti S, Marques MAL. 2019. Recent advances and applications of\n[machine learning in solid-state materials science. Available at: https://www.nature.com/articles/](https://www.nature.com/articles/s41524-019-0221-0)\n[s41524-019-0221-0.](https://www.nature.com/articles/s41524-019-0221-0)\n\n8. Benlamri R, Sparer M. Leadership, innovation and Entrepreneurship as driving forces of the global\neconomy. Proceedings of the 2016 ICLIE, Springer Proceedings in Business and Economics. 2016.\n\n9. Koi-Akrofi GW. Justification for IT investments: evaluation methods, frameworks, and models.\nTexila Int J Management. 2017; 3(2).\n\n10. Melarkode A, From-Poulsen M and Warnakulasuriya S. Delivery agility through IT. Business\nStrategy Rev. 2004, Autumn 2004.\n\n11. Wadhwa M, Harper A. Technology, innovation and enterprise transformation. IGI Glob book Ser\nAdv Business Inf Syst Analytics (Abisa). 2015, Hershey, USA.\n\n12. Schrage M, Kiron D, Hancock B, Breschi R. Performance management’s digital shift. MIT Sloan\n[Management Rev. February 26, 2019. Available at: https://sloanreview.mit.edu/projects/](https://sloanreview.mit.edu/projects/performance-managements-digital-shift/)\n[performance-managements-digital-shift/.](https://sloanreview.mit.edu/projects/performance-managements-digital-shift/)\n\n13. Dong J and Yang CH. Business value of big data analytics: a systems-theoretic approach and\nempirical test. Inf Management. 2020; 57(1): 103124.\n\n14. Ilmudeen, A, Bao, Y, Alharbi, IM. How does strategic alignment affect firm performance? the roles\nof information technology investment and environmental uncertainty, J Enterprise Inf\nManagement. 2019; 32(3): 457-76.\n\n15. Davies P. Strategic objectives and principles. 2015. Version V1.0, University of Sussex, Date of\n[Issue: 9th April 2015 Available at: http://www.sussex.ac.uk/its/pdfs/IT_Strategy_2015.pdf.](http://www.sussex.ac.uk/its/pdfs/IT_Strategy_2015.pdf)\n\n16. Chugunov A, Misnikov Y, Roshchin E, Trutnev D. Electronic governance and open society:\nchallenges in Eurasia. 5th International Conference. 2018, EGOSE 2018.\n\n17. Tallon, P. How information technology infrastructure flexibility shapes strategic alignment: a\ncase study investigation with implications for strategic IS planning. Plann Inf Syst. 2015; 15,\nAcemap: 425-55.\n\n18. Tallon P, Kraemer K. Investigating the relationship between strategic alignment and IT business\nvalue: the discovery of a paradox, In: Shin N (Eds), Creating business value with IT: challenges\nand solutions, Hershey, Pennsylvania, PA: Idea Group Publishing, 2003.\n\n19. Kaleka A, Morgan NA. How marketing capabilities and current performance drive strategic\nintentions in international markets. Ind Marketing Management. 2017; 78: 108-121.\n\n\n-----\n\n20. Coleman P, Papp R. Strategic alignment: analysis of perspectives. Proceedings of the 2006\nSouthern Association for Information Systems Conference, March 11–12, 2006, Florida, FL. 2006.\n\n21. Weill P, Subramani M, Broadbent M. Building IT infrastructure for strategic agility. MIT Sloan\nManagement Rev. 2002, Fall 2002.\n\n22. Lambropoulos G., Mitropoulos S., Douligeris C. Improving business performance by employing\nvirtualization technology: a case study in the financial sector. Computers. 2021; 10(4): 52.\n\n23. Razis M., Mitropoulos S. An integrated approach for the banking intranet/extranet information\nsystems: the interoperability case. Publ Int J Business Syst Res. 2021, Inderscience Publishers.\nforthcoming paper.\n\n24. Katsikogiannis G., Kallergis D., Garofalaki Z., Mitropoulos S., Douligeris C. A policy-aware service\noriented architecture for secure machine-to-machine communications. J Ad Hoc Networks. 2018;\n80, November 2018, Elsevier Science Publishers.\n\n25. Chassapis P, Mitropoulos S, Douligeris C. A prototype mobile application for the athens\nnumismatic museum. J Appl Comput Inform. 2020; ahead-of-print(ahead-of-print), Emerald\nPublishers.\n\n26. Mitropoulos S. A simulation-based approach for IT and business strategy alignment and\nevaluation. Int J Business Inf Syst. 2012; 10(4): 369-396, Inderscience Publishers.\n\n27. Mitropoulos S, Giannakos K, Achlioptas J, Douligeris C. A prototype workflow MIS for supply\nchain management: architecture, implementation and business evaluation. Publ Int J Business Inf\nSyst. 2021, Inderscience Publishers. forthcoming paper.\n\n28. Mitropoulos S, Mitsis C, Valacheas P, Douligeris C. An online Emergency medical management\ninformation system using mobile computing. J Appl Comput Inform. 2020. online version,\nEmerald Publishers.\n\n29. Sayabek, Z, Suieubayeva, S, Utegenova, A. Digital transformation in business, ISCDTE 2019:\ndigital age: chances, challenges and future lecture notes in networks and systems. 2020; 84:\n408-415, Springer, Cham.\n\n30. Gimpel H, R€oglinger M. Digital Transformation Changes and chances- Insights based on an\n[empirical study. 2015. Available at: https://fim-rc.de/wp-content/uploads/2020/02/Fraunhofer-](https://fim-rc.de/wp-content/uploads/2020/02/Fraunhofer-Studie_Digitale-Transformation.pdf)\n[Studie_Digitale-Transformation.pdf.](https://fim-rc.de/wp-content/uploads/2020/02/Fraunhofer-Studie_Digitale-Transformation.pdf)\n\n31. IDC. Exploring the Impact of infrastructure virtualization on digital transformation strategies and\n[carbon emissions, white paper. 2019, Available at: https://www.vmware.com/content/dam/](https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/company/vmware-exploring-impact-of-infrastructure-virtualization-on-digital-transformation-strategies-and-carbon-emissions-whitepaper.pdf)\n[digitalmarketing/vmware/en/pdf/company/vmware-exploring-impact-of-infrastructure-](https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/company/vmware-exploring-impact-of-infrastructure-virtualization-on-digital-transformation-strategies-and-carbon-emissions-whitepaper.pdf)\n[virtualization-on-digital-transformation-strategies-and-carbon-emissions-whitepaper.pdf.](https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/company/vmware-exploring-impact-of-infrastructure-virtualization-on-digital-transformation-strategies-and-carbon-emissions-whitepaper.pdf)\n\n[32. Oracle KPMG. Oracle and KPMG cloud threat report. 2020, Available at: https://www.oracle.com/](https://www.oracle.com/a/ocom/docs/cloud/oracle-cloud-threat-report-2020.pdf)\n[a/ocom/docs/cloud/oracle-cloud-threat-report-2020.pdf, [Accessed 12 June 2021].](https://www.oracle.com/a/ocom/docs/cloud/oracle-cloud-threat-report-2020.pdf)\n\n33. Huang M, et al.. An effective service-oriented networking management architecture for 5Genabled internet of things. Compuert Networks. 2020; 173: 107208.\n\n34. Niu Y, et al. Exploiting device-to-device communications in joint scheduling of access and\nbackhaul for mmWave small cells. IEEE JSAC. 2015; 33(10): 2052-2069.\n\n35. Ahmad Qadri Y, et al.. The future of healthcare internet of things: a survey of emerging\ntechnologies. IEEE Commun Surv Tutorials. 2020; 22(2): 1121-1167.\n\n36. Bera B, et al.. Designing blockchain-based access control protocol in IoT-enabled smart-grid\nsystem. IEEE Internet Things J. 2021; 8(7): 5744-5761.\n\nCorresponding author\n[Sarandis Mitropoulos can be contacted at: smitropoulos@ionio.gr](mailto:smitropoulos@ionio.gr)\n\nFor instructions on how to order reprints of this article, please visit our website:\nwww.emeraldgrouppublishing.com/licensing/reprints.htm\nOr contact us for further details: permissions@emeraldinsight.com\n\n\n## Informatics and applied computing\n\n\n-----\n\n"
Why and how informatics and applied computing can still create structural changes and competitive advantage
PurposeIn the new digital age, enterprises are facing an increasing global competition. In this paper, we first examine how Information Technology (IT) can play an important role in giving significant competitive advantage in the modern enterprises. The business value of IT is examined, as well as the limitations and t...
2021.0
2021-10-01 00:00:00
https://www.semanticscholar.org/paper/0106a389bab04617737f3a786e08e31fa4afe7e5
Applied Computing and Informatics
True
01079c5c50c9b17fe9c05eccc3764f25df77393c
## future internet _Article_ # A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M **Luis F. Gonzalez *** **, Ivan Vidal *** **, Francisco Valera** **, Raul Martin and Dulce Artalejo** Telematic Engineering Department, Universidad Carlos III de Madrid, Avda. Un...
A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M
Microservices have become promising candidates for the deployment of network and vertical functions in the fifth generation of mobile networks. However, microservice platforms like Kubernetes use a flat networking approach towards the connectivity of virtualised workloads, which prevents the deployment of network funct...
2023.0
2023-08-17 00:00:00
https://www.semanticscholar.org/paper/01079c5c50c9b17fe9c05eccc3764f25df77393c
Future Internet
True
0109b47dabb716f4886a9c4317735459dbf5b13b
# MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks ## Pruet Boonma and Junichi Suzuki Department of Computer Science University of Massachusetts, Boston pruet, jxs @cs.umb.edu { } ## Abstract _Wireless sensor applications (WSNs) are often required_ _to simultaneousl...
MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks
2008.0
2008-01-07 00:00:00
https://www.semanticscholar.org/paper/0109b47dabb716f4886a9c4317735459dbf5b13b
Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)
True
010a74a07848f32bfc5c6155fa3977f24606075a
# SECOND PRICE AUCTIONS ## A Case Study of Secure Distributed Computing Bart De Decker[1], Gregory Neven[2], Frank Piessens[3], Erik Van Hoeymissen[1] 1K. U. Leuven, Dept. Computer Science, Celestijnenlaan 200A, B-3001 Leuven, Belgium {Bart.DeDecker.Erik.VanHoeymissen}@cs.kuleuven.ac.be 2Research Assistant of the ...
Second Price Auctions - A Case Study of Secure Distributed Computating
2001.0
2001-09-17 00:00:00
https://www.semanticscholar.org/paper/010a74a07848f32bfc5c6155fa3977f24606075a
IFIP International Conference on Distributed Applications and Interoperable Systems
True
010a9df80b73d0c589eaffcb3a9f4cb05b07d225
# Emory Law Journal Emory Law Journal ### Volume 70 Issue 2 2020 # The Elections Clause Obligates Congress to Enact a Federal Plan The Elections Clause Obligates Congress to Enact a Federal Plan to Secure U.S. Elections Against Foreign Cyberattacks to Secure U.S. Elections Against Foreign Cyberattacks ### Suman ...
The Elections Clause Obligates Congress to Enact a Federal Plan to Secure U.S. Elections Against Foreign Cyberattacks
While foreign adversaries continue to launch cyberattacks aimed at disrupting elections in the United States, Congress has been reluctant to take action. After Russia interfered in the 2016 election, cybersecurity experts articulated clear measures that must be taken to secure U.S. election systems against foreign inte...
2020.0
NaT
https://www.semanticscholar.org/paper/010a9df80b73d0c589eaffcb3a9f4cb05b07d225
False
010d55f6ebe83e48bb83926c88b0d72be0c08538
## **International Journal of Current Science Research and Review ** ### **ISSN: 2581-8341 ** Volume 06 Issu e 07 July 2023 **DOI: 10.47191/ijcsrr/V6-i7-108, Impact Factor: 6.789 ** **IJCSRR @ 2023 ** ### **www.ijcsrr.org** # **Investment Portfolio Optimization in Indonesia (Study On: Lq-45 Stock ** **Index, Governme...
Investment Portfolio Optimization in Indonesia (Study On: Lq-45 Stock Index, Government Bond, United States Dollar, Gold and Bitcoin)
In forming their portfolios, investors should analyze the risk and return of each investment instrument. This is aimed at preventing investors from speculating and gambling with their investments. Conducting an investment portfolio optimization study on LQ-45 stock index, government bond, USD, gold, and Bitcoin can pro...
2023.0
2023-07-24 00:00:00
https://www.semanticscholar.org/paper/010d55f6ebe83e48bb83926c88b0d72be0c08538
International Journal of Current Science Research and Review
True
010d89793ad314e40acc52f726a8eb4440010419
# **Blockchain as privacy and security** **solution for smart environments: A** **Survey** **MAAD EBRAHIM** **[1]** **, ABDELHAKIM HAFID** **[1]** **(Member, IEEE), and ETIENNE ELIE** **[2]** 1 Department of Computer Science and Operations Research (DIRO), University of Montreal, Montreal, QC H3T1J4 Canada 2 Intel Co...
Blockchain as privacy and security solution for smart environments: A Survey
Blockchain was always associated with Bitcoin, cryptocurrencies, and digital asset trading. However, its benefits are far beyond that. It supports technologies like the Internet-of-Things (IoT) to pave the way for futuristic smart environments, like smart homes, smart transportation, smart energy trading, smart industr...
2022.0
2022-03-16 00:00:00
https://www.semanticscholar.org/paper/010d89793ad314e40acc52f726a8eb4440010419
arXiv.org
True
010def07d358187bc10b482d05b77f0e27f833dc
Howell, Bronwyn E.; Potgieter, Petrus H.; Sadowski, Bert M. **Conference Paper** ## Governance of Blockchain and Distributed Ledger Technology Projects 2nd Europe - Middle East - North African Regional Conference of the International Telecommunications Society (ITS): "Leveraging Technologies For Growth", Aswan, Egypt...
Governance of Blockchain and Distributed Ledger Technology Projects
Blockchains are the most well-known example of a distributed ledger technology (DLT). Unlike classic databases, the ledger is not maintained by any central authority. The integrity of the ledger is maintained automatically by an algorithmic consensus process whereby nodes vote and agree upon the authoritative version. ...
2019.0
2019-02-01 00:00:00
https://www.semanticscholar.org/paper/010def07d358187bc10b482d05b77f0e27f833dc
Social Science Research Network
True
010f3407c141dfafbcddf8db50f4b8914f9a3d0d
#### EGEE-PUB-2008-002 # Scheduling for Responsive Grids ## Germain-Renaud, C LRI - CNRS and Universit Paris-Sud et al ### 20 December 2008 Journal of Grid Computing #### EGEE-II is a project funded by the European Commission Contract number INFSO-RI-031688 The electronic version of this EGEE Publication is avai...
Scheduling for Responsive Grids
2008.0
2008-03-01 00:00:00
https://www.semanticscholar.org/paper/010f3407c141dfafbcddf8db50f4b8914f9a3d0d
Journal of Grid Computing
True
0112123cfb29e45be6d0a80751184ab7f20888df
Published Online September 2019 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2019.09.04 # An Approach to Develop a Transactional Calculus for Semi-Structured Database System ## Rita Ganguly Department of Computer Applications; Dr.B.C.Roy Engineering College; Durgapur: 713206; West Bengal, India E-mail...
An Approach to Develop a Transactional Calculus for Semi-Structured Database System
— Traditional database system forces all data to adhere to an explicitly specified, rigid schema and most of the limitations of traditional database may be overcome by semi-structured database. Whereas a traditional transaction system guarantee that either all modifications are done or none of these i.e. the database m...
2019.0
2019-09-08 00:00:00
https://www.semanticscholar.org/paper/0112123cfb29e45be6d0a80751184ab7f20888df
International Journal of Computer Network and Information Security
True
0112d65d2ea11c065d7eb5f6fada9287002aa158
Hindawi Wireless Communications and Mobile Computing Volume 2022, Article ID 8482415, 16 pages [https://doi.org/10.1155/2022/8482415](https://doi.org/10.1155/2022/8482415) # Research Article A Data Management Model for Intelligent Water Project Construction Based on Blockchain ## Zhoukai Wang,[1,2] Kening Wang,[3] Yi...
A Data Management Model for Intelligent Water Project Construction Based on Blockchain
The engineering construction-related data is essential for evaluating and tracing project quality in industry 4.0. Specifically, the preservation of the information is of great significance to the safety of intelligent water projects. This paper proposes a blockchain-based data management model for intelligent water pr...
2022.0
2022-03-09 00:00:00
https://www.semanticscholar.org/paper/0112d65d2ea11c065d7eb5f6fada9287002aa158
Wireless Communications and Mobile Computing
True
01155ceeaefeab3737c49cebde0b4b9e01f7d9cd
Vol. 36, No. 1, February, 2022, pp. 61-71 Journal homepage: http://iieta.org/journals/ria # TCP/UDP-Based Exploitation DDoS Attacks Detection Using AI Classification Algorithms with Common Uncorrelated Feature Subset Selected by Pearson, Spearman and Kendall Correlation Methods Kishore Babu Dasari[1*], Nagaraju Dev...
TCP/UDP-Based Exploitation DDoS Attacks Detection Using AI Classification Algorithms with Common Uncorrelated Feature Subset Selected by Pearson, Spearman and Kendall Correlation Methods
The Distributed Denial of Service (DDoS) attack is a serious cyber security attack that attempts to disrupt the availability security principle of computer networks and information systems. It's critical to detect DDoS attacks quickly and accurately while using as less computing power as possible in order to minimize d...
2022.0
2022-02-28 00:00:00
https://www.semanticscholar.org/paper/01155ceeaefeab3737c49cebde0b4b9e01f7d9cd
Revue d'Intelligence Artificielle
True
01157f7c700e92323a5933e00c71cf001a8bac88
Published Online June 2018 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijisa.2018.06.05 # Blockchain with Internet of Things: Benefits, Challenges, and Future Directions ## Hany F. Atlam Electronic and Computer Science Dept., University of Southampton, Southampton, UK Computer Science and Engineering Dept., ...
Blockchain with Internet of Things: Benefits, Challenges, and Future Directions
The Internet of Things (IoT) has extended the internet connectivity to reach not just computers and humans, but most of our environment things. The IoT has the potential to connect billions of objects simultaneously which has the impact of improving information sharing needs that result in improving our life. Although ...
2018.0
2018-06-08 00:00:00
https://www.semanticscholar.org/paper/01157f7c700e92323a5933e00c71cf001a8bac88
International Journal of Intelligent Systems and Applications
True
0118bd5580dc6d23a0c0b67241c735b25e405e09
# q p y Challenges of Cloudlets in Smart Grid 1Stephen Ugwuanyi _Electrical and Electronic Engineering_ _University of Strathclyde_ Glasgow, United Kingdom Stephen.ugwuanyi@strath.ac.uk 2Kinan Ghanem _Power Networks Demonstration Centre_ _University of Strathclyde_ Glasgow, United Kingdom kinan.ghanem@strath.ac.uk ...
Communication Requirements and Deployment Challenges of Cloudlets in Smart Grid
Intelligent and distributed power networks are becoming more complex with the addition of cloudlets infrastructure. This paper is the initial output of a Low Latency Edge Containerisation and Virtualisation project at PNDC. This project investigates the performance and communication requirements of deploying edge compu...
2022.0
2022-11-29 00:00:00
https://www.semanticscholar.org/paper/0118bd5580dc6d23a0c0b67241c735b25e405e09
International Conference on Smart Communications and Networking
True
011c4c415a99465d1d643d4f3f5371f3d885637c
## sustainability _Review_ # Edge AI and Blockchain for Smart Sustainable Cities: Promise and Potential **Elarbi Badidi** Department of Computer Science and Software Engineering, College of Information Technology, UAE University, Al-Ain P.O. Box 15551, United Arab Emirates; ebadidi@uaeu.ac.ae; Tel.: +971-3-713-5552 ...
Edge AI and Blockchain for Smart Sustainable Cities: Promise and Potential
Modern cities worldwide are undergoing radical changes to foster a clean, sustainable and secure environment, install smart infrastructures, deliver intelligent services to residents, and facilitate access for vulnerable groups. The adoption of new technologies is at the heart of implementing many initiatives to addres...
2022.0
2022-06-22 00:00:00
https://www.semanticscholar.org/paper/011c4c415a99465d1d643d4f3f5371f3d885637c
Sustainability
True
011d61920ae95bbe63193f2e73e7eab7bc116206
CBU I NTERNATIONAL C ONFERENCE ON I NNOVATIONS IN S CIENCE AND E DUCATION M ARCH 21-23, 2018, P RAGUE, C ZECH R EPUBLIC WWW . CBUNI . CZ, WWW . JOURNALS . CZ # **ANALYSIS OF BITCOIN MARKET EFFICIENCY BY USING MACHINE LEARNING ** Yuki Hirano [1], Lukáš Pichl [2], Cheoljun Eom [3], Taisei Kaizoji [4] **Abstract:** The ...
ANALYSIS OF BITCOIN MARKET EFFICIENCY BY USING MACHINE LEARNING
The issue of market efficiency for cryptocurrency exchanges has been largely unexplored. Here we put Bitcoin, the leading cryptocurrency, on a test by studying the applicability of the Efficient Market Hypothesis by Fama from two viewpoints: (1) the existence of profitable arbitrage spread among Bitcoin exchanges, and ...
2018.0
2018-09-24 00:00:00
https://www.semanticscholar.org/paper/011d61920ae95bbe63193f2e73e7eab7bc116206
CBU International Conference Proceedings
True
011e06a3b06257e73ee37540df71cd6a595d3c03
**Blockchain for Good?[1]** Beth Kewell, University of Surrey, Surrey, UK. Richard Adams, University of Surrey, Surrey, UK. Glenn Parry, University of the West of England, UK. Explores key areas of Blockchain innovation that appear to represent viable catalysts for achieving global Sustainable Development targets. P...
Blockchain for good
2017.0
2017-09-01 00:00:00
https://www.semanticscholar.org/paper/011e06a3b06257e73ee37540df71cd6a595d3c03
True
011f7eb8584458d0676216165e63dbefce1d393a
# MINERVA : A Scalable Efficient Peer-to-Peer ∞ Search Engine Sebastian Michel[1], Peter Triantafillou[2], and Gerhard Weikum[1] 1 Max-Planck-Institut f¨ur Informatik, 66123 Saarbr¨ucken, Germany _{smichel, weikum}@mpi-inf.mpg.de_ 2 R.A. Computer Technology Institute and University of Patras, 26500 Greece peter@c...
MINERVA infinity : A Scalable Efficient Peer-to-Peer Search Engine.
2005.0
NaT
https://www.semanticscholar.org/paper/011f7eb8584458d0676216165e63dbefce1d393a
False
012060a1b33dbb659214465af5ad64974ca35f8e
Contents lists available at ScienceDirect # Automation in Construction [journal homepage: www.elsevier.com/locate/autcon](https://www.elsevier.com/locate/autcon) #### Review ## Exploratory literature review of blockchain in the construction industry ### Denis J. Scott [*], Tim Broyd, Ling Ma _Bartlett School of ...
Exploratory literature review of blockchain in the construction industry
2021.0
2021-12-01 00:00:00
https://www.semanticscholar.org/paper/012060a1b33dbb659214465af5ad64974ca35f8e
Automation in Construction
True
012123313b7676f86c331a3e62bd39dec6fa9771
# electronics _Article_ ## Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability **N. Sangeeta and Seung Yeob Nam *** Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea *** Corres...
Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability
Closed-circuit television (CCTV) cameras and black boxes are indispensable for road safety and accident management. Visible highway surveillance cameras can promote safe driving habits while discouraging moving violations. According to CCTV laws, footage captured by roadside cameras must be securely stored, and authori...
2023.0
2023-03-24 00:00:00
https://www.semanticscholar.org/paper/012123313b7676f86c331a3e62bd39dec6fa9771
Electronics
True
012136c4ef2730ee762ae3110798b0648dfade38
Edited by: Alessandra Tanda, University of Pavia, Italy Reviewed by: Jürgen Hakala, Leonteq Securities AG, Switzerland Marika Vezzoli, University of Brescia, Italy *Correspondence: Cinzia Baldan [cinzia.baldan@unipd.it](mailto:cinzia.baldan@unipd.it) Specialty section: This article was submitted to Artific...
The Bitcoin as a Virtual Commodity: Empirical Evidence and Implications
The present work investigates the impact on financial intermediation of distributed ledger technology (DLT), which is usually associated with the blockchain technology and is at the base of the cryptocurrencies' development. “Bitcoin” is the expression of its main application since it was the first new currency that ga...
2020.0
2020-04-30 00:00:00
https://www.semanticscholar.org/paper/012136c4ef2730ee762ae3110798b0648dfade38
Frontiers in Artificial Intelligence
True
0127a973ed71969408342e74ef1b27ebbb67a76d
_Foundation of Computer Science FCS, New York, USA_ _Volume 3– No.5, November 2015 – www.caeaccess.org_ # FOG Computing: The new Paradigm ## Hathal Salamah A. Alwageed #### Department of Computer Engineering and Network Aljouf University, Saudi Arabia ## ABSTRACT As the Internet of Everything (IoE) heats up, Cisc...
FOG Computing: The new Paradigm
2015.0
NaT
https://www.semanticscholar.org/paper/0127a973ed71969408342e74ef1b27ebbb67a76d
True
01290c447f2304ff3c347c3ac0dfa22f053e281b
Hindawi Security and Communication Networks Volume 2018, Article ID 4963932, 16 pages [https://doi.org/10.1155/2018/4963932](https://doi.org/10.1155/2018/4963932) #### Research Article A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord ###### Riccardo Pecori 1 and Luca Veltri 2 _1SMARTEST ...
A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord
A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, especially those based on Distributed Hash Tables (DHTs). Tampering routing tables by means of multiple fake identities can make routing, storing, and retrieving operations significantly more difficult and time-consuming. ...
2018.0
2018-11-12 00:00:00
https://www.semanticscholar.org/paper/01290c447f2304ff3c347c3ac0dfa22f053e281b
Secur. Commun. Networks
True
012b5aa479f62062944ab4190a60d6f940f10c37
# energies _Article_ ## A Sponge-Based Key Expansion Scheme for Modern Block Ciphers **Maciej Sawka *[,†]** **and Marcin Niemiec** **[†]** Department of Telecommunications, AGH University of Science and Technology, Mickiewicza 30, 30-059 Krakow, Poland *** Correspondence: maciejsawka@gmail.com** † These authors con...
A Sponge-Based Key Expansion Scheme for Modern Block Ciphers
Many systems in use today require strong cryptographic primitives to ensure confidentiality and integrity of data. This is especially true for energy systems, such as smart grids, as their proper operation is crucial for the existence of a functioning society. Because of this, we observe new developments in the field o...
2022.0
2022-09-20 00:00:00
https://www.semanticscholar.org/paper/012b5aa479f62062944ab4190a60d6f940f10c37
Energies
True
012bcc9a33bf8686741b315847b6c45f3b23fbb9
## Safe Fusion Compared to Established Distributed Fusion Methods #### Jonas Nygårds, Viktor Deleskog and Gustaf Hendeby ### Conference Publication #### N.B.: When citing this work, cite the original article. Original Publication: Jonas Nygårds, Viktor Deleskog and Gustaf Hendeby, Safe Fusion Compared to Establi...
Safe fusion compared to established distributed\ fusion methods
2016.0
2016-09-01 00:00:00
https://www.semanticscholar.org/paper/012bcc9a33bf8686741b315847b6c45f3b23fbb9
International Conference on Multisensor Fusion and Integration for Intelligent Systems
True
012cfea30b807059314c2e98d96bdbd502bdf409
Hindawi Mobile Information Systems Volume 2022, Article ID 8930472, 17 pages [https://doi.org/10.1155/2022/8930472](https://doi.org/10.1155/2022/8930472) # Review Article Self-Sovereign Identity Solution for Blockchain-Based Land Registry System: A Comparison ## Mohammed Shuaib,[1,2] Noor Hafizah Hassan,[1] Sahnius U...
Self-Sovereign Identity Solution for Blockchain-Based Land Registry System: A Comparison
Providing an identity solution is essential for a reliable blockchain-based land registry system. A secure, privacy-preserving, and efficient identity solution is essential but challenging. This paper examines the current literature and provides a systematic literature review in three stages based on the three research...
2022.0
2022-04-04 00:00:00
https://www.semanticscholar.org/paper/012cfea30b807059314c2e98d96bdbd502bdf409
Mobile Information Systems
True
012dbb6ffa748446949f36b1e1551bc593a440bb
## sustainability _Article_ # Critical Dimensions of Blockchain Technology Implementation in the Healthcare Industry: An Integrated Systems Management Approach **Satyabrata Aich** **[1]** **, Sushanta Tripathy** **[2], Moon-Il Joo** **[1]** **and Hee-Cheol Kim** **[3,]*** 1 Institute of Digital Anti-Aging Healthcare...
Critical Dimensions of Blockchain Technology Implementation in the Healthcare Industry: An Integrated Systems Management Approach
In the digital era, almost every system is connected to a digital platform to enhance efficiency. Although life is thus improved, security issues remain important, especially in the healthcare sector. The privacy and security of healthcare records is paramount; data leakage is socially unacceptable. Therefore, technolo...
2021.0
2021-05-08 00:00:00
https://www.semanticscholar.org/paper/012dbb6ffa748446949f36b1e1551bc593a440bb
Sustainability
True
012e174c148901bedf28ae161518f3fa5c2eee4c
# AN OVERVIEW OF THE OMNeT++ SIMULATION ENVIRONMENT ## András Varga ### OpenSim Ltd. Sz l köz 11, 1032 ő ő Budapest, Hungary ## andras.varga@omnest.com ABSTRACT The OMNeT++ discrete event simulation environment has been publicly available since 1997. It has been created with the simulation of communication net...
An overview of the OMNeT++ simulation environment
2008.0
2008-03-03 00:00:00
https://www.semanticscholar.org/paper/012e174c148901bedf28ae161518f3fa5c2eee4c
International ICST Conference on Simulation Tools and Techniques
True
012e3df4305cbe5ca918f6f7f87aa80a93593662
#### ECONOMICS OF ENTERPRISES: ECONOMICS AND MANAGEMENT OF ENTERPRISE ISSN 2664-9969 ### UDC 336.02:336.64 JEL Classification: G32 DOI: 10.15587/2706-5448.2023.285749 ## Eugine Nkwinika, Segun Akinola # THE IMPORTANCE OF FINANCIAL MANAGEMENT IN SMALL AND MEDIUM-SIZED ENTERPRISES (SMEs): AN ANALYSIS OF CHALLE...
The importance of financial management in small and medium-sized enterprises (SMEs): an analysis of challenges and best practices
The object of research is the importance of monetary management in Small and Medium-sized Enterprises (SMEs), specializing in challenges, best practices, and future trends. Financial management in SMEs is an important aspect that influences their growth, sustainability, and competitiveness. The paper begins by defining...
2023.0
2023-09-28 00:00:00
https://www.semanticscholar.org/paper/012e3df4305cbe5ca918f6f7f87aa80a93593662
Technology audit and production reserves
True
0130f7d0c517b61a63e1018d5a1ba30c13ab16ab
Edited by: Bo Yang, Kunming University of Science and Technology, China Reviewed by: Yixuan Chen, The University of Hong Kong, Hong Kong, SAR China Yang Li, Northeast Electric Power University, China *Correspondence: Xinmiao Liu [lxm2021@foxmail.com](mailto:lxm2021@foxmail.com) Specialty section: This article was su...
Optimal Locating and Sizing of BESSs in Distribution Network Based on Multi-Objective Memetic Salp Swarm Algorithm
Battery energy storage systems (BESSs) are a key technology to accommodate the uncertainties of RESs and load demand. However, BESSs at an improper location and size may result in no-reasonable investment costs and even unsafe system operation. To realize the economic and reliable operation of BESSs in the distribution...
2021.0
2021-07-27 00:00:00
https://www.semanticscholar.org/paper/0130f7d0c517b61a63e1018d5a1ba30c13ab16ab
Frontiers in Energy Research
True
01324b0a808e3440c60626f6cacec48ecc261d44
p g ## RESEARCH ARTICLE Open Access # A pay for performance scheme in primary care: Meta-synthesis of qualitative studies on the provider experiences of the quality and outcomes framework in the UK ### Nagina Khan[1*], David Rudoler[2], Mary McDiarmid[3] and Stephen Peckham[4] Abstract Background: The Quality and ...
A pay for performance scheme in primary care: Meta-synthesis of qualitative studies on the provider experiences of the quality and outcomes framework in the UK
Background The Quality and Outcomes Framework (QOF) is an incentive scheme for general practice, which was introduced across the UK in 2004. The Quality and Outcomes Framework is one of the biggest pay for performance (P4P) scheme in the world, worth £691 million in 2016/17. We now know that P4P is good at driving some...
2020.0
2020-07-13 00:00:00
https://www.semanticscholar.org/paper/01324b0a808e3440c60626f6cacec48ecc261d44
BMC Family Practice
True
0132509cb91893022691151e825cdef22692df5c
**_Journal of Sport & Exercise Psychology, 2015, 37, 626 -636_** http://dx.doi.org/10.1123/jsep.2015-0166 © 2015 Human Kinetics, Inc. ORIGINAL RESEARCH # Sensorimotor Rhythm Neurofeedback Enhances Golf Putting Performance #### Ming-Yang Cheng,[1] Chung-Ju Huang,[2] Yu-Kai Chang,[3] Dirk Koester,[1] Thomas Schack,...
Sensorimotor Rhythm Neurofeedback Enhances Golf Putting Performance.
2015.0
2015-12-01 00:00:00
https://www.semanticscholar.org/paper/0132509cb91893022691151e825cdef22692df5c
Journal of Sport & Exercise Psychology (JSEP)
True
013973151bd1db3552ea8d8278c6dece1bbdd352
### SUERF Policy Briefs ### No 114, June 2021 # How to issue a privacy-preserving central bank digital currency ## By Christian Grothoff and Thomas Moser[1] _JEL codes: E42, E51, E52, E58, G2._ _Keywords: Central Bank Digital Currency, privacy, blind signatures._ _Many central banks are currently investigati...
How to issue a privacy-preserving central bank digital currency
JEL
2021.0
NaT
https://www.semanticscholar.org/paper/013973151bd1db3552ea8d8278c6dece1bbdd352
Social Science Research Network
True
01398bbd4ecc589fecef134641d1016fdc1c044c
# sensors _Article_ ## Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve **Md. Mainul Islam** **[1]** **, Md. Selim Hossain** **[2]** **, Moh. Khalid Hasan** **[1]** **, Md. Shahjalal** **[1]** **and Yeong Min Jang** **[1,]*** 1 Department of Electronic...
Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve
With the swift evolution of wireless technologies, the demand for the Internet of Things (IoT) security is rising immensely. Elliptic curve cryptography (ECC) provides an attractive solution to fulfill this demand. In recent years, Edwards curves have gained widespread acceptance in digital signatures and ECC due to th...
2020.0
2020-09-01 00:00:00
https://www.semanticscholar.org/paper/01398bbd4ecc589fecef134641d1016fdc1c044c
Italian National Conference on Sensors
True
013d1b03a0f7dfb6675f903e52da4f3ae809f719
# Model for Simulation of Heterogeneous High-Performance Computing Environments Rodrigo Fernandes de Mello[1] and Luciano José Senger[2][⋆] 1 Universidade de São Paulo – Departamento de Computação Instituto de Ciências Matematicas e de Computação Av. Trabalhador Saocarlense, 400 Caixa Postal 668 CEP 13560-970 São Car...
Model for Simulation of Heterogeneous High-Performance Computing Environments
2006.0
2006-06-10 00:00:00
https://www.semanticscholar.org/paper/013d1b03a0f7dfb6675f903e52da4f3ae809f719
International Conference on High Performance Computing for Computational Science
True
013f3dbde05a9be858502c6cc5e85ea5ebae5ab6
## IJCS 3,2 198 Received 26 March 2019 Revised 3 June 2019 Accepted 11 July 2019 International Journal of Crowd Science Vol. 3 No. 2, 2019 pp. 198-220 EmeraldPublishingLimited 2398-7294 [DOI 10.1108/IJCS-03-2019-0012](http://dx.doi.org/10.1108/IJCS-03-2019-0012) www.emeraldinsight.com/2398-7294.htm # Collective ...
Collective hybrid intelligence: towards a conceptual framework
PurposeHuman or machine, which one is more intelligent and powerful for performing computing and processing tasks? Over the years, researchers and scientists have spent significant amounts of money and effort to answer this question. Nonetheless, despite some outstanding achievements, replacing humans in the intellectu...
2019.0
2019-08-30 00:00:00
https://www.semanticscholar.org/paper/013f3dbde05a9be858502c6cc5e85ea5ebae5ab6
International Journal of Crowd Science
True
01407e4317cba968ae41a1d029b154d8e50a0f08
## International Journal of Computer and Communication International Journal of Computer and Communication Technology Technology ##### Volume 2 Issue 2 Article 1 April 2011 ## Next Generation Middleware Technology for Mobile Computing Next Generation Middleware Technology for Mobile Computing ##### B. Darsana Sr....
Next Generation Middleware Technology for Mobile Computing
2010.0
NaT
https://www.semanticscholar.org/paper/01407e4317cba968ae41a1d029b154d8e50a0f08
False
01416385e99636f6fdff4d317f449a3df426cd4e
# electronics _Article_ ## STAFL: Staleness-Tolerant Asynchronous Federated Learning on Non-iid Dataset **Feng Zhu** **[1,2], Jiangshan Hao** **[1,]*** **, Zhong Chen** **[1,2], Yanchao Zhao** **[1,]*, Bing Chen** **[1]** **and Xiaoyang Tan** **[1]** 1 Collage of Computer Science and Technology, Nanjing University o...
STAFL: Staleness-Tolerant Asynchronous Federated Learning on Non-iid Dataset
With the development of the Internet of Things, edge computing applications are paying more and more attention to privacy and real-time. Federated learning, a promising machine learning method that can protect user privacy, has begun to be widely studied. However, traditional synchronous federated learning methods are ...
2022.0
2022-01-20 00:00:00
https://www.semanticscholar.org/paper/01416385e99636f6fdff4d317f449a3df426cd4e
Electronics
True
0141e74a0695b544b3fd99677de1723dd1fe1548
# Formal Correctness of an Automotive Bus Controller Implementation at Gate-Level Eyad Alkassar, Peter B¨ohm, and Steffen Knapp **Abstract We formalize the correctness of a real-time scheduler in a time-triggered** architecture. Where previous research elaborated on real-time protocol correctness, we extend this work...
Formal Correctness of an Automotive Bus Controller Implementation at Gate-Level
2008.0
2008-09-07 00:00:00
https://www.semanticscholar.org/paper/0141e74a0695b544b3fd99677de1723dd1fe1548
IFIP Working Conference on Distributed and Parallel Embedded Systems
True
0141e776d7e5a2b7699f1b5cebf8af033b0c3e25
### ARTICLE https://doi.org/10.1038/s42005-023-01375-x **OPEN** ## Bright and dark Talbot pulse trains on a chip #### Jiaye Wu 1, Marco Clementi 1, Edgars Nitiss1, Jianqi Hu 1, Christian Lafforgue 1 & Camille-Sophie Brès 1✉ Temporal Talbot effect, the intriguing phenomenon of the self-imaging of optical pulse tra...
Bright and dark Talbot pulse trains on a chip
Temporal Talbot effect, the intriguing phenomenon of the self-imaging of optical pulse trains, is extensively investigated using macroscopic components. However, the ability to manipulate pulse trains, either bright or dark, through the Talbot effect on integrated photonic chips to replace bulky instruments has rarely ...
2023.0
2023-09-13 00:00:00
https://www.semanticscholar.org/paper/0141e776d7e5a2b7699f1b5cebf8af033b0c3e25
Communications Physics
True
01456d7ead48b17af151463d73aee8611ad0f450
UDK: 347.78:004.031.4(4 672EU) # NFTs AND COPYRIGHT LAW _Belma Mujević[1*], Mersad Mujević[2]_ [1The University of Szeged, Faculty of Law and Political Sciences, Hungary, e-mail: mujevic5@gmail.com](mailto:mujevic5%40gmail.com?subject=) [[2]International University in Novi Pazar, Republic of Serbia, e-mail: mersadm...
NFTs AND COPYRIGHT LAW
NFT stands for “non-fungible token” and refers to a cryptographically protected asset that represents a unique object, work of art, real estate, ticket, or certificate. Like cryptocurrencies, each NFT contains ownership data to facilitate identification and transfer between token holders. By purchasing a token, the own...
2023.0
2023-05-31 00:00:00
https://www.semanticscholar.org/paper/01456d7ead48b17af151463d73aee8611ad0f450
SCIENCE International Journal
True
0148207de2efe9b34947ed00528c7d09f7af7249
The 6th International Conference on Economic Management and Green Development (ICEMGD 2022) DOI: 10.54254/2754-1169/4/2022910 # ***Is Bitcoin the 'Digit Gold'——A Potential Safe-haven Asset? *** ## **Shupeng Guan [1,] *, Han Jiang [2], Muyang Zhou [3], and Jianuo Liu [4]** *1 School of Mathamatics, University of Birmin...
Is Bitcoin the 'Digit Gold'A Potential Safe-haven Asset?
In this paper, we examine whether bitcoin has the potential to become safe-haven asset that can rival gold in the future. We observed, compared and analyzed and the performance of bitcoin and gold in face of a falling market and inflation pressure. We can see if investors can rely on bitcoin to reduce risk exposure sig...
2023.0
2023-03-21 00:00:00
https://www.semanticscholar.org/paper/0148207de2efe9b34947ed00528c7d09f7af7249
Advances in Economics, Management and Political Sciences
True
014981e1454105af6a6275bef4baf47afbeb7377
## AODV-Miner: Consensus-Based Routing Using Node Reputation ### Edward Staddon, Valeria Loscrì, Nathalie Mitton To cite this version: #### Edward Staddon, Valeria Loscrì, Nathalie Mitton. AODV-Miner: Consensus-Based Routing Using Node Reputation. WiMob 2022 - The 18th International Conference on Wireless and Mobil...
AODV-Miner: Consensus-Based Routing Using Node Reputation
With the increase of Internet of Things (IoT) applications, securing their communications is an important task. In multi-hop wireless networks, nodes must unconditionally trust their neighbours when performing routing activities. However, this is often their downfall as malicious nodes can infiltrate the network and ca...
2022.0
2022-10-10 00:00:00
https://www.semanticscholar.org/paper/014981e1454105af6a6275bef4baf47afbeb7377
2022 18th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
True
0149a1792d4ed2dfb4972b5a49c089d2f0bead9e
The Evaluation of Block Chain Technology within the Scope of Ripple and Banking Activities **153** *UDK: 336.71:004* *DOI: 10.2478/jcbtp-2021-0029* *Journal of Central Banking Theory and Practice, 2021, 3, pp. 153-167* *Received: 26 February 2020; accepted: 06 October 2020* ## ***Erdogan Kaygin [*], Yunus Zengin [*...
The Evaluation of Block Chain Technology within the Scope of Ripple and Banking Activities
Abstract Technological developments have always led to changes in all aspects of our lives. Crypto currency is one of those changes. As a result of those changes, thousands of currencies such as bitcoin, ripple, litecoin and ethereum have evolved and have found a use in business. The present study focuses upon Ripple a...
2021.0
2021-09-01 00:00:00
https://www.semanticscholar.org/paper/0149a1792d4ed2dfb4972b5a49c089d2f0bead9e
Journal of Central Banking Theory and Practice
True
0149bc70d355eaf564fd6bf2a25587b73c634961
**_ISSN: 2321-8169 Volume: 9 Issue: 9_** **_DOI: https://doi.org/10.17762/ijritcc.v9i9.5489_** **_Article Received: 20 June 2021 Revised: 23 July 2021 Accepted: 30 August 2021 Publication: 30 September 2021_** ______________________________________________________________________________________________________________...
A Comparative and Comprehensive Analysis of Smart Contract Enabled Blockchain Applications
Blockchain is a disruptive innovation that is already reshaping corporate, social, and political connections, as well as any other form of value exchange. Again, this isn't simply a shift; it's a fast-moving phenomenon that has already begun. Top financial institutions and a large number of businesses have begun to inv...
2021.0
2021-09-30 00:00:00
https://www.semanticscholar.org/paper/0149bc70d355eaf564fd6bf2a25587b73c634961
International Journal on Recent and Innovation Trends in Computing and Communication
True
014a35c538928a59935d1940bad737afa4159dfa
**Journal of Neuropathology and Experimental Neurology** Vol. 61, No. 1 Copyright � 2002 by the American Association of Neuropathologists January, 2002 pp. 33 45 # Morphological and Biochemical Correlations of Abnormal Tau Filaments in Progressive Supranuclear Palsy MAKIO TAKAHASHI, MD, KAREN M. WEIDENHEIM, MD, DEN...
Morphological and Biochemical Correlations of Abnormal Tau Filaments in Progressive Supranuclear Palsy
2002.0
2002-01-01 00:00:00
https://www.semanticscholar.org/paper/014a35c538928a59935d1940bad737afa4159dfa
Journal of Neuropathology and Experimental Neurology
True
014ad6b5c003ecf7566570266d43154ac8683758
## Convolutional Transformer based Dual Discriminator Generative Adversarial Networks for Video Anomaly Detection ### Xinyang Feng ##### Columbia University New York, New York, USA xf2143@columbia.edu ### Dongjin Song[∗] ##### University of Connecticut Storrs, Connecticut, USA dongjin.song@uconn.edu ### Zhengzha...
Convolutional Transformer based Dual Discriminator Generative Adversarial Networks for Video Anomaly Detection
Detecting abnormal activities in real-world surveillance videos is an important yet challenging task as the prior knowledge about video anomalies is usually limited or unavailable. Despite that many approaches have been developed to resolve this problem, few of them can capture the normal spatio-temporal patterns effec...
2021.0
2021-07-29 00:00:00
https://www.semanticscholar.org/paper/014ad6b5c003ecf7566570266d43154ac8683758
ACM Multimedia
True
014be151dfab3a65e5da397810b0bd834b2aa06d
# A Survey of Local Differential Privacy and Its Variants ### Likun Qin, Nan Wang, Tianshuo Qiu Department of Electrical and Computer Engineering Shandong University, Jinan, China Abstract—The introduction and advancements in Local Differential Privacy (LDP) variants have become a cornerstone in addressing the priva...
A Survey of Local Differential Privacy and Its Variants
The introduction and advancements in Local Differential Privacy (LDP) variants have become a cornerstone in addressing the privacy concerns associated with the vast data produced by smart devices, which forms the foundation for data-driven decision-making in crowdsensing. While harnessing the power of these immense dat...
2023.0
2023-09-02 00:00:00
https://www.semanticscholar.org/paper/014be151dfab3a65e5da397810b0bd834b2aa06d
arXiv.org
True
014d53aa1795a4e229037afe328ae014e5e2c18f
# AmbientDB: P2P Data Management Middleware for Ambient Intelligence ## Willem Fontijn Peter Boncz Philips Research CWI willem.fontijn@philips.com boncz@cwi.nl Abstract system has to present to the user a unified and consistent _The future generation of consumer electronics devices is_ view irrespective of the con...
AmbientDB: P2P data management middleware for ambient intelligence
2004.0
2004-03-14 00:00:00
https://www.semanticscholar.org/paper/014d53aa1795a4e229037afe328ae014e5e2c18f
IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second
True
014f27c5272292f84a182c49ca98f873fba06ae5
## Detection of Insider Attacks in Distributed Projected Subgradient Algorithms #### Sissi Xiaoxiao Wu, Gangqiang Li, Shengli Zhang, and Xiaohui Lin **_Abstract—The gossip-based distributed algorithms are widely_** **used to solve decentralized optimization problems in various** **multi-agent applications, while the...
Detection of Insider Attacks in Distributed Projected Subgradient Algorithms
The gossip-based distributed projected subgradient algorithms (DPS) are widely used to solve decentralized optimization problems in various multi-agent applications, while they are generally vulnerable to data injection attacks by internal malicious agents as each agent locally estimates its descent direction without a...
2021.0
2021-01-18 00:00:00
https://www.semanticscholar.org/paper/014f27c5272292f84a182c49ca98f873fba06ae5
IEEE Transactions on Cognitive Communications and Networking
True
014fdd56682f5f3e91789e83114aad81f5aa5670
_Sensors_ **2010, 10, 4497-4520; doi:10.3390/s100504497** _Article_ **OPEN ACCESS** # sensors **ISSN 1424-8220** www.mdpi.com/journal/sensors ## Adaptive Square-Shaped Trajectory-Based Service Location Protocol in Wireless Sensor Networks **Hwa-Jung Lim, Joa-Hyoung Lee and Heon-Guil Lee *** Dept. of Computer S...
Adaptive Square-Shaped Trajectory-Based Service Location Protocol in Wireless Sensor Networks
In this paper we propose an adaptive square-shaped trajectory (ASST)-based service location method to ensure load scalability in wireless sensor networks. This first establishes a square-shaped trajectory over the nodes that surround a target point computed by the hash function and any user can access it, using the has...
2010.0
2010-04-30 00:00:00
https://www.semanticscholar.org/paper/014fdd56682f5f3e91789e83114aad81f5aa5670
Italian National Conference on Sensors
True
0153cde1ef613a5261c93354a43fb137d3bbf2a4
# electronics _Article_ ## A Comparative Study of Consensus Mechanisms in Blockchain for IoT Networks **Zachary Auhl** **[1,]*, Naveen Chilamkurti** **[1]** **, Rabei Alhadad** **[1]** **and Will Heyne** **[2]** 1 Cybersecurity Innovation Node, La Trobe University, Melbourne, VIC 3086, Australia 2 BAE Systems, Adela...
A Comparative Study of Consensus Mechanisms in Blockchain for IoT Networks
The consensus mechanism is a core component of Blockchain technology, allowing thousands of nodes to agree on a single and consistent view of the Blockchain. A carefully selected consensus mechanism can provide attributes such as fault tolerance and immutability to an application. The Internet of Things (IoT) is a use ...
2022.0
2022-08-27 00:00:00
https://www.semanticscholar.org/paper/0153cde1ef613a5261c93354a43fb137d3bbf2a4
Electronics
True
01540651818ded5880dbfa4a6aecf665efd8a00a
# Policies and Security Aspects For Distributed Scientific Laboratories Nicoletta Dess´ı, Maria Grazia Fugini, R. A. Balachandar **Abstract Web Services and the Grid allow distributed research teams to form dy-** namic, multi-institutional virtual organizations sharing high performance computing resources, large scal...
Policies and Security Aspects For Distributed Scientific Laboratories
2008.0
2008-09-07 00:00:00
https://www.semanticscholar.org/paper/01540651818ded5880dbfa4a6aecf665efd8a00a
IFIP International Information Security Conference
True
0154a7e5dfd13d425e75b44ccbbb87043c308356
Proceedings of the 2023 International Conference on Software Engineering and Machine Learning DOI: 10.54254/2755-2721/8/20230187 # Analysis of consensus mechanisms: PoW and PoS **Jiang Wenxuan** Ningbo Xiaoshi High School, Ningbo, Zhejiang, China, 315000 vincentjiang0207@163.com **Abstract. Along with the trend o...
Analysis of Consensus Mechanisms: PoW and PoS
Along with the trend of Bitcoin blockchain, the concept behind all virtual currency has be-come popular in the study of the Internet. This essay mainly researches two kinds of common consensus mechanisms for the current blockchain network and looks forward to the future development of the technologys usage in daily lif...
2023.0
2023-08-01 00:00:00
https://www.semanticscholar.org/paper/0154a7e5dfd13d425e75b44ccbbb87043c308356
Applied and Computational Engineering
True
0155fe1751b05dda3dfde6e95745a5fc3e0c6e95
# mathematics _Article_ ## Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption **Cunqun Fan** **[1,2], Peiheng Jia** **[3], Manyun Lin** **[1,2], Lan Wei** **[1,2,][∗], Peng Guo** **[1,2], Xiangang Zhao** **[1,2]** **and Ximeng Liu** **[4]** 1 Key Laboratory of Radiometric Calibration ...
Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption
With the development of cloud computing and big data, secure multi-party computation, which can collaborate with multiple parties to deal with a large number of transactions, plays an important role in protecting privacy. Private set intersection (PSI), a form of multi-party secure computation, is a formidable cryptogr...
2023.0
2023-04-08 00:00:00
https://www.semanticscholar.org/paper/0155fe1751b05dda3dfde6e95745a5fc3e0c6e95
Mathematics
True
01595e97cdf2cb27afbab014d58eb69ab9ffe030
# Low Complexity Approaches for End-to-End Latency Prediction ## Pierre Larrenie, Jean-François Bercher, Olivier Venard, Iyad Lahsen-Cherif To cite this version: #### Pierre Larrenie, Jean-François Bercher, Olivier Venard, Iyad Lahsen-Cherif. Low Complexity Ap- proaches for End-to-End Latency Prediction. 2022 13th ...
Low Complexity Approaches for End-to-End Latency Prediction
Software Defined Networks have opened the door to statistical and AI-based techniques to improve efficiency of networking. Especially to ensure a certain Quality of Service (QoS) for specific applications by routing packets with awareness on content nature (VoIP, video, files, etc.) and its needs (latency, bandwidth, e...
2022.0
2022-10-03 00:00:00
https://www.semanticscholar.org/paper/01595e97cdf2cb27afbab014d58eb69ab9ffe030
International Conference on Computing Communication and Networking Technologies
True
0159c5f17225c6e8aa183f7b39e74aaffa185a1e
# Building a Blockchain Application that Complies with the EU General Data Protection Regulation ### Complying with the EU General Data Protection Regulation (GDPR) poses significant challenges for blockchain projects, including establishing clear responsibilities for compliance, securing lawful bases for processing p...
Building a Blockchain Application thatComplies with the EU General DataProtection Regulation
2019.0
2019-12-01 00:00:00
https://www.semanticscholar.org/paper/0159c5f17225c6e8aa183f7b39e74aaffa185a1e
MIS Q. Executive
True
0159df66618cb667a54a529247fedac5640af2da
###### Investigating Service Discovery, Management and Network Support for Next Generation Object Oriented Services Bilhanan Silverajan, Joona Hartman, and Jani Laaksonen _Dept. oflnformation Technology, Tampere University ofTechnology, P.O. Box 553,_ _FIN-3310J_ _Tampere, Finland_ _{bilhanan_ I hartmanj IJjlaakso}@...
Investigating Service Discovery, Management and Network Support for Next Generation Object Oriented Services
2002.0
2002-04-08 00:00:00
https://www.semanticscholar.org/paper/0159df66618cb667a54a529247fedac5640af2da
Intelligence in Networks
True
015d50faf4b17a5b7a910e87a7327d9a7896e62d
[GW Law Faculty Publications & Other Works](https://scholarship.law.gwu.edu/faculty_publications) [Faculty Scholarship](https://scholarship.law.gwu.edu/faculty_scholarship) 2021 # It's Time to Regulate Stablecoins as Deposits and Require Their It's Time to Regulate Stablecoins as Deposits and Require Their Issuers t...
It's Time to Regulate Stablecoins as Deposits and Require Their Issuers to Be FDIC-Insured Banks
2021.0
NaT
https://www.semanticscholar.org/paper/015d50faf4b17a5b7a910e87a7327d9a7896e62d
Social Science Research Network
False
015ece3905050fcb19ea459d7aebfa88a6d015a3
African Journal of Business Management Vol.6 (44), pp. 10799-10806, 7 November 2012 Available online at http://www.academicjournals.org/AJBM DOI: 10.5897/AJBM12.992 ISSN 1993-8233 ©2012 Academic Journals ## Review # The case for a technically safe environment to protect the identities of anonymous whistle-blowers: A...
The case for a technically safe environment to protect the identities of anonymous whistle-blowers : a conceptual paper
Whistle-blowing is one of the most important aspects in the fight against corruption. In most cases, it is impossible to commit a corrupt deed without at least one other person being involved in, or, knowing about it. Many businesses and public entities have a ‘crime lines’ in place to facilitate whistle-blowing but th...
2012.0
2012-11-07 00:00:00
https://www.semanticscholar.org/paper/015ece3905050fcb19ea459d7aebfa88a6d015a3
True
015ed213c9398c10a4fea0eb09a29b7bd9816d81
Complex Systems Informatics and Modeling Quarterly (CSIMQ) eISSN: 2255-9922 [Published online by RTU Press, https://csimq-journals.rtu.lv](https://csimq-journals.rtu.lv/) Article 150, Issue 26, March/April 2021, Pages 46–54 https://doi.org/10.7250/csimq.2021-26.03 # An Introduction to Decentralized Finance (DeFi) Joh...
An Introduction to Decentralized Finance (DeFi)
. Decentralized financial applications (DeFi) are a new breed of consumer-facing financial applications composed as smart contracts, deployed on permissionless blockchain technologies. In this article, we situate the DeFi concept in the theoretical context of permissionless blockchain technology and provide a taxonomic...
2021.0
2021-04-30 00:00:00
https://www.semanticscholar.org/paper/015ed213c9398c10a4fea0eb09a29b7bd9816d81
Complex Systems Informatics and Modeling Quarterly
True
01614001dfc81c1d899402168314ff0c3ef7ce1e
# Private and Efficient Set Intersection Protocol For RFID-Based Food Adequacy Check ## Zakaria Gheid[†], Yacine Challal[∗†], Lin Chen[‡] _∗Centre de Recherche sur l’Information Scientifique et Technique, Algiers, Algeria_ _†Ecole nationale sup´erieure d’informatique, Laboratoire des M´ethodes de Conception des Syst`...
Private and efficient set intersection protocol for RFID-based food adequacy check
2018.0
2018-04-15 00:00:00
https://www.semanticscholar.org/paper/01614001dfc81c1d899402168314ff0c3ef7ce1e
IEEE Wireless Communications and Networking Conference
True
016143d542f7249ee1a1a2aafc45f11fc61a0bc0
# BRAIN 2022: Third Workshop on Blockchain Theory and Applications - Welcome and Committees Welcome Message BRAIN 2022, the 3rd Workshop on Blockchain theoRy and ApplicatIoNs, aims to provide a venue for researchers from both academy and industry to present and discuss important topics on blockchain technology. In ...
Blockchain Theory and Applications - Welcome and Committees
2022.0
2022-03-21 00:00:00
https://www.semanticscholar.org/paper/016143d542f7249ee1a1a2aafc45f11fc61a0bc0
2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)
True
016320200c600c00a351586477cfcf8f3df423d1
# sensors _Article_ ## Decentralized Real-Time Anomaly Detection in Cyber-Physical Production Systems under Industry Constraints **Christian Goetz *** **and Bernhard Humm** Hochschule Darmstadt— Department of Computer Science, University of Applied Sciences, 64295 Darmstadt, Germany *** Correspondence: christian.go...
Decentralized Real-Time Anomaly Detection in Cyber-Physical Production Systems under Industry Constraints
Anomaly detection is essential for realizing modern and secure cyber-physical production systems. By detecting anomalies, there is the possibility to recognize, react early, and in the best case, fix the anomaly to prevent the rise or the carryover of a failure throughout the entire manufacture. While current centraliz...
2023.0
2023-04-23 00:00:00
https://www.semanticscholar.org/paper/016320200c600c00a351586477cfcf8f3df423d1
Italian National Conference on Sensors
True
016337f0d33ffcc75d194f57abc788161eaec927
Received February 4, 2020, accepted February 27, 2020, date of publication March 17, 2020, date of current version March 31, 2020. _Digital Object Identifier 10.1109/ACCESS.2020.2981447_ # On the Convergence of Artificial Intelligence and Distributed Ledger Technology: A Scoping Review and Future Research Agenda KON...
On the Convergence of Artificial Intelligence and Distributed Ledger Technology: A Scoping Review and Future Research Agenda
Developments in artificial intelligence (AI) and distributed ledger technology (DLT) currently lead to lively debates in academia and practice. AI processes data to perform tasks that were previously thought possible only for humans. DLT has the potential to create consensus over data among a group of participants in u...
2020.0
2020-01-29 00:00:00
https://www.semanticscholar.org/paper/016337f0d33ffcc75d194f57abc788161eaec927
IEEE Access
True
01633c22086abbdc8f180de4361585c1a731bc93
# A Distributed Implementation of Steady-State Kalman Filter ### Jiaqi Yan, Xu Yang, Yilin Mo[∗], and Keyou You **_Abstract—This paper studies the distributed state estimation_** **in sensor network, where m sensors are deployed to infer the n-** **dimensional state of a Linear Time-Invariant (LTI) Gaussian sys-** *...
A Distributed Implementation of Steady-State Kalman Filter
This article studies the distributed state estimation in sensor network, where <inline-formula><tex-math notation="LaTeX">$m$</tex-math></inline-formula> sensors are deployed to infer the <inline-formula><tex-math notation="LaTeX">$n$</tex-math></inline-formula>-dimensional state of a linear time-invariant Gaussian sys...
2021.0
2021-01-26 00:00:00
https://www.semanticscholar.org/paper/01633c22086abbdc8f180de4361585c1a731bc93
IEEE Transactions on Automatic Control
True