paperId stringlengths 40 40 | text stringlengths 51 184k | title stringlengths 4 300 | abstract stringlengths 0 10k | year stringclasses 49
values | publicationDate stringlengths 0 19 | url stringlengths 78 78 | venue stringlengths 0 300 | isOpenAccess stringclasses 2
values |
|---|---|---|---|---|---|---|---|---|
00c5185c5a5c68761ff4b22fb523d734af9c5c16 | _Article_
# Down with the #Dogefather: Evidence of a Cryptocurrency Responding in Real Time to a Crypto-Tastemaker
**Michael Cary**
Division of Resource Economics and Management, West Virginia University, Morgantown, WV 26506, USA;
macary@mix.wvu.edu
**Abstract: Recent research in cryptocurrencies has considered the... | Down with the #Dogefather: Evidence of a Cryptocurrency Responding in Real Time to a Crypto-Tastemaker | Recent research in cryptocurrencies has considered the effects of the behavior of individuals on the price of cryptocurrencies through actions such as social media usage. However, some celebrities have gone as far as affixing their celebrity to a specific cryptocurrency, becoming a crypto-tastemaker. One such example o... | 2021.0 | 2021-09-03 00:00:00 | https://www.semanticscholar.org/paper/00c5185c5a5c68761ff4b22fb523d734af9c5c16 | Journal of Theoretical and Applied Electronic Commerce Research | True |
00cb943e73fce88d768f3891ad67fa48c6b70ed2 | # Name Enhanced SDN Framework for Service Function Chaining of Elastic Network Functions
## Sameer G Kulkarni[∗], Mayutan Arumaithurai[∗], Argyrious Tasiopoulos[‡], Yiaonis Psaras[‡], K.K. Ramakrishnan[†], Xiaoming Fu[∗], George Pavlou[‡]
_∗University of G¨ottingen, Germany, ‡University College London, †University of... | Name enhanced SDN framework for service function chaining of elastic Network functions | 2016.0 | 2016-04-10 00:00:00 | https://www.semanticscholar.org/paper/00cb943e73fce88d768f3891ad67fa48c6b70ed2 | Conference on Computer Communications Workshops | True | |
00cf3d116538b3fbc71c113df890d54299369a61 | ## Universal Randomized Guessing with Application to Asynchronous Decentralized Brute–Force Attacks
#### Neri Merhav[∗] Asaf Cohen[†]
#### November 13, 2018
Abstract
Consider the problem of guessing the realization of a random vector X by repeatedly
submitting queries (guesses) of the form “Is X equal to x?” unti... | Universal Randomized Guessing With Application to Asynchronous Decentralized Brute–Force Attacks | Consider the problem of guessing the realization of a random vector <inline-formula> <tex-math notation="LaTeX">${X}$ </tex-math></inline-formula> by repeatedly submitting queries (guesses) of the form “Is <inline-formula> <tex-math notation="LaTeX">${X}$ </tex-math></inline-formula> equal to <inline-formula> <tex-math... | 2020.0 | 2020-01-01 00:00:00 | https://www.semanticscholar.org/paper/00cf3d116538b3fbc71c113df890d54299369a61 | IEEE Transactions on Information Theory | True |
00d0783da6191568a814381a0dc4db49262736e9 | # entropy
_Perspective_
### On Global Quantum Communication Networking
**Ivan B. Djordjevic**
Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ 85721, USA;
ivan@email.arizona.edu; Tel.: +1-520-626-5119
Received: 29 June 2020; Accepted: 28 July 2020; Published: 29 July 2020
[���... | On Global Quantum Communication Networking | Research in quantum communications networks (QCNs), where multiple users desire to generate or transmit common quantum-secured information, is still in its beginning stage. To solve for the problems of both discrete variable- and continuous variable-quantum key distribution (QKD) schemes in a simultaneous manner as wel... | 2020.0 | 2020-07-29 00:00:00 | https://www.semanticscholar.org/paper/00d0783da6191568a814381a0dc4db49262736e9 | Entropy | True |
00d1e468ebce3a3c6197b876c32330c2f54777a3 | # applied sciences
_Article_
## BioShare: An Open Framework for Trusted Biometric Authentication under User Control
**Quan Sun** **[1,2,]*, Jie Wu** **[1]** **and Wenhai Yu** **[2]**
1 School of Computer Science and Technology, Fudan University, No. 220 Handan Rd., Shanghai 200433, China
2 China UnionPay Co., Ltd.,... | BioShare: An Open Framework for Trusted Biometric Authentication under User Control | Generally, biometric authentication is conducted either by mobile terminals in local-processing mode or by public servers in centralized-processing mode. In the former mode, each user has full control of his/her biometric data, but the authentication service is restricted to local mobile apps. In the latter mode, the a... | 2022.0 | 2022-10-25 00:00:00 | https://www.semanticscholar.org/paper/00d1e468ebce3a3c6197b876c32330c2f54777a3 | Applied Sciences | True |
00d4ca5c46ab55cd82aff4fffd52b182c9a4ca34 | DOI 10.1007/s12046 016 0545 0
# Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks
## V S JANANI[*] and M S K MANIKANDAN
Department of Electronics and Communication Engineering, Thiagarajar College of Engineering,
Madurai 625015, India
e-mail: jananivs@tce.edu
MS ... | Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks | 2016.0 | 2016-10-01 00:00:00 | https://www.semanticscholar.org/paper/00d4ca5c46ab55cd82aff4fffd52b182c9a4ca34 | Sādhanā | True | |
00d793b0c383f3232ba96b73d6917925ebb75ebe | This paper has been accepted for publication in IEEE Robotics and Automation Letters.
DOI:10.1109/LRA.2017.2715400
[IEEE Xplore: http://ieeexplore.ieee.org/document/7949041/](http://ieeexplore.ieee.org/document/7949041/)
c 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained f... | Single-View and Multiview Depth Fusion | Dense and accurate 3-D mapping from a monocular sequence is a key technology for several applications and still an open research area. This letter leverages recent results on single-view convolutional network (CNN)-based depth estimation and fuses them with multiview depth estimation. Both approaches present complement... | 2016.0 | 2016-11-22 00:00:00 | https://www.semanticscholar.org/paper/00d793b0c383f3232ba96b73d6917925ebb75ebe | IEEE Robotics and Automation Letters | True |
00de0b220e561f58bda5643968bf05822b7f896d | Received April 9, 2022, accepted April 24, 2022, date of publication April 28, 2022, date of current version May 9, 2022.
_Digital Object Identifier 10.1109/ACCESS.2022.3170910_
# Experimental Evaluation of Transmitted Signal Distortion Caused by Power Allocation in Inter-Cell Interference Coordination Techniques for... | Experimental Evaluation of Transmitted Signal Distortion Caused by Power Allocation in Inter-Cell Interference Coordination Techniques for LTE/LTE-A and 5G Systems | Error vector magnitude (EVM) and out-of-band emissions are key metrics for evaluating in-band and out-band distortions introduced by all potential non-idealities in the transmitters of wireless systems. As EVM is a measure of the quality of the modulated signal/symbols, LTE/LTE-A and 5G systems specify mandatory EVM re... | 2022.0 | NaT | https://www.semanticscholar.org/paper/00de0b220e561f58bda5643968bf05822b7f896d | IEEE Access | True |
00e55a9d00b3beab2f3a952e50d8a7359ae8f1c8 | Received May 29, 2020, accepted June 15, 2020, date of publication June 29, 2020, date of current version July 20, 2020.
_Digital Object Identifier 10.1109/ACCESS.2020.3005663_
# Consortium Blockchain-Based Decentralized Stock Exchange Platform
HAMED AL-SHAIBANI, NOUREDDINE LASLA, (Member, IEEE),
AND MOHAMED ABDALLA... | Consortium Blockchain-Based Decentralized Stock Exchange Platform | The global implementation architecture of the traditional stock market distributes responsibilities and data across different intermediaries, including financial and governmental organizations. Each organization manages its system and collaborates with the others to facilitate trading on the stock exchange platform, an... | 2020.0 | 2020-06-29 00:00:00 | https://www.semanticscholar.org/paper/00e55a9d00b3beab2f3a952e50d8a7359ae8f1c8 | IEEE Access | True |
00e65f396b4febdc799e03c997608fbeb1035905 | # Achlys : Towards a framework for distributed storage and generic computing applications for wireless IoT edge networks with Lasp on GRiSP
### Igor Kopestenski
ICTEAM Institute
Universit´e catholique de Louvain
igor.kopestenski@uclouvain.be
**_Abstract—Internet of Things (IoT) continues to grow expo-_**
**nentiall... | Achlys: Towards a Framework for Distributed Storage and Generic Computing Applications for Wireless IoT Edge Networks with Lasp on GRiSP | Internet of Things (IoT) continues to grow exponentially, in number of devices and the amount of data they generate. Processing this data requires an exponential increase in computing power. For example, aggregation can be done directly at the edge. However, aggregation is very limited; ideally we would like to do more... | 2019.0 | 2019-01-15 00:00:00 | https://www.semanticscholar.org/paper/00e65f396b4febdc799e03c997608fbeb1035905 | 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) | True |
00e730f1a001c200cd93883e1cbeb0337c11faee | ## MULTI-AGENT CONTINUAL COORDINATION VIA PROGRESSIVE TASK CONTEXTUALIZATION
A PREPRINT
**Lei Yuan[1,2], Lihe Li[1], Ziqian Zhang[1], Fuxiang Zhang[1,2], Cong Guan[1], Yang Yu[1,2,][∗]**
1 National Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China
2 Polixir.ai
yuanl, lilh, zhangzq, zh... | Multiagent Continual Coordination via Progressive Task Contextualization | Cooperative multiagent reinforcement learning (MARL) has attracted significant attention and has the potential for many real-world applications. Previous arts mainly focus on facilitating the coordination ability from different aspects (e.g., nonstationarity and credit assignment) in single-task or multitask scenarios,... | 2023.0 | 2023-05-07 00:00:00 | https://www.semanticscholar.org/paper/00e730f1a001c200cd93883e1cbeb0337c11faee | IEEE Transactions on Neural Networks and Learning Systems | False |
00ea729f4029076d418123a919825ae23de9932a | **EVOLUTION AND ANALYSIS OF SECURE HASH ALGORITHM (SHA) FAMILY**
**_Burhan Ul Islam Khan[1*], Rashidah Funke Olanrewaju[2], Malik Arman Morshidi[3], Roohie Naaz Mir[4], Miss Laiha_**
**_Binti Mat Kiah[5] and Abdul Mobeen Khan[6 ]_**
1,2,3Department of ECE, KOE, International Islamic University Malaysia (IIUM), Kuala... | EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY | With the rapid advancement of technologies and proliferation of intelligent devices, connecting to the internet challenges have grown manifold, such as ensuring communication security and keeping user credentials secret. Data integrity and user privacy have become crucial concerns in any ecosystem of advanced and inter... | 2022.0 | 2022-07-27 00:00:00 | https://www.semanticscholar.org/paper/00ea729f4029076d418123a919825ae23de9932a | Malaysian Journal of Computer Science | True |
00eb6f6ebb68f199f12507a6bd585718f464d75d | # Revision and Enhancement of Two Three Party Key Agreement Protocols Vulnerable to KCI Attacks
### Maurizio Adriano Strangio
Department of Mathematics, University of Rome “Roma Tre”, Rome, Italy
_∗Corresponding Author: strangio@mat.uniroma3.it_
Copyright c⃝2014 Horizon Research Publishing All rights reserved.
##... | Revision and Enhancement of Two Three Party Key Agreement Protocols Vulnerable to KCI Attacks | In two recent papers, Zuowen Tan (Secu- rity and Communication Networks) and Chih-ho Chou et al. (Computers and Electronics) published three party key agreement protocols especially convenient for protecting communications in mobile-centric environ- ments such as e-payments, vehicular mobile networks (VMN), RFID applic... | 2014.0 | NaT | https://www.semanticscholar.org/paper/00eb6f6ebb68f199f12507a6bd585718f464d75d | True | |
00eb7acc1610d210d538de47fd9ca0cb75faf055 | ## Many-to-One Trapdoor Functions
and Their Relation to Public-Key Cryptosystems
Mihir Bellare 1 , Shai Halevi 2, Amit Sahai 3, and Salil Vadhan 3
1 Dept. of Computer Science & Engineering, University of California at San Diego,
9500 Gilman Drive, La Jolla, CA 92093, USA. E-Mail: mihir@cs.ucsd, edu.
```
... | Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems | 1998.0 | 1998-08-23 00:00:00 | https://www.semanticscholar.org/paper/00eb7acc1610d210d538de47fd9ca0cb75faf055 | Annual International Cryptology Conference | True | |
00eca0ba653718274f5b0593a06dda278759d534 | # sensors
_Article_
## Adaptive Indoor Area Localization for Perpetual Crowdsourced Data Collection
**Marius Laska** **[1,]*** **, Jörg Blankenbach** **[1]** **and Ralf Klamma** **[2]**
1 Geodetic Institute and Chair for Computing in Civil Engineering & Geo Information Systems,
RWTH Aachen University, Mies-van-der-R... | Adaptive Indoor Area Localization for Perpetual Crowdsourced Data Collection | The accuracy of fingerprinting-based indoor localization correlates with the quality and up-to-dateness of collected training data. Perpetual crowdsourced data collection reduces manual labeling effort and provides a fresh data base. However, the decentralized collection comes with the cost of heterogeneous data that c... | 2020.0 | 2020-03-01 00:00:00 | https://www.semanticscholar.org/paper/00eca0ba653718274f5b0593a06dda278759d534 | Italian National Conference on Sensors | True |
00ed8311df8cd0e843ca8912bc76e6d365443859 | Approved for public release;
distribution is unlimited.
_Title:_ A Comparison of TCP Automatic Tuning Techniques for
###### Distributed Computing
_Author(s):_ Eric Weigle and Wu-Chun Feng
_Submitted to:_ 1 1 th IEEE International Symposium on High-Performance
###### Distributed Computing
Los Alamos
NATIONAL LABO... | A comparison of TCP automatic tuning techniques for distributed computing | 2002.0 | 2002-07-24 00:00:00 | https://www.semanticscholar.org/paper/00ed8311df8cd0e843ca8912bc76e6d365443859 | Proceedings 11th IEEE International Symposium on High Performance Distributed Computing | True | |
00ee11fd044876642ee1440432a33d7faa6d3292 | # SCI Networking for Shared-Memory Computing in UPC: Blueprints of the GASNet SCI Conduit
## H. Su, B. Gordon, S. Oral, A. George {su, gordon, oral, george}@hcs.ufl.edu
_High-performance Computing and Simulation (HCS) Research Lab, Dept. of Electrical and Computer Engineering,_
_University of Florida, Gainesville, Fl... | SCI networking for shared-memory computing in UPC: blueprints of the GASNet SCI conduit | 2004.0 | 2004-11-16 00:00:00 | https://www.semanticscholar.org/paper/00ee11fd044876642ee1440432a33d7faa6d3292 | 29th Annual IEEE International Conference on Local Computer Networks | True | |
00ef77f1162f6eed2595e569d716f963c181de21 | # Classical zero-knowledge arguments for quantum computations
#### Thomas Vidick[1] and Tina Zhang[2]
1Department of Computing and Mathematical Sciences, California Institute of Technology, USA
2Division of Physics, Mathematics and Astronomy, California Institute of Technology, USA
We show that every language in ... | Classical zero-knowledge arguments for quantum computations | We show that every language in QMA admits a classical-verifier, quantum-prover zero-knowledge argument system which is sound against quantum polynomial-time provers and zero-knowledge for classical (and quantum) polynomial-time verifiers. The protocol builds upon two recent results: a computational zero-knowledge proof... | 2019.0 | 2019-02-14 00:00:00 | https://www.semanticscholar.org/paper/00ef77f1162f6eed2595e569d716f963c181de21 | IACR Cryptology ePrint Archive | True |
00f0072a48291ce27d5dfe10e00847d98a915d76 | ### Conservative Linear Unbiased Estimation Under Partially Known Covariances
#### Forsling Robin, Anders Hansson, Fredrik Gustafsson, Zoran Sjanic, Johan Löfberg and Gustaf Hendeby
The self-archived postprint version of this journal article is available at Linköping University Institutional Repository (DiVA): http:... | Conservative Linear Unbiased Estimation Under Partially Known Covariances | Mean square error optimal estimation requires the full correlation structure to be available. Unfortunately, it is not always possible to maintain full knowledge about the correlations. One example is decentralized data fusion where the cross-correlations between estimates are unknown, partly due to information sharing... | 2022.0 | NaT | https://www.semanticscholar.org/paper/00f0072a48291ce27d5dfe10e00847d98a915d76 | IEEE Transactions on Signal Processing | True |
00f0106e0a9ab64dcd4c0dabe5f1af1e5549f75e | Received January 29, 2021, accepted February 11, 2021, date of publication February 15, 2021, date of current version February 25, 2021.
_Digital Object Identifier 10.1109/ACCESS.2021.3059473_
# Channel Load Aware AP / Extender Selection in Home WiFi Networks Using IEEE 802.11k/v
TONI ADAME 1, MARC CARRASCOSA1, BORI... | Channel Load Aware AP / Extender Selection in Home WiFi Networks Using IEEE 802.11k/v | Next-generation Home WiFi networks have to step forward in terms of performance. New applications such as on-line games, virtual reality or high quality video contents will further demand higher throughput levels, as well as low latency. Beyond physical (PHY) and medium access control (MAC) improvements, deploying mult... | 2020.0 | 2020-04-17 00:00:00 | https://www.semanticscholar.org/paper/00f0106e0a9ab64dcd4c0dabe5f1af1e5549f75e | IEEE Access | True |
00f030043a1ca3a957a37cdf03060a15fefeb932 | Volume/Cilt: 6, Issue/Sayı: 4 Year/Yıl: 2023, pp. 243-253
E-ISSN: 2636-7718
[URL: https://journals.gen.tr/arts](https://journals.gen.tr/arts)
DOI: https://doi.org/10.31566/arts.2163
Received / Geliş: 08/08/2023
Acccepted / Kabul: 27/09/2023
RESEARCH ARTICLE / ARAŞTIRMA MAKALESİ
# Paradigm shift in the music indus... | Paradigm shift in the music industry: Adaptation of blockchain technology and its transformative effects | The music industry is undergoing a profound transformation thanks to blockchain technology. This article extensively examines how the core components of music – production, distribution, performance, and presentation – are undergoing radical changes through the integration of blockchain technology. The traditional musi... | 2023.0 | 2023-10-23 00:00:00 | https://www.semanticscholar.org/paper/00f030043a1ca3a957a37cdf03060a15fefeb932 | JOURNAL OF ARTS | True |
00f24857803eefcd0900689dda52c32505105132 | http://www.journalofcloudcomputing.com/content/2/1/24
## RESEARCH Open Access
# THUNDER: helping underfunded NPO’s distribute electronic resources
### Gabriel Loewen[*], Jeffrey Galloway, Jeffrey Robinson, Xiaoyan Hong and Susan Vrbsky
**Abstract**
As federal funding in many public non-profit organizations (NPO’... | THUNDER: helping underfunded NPO’s distribute electronic resources | As federal funding in many public non-profit organizations (NPO’s) seems to be dwindling, it is of the utmost importance that efforts are focused on reducing operating costs of needy organizations, such as public schools. Our approach for reducing organizational costs is through the combined benefits of a high performa... | 2013.0 | 2013-12-01 00:00:00 | https://www.semanticscholar.org/paper/00f24857803eefcd0900689dda52c32505105132 | Journal of Cloud Computing: Advances, Systems and Applications | True |
00f2f02c7694836eb4950f4395aae455571d91c1 | DOI: 10.1002/qua.27035
#### R E V I E W
# Blockchain technology in quantum chemistry: A tutorial review for running simulations on a blockchain
## Magnus W. D. Hanson-Heine [1] | Alexander P. Ashmore [2]
1School of Chemistry, University of
Nottingham, Nottingham, UK
2Oxinet, Bath, UK
Correspondence
Magnus W. D... | Blockchain technology in quantum chemistry: A tutorial review for running simulations on a blockchain | 2022.0 | 2022-10-30 00:00:00 | https://www.semanticscholar.org/paper/00f2f02c7694836eb4950f4395aae455571d91c1 | International Journal of Quantum Chemistry | True | |
00f3a470a4e9d926afcc53cfcd5deeb000595e12 | International Journal of Information & Computation Technology.
ISSN 0974-2239 Volume 13, Number 1 (2023), pp. 1-6
© International Research Publications House
https://dx.doi.org/10.37624/IJICT/13.1.2023.1-6
# A Secure Land Asset Transfer System using
Blockchain
**P.N. Ramya[1], Geetha Krishna Guruju[2], Ayushi Verma[... | A Secure Land Asset Transfer System using Blockchain | 2023.0 | 2023-07-06 00:00:00 | https://www.semanticscholar.org/paper/00f3a470a4e9d926afcc53cfcd5deeb000595e12 | International Journal of Information & Computation Technology | True | |
00f658832a6f1d5d53f20b9bc361594b72a8ddf8 | ## We are IntechOpen, the world’s leading publisher of Open Access books Built by scientists, for scientists
# 6,700
Open access books available
# 180,000 195M
International authors and editors
Our authors are among the
Downloads
# 12.2%
# 154 TOP 1%
Countries delivered to most cited scientists Contribut... | A Review of Dynamic Wireless Power Transfer for In‐Motion Electric Vehicles | 2016.0 | 2016-06-29 00:00:00 | https://www.semanticscholar.org/paper/00f658832a6f1d5d53f20b9bc361594b72a8ddf8 | True | ||
00f6cf73c647f116d7a23d17e8a4c45a0555dd81 | ## Phase transitions in distributed control systems with multiplicative noise
**Nicolas Allegra[1][,][2], Bassam Bamieh[1], Partha Mitra[3]** **and Cl´ement Sire[4]**
1 Department of Mechanical Engineering, University of California, Santa Barbara, USA
3 Cold Spring Harbor Laboratory, Cold Spring Harbor, NY, USA
4 Lab... | Phase transitions in distributed control systems with multiplicative noise | Contemporary technological challenges often involve many degrees of freedom in a distributed or networked setting. Three aspects are notable: the variables are usually associated with the nodes of a graph with limited communication resources, hindering centralized control; the communication is subject to noise; and the... | 2016.0 | 2016-10-03 00:00:00 | https://www.semanticscholar.org/paper/00f6cf73c647f116d7a23d17e8a4c45a0555dd81 | arXiv.org | True |
00f77951251798ae562e1ebe066753594f4b37be | ### Johannes Ernst* and Alexander Koch
# Private Stream Aggregation with Labels in the Standard Model[†]
**Abstract: A private stream aggregation (PSA) scheme**
is a protocol of n clients and one aggregator. At every time step, the clients send an encrypted value to
the (untrusted) aggregator, who is able to compute ... | Private Stream Aggregation with Labels in the Standard Model | Abstract A private stream aggregation (PSA) scheme is a protocol of n clients and one aggregator. At every time step, the clients send an encrypted value to the (untrusted) aggregator, who is able to compute the sum of all client values, but cannot learn the values of individual clients. One possible application of PSA... | 2021.0 | 2021-07-23 00:00:00 | https://www.semanticscholar.org/paper/00f77951251798ae562e1ebe066753594f4b37be | Proceedings on Privacy Enhancing Technologies | True |
00f84366664c896ee112940dc12eaacef6189f89 | # Distributed Volumetric Scene Geometry Reconstruction With a Network of Distributed Smart Cameras
## Shubao Liu † Kongbin Kang † Jean-Philippe Tarel ‡ David B. Cooper † †Division of Engineering, Brown University, Providence, RI 02912
{sbliu, kk, cooper}@lems.brown.edu
## ‡Laboratoire central des Ponts et Chauss´ees (... | Distributed volumetric scene geometry reconstruction with a network of distributed smart cameras | 2009.0 | 2009-06-20 00:00:00 | https://www.semanticscholar.org/paper/00f84366664c896ee112940dc12eaacef6189f89 | 2009 IEEE Conference on Computer Vision and Pattern Recognition | True | |
00fe625102de79328a9ee3bf867afa05f8be82d7 | **Research Article**
# Blockchain‑based multi‑organization taxonomy for smart cities
**Ekleen Kaur[1] · Anshul Oza[1]**
Received: 14 October 2019 / Accepted: 5 February 2020 / Published online: 18 February 2020
© Springer Nature Switzerland AG 2020
**Abstract**
With the tremendous development in distributed ledger ... | Blockchain-based multi-organization taxonomy for smart cities | 2020.0 | 2020-02-18 00:00:00 | https://www.semanticscholar.org/paper/00fe625102de79328a9ee3bf867afa05f8be82d7 | SN Applied Sciences | True | |
00ff024e0800db79a8f7c661b47357fc98e6c0af | ## ADVERSARIAL-PLAYGROUND: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning
#### Andrew P. Norton[*] Yanjun Qi[†]
Department of Computer Science, University of Virginia
**ABSTRACT**
Recent studies have shown that attackers can force deep learning
models to misclassify so-called “adversaria... | Adversarial-Playground: A visualization suite showing how adversarial examples fool deep learning | Recent studies have shown that attackers can force deep learning models to misclassify so-called “adversarial examples:” maliciously generated images formed by making imperceptible modifications to pixel values. With growing interest in deep learning for security applications, it is important for security experts and u... | 2017.0 | 2017-08-01 00:00:00 | https://www.semanticscholar.org/paper/00ff024e0800db79a8f7c661b47357fc98e6c0af | Visualization for Computer Security | True |
0100d00584f7b6a2e3969fd57a9d164103f39a69 | # ENHANCED DYNAMIC RESOURCE ALLOCATION SCHEME BASED ON
PACKAGE LEVEL ACCESS IN CLOUD COMPUTING : A REVIEW
## Manpreet Kaur [(1)], Dr. Rajinder Singh[(2)]
(1) Research Scholar, Department of Computer Science & Engineering, GGSCET, Bathinda, Punjab.
### manpreet12395@gmail.com
(2) Assistant Professor, Department of ... | ENHANCED DYNAMIC RESOURCE ALLOCATION SCHEME BASED ON PACKAGE LEVEL ACCESS IN CLOUD COMPUTING : A REVIEW | Cloud computing is distributed computing, storing, sharing and accessing data over the Internet. It provides a pool of shared resources to the users available on the basis of pay as you go service that means users pay only for those services which are used by him according to their access times. This research work deal... | 2017.0 | 2017-04-06 00:00:00 | https://www.semanticscholar.org/paper/0100d00584f7b6a2e3969fd57a9d164103f39a69 | Bioinformatics | True |
0101445aec81d2dec8562a83e656ac6ccd633ee2 | # Founding Cryptography on Tamper-Proof
Hardware Tokens
Vipul Goyal[1][,⋆], Yuval Ishai[2][,⋆⋆], Amit Sahai[3][,⋆⋆⋆], Ramarathnam Venkatesan[4],
and Akshay Wadia[3]
1 UCLA and MSR India
vipul.goyal@gmail.com
2 Technion and UCLA
yuvali@cs.technion.ac.il
3 UCLA
_{sahai,awadia}@cs.ucla.edu_
4 Microsoft Research... | Founding Cryptography on Tamper-Proof Hardware Tokens | 2010.0 | 2010-02-09 00:00:00 | https://www.semanticscholar.org/paper/0101445aec81d2dec8562a83e656ac6ccd633ee2 | IACR Cryptology ePrint Archive | True | |
01044c3e265ad414aec8cf608c24e1d1cf406077 | Annales UMCS Informatica AI XII, 4 (2012) 11–22
DOI: 10.2478/v10065-012-0018-y
### Hardened Bloom Filters, with an Application to Unobservability
Nicolas Bernard[1][∗], Franck Leprévost[1][†]
```
1LACS, University of Luxembourg
```
162 a, Avenue de la Faïencerie, L-1511 Luxembourg
Abstract – Cla... | Hardened Bloom Filters, with an Application to Unobservability | Classical Bloom filters may be used to elegantly check if an element e belongs to a set S, and, if not, to add e to S. They do not store any data and only provide boolean answers regarding the membership of a given element in the set, with some probability of false positive answers. Bloom filters are often used in cach... | 2012.0 | NaT | https://www.semanticscholar.org/paper/01044c3e265ad414aec8cf608c24e1d1cf406077 | Ann. UMCS Informatica | True |
01060a62a51c08248abc0b204b4e255a09731ad8 | # electronics
_Article_
## A Framework for Data Privacy Preserving in Supply Chain Management Using Hybrid Meta-Heuristic Algorithm with Ethereum Blockchain Technology
**Yedida Venkata Rama Subramanya Viswanadham * and Kayalvizhi Jayavel**
Department of Computer Science and Engineering, SRM Institute of Science and ... | A Framework for Data Privacy Preserving in Supply Chain Management Using Hybrid Meta-Heuristic Algorithm with Ethereum Blockchain Technology | Blockchain is a recently developed advanced technology. It has been assisted by a lot of interest in a decentralized and distributed public ledger system integrated as a peer-to-peer network. A tamper-proof digital framework is created for sharing and storing data, where the linked block structure is utilized to verify... | 2023.0 | 2023-03-15 00:00:00 | https://www.semanticscholar.org/paper/01060a62a51c08248abc0b204b4e255a09731ad8 | Electronics | True |
0106a389bab04617737f3a786e08e31fa4afe7e5 | ERROR: type should be string, got "https://www.emerald.com/insight/2210-8327.htm\n\n# Why and how informatics and applied computing can still create structural changes and competitive advantage\n\n## Sarandis Mitropoulos\n### Regional Development, Ionian University, Lefkada, Greece, and\n## Christos Douligeris\n### Informatics, University of Piraeus, Piraeus, Greece\n\nAbstract\nPurpose – In the new digital age, enterprises are facing an increasing global competition. In this paper, we first\nexamine how Information Technology (IT) can play an important role in giving significant competitive\nadvantage in the modern enterprises. The business value of IT is examined, as well as the limitations and the\ntrade-offs that its applicability faces. Next, we present the basic principles for a successful IT strategy,\nconsidering the development of a long-term IT renovation plan, the strategic alignment of IT with the business\nstrategy, and the adoption of an integrated, distributed, and interoperable IT platform. Finally, we examine\nhow a highly functional and efficient IT organization can be developed.\nDesign/methodology/approach – Our methodological approach was based to the answers of the following\nquestions: 1. Does IT still matter? 2. What is the business value created by IT along with the corresponding\nlimitations and trade-offs? 3. How could a successful IT Strategy be build up? 4. How could an effective?\nT planning aligned with the business strategy be build up? 5. How could a homogenized and distributed\ncorporate IT platform be developed? and finally, 6. How could a high-performance IT-enabled enterprise be\nbuild up?\nFindings – The enterprises in order to succeed in the new digital area need to: 1. synchronize their IT strategy\nwith their business strategy, 2. formulate a long-term IT strategy, 3. adopt IT systems and solutions that are\nimplemented with elasticity, interoperability, distribution, and service-orientation. 4. keep a strategic direction\ntowards the creation of an exceptional organization based on IT.\nOriginality/value – This paper is original with respect to the integrated approach the overall problem is\nexamined. There is a prototype combined investigation of all perspectives for an effective enforcement of IT in\na way that causes acceleration in competitive advantage when conducting business.\nKeywords New technologies, IT strategy, Strategic alignment, Business value, SOA\nPaper type Research paper\n\n1. Introduction\nThe steadily increasing global market competition is significantly reducing the turnover time\nof innovation products. Information Technology (IT) can provide a significant competitive\nmarket advantage to an enterprise because it dynamically promotes relationships with its\ncustomers and suppliers, strengthens strategic alliances, promotes innovative products and\nservices, adapts existing solutions, and achieves lower operating costs, while it improves the\ninternal business processes. It is true that new technologies, such as the cloud, mobile\ncomputing, the Internet of Things (IoT), and the use of artificial intelligence (AI) have brought\n\n© Sarandis Mitropoulos and Christos Douligeris. Published in Applied Computing and Informatics.\nPublished by Emerald Publishing Limited. This article is published under the Creative Commons\nAttribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works\nof this article (for both commercial and non-commercial purposes), subject to full attribution to the\n[original publication and authors. The full terms of this licence may be seen at http://creativecommons.](http://creativecommons.org/licences/by/4.0/legalcode)\n[org/licences/by/4.0/legalcode](http://creativecommons.org/licences/by/4.0/legalcode)\n\n\n## Informatics and applied computing\n\nReceived 7 June 2021\nRevised 19 July 2021\n16 September 2021\nAccepted 17 September 2021\n\nApplied Computing and\nInformatics\nEmerald Publishing Limited\ne-ISSN: 2210-8327\np-ISSN: 2634-1964\n[DOI 10.1108/ACI-06-2021-0149](https://doi.org/10.1108/ACI-06-2021-0149)\n\n\n-----\n\n## ACI\n\n\naround structural changes in the way businesses operate as well as in the way markets\nfunction. For example, the internet has created hyperarchies that influence the creation of\nnew business models [1], by replacing the traditional enterprise hierarchies, while on the other\nhand it has necessitated a comprehensive review of the traditional business strategies. This\nrevision of the companies’ business strategies, as well as the new supply value chain have\nsignificantly increased the productivity, the quality of services offered to customers and the\noverall value proposition of the enterprises.\nNevertheless, there are many enterprises, which, despite investing a significant amount of\nmoney and human resources in applied computing, as well as in relevant research, have failed\nin having the initially expected advantages. This happened because these enterprises failed\nto adopt and then successfully implement the new e-business and e-governance models [2]. In\nthe context of rapidly responding to market needs and to their fierce competition, many\nenterprises have only pursued short-term benefits from applied computing and informatics\nby trying only to accelerate the development of new services and products at the lowest\npossible operating costs. But ignoring the fundamentals of strategy formulation has led to a\nconvergence of business practices based on cost leadership [3], something we have seen\nhappening in the past with the dotcom enterprises. This problem still exists with the latest\ninformatics technologies, where we see that enterprises still do not incorporate the\ninformatics and computing applications in their processes in the right way [2, 4, 5]. The main\nfaults that enterprises make regarding the adoption of informatics are that they do not:\n\n(1) synchronize their IT strategy with the goals of their business strategy,\n\n(2) formulate a long-term IT strategy,\n\n(3) keep a strategic direction towards the creation of an exceptional organization based\non IT,\n\n(4) adopt effective IT systems, and integrated IΤ solutions; instead these are\nimplemented hastily, inelastically and without interoperability.\n\nThe exponential growth of ubiquitous computing drives the need for new business models,\nwhich must serve an effective IT-enabled business strategy directly related to the Digital\nTransformation. The problem space here is how the effective adoption of new IT technologies\ncan be achieved which in turn drives the requirements of renewed business strategy and\nprocesses, and of culture change [29]. The main problem which modern enterprises face\nconcerns the right IT implementation along with the adaptation of the right strategy, process,\nand culture. This paper tries to answer all these requirements in a consistent and\nmethodological way. Even though a considerable body of research towards this direction\nexists, there is still a gap for the development of a perfect alignment between the strategy the\nenterprises must follow and an intelligent and effective way the new technologies are\nimplemented so that they create a competitive advantage [5]. Internet, cloud computing,\nmobile computing, software-oriented architectures (SOA), Internet of things (IoT), blockchain,\nserver virtualization and other modern technologies provide the enterprises with the\nopportunity to migrate from the traditional business models to new ones [30, 31, 35, 36].\nAlthough there exist theoretical frameworks in the literature [2–5], there is still a lack of of\nframeworks that combine the characteristics of hybrid, both research and practical methods\napproaches. The outcomes of the existing approaches show that the use of IT has not been\nproven fully effective, except from some exceptional cases.\nTo achieve an effective IT incorporation, this paper proposes a framework with very\nspecific suggestions. This framework can be used as a roadmap for future readiness and\ngrowth. The evaluation discussion shows the effectiveness of the proposed framework and\nmethodology. This framework in short consists of the following steps:\n\n\n-----\n\n(1) Examination of the expected business value to be created by IT along with any\nexpected limitations and necessary trade-offs.\n\n(2) Formulation of an effective IT strategy aligned with the overall business strategy.\n\n(3) Development of an effective IT planning.\n\n(4) Development of a homogenized, interoperable, and distributed IT platform.\n\n(5) Development of a high IT-enabled organization in all its dimensions.\n\n(6) Establishment of an on-going evaluation system for the continuous improvement of\nthe IT strategy and the corresponding infrastructure.\n\nThe issues and steps mentioned above are thoroughly analysed and potential solutions are\nproposed. A thorough and comprehensive investigation of whether IT can still make\nstructural changes in the operation of businesses is performed. In addition, it is examined how\nthis can be achieved with respect to the creation of business value considering the\ncorresponding limitations and necessary trade-offs. But since creating value without\ndeveloping a rational strategy is impossible the principles of a sound IT strategy are\nexamined, as well as how this can be effectively developed. Finally, implementation issues\nand evaluation results are discussed, as well as potential future work.\n\n2. IT still does matter\nMany researchers argue that IΤ no longer offers any innovation over the competition and\nhave, therefore, IΤ has reached the stage of maturing as a service [6]. This viewpoint has been\nexpressed without considering its high and disruptive evolution. Τhere is obviously a part of\nIT that is common to almost all enterprises, making this utility approach workable.\nNevertheless, this is only one side of the coin because IT is creating new situations that\naccelerate the developments in the operation of markets and enterprises. The concept of\nubiquitous computing, for example, is a new trend which will surely cause structural changes,\nwhile new ideas in virtual communities can create significant changes in corporate\ncollaboration by forming on-demand virtual business partner hyperarchies. In addition, new\nintelligent algorithms for machine learning, artificial intelligence and biotechnology are being\ndeveloped, thus facilitating research into new products (e.g. drugs and crystal solid materials)\nand services (e.g. telemedicine) with significant business and social benefits [7]. Thus, the new\ninformation technologies can leverage the capacity for innovation. Enterprises through the\nsmart and targeted use of IT will be able to create growth, and innovative products and\nservices at the right time.\nIn addition, enterprises need to focus on another perspective of IT, that of the growing\nbusiness value through digital culture. A well-designed business strategy, synchronized\nwith that of IT, creates an innovation-oriented corporate culture. Such a culture is not easy\nto be copied from the competition, thus, giving the enterprises that adopt it a clear lead.\nThere are many important examples that prove this to be true, such as the ones of Toyota\nand Dell – their supply chain and production chain management practices make them\nstand out [6].\nThe innovative and smart use of IT (e.g. green informatics) can create an additional\ncompetitive advantage which, most of the times, is closely connected with a change of culture\n\n[8]. However, the technology is not a panacea. In practice, many enterprises do not effectively\nenforce the new IT-enabled business models because their adoption of IT has not been\ndirected to develop a highly IT-enabled corporate culture, they have not integrated their\ndigital strategy with the overall business strategy, or they have not adequately understood\nthe new technology trends while developing a corresponding strategy.\n\n\n## Informatics and applied computing\n\n\n-----\n\n## ACI\n\n\n3. Business value creation: limitations and trade-offs\nNowadays, the relationship between business strategy and IT-based innovation is a strongly\ninteracting one. A successful business strategy must define an IT infrastructure driven by\ninnovation. Obviously, all of the expected benefits offer improved business performance and\nare, therefore, critical to the business success [5, 9].\nIT enables an increased control of the operating costs as well as of productivity. Indeed,\nthe assembly of products e.g. through the Computer Integrated Manufacturing (CIM) and the\nRobotics systems of the industry 4.0 era, increases productivity and quality, while reducing\ncosts. We also notice that information technology significantly increases the knowledge of\nthe business environment through monitoring systems, such as the ones used in the product\ndelivery status or in the stock levels of warehouses. IT systems can help develop staff skills\nthrough e-learning and on-the-job on-line assistance.\nNevertheless, there exist several criteria which need to be fulfilled for enterprises to be able\nto differentiate from competitors. Such criteria include among others the brand name visibility,\nthe quick-to-market response, and the service quality [10]. Despite these advantages, there are\nimportant limitations that need to be considered, such as the existence of isolated and\nproprietary software applications and databases. Outdated information (legacy) systems,\nwhich require high-cost adapters to bridge the newer applications, and the use of a wide range\nof different and heterogeneous technologies, are two other examples. The low utilization of\nthe existing IT resources is also a problem. All these limitations significantly reduce the\nefficiency of IT, the process support, the access and dissemination of information, the\nimplementation of new projects, and the staff adaptation to the new conditions, while they\nfurther increase the operating costs.\nThere are solutions to such problems, which enterprises are called upon to adopt, such as\ne.g. the Enterprise Application Integration (EAI), the rapid development of new applications,\nand the development of business process management systems By gradually adopting such\nsolutions an enterprise can in a reasonable time develop a much more integrated business\nenvironment, launch new services in a timely fashion, achieve world-wide access, improve its\nbusiness operations control, acquire resources on demand, work on a flexible infrastructure\nand lower costs [2, 10].\nMost of the times, the enforcement of these IT solutions requires the consideration of a\nvariety of trade-offs, while the main question is: “is there adequate capacity, qualities and\nstrategic direction for a change from the old economy environment to the new one?”. The\nanswer to this question includes: (1) the adoption of an innovation culture, which in turn\nrequires management of change and capability building up for the human resources, and (2)\nan elastic and interoperable infrastructure [11, 12].\nIn addition, the changing of an operational business model can drive the requirements\nfor higher adaptation in the application software portfolio creating another trade-off\namong efficiency, innovation, experimentation, and conformance to the relevant standards\n\n[11–13].\n\n4. The proposed methodological approach\nGiven that IT is still considered to be able to bring about significant structural changes and\nprovide a business competitive advantage in the modern markets along with all the related\noperational benefits, the question is how this goal can be achieved methodologically. This\ndevelopment can be considered to have the following four main dimensions:\n\n(1) Development of a successful IT strategy, whose goals should be synchronized with\nthe business strategy, e.g. there can be no strategy to penetrate global markets, while\nthe company’s information system cannot support the internationalization of the\ninformation it offers and manages.\n\n\n-----\n\n(2) The IT development plan which should consider the organizational structure of\nenterprise, the demanded quality of service to its customers, the firm’s human\nresources and the existing IT infrastructure and systems. Everything may need to be\nchanged partially or to a very large extent.\n\n(3) Development of the IT Infrastructure as a homogenized and distributed service\nplatform provided either to the internal customers of the company or to the external\nones.\n\n(4) Development of services and policies for management, research and innovation,\ntraining for the creation of a technologically high-performance enterprise,\n\nAll these key dimensions of development of innovation and IT solutions are shown in\nFigure 1 as phases.\n\n5. Building up a successful IT strategy\nA business strategy expresses the vision, the mission and the main business goals of a\nenterprise or organization. The business goals must be interpreted into subgoals that are\nenforced on specific high-level business domains, e.g. sales, customer relationships,\nproduction, and logistics. In fact, these domains, according to the balanced scorecard\n(BSC) approach [5], are influenced by the corporate strategy regarding the perspectives of the\nfuture readiness and the innovation, the internal process improvement, the customer\norientation, the cost control, and the financial goals. It is obvious that enterprises need to\neffectively approach these perspectives if they want to achieve a transition from the oldfashion business models to the new ones. Thus, the strategic components incorporated in\nthese perspectives, must be refined and improved.\nThese components, in fact, construct the high-level business domains upon which the\ngoals of the business strategy must be enforced. Of course, these domains must contain\nsubdomains or, in other words, lower-level domains that express the implementation\ncomponents of an enterprise or organization. Such components include among others\ntechnical processes, business data, operations, and informatics implementations. This topdown approach is very useful for the executives because it provides them with a tool for the\nsuccessful enforcement of a business strategy considering all its dimensions.\nThe IT potentiality in terms of new technologies and solutions, makes the IT strategy to be\nthe determinant while the business strategy to be the weak area which needs improvement\n\n[5]. This fact is expressed by the Strategic Alignment (SA) model [14] for the business and IT\nstrategies and the organisational and IT infrastructures.\nFor example, ubiquitous computing brings new capabilities to the enterprises and, thus, it\npushes for a revision of the corresponding business strategies. The goal is to achieve a\n\n\n## Informatics and applied computing\n\nFigure 1.\nThe basic dimensions\nof a high-performance\nenterprise based on\ninnovation and new\ntechnologies\n\n\n-----\n\n## ACI\n\n\ncompetitive advantage over the competition through the development of new products and\nthe appropriate modification of the business scope, the distinct competencies, and the\nbusiness governance, along with the improvement of the organizational infrastructure which\nconcerns the business processes, the human resource capability, and the administrative\nstructure. As mentioned, this approach helps enterprises to conform to the new requirements\nthat arise due to the new technological solutions and the potentialities created by them.\nTowards this direction, the following are proposed:\n\n(1) IT and business strategy alignment,\n\n(2) dimensioning of IT resource requirements,\n\n(3) adoption of new IT architectures and their management, based on innovation and\nadaptability, and\n\n(4) selection of Key Performance Indicators (KPI) for evaluation reasons.\n\nThe first point imposes an IT strategic plan fully aligned with the business strategy. The next\npoint asks for an open, interoperable, scalable, and distributed IT infrastructure, while the\nthird point relates to a high-performance IT-enabled enterprise [4, 5, 15]. Key performance\nmetrics are always required so that the evaluation of the adopted overall approach to be\npossible.\n\n6. Developing an effective IT planning aligned with the business strategy\nIT planning must incorporate the current as well as the future enterprise needs and\ntechnological trends. Thus, it must cover long-term issues as well as whatever is necessary\nfor future readiness. A Strategic Alignment (SA) between the business and IT strategies\naddresses four main areas: business strategy, IT strategy, organizational infrastructure, and\nIT infrastructure [5, 16]. These areas need to be aligned with each other according to the\nbusiness requirements and the type of enterprises. Namely, the requirement for alignment\nvaries from enterprise to enterprise and while it is generally very helpful, it may, however,\nlimit the degrees of freedom in some business cases. In fact, trade-offs and equilibria between\nstrategic alignment and flexibility must be addressed successfully. For example, the\nproduction and other business operations, like the customer relationship management (CRM),\nare positively affected by the Strategic Alignment. On the other hand, the business planning,\nthe marketing, and the sales are less influenced by the SA. Specifically, enterprises, whose\ncritical operations do not focus on IT, do not require such a strict SA. The more supportive\nand functional the role of IT is, the more SA it requires. On the contrary, where IT moves\nwithin a strategic role, the need for a strict SA decreases [17–19]. The following perspectives\ncan be considered in an IT environment [20]:\n\n(1) IT infrastructure: emerging IT infrastructure technologies and solutions call for the\nreformulation of the IT strategy, while the business strategy is implicitly impacted.\n\n(2) IT organization infrastructure: emerging IT calls for the reformulation of the\norganizational infrastructure, while the business strategy is implicitly impacted.\n\n(3) competitive potentiality: emerging IT capabilities, as well as new IT governance\npatterns call for the reformulation of the business strategy, while the organizational\ninfrastructure is implicitly impacted.\n\n(4) service level: the IT resources use, as well as the orientation to the customer calls for\nthe reformulation of the IT infrastructure, while the organizational infrastructure is\nimplicitly impacted.\n\n\n-----\n\n7. Developing a homogenized and distributed corporate IT platform\nThe following services can be offered in an enterprise network in an open and interoperable\nmanner [21, 22]:\n\n(1) electronic services for channel-management, as far as all the involved parties, like\nenterprises, clients, and suppliers, are concerned,\n\n(2) security, that concerns the IT resources protection,\n\n(3) communication mechanisms needed for the communication and interworking\nbetween all the internal/external business entities,\n\n(4) database and file management services, for the purpose of making the required data\nand files available over the enterprise network,\n\n(5) application services, for the purpose of making the required applications, like EPR,\nSCM and HRM, available over the enterprise network, and\n\n(6) management of IT facilities, needed for integration and synchronization of the\ninfrastructure layers and for provision of servers and platforms.\n\nNew trends in IT technologies call for the distribution, homogenization, integration, and\ninteroperability of systems and services [23]. Open IT standards and SOA are among the\ncurrent information systems technologies that enterprises need to move towards because\nthey offer increased interoperability, transfer of application services to heterogeneous\nenvironments, enterprise application integration, service reusability, high operational control\nand monitoring, and flexible service configuration and measurability in service\nperformance [24].\nA SOA helps to create networks of services for the purpose of their common management.\nService orientation here is mentioned as an architectural approach of the new IT systems\nwithout restricting its implementation to specific offered solutions, as it is the Enterprise\nService Bus (ESB). In most cases, service orientation must be followed due to the benefits\nmentioned above. Figure 2 introduces the conceptual approach of a service grid, where\napplication services are interacting each other through several underlying platform services,\nlike routing, message exchange and message queuing, data and knowledge management,\ndistributed API’s, security, accounting, QoS assurance, system monitoring and control.\nIndeed, the adoption of IT service grids can prove to be a key factor for enterprises in their\nefforts to gain a significant competitive advantage. New informatics and applied services\nneed to be distributed, scalable, open, and reliable in a low cost and quick-to-market\n\n**_Services_**\n\n**_Services_** **_Services_**\n\n**_Protocols:_**\n**_Rest, XML/SOAP, WSDL, UDDI_** **_Transportation:_**\n\n**_Routing, Queuing, MOM_**\n\n**_Utilities:_**\n\n**_Services_**\n\n**_Services_** **_Accounting, Security_**\n\n**_Data and Knowledge Management:_**\n\n**_Management:_** **_Directories, Discovery, DBMS, NFS_**\n**_QoS, SLA, Monitoring_**\n\n**_Services_** **_Services_**\n\n**_Services_**\n\n\n## Informatics and applied computing\n\nFigure 2.\nThe conceptual\napproach of SOA and\nthe Service Grid\n\n\n**_Services_**\n\n**_Services_**\n\n**_Protocols:_**\n**_Rest, XML/SOAP, WSDL, UDDI_**\n\n**_Utilities:_**\n\n**_Services_** **_Accounting, Security_**\n\n**_Management:_**\n**_QoS, SLA, Monitoring_**\n\n\n**_Services_** **_Services_**\n\n**_Services_**\n\n\n-----\n\n## ACI\n\nFigure 3.\nThe supply chain\n\n\ndeployment fashion. Furthermore, this adoption will cause channel enhancements, like\ndisintermediation, mitigation of information asymmetry, world-wide access, virtualization,\ncost reduction and control, efficient management information, economies of scale, and\nimproved strategic positioning.\nService grids will be enhanced with the new ubiquitous computing capabilities. For\nexample, mobile computing can effectively leverage the quality of service, as well as the\ncollaboration between employers, employees, customers, strategic partners, and third parties\n\n[25]. Furthermore, smartphones can provide a variety of functionalities, like user interaction,\ntask management, user online help, blogging, wiki, chatting, and remote access from trusteed\nparties or customers through appropriate authentication and authorizations, that can\nsignificantly leverage the operational effectiveness of modern enterprises. The dissemination\nof notifications (e.g. Google Cloud Messages) in mobile apps is another example which can\nfacilitate business operations.\n\n8. Developing a high-performance IT-enabled enterprise\nThe IT services implemented with technologies like SOA and ubiquitous computing, must be\nsupplemented by IT management services. Towards this direction [21, 24], the following\nmanagement services can be identified:\n\n(1) IT administration services, for the platforms, the IT systems planning and the project\nmanagement, the SLAs, and the negotiations with the IT suppliers,\n\n(2) IT architecture services, which need the incorporation of system management policies\nfor the effective management of IT resources,\n\n(3) IT R&D services, concerning new products, services, processes, and operations using\nIT, and\n\n(4) training services in the use of IT, strongly needed for the capacity building of\nenterprise’s staff.\n\nAlong with the management, the overall business processes as well as any activity involved\nin a process need to be designed effectively. It has been well-documented that business\nprocesses which are supported by IT, along with the right organizational and management\nservices, are significantly more efficient than those of the old economy [26, 27]. The supply\nchain is a classic example that proves the truth of the matter. Figure 3 illustrates the process\nof supply chain. In brief, creating a performance-oriented IT organization requires process\ninnovation and efficiency, effective communication with the customers, the partners, and the\nsuppliers, inventory management, development of new products and services, and agile\nadaptation of the existing ones.\nIT-enabled enterprises need to be supported by several key functionalities and\ntechnologies [22, 28, 33, 34]. Bridges between the different information systems via\nappropriate interfaces by using e.g. web services (XML or json-based approaches), are also\nrequired. Of course, the adoption of these technologies may raise critical security and risk\nmanagement issues., All the vulnerabilities and security holes must be eliminated in an way.\n\n\n-----\n\n9. Analysis discussion and evaluation\nHereafter, some examples are provided regarding the right way to employ new technologies\nin modern enterprises. As mentioned in the Accenture report “Improving Business ROI with\nDigital Technologies”[1], “to become a more efficient finance organization, considerable\ninvestments must be made to improve processes and technology”. According to this survey, the\nreasons of fail are that (1) there is no clear strategy and vision, (2) they do not deal effectively\nwith the legacy systems, and (3) they do not understand adequately the existing digital\ncapabilities. The outcomes of this survey are fully aligned with the assumptions of our\nresearch presented above.\nIn the report entitled “The ROI of IoT: The 7 benefits it can bring to your business”[2], it is\nstated that “if you know how your key equipment and assets are behaving, and how people are\ninteracting with them, you can unlock the value of that data through an IoT software program\nthat delivers actionable insights and improves business processes in future”. This is a key issue\nfor the development of an improved long-term planning and strategy, which in turn it is\nnecessary for the success of an IT investment project, according to our research.\nAccording to [32], 88% of companies reported that they already use cloud services, while\n50% of companies expect to have all their data stored in the cloud for a period of two years.\nThe same survey revealed that most enterprises already have applications in production\nbased on cloud at a level of about 47%, while a significant percentage intend to develop such\napplications. However, these enterprises are almost entirely concerned with the security of\ntheir data, which requires a high-performance IT-enabled enterprise accordingto our research.\nFinally, according to the study conducted in [22], by adopting virtualization technology\nfor a computer centre, the cost of investing in it gradually yielded positive profits over the\nannual investment cost over a period of five years. Also, the return on investment (ROI)\nbecame positive after the second year, while during the fourth year, the total investment cost\nbecame significantly lower than the projected profits.\nItshould benotedthat fora continuousevaluation of theITstrategy and its implementation,\nit is necessary to define critical success factors of the organizational and the IT infrastructures\nthat are linked to certain KPIs. These indicators will assess not only the effectiveness of\ninternal processes, customer satisfaction or financial gains, but also the achievement of the\nstructural changes necessary to adapt the organization to an ever-evolving environment.\n\n10. Conclusions and future work\nThis paper presented in a concise and detailed way, the very important role that IT still plays\nnowadays in modern enterprises, giving them a competitive advantage in modern globalized\nmarkets. It was posited that enterprises that adopt IT in a smart and innovative way have a\nsignificant capacity building capability, improved future readiness, and better strategic\npositioning.\nIn the future, we intend to evaluate our approach in an enterprise. The process of analysis\nwill include the business strategy, processes and practices, organizational structures, IT\ninfrastructure, etc. The whole task faces the restrictions of the confidentiality of business\ninformation making access to all this information rather difficult, especially when this\ninformation may be made public. An organization before the application of our methodology\nrequires an adequate mapping (a master plan), while then a road map should be developed\nwith all the technical details of integration of practices, plans, technological solutions,\nevaluations, etc. Evaluations could be based among others in the implementation of a\nbalanced scorecard, where the results will be expressed via Key Performance Indicators\nconcerning crucial success factors (CSF) in all, the internal processes, the quality of services to\nthe customers, and the financial profit which is essentially the main motivation of every\nenterprise.\n\n\n## Informatics and applied computing\n\n\n-----\n\n## ACI\n\n\nNotes\n[1. https://www.accenture.com/nl-en/blogs/insights/how-digital-technologies-improve-business-roi](https://www.accenture.com/nl-en/blogs/insights/how-digital-technologies-improve-business-roi)\n\n(last access: 14/7/2021).\n\n[2. https://blog.worldsensing.com/critical-infrastructure/roi-iot/ (last access 14/7/2021).](https://blog.worldsensing.com/critical-infrastructure/roi-iot/)\n\nReferences\n\n1. Naved K, Tabassum F. Reinventing business organizations: the information culture framework.\nSingapore Management Rev. 2005; 27(2): 37-63.\n\n2. Porter ME, Heppelmann JE. How smart, connected products are transforming competition. Harv\nBusiness Rev Spotlight Managing Internet Things. 2014, November 2014.\n\n3. Teece DJ. A capability theory of the firm: an economics and (strategic) management perspective.\nTaylor & Francis Online. 2017, New Zealand Economic Papers; 53(1) 2019.\n\n4. Tiwana A. IT strategy for non-IT managers. MIT Press. 2017, London, England.\n\n5. Mitropoulos S. An integrated model for formulation, alignment, execution and evaluation of\nbusiness and IT strategies. Int J Business Syst Res. 2021; 15(1): 90.\n\n6. Vandenbosch B, Lyytinen K. Much ado about IT: a response to “the corrosion of IT advantage”\nby Carr’ NG, J Business Strategy. 2004; 25(6): 10-12.\n\n7. Schmidt J, Marques MRG, Botti S, Marques MAL. 2019. Recent advances and applications of\n[machine learning in solid-state materials science. Available at: https://www.nature.com/articles/](https://www.nature.com/articles/s41524-019-0221-0)\n[s41524-019-0221-0.](https://www.nature.com/articles/s41524-019-0221-0)\n\n8. Benlamri R, Sparer M. Leadership, innovation and Entrepreneurship as driving forces of the global\neconomy. Proceedings of the 2016 ICLIE, Springer Proceedings in Business and Economics. 2016.\n\n9. Koi-Akrofi GW. Justification for IT investments: evaluation methods, frameworks, and models.\nTexila Int J Management. 2017; 3(2).\n\n10. Melarkode A, From-Poulsen M and Warnakulasuriya S. Delivery agility through IT. Business\nStrategy Rev. 2004, Autumn 2004.\n\n11. Wadhwa M, Harper A. Technology, innovation and enterprise transformation. IGI Glob book Ser\nAdv Business Inf Syst Analytics (Abisa). 2015, Hershey, USA.\n\n12. Schrage M, Kiron D, Hancock B, Breschi R. Performance management’s digital shift. MIT Sloan\n[Management Rev. February 26, 2019. Available at: https://sloanreview.mit.edu/projects/](https://sloanreview.mit.edu/projects/performance-managements-digital-shift/)\n[performance-managements-digital-shift/.](https://sloanreview.mit.edu/projects/performance-managements-digital-shift/)\n\n13. Dong J and Yang CH. Business value of big data analytics: a systems-theoretic approach and\nempirical test. Inf Management. 2020; 57(1): 103124.\n\n14. Ilmudeen, A, Bao, Y, Alharbi, IM. How does strategic alignment affect firm performance? the roles\nof information technology investment and environmental uncertainty, J Enterprise Inf\nManagement. 2019; 32(3): 457-76.\n\n15. Davies P. Strategic objectives and principles. 2015. Version V1.0, University of Sussex, Date of\n[Issue: 9th April 2015 Available at: http://www.sussex.ac.uk/its/pdfs/IT_Strategy_2015.pdf.](http://www.sussex.ac.uk/its/pdfs/IT_Strategy_2015.pdf)\n\n16. Chugunov A, Misnikov Y, Roshchin E, Trutnev D. Electronic governance and open society:\nchallenges in Eurasia. 5th International Conference. 2018, EGOSE 2018.\n\n17. Tallon, P. How information technology infrastructure flexibility shapes strategic alignment: a\ncase study investigation with implications for strategic IS planning. Plann Inf Syst. 2015; 15,\nAcemap: 425-55.\n\n18. Tallon P, Kraemer K. Investigating the relationship between strategic alignment and IT business\nvalue: the discovery of a paradox, In: Shin N (Eds), Creating business value with IT: challenges\nand solutions, Hershey, Pennsylvania, PA: Idea Group Publishing, 2003.\n\n19. Kaleka A, Morgan NA. How marketing capabilities and current performance drive strategic\nintentions in international markets. Ind Marketing Management. 2017; 78: 108-121.\n\n\n-----\n\n20. Coleman P, Papp R. Strategic alignment: analysis of perspectives. Proceedings of the 2006\nSouthern Association for Information Systems Conference, March 11–12, 2006, Florida, FL. 2006.\n\n21. Weill P, Subramani M, Broadbent M. Building IT infrastructure for strategic agility. MIT Sloan\nManagement Rev. 2002, Fall 2002.\n\n22. Lambropoulos G., Mitropoulos S., Douligeris C. Improving business performance by employing\nvirtualization technology: a case study in the financial sector. Computers. 2021; 10(4): 52.\n\n23. Razis M., Mitropoulos S. An integrated approach for the banking intranet/extranet information\nsystems: the interoperability case. Publ Int J Business Syst Res. 2021, Inderscience Publishers.\nforthcoming paper.\n\n24. Katsikogiannis G., Kallergis D., Garofalaki Z., Mitropoulos S., Douligeris C. A policy-aware service\noriented architecture for secure machine-to-machine communications. J Ad Hoc Networks. 2018;\n80, November 2018, Elsevier Science Publishers.\n\n25. Chassapis P, Mitropoulos S, Douligeris C. A prototype mobile application for the athens\nnumismatic museum. J Appl Comput Inform. 2020; ahead-of-print(ahead-of-print), Emerald\nPublishers.\n\n26. Mitropoulos S. A simulation-based approach for IT and business strategy alignment and\nevaluation. Int J Business Inf Syst. 2012; 10(4): 369-396, Inderscience Publishers.\n\n27. Mitropoulos S, Giannakos K, Achlioptas J, Douligeris C. A prototype workflow MIS for supply\nchain management: architecture, implementation and business evaluation. Publ Int J Business Inf\nSyst. 2021, Inderscience Publishers. forthcoming paper.\n\n28. Mitropoulos S, Mitsis C, Valacheas P, Douligeris C. An online Emergency medical management\ninformation system using mobile computing. J Appl Comput Inform. 2020. online version,\nEmerald Publishers.\n\n29. Sayabek, Z, Suieubayeva, S, Utegenova, A. Digital transformation in business, ISCDTE 2019:\ndigital age: chances, challenges and future lecture notes in networks and systems. 2020; 84:\n408-415, Springer, Cham.\n\n30. Gimpel H, R€oglinger M. Digital Transformation Changes and chances- Insights based on an\n[empirical study. 2015. Available at: https://fim-rc.de/wp-content/uploads/2020/02/Fraunhofer-](https://fim-rc.de/wp-content/uploads/2020/02/Fraunhofer-Studie_Digitale-Transformation.pdf)\n[Studie_Digitale-Transformation.pdf.](https://fim-rc.de/wp-content/uploads/2020/02/Fraunhofer-Studie_Digitale-Transformation.pdf)\n\n31. IDC. Exploring the Impact of infrastructure virtualization on digital transformation strategies and\n[carbon emissions, white paper. 2019, Available at: https://www.vmware.com/content/dam/](https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/company/vmware-exploring-impact-of-infrastructure-virtualization-on-digital-transformation-strategies-and-carbon-emissions-whitepaper.pdf)\n[digitalmarketing/vmware/en/pdf/company/vmware-exploring-impact-of-infrastructure-](https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/company/vmware-exploring-impact-of-infrastructure-virtualization-on-digital-transformation-strategies-and-carbon-emissions-whitepaper.pdf)\n[virtualization-on-digital-transformation-strategies-and-carbon-emissions-whitepaper.pdf.](https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/company/vmware-exploring-impact-of-infrastructure-virtualization-on-digital-transformation-strategies-and-carbon-emissions-whitepaper.pdf)\n\n[32. Oracle KPMG. Oracle and KPMG cloud threat report. 2020, Available at: https://www.oracle.com/](https://www.oracle.com/a/ocom/docs/cloud/oracle-cloud-threat-report-2020.pdf)\n[a/ocom/docs/cloud/oracle-cloud-threat-report-2020.pdf, [Accessed 12 June 2021].](https://www.oracle.com/a/ocom/docs/cloud/oracle-cloud-threat-report-2020.pdf)\n\n33. Huang M, et al.. An effective service-oriented networking management architecture for 5Genabled internet of things. Compuert Networks. 2020; 173: 107208.\n\n34. Niu Y, et al. Exploiting device-to-device communications in joint scheduling of access and\nbackhaul for mmWave small cells. IEEE JSAC. 2015; 33(10): 2052-2069.\n\n35. Ahmad Qadri Y, et al.. The future of healthcare internet of things: a survey of emerging\ntechnologies. IEEE Commun Surv Tutorials. 2020; 22(2): 1121-1167.\n\n36. Bera B, et al.. Designing blockchain-based access control protocol in IoT-enabled smart-grid\nsystem. IEEE Internet Things J. 2021; 8(7): 5744-5761.\n\nCorresponding author\n[Sarandis Mitropoulos can be contacted at: smitropoulos@ionio.gr](mailto:smitropoulos@ionio.gr)\n\nFor instructions on how to order reprints of this article, please visit our website:\nwww.emeraldgrouppublishing.com/licensing/reprints.htm\nOr contact us for further details: permissions@emeraldinsight.com\n\n\n## Informatics and applied computing\n\n\n-----\n\n" | Why and how informatics and applied computing can still create structural changes and competitive advantage | PurposeIn the new digital age, enterprises are facing an increasing global competition. In this paper, we first examine how Information Technology (IT) can play an important role in giving significant competitive advantage in the modern enterprises. The business value of IT is examined, as well as the limitations and t... | 2021.0 | 2021-10-01 00:00:00 | https://www.semanticscholar.org/paper/0106a389bab04617737f3a786e08e31fa4afe7e5 | Applied Computing and Informatics | True |
01079c5c50c9b17fe9c05eccc3764f25df77393c | ## future internet
_Article_
# A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M
**Luis F. Gonzalez *** **, Ivan Vidal *** **, Francisco Valera** **, Raul Martin and Dulce Artalejo**
Telematic Engineering Department, Universidad Carlos III de Madrid, Avda. Un... | A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M | Microservices have become promising candidates for the deployment of network and vertical functions in the fifth generation of mobile networks. However, microservice platforms like Kubernetes use a flat networking approach towards the connectivity of virtualised workloads, which prevents the deployment of network funct... | 2023.0 | 2023-08-17 00:00:00 | https://www.semanticscholar.org/paper/01079c5c50c9b17fe9c05eccc3764f25df77393c | Future Internet | True |
0109b47dabb716f4886a9c4317735459dbf5b13b | # MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks
## Pruet Boonma and Junichi Suzuki Department of Computer Science University of Massachusetts, Boston pruet, jxs @cs.umb.edu { }
## Abstract
_Wireless sensor applications (WSNs) are often required_
_to simultaneousl... | MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks | 2008.0 | 2008-01-07 00:00:00 | https://www.semanticscholar.org/paper/0109b47dabb716f4886a9c4317735459dbf5b13b | Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) | True | |
010a74a07848f32bfc5c6155fa3977f24606075a | # SECOND PRICE AUCTIONS
## A Case Study of Secure Distributed Computing
Bart De Decker[1], Gregory Neven[2], Frank Piessens[3], Erik Van Hoeymissen[1]
1K. U. Leuven, Dept. Computer Science, Celestijnenlaan 200A, B-3001 Leuven, Belgium
{Bart.DeDecker.Erik.VanHoeymissen}@cs.kuleuven.ac.be
2Research Assistant of the ... | Second Price Auctions - A Case Study of Secure Distributed Computating | 2001.0 | 2001-09-17 00:00:00 | https://www.semanticscholar.org/paper/010a74a07848f32bfc5c6155fa3977f24606075a | IFIP International Conference on Distributed Applications and Interoperable Systems | True | |
010a9df80b73d0c589eaffcb3a9f4cb05b07d225 | # Emory Law Journal Emory Law Journal
### Volume 70 Issue 2
2020
# The Elections Clause Obligates Congress to Enact a Federal Plan The Elections Clause Obligates Congress to Enact a Federal Plan
to Secure U.S. Elections Against Foreign Cyberattacks to Secure U.S. Elections Against Foreign Cyberattacks
### Suman ... | The Elections Clause Obligates Congress to Enact a Federal Plan to Secure U.S. Elections Against Foreign Cyberattacks | While foreign adversaries continue to launch cyberattacks aimed at disrupting elections in the United States, Congress has been reluctant to take action. After Russia interfered in the 2016 election, cybersecurity experts articulated clear measures that must be taken to secure U.S. election systems against foreign inte... | 2020.0 | NaT | https://www.semanticscholar.org/paper/010a9df80b73d0c589eaffcb3a9f4cb05b07d225 | False | |
010d55f6ebe83e48bb83926c88b0d72be0c08538 | ## **International Journal of Current Science Research and Review **
### **ISSN: 2581-8341 ** Volume 06 Issu e 07 July 2023 **DOI: 10.47191/ijcsrr/V6-i7-108, Impact Factor: 6.789 ** **IJCSRR @ 2023 **
### **www.ijcsrr.org**
# **Investment Portfolio Optimization in Indonesia (Study On: Lq-45 Stock ** **Index, Governme... | Investment Portfolio Optimization in Indonesia (Study On: Lq-45 Stock Index, Government Bond, United States Dollar, Gold and Bitcoin) | In forming their portfolios, investors should analyze the risk and return of each investment instrument. This is aimed at preventing investors from speculating and gambling with their investments. Conducting an investment portfolio optimization study on LQ-45 stock index, government bond, USD, gold, and Bitcoin can pro... | 2023.0 | 2023-07-24 00:00:00 | https://www.semanticscholar.org/paper/010d55f6ebe83e48bb83926c88b0d72be0c08538 | International Journal of Current Science Research and Review | True |
010d89793ad314e40acc52f726a8eb4440010419 | # **Blockchain as privacy and security** **solution for smart environments: A** **Survey**
**MAAD EBRAHIM** **[1]** **, ABDELHAKIM HAFID** **[1]** **(Member, IEEE), and ETIENNE ELIE** **[2]**
1 Department of Computer Science and Operations Research (DIRO), University of Montreal, Montreal, QC H3T1J4 Canada
2 Intel Co... | Blockchain as privacy and security solution for smart environments: A Survey | Blockchain was always associated with Bitcoin, cryptocurrencies, and digital asset trading. However, its benefits are far beyond that. It supports technologies like the Internet-of-Things (IoT) to pave the way for futuristic smart environments, like smart homes, smart transportation, smart energy trading, smart industr... | 2022.0 | 2022-03-16 00:00:00 | https://www.semanticscholar.org/paper/010d89793ad314e40acc52f726a8eb4440010419 | arXiv.org | True |
010def07d358187bc10b482d05b77f0e27f833dc | Howell, Bronwyn E.; Potgieter, Petrus H.; Sadowski, Bert M.
**Conference Paper**
## Governance of Blockchain and Distributed Ledger Technology Projects
2nd Europe - Middle East - North African Regional Conference of the International
Telecommunications Society (ITS): "Leveraging Technologies For Growth", Aswan, Egypt... | Governance of Blockchain and Distributed Ledger Technology Projects | Blockchains are the most well-known example of a distributed ledger technology (DLT). Unlike classic databases, the ledger is not maintained by any central authority. The integrity of the ledger is maintained automatically by an algorithmic consensus process whereby nodes vote and agree upon the authoritative version. ... | 2019.0 | 2019-02-01 00:00:00 | https://www.semanticscholar.org/paper/010def07d358187bc10b482d05b77f0e27f833dc | Social Science Research Network | True |
010f3407c141dfafbcddf8db50f4b8914f9a3d0d | #### EGEE-PUB-2008-002
# Scheduling for Responsive Grids
## Germain-Renaud, C LRI - CNRS and Universit Paris-Sud et al
### 20 December 2008
Journal of Grid Computing
#### EGEE-II is a project funded by the European Commission Contract number INFSO-RI-031688
The electronic version of this EGEE Publication is avai... | Scheduling for Responsive Grids | 2008.0 | 2008-03-01 00:00:00 | https://www.semanticscholar.org/paper/010f3407c141dfafbcddf8db50f4b8914f9a3d0d | Journal of Grid Computing | True | |
0112123cfb29e45be6d0a80751184ab7f20888df | Published Online September 2019 in MECS (http://www.mecs-press.org/)
DOI: 10.5815/ijcnis.2019.09.04
# An Approach to Develop a Transactional
Calculus for Semi-Structured
Database System
## Rita Ganguly
Department of Computer Applications; Dr.B.C.Roy Engineering College; Durgapur: 713206; West Bengal, India
E-mail... | An Approach to Develop a Transactional Calculus for Semi-Structured Database System | — Traditional database system forces all data to adhere to an explicitly specified, rigid schema and most of the limitations of traditional database may be overcome by semi-structured database. Whereas a traditional transaction system guarantee that either all modifications are done or none of these i.e. the database m... | 2019.0 | 2019-09-08 00:00:00 | https://www.semanticscholar.org/paper/0112123cfb29e45be6d0a80751184ab7f20888df | International Journal of Computer Network and Information Security | True |
0112d65d2ea11c065d7eb5f6fada9287002aa158 | Hindawi
Wireless Communications and Mobile Computing
Volume 2022, Article ID 8482415, 16 pages
[https://doi.org/10.1155/2022/8482415](https://doi.org/10.1155/2022/8482415)
# Research Article A Data Management Model for Intelligent Water Project Construction Based on Blockchain
## Zhoukai Wang,[1,2] Kening Wang,[3] Yi... | A Data Management Model for Intelligent Water Project Construction Based on Blockchain | The engineering construction-related data is essential for evaluating and tracing project quality in industry 4.0. Specifically, the preservation of the information is of great significance to the safety of intelligent water projects. This paper proposes a blockchain-based data management model for intelligent water pr... | 2022.0 | 2022-03-09 00:00:00 | https://www.semanticscholar.org/paper/0112d65d2ea11c065d7eb5f6fada9287002aa158 | Wireless Communications and Mobile Computing | True |
01155ceeaefeab3737c49cebde0b4b9e01f7d9cd | Vol. 36, No. 1, February, 2022, pp. 61-71
Journal homepage: http://iieta.org/journals/ria
# TCP/UDP-Based Exploitation DDoS Attacks Detection Using AI Classification Algorithms with Common Uncorrelated Feature Subset Selected by Pearson, Spearman and Kendall Correlation Methods
Kishore Babu Dasari[1*], Nagaraju Dev... | TCP/UDP-Based Exploitation DDoS Attacks Detection Using AI Classification Algorithms with Common Uncorrelated Feature Subset Selected by Pearson, Spearman and Kendall Correlation Methods | The Distributed Denial of Service (DDoS) attack is a serious cyber security attack that attempts to disrupt the availability security principle of computer networks and information systems. It's critical to detect DDoS attacks quickly and accurately while using as less computing power as possible in order to minimize d... | 2022.0 | 2022-02-28 00:00:00 | https://www.semanticscholar.org/paper/01155ceeaefeab3737c49cebde0b4b9e01f7d9cd | Revue d'Intelligence Artificielle | True |
01157f7c700e92323a5933e00c71cf001a8bac88 | Published Online June 2018 in MECS (http://www.mecs-press.org/)
DOI: 10.5815/ijisa.2018.06.05
# Blockchain with Internet of Things: Benefits,
Challenges, and Future Directions
## Hany F. Atlam
Electronic and Computer Science Dept., University of Southampton, Southampton, UK
Computer Science and Engineering Dept., ... | Blockchain with Internet of Things: Benefits, Challenges, and Future Directions | The Internet of Things (IoT) has extended the internet connectivity to reach not just computers and humans, but most of our environment things. The IoT has the potential to connect billions of objects simultaneously which has the impact of improving information sharing needs that result in improving our life. Although ... | 2018.0 | 2018-06-08 00:00:00 | https://www.semanticscholar.org/paper/01157f7c700e92323a5933e00c71cf001a8bac88 | International Journal of Intelligent Systems and Applications | True |
0118bd5580dc6d23a0c0b67241c735b25e405e09 | # q p y Challenges of Cloudlets in Smart Grid
1Stephen Ugwuanyi
_Electrical and Electronic Engineering_
_University of Strathclyde_
Glasgow, United Kingdom
Stephen.ugwuanyi@strath.ac.uk
2Kinan Ghanem
_Power Networks Demonstration Centre_
_University of Strathclyde_
Glasgow, United Kingdom
kinan.ghanem@strath.ac.uk
... | Communication Requirements and Deployment Challenges of Cloudlets in Smart Grid | Intelligent and distributed power networks are becoming more complex with the addition of cloudlets infrastructure. This paper is the initial output of a Low Latency Edge Containerisation and Virtualisation project at PNDC. This project investigates the performance and communication requirements of deploying edge compu... | 2022.0 | 2022-11-29 00:00:00 | https://www.semanticscholar.org/paper/0118bd5580dc6d23a0c0b67241c735b25e405e09 | International Conference on Smart Communications and Networking | True |
011c4c415a99465d1d643d4f3f5371f3d885637c | ## sustainability
_Review_
# Edge AI and Blockchain for Smart Sustainable Cities: Promise and Potential
**Elarbi Badidi**
Department of Computer Science and Software Engineering, College of Information Technology, UAE University,
Al-Ain P.O. Box 15551, United Arab Emirates; ebadidi@uaeu.ac.ae; Tel.: +971-3-713-5552
... | Edge AI and Blockchain for Smart Sustainable Cities: Promise and Potential | Modern cities worldwide are undergoing radical changes to foster a clean, sustainable and secure environment, install smart infrastructures, deliver intelligent services to residents, and facilitate access for vulnerable groups. The adoption of new technologies is at the heart of implementing many initiatives to addres... | 2022.0 | 2022-06-22 00:00:00 | https://www.semanticscholar.org/paper/011c4c415a99465d1d643d4f3f5371f3d885637c | Sustainability | True |
011d61920ae95bbe63193f2e73e7eab7bc116206 | CBU I NTERNATIONAL C ONFERENCE ON I NNOVATIONS IN S CIENCE AND E DUCATION
M ARCH 21-23, 2018, P RAGUE, C ZECH R EPUBLIC WWW . CBUNI . CZ, WWW . JOURNALS . CZ
# **ANALYSIS OF BITCOIN MARKET EFFICIENCY BY USING MACHINE LEARNING ** Yuki Hirano [1], Lukáš Pichl [2], Cheoljun Eom [3], Taisei Kaizoji [4]
**Abstract:** The ... | ANALYSIS OF BITCOIN MARKET EFFICIENCY BY USING MACHINE LEARNING | The issue of market efficiency for cryptocurrency exchanges has been largely unexplored. Here we put Bitcoin, the leading cryptocurrency, on a test by studying the applicability of the Efficient Market Hypothesis by Fama from two viewpoints: (1) the existence of profitable arbitrage spread among Bitcoin exchanges, and ... | 2018.0 | 2018-09-24 00:00:00 | https://www.semanticscholar.org/paper/011d61920ae95bbe63193f2e73e7eab7bc116206 | CBU International Conference Proceedings | True |
011e06a3b06257e73ee37540df71cd6a595d3c03 | **Blockchain for Good?[1]**
Beth Kewell, University of Surrey, Surrey, UK.
Richard Adams, University of Surrey, Surrey, UK.
Glenn Parry, University of the West of England, UK.
Explores key areas of Blockchain innovation that appear to represent viable
catalysts for achieving global Sustainable Development targets.
P... | Blockchain for good | 2017.0 | 2017-09-01 00:00:00 | https://www.semanticscholar.org/paper/011e06a3b06257e73ee37540df71cd6a595d3c03 | True | ||
011f7eb8584458d0676216165e63dbefce1d393a | # MINERVA : A Scalable Efficient Peer-to-Peer ∞
Search Engine
Sebastian Michel[1], Peter Triantafillou[2], and Gerhard Weikum[1]
1 Max-Planck-Institut f¨ur Informatik, 66123 Saarbr¨ucken, Germany
_{smichel, weikum}@mpi-inf.mpg.de_
2 R.A. Computer Technology Institute and University of Patras, 26500 Greece
peter@c... | MINERVA infinity : A Scalable Efficient Peer-to-Peer Search Engine. | 2005.0 | NaT | https://www.semanticscholar.org/paper/011f7eb8584458d0676216165e63dbefce1d393a | False | ||
012060a1b33dbb659214465af5ad64974ca35f8e | Contents lists available at ScienceDirect
# Automation in Construction
[journal homepage: www.elsevier.com/locate/autcon](https://www.elsevier.com/locate/autcon)
#### Review
## Exploratory literature review of blockchain in the construction industry
### Denis J. Scott [*], Tim Broyd, Ling Ma
_Bartlett School of ... | Exploratory literature review of blockchain in the construction industry | 2021.0 | 2021-12-01 00:00:00 | https://www.semanticscholar.org/paper/012060a1b33dbb659214465af5ad64974ca35f8e | Automation in Construction | True | |
012123313b7676f86c331a3e62bd39dec6fa9771 | # electronics
_Article_
## Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability
**N. Sangeeta and Seung Yeob Nam ***
Department of Information and Communication Engineering, Yeungnam University,
Gyeongsan 38541, Republic of Korea
*** Corres... | Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability | Closed-circuit television (CCTV) cameras and black boxes are indispensable for road safety and accident management. Visible highway surveillance cameras can promote safe driving habits while discouraging moving violations. According to CCTV laws, footage captured by roadside cameras must be securely stored, and authori... | 2023.0 | 2023-03-24 00:00:00 | https://www.semanticscholar.org/paper/012123313b7676f86c331a3e62bd39dec6fa9771 | Electronics | True |
012136c4ef2730ee762ae3110798b0648dfade38 | Edited by:
Alessandra Tanda,
University of Pavia, Italy
Reviewed by:
Jürgen Hakala,
Leonteq Securities AG, Switzerland
Marika Vezzoli,
University of Brescia, Italy
*Correspondence:
Cinzia Baldan
[cinzia.baldan@unipd.it](mailto:cinzia.baldan@unipd.it)
Specialty section:
This article was submitted to
Artific... | The Bitcoin as a Virtual Commodity: Empirical Evidence and Implications | The present work investigates the impact on financial intermediation of distributed ledger technology (DLT), which is usually associated with the blockchain technology and is at the base of the cryptocurrencies' development. “Bitcoin” is the expression of its main application since it was the first new currency that ga... | 2020.0 | 2020-04-30 00:00:00 | https://www.semanticscholar.org/paper/012136c4ef2730ee762ae3110798b0648dfade38 | Frontiers in Artificial Intelligence | True |
0127a973ed71969408342e74ef1b27ebbb67a76d | _Foundation of Computer Science FCS, New York, USA_
_Volume 3– No.5, November 2015 – www.caeaccess.org_
# FOG Computing: The new Paradigm
## Hathal Salamah A. Alwageed
#### Department of Computer Engineering and Network
Aljouf University, Saudi Arabia
## ABSTRACT
As the Internet of Everything (IoE) heats up, Cisc... | FOG Computing: The new Paradigm | 2015.0 | NaT | https://www.semanticscholar.org/paper/0127a973ed71969408342e74ef1b27ebbb67a76d | True | ||
01290c447f2304ff3c347c3ac0dfa22f053e281b | Hindawi
Security and Communication Networks
Volume 2018, Article ID 4963932, 16 pages
[https://doi.org/10.1155/2018/4963932](https://doi.org/10.1155/2018/4963932)
#### Research Article A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord
###### Riccardo Pecori 1 and Luca Veltri 2
_1SMARTEST ... | A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord | A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, especially those based on Distributed Hash Tables (DHTs). Tampering routing tables by means of multiple fake identities can make routing, storing, and retrieving operations significantly more difficult and time-consuming. ... | 2018.0 | 2018-11-12 00:00:00 | https://www.semanticscholar.org/paper/01290c447f2304ff3c347c3ac0dfa22f053e281b | Secur. Commun. Networks | True |
012b5aa479f62062944ab4190a60d6f940f10c37 | # energies
_Article_
## A Sponge-Based Key Expansion Scheme for Modern Block Ciphers
**Maciej Sawka *[,†]** **and Marcin Niemiec** **[†]**
Department of Telecommunications, AGH University of Science and Technology, Mickiewicza 30,
30-059 Krakow, Poland
*** Correspondence: maciejsawka@gmail.com**
† These authors con... | A Sponge-Based Key Expansion Scheme for Modern Block Ciphers | Many systems in use today require strong cryptographic primitives to ensure confidentiality and integrity of data. This is especially true for energy systems, such as smart grids, as their proper operation is crucial for the existence of a functioning society. Because of this, we observe new developments in the field o... | 2022.0 | 2022-09-20 00:00:00 | https://www.semanticscholar.org/paper/012b5aa479f62062944ab4190a60d6f940f10c37 | Energies | True |
012bcc9a33bf8686741b315847b6c45f3b23fbb9 | ## Safe Fusion Compared to Established Distributed Fusion Methods
#### Jonas Nygårds, Viktor Deleskog and Gustaf Hendeby
### Conference Publication
#### N.B.: When citing this work, cite the original article.
Original Publication:
Jonas Nygårds, Viktor Deleskog and Gustaf Hendeby, Safe Fusion Compared to Establi... | Safe fusion compared to established distributed\ fusion methods | 2016.0 | 2016-09-01 00:00:00 | https://www.semanticscholar.org/paper/012bcc9a33bf8686741b315847b6c45f3b23fbb9 | International Conference on Multisensor Fusion and Integration for Intelligent Systems | True | |
012cfea30b807059314c2e98d96bdbd502bdf409 | Hindawi
Mobile Information Systems
Volume 2022, Article ID 8930472, 17 pages
[https://doi.org/10.1155/2022/8930472](https://doi.org/10.1155/2022/8930472)
# Review Article Self-Sovereign Identity Solution for Blockchain-Based Land Registry System: A Comparison
## Mohammed Shuaib,[1,2] Noor Hafizah Hassan,[1] Sahnius U... | Self-Sovereign Identity Solution for Blockchain-Based Land Registry System: A Comparison | Providing an identity solution is essential for a reliable blockchain-based land registry system. A secure, privacy-preserving, and efficient identity solution is essential but challenging. This paper examines the current literature and provides a systematic literature review in three stages based on the three research... | 2022.0 | 2022-04-04 00:00:00 | https://www.semanticscholar.org/paper/012cfea30b807059314c2e98d96bdbd502bdf409 | Mobile Information Systems | True |
012dbb6ffa748446949f36b1e1551bc593a440bb | ## sustainability
_Article_
# Critical Dimensions of Blockchain Technology Implementation in the Healthcare Industry: An Integrated Systems Management Approach
**Satyabrata Aich** **[1]** **, Sushanta Tripathy** **[2], Moon-Il Joo** **[1]** **and Hee-Cheol Kim** **[3,]***
1 Institute of Digital Anti-Aging Healthcare... | Critical Dimensions of Blockchain Technology Implementation in the Healthcare Industry: An Integrated Systems Management Approach | In the digital era, almost every system is connected to a digital platform to enhance efficiency. Although life is thus improved, security issues remain important, especially in the healthcare sector. The privacy and security of healthcare records is paramount; data leakage is socially unacceptable. Therefore, technolo... | 2021.0 | 2021-05-08 00:00:00 | https://www.semanticscholar.org/paper/012dbb6ffa748446949f36b1e1551bc593a440bb | Sustainability | True |
012e174c148901bedf28ae161518f3fa5c2eee4c | # AN OVERVIEW OF THE OMNeT++ SIMULATION ENVIRONMENT
## András Varga
### OpenSim Ltd.
Sz l köz 11, 1032 ő ő
Budapest, Hungary
## andras.varga@omnest.com
ABSTRACT
The OMNeT++ discrete event simulation environment has been
publicly available since 1997. It has been created with the
simulation of communication net... | An overview of the OMNeT++ simulation environment | 2008.0 | 2008-03-03 00:00:00 | https://www.semanticscholar.org/paper/012e174c148901bedf28ae161518f3fa5c2eee4c | International ICST Conference on Simulation Tools and Techniques | True | |
012e3df4305cbe5ca918f6f7f87aa80a93593662 | #### ECONOMICS OF ENTERPRISES:
ECONOMICS AND MANAGEMENT OF ENTERPRISE
ISSN 2664-9969
### UDC 336.02:336.64
JEL Classification: G32
DOI: 10.15587/2706-5448.2023.285749
## Eugine Nkwinika, Segun Akinola
# THE IMPORTANCE OF FINANCIAL MANAGEMENT IN SMALL AND MEDIUM-SIZED ENTERPRISES (SMEs): AN ANALYSIS OF CHALLE... | The importance of financial management in small and medium-sized enterprises (SMEs): an analysis of challenges and best practices | The object of research is the importance of monetary management in Small and Medium-sized Enterprises (SMEs), specializing in challenges, best practices, and future trends. Financial management in SMEs is an important aspect that influences their growth, sustainability, and competitiveness. The paper begins by defining... | 2023.0 | 2023-09-28 00:00:00 | https://www.semanticscholar.org/paper/012e3df4305cbe5ca918f6f7f87aa80a93593662 | Technology audit and production reserves | True |
0130f7d0c517b61a63e1018d5a1ba30c13ab16ab | Edited by:
Bo Yang,
Kunming University of Science and
Technology, China
Reviewed by:
Yixuan Chen,
The University of Hong Kong,
Hong Kong, SAR China
Yang Li,
Northeast Electric Power University,
China
*Correspondence:
Xinmiao Liu
[lxm2021@foxmail.com](mailto:lxm2021@foxmail.com)
Specialty section:
This article was su... | Optimal Locating and Sizing of BESSs in Distribution Network Based on Multi-Objective Memetic Salp Swarm Algorithm | Battery energy storage systems (BESSs) are a key technology to accommodate the uncertainties of RESs and load demand. However, BESSs at an improper location and size may result in no-reasonable investment costs and even unsafe system operation. To realize the economic and reliable operation of BESSs in the distribution... | 2021.0 | 2021-07-27 00:00:00 | https://www.semanticscholar.org/paper/0130f7d0c517b61a63e1018d5a1ba30c13ab16ab | Frontiers in Energy Research | True |
01324b0a808e3440c60626f6cacec48ecc261d44 | p g
## RESEARCH ARTICLE Open Access
# A pay for performance scheme in primary care: Meta-synthesis of qualitative studies on the provider experiences of the quality and outcomes framework in the UK
### Nagina Khan[1*], David Rudoler[2], Mary McDiarmid[3] and Stephen Peckham[4]
Abstract
Background: The Quality and ... | A pay for performance scheme in primary care: Meta-synthesis of qualitative studies on the provider experiences of the quality and outcomes framework in the UK | Background The Quality and Outcomes Framework (QOF) is an incentive scheme for general practice, which was introduced across the UK in 2004. The Quality and Outcomes Framework is one of the biggest pay for performance (P4P) scheme in the world, worth £691 million in 2016/17. We now know that P4P is good at driving some... | 2020.0 | 2020-07-13 00:00:00 | https://www.semanticscholar.org/paper/01324b0a808e3440c60626f6cacec48ecc261d44 | BMC Family Practice | True |
0132509cb91893022691151e825cdef22692df5c | **_Journal of Sport & Exercise Psychology, 2015, 37, 626 -636_**
http://dx.doi.org/10.1123/jsep.2015-0166
© 2015 Human Kinetics, Inc.
ORIGINAL RESEARCH
# Sensorimotor Rhythm Neurofeedback Enhances Golf Putting Performance
#### Ming-Yang Cheng,[1] Chung-Ju Huang,[2] Yu-Kai Chang,[3] Dirk Koester,[1] Thomas Schack,... | Sensorimotor Rhythm Neurofeedback Enhances Golf Putting Performance. | 2015.0 | 2015-12-01 00:00:00 | https://www.semanticscholar.org/paper/0132509cb91893022691151e825cdef22692df5c | Journal of Sport & Exercise Psychology (JSEP) | True | |
013973151bd1db3552ea8d8278c6dece1bbdd352 | ### SUERF Policy Briefs
### No 114, June 2021
# How to issue a privacy-preserving central bank digital currency
## By Christian Grothoff and Thomas Moser[1]
_JEL codes: E42, E51, E52, E58, G2._
_Keywords: Central Bank Digital Currency, privacy, blind signatures._
_Many central banks are currently investigati... | How to issue a privacy-preserving central bank digital currency | JEL | 2021.0 | NaT | https://www.semanticscholar.org/paper/013973151bd1db3552ea8d8278c6dece1bbdd352 | Social Science Research Network | True |
01398bbd4ecc589fecef134641d1016fdc1c044c | # sensors
_Article_
## Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve
**Md. Mainul Islam** **[1]** **, Md. Selim Hossain** **[2]** **, Moh. Khalid Hasan** **[1]** **, Md. Shahjalal** **[1]**
**and Yeong Min Jang** **[1,]***
1 Department of Electronic... | Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve | With the swift evolution of wireless technologies, the demand for the Internet of Things (IoT) security is rising immensely. Elliptic curve cryptography (ECC) provides an attractive solution to fulfill this demand. In recent years, Edwards curves have gained widespread acceptance in digital signatures and ECC due to th... | 2020.0 | 2020-09-01 00:00:00 | https://www.semanticscholar.org/paper/01398bbd4ecc589fecef134641d1016fdc1c044c | Italian National Conference on Sensors | True |
013d1b03a0f7dfb6675f903e52da4f3ae809f719 | # Model for Simulation of Heterogeneous High-Performance Computing Environments
Rodrigo Fernandes de Mello[1] and Luciano José Senger[2][⋆]
1 Universidade de São Paulo – Departamento de Computação
Instituto de Ciências Matematicas e de Computação
Av. Trabalhador Saocarlense, 400 Caixa Postal 668
CEP 13560-970 São Car... | Model for Simulation of Heterogeneous High-Performance Computing Environments | 2006.0 | 2006-06-10 00:00:00 | https://www.semanticscholar.org/paper/013d1b03a0f7dfb6675f903e52da4f3ae809f719 | International Conference on High Performance Computing for Computational Science | True | |
013f3dbde05a9be858502c6cc5e85ea5ebae5ab6 | ## IJCS 3,2
198
Received 26 March 2019
Revised 3 June 2019
Accepted 11 July 2019
International Journal of Crowd
Science
Vol. 3 No. 2, 2019
pp. 198-220
EmeraldPublishingLimited
2398-7294
[DOI 10.1108/IJCS-03-2019-0012](http://dx.doi.org/10.1108/IJCS-03-2019-0012)
www.emeraldinsight.com/2398-7294.htm
# Collective ... | Collective hybrid intelligence: towards a conceptual framework | PurposeHuman or machine, which one is more intelligent and powerful for performing computing and processing tasks? Over the years, researchers and scientists have spent significant amounts of money and effort to answer this question. Nonetheless, despite some outstanding achievements, replacing humans in the intellectu... | 2019.0 | 2019-08-30 00:00:00 | https://www.semanticscholar.org/paper/013f3dbde05a9be858502c6cc5e85ea5ebae5ab6 | International Journal of Crowd Science | True |
01407e4317cba968ae41a1d029b154d8e50a0f08 | ## International Journal of Computer and Communication International Journal of Computer and Communication
Technology Technology
##### Volume 2 Issue 2 Article 1
April 2011
## Next Generation Middleware Technology for Mobile Computing Next Generation Middleware Technology for Mobile Computing
##### B. Darsana
Sr.... | Next Generation Middleware Technology for Mobile Computing | 2010.0 | NaT | https://www.semanticscholar.org/paper/01407e4317cba968ae41a1d029b154d8e50a0f08 | False | ||
01416385e99636f6fdff4d317f449a3df426cd4e | # electronics
_Article_
## STAFL: Staleness-Tolerant Asynchronous Federated Learning on Non-iid Dataset
**Feng Zhu** **[1,2], Jiangshan Hao** **[1,]*** **, Zhong Chen** **[1,2], Yanchao Zhao** **[1,]*, Bing Chen** **[1]** **and Xiaoyang Tan** **[1]**
1 Collage of Computer Science and Technology, Nanjing University o... | STAFL: Staleness-Tolerant Asynchronous Federated Learning on Non-iid Dataset | With the development of the Internet of Things, edge computing applications are paying more and more attention to privacy and real-time. Federated learning, a promising machine learning method that can protect user privacy, has begun to be widely studied. However, traditional synchronous federated learning methods are ... | 2022.0 | 2022-01-20 00:00:00 | https://www.semanticscholar.org/paper/01416385e99636f6fdff4d317f449a3df426cd4e | Electronics | True |
0141e74a0695b544b3fd99677de1723dd1fe1548 | # Formal Correctness of an Automotive Bus Controller Implementation at Gate-Level
Eyad Alkassar, Peter B¨ohm, and Steffen Knapp
**Abstract We formalize the correctness of a real-time scheduler in a time-triggered**
architecture. Where previous research elaborated on real-time protocol correctness,
we extend this work... | Formal Correctness of an Automotive Bus Controller Implementation at Gate-Level | 2008.0 | 2008-09-07 00:00:00 | https://www.semanticscholar.org/paper/0141e74a0695b544b3fd99677de1723dd1fe1548 | IFIP Working Conference on Distributed and Parallel Embedded Systems | True | |
0141e776d7e5a2b7699f1b5cebf8af033b0c3e25 | ### ARTICLE
https://doi.org/10.1038/s42005-023-01375-x **OPEN**
## Bright and dark Talbot pulse trains on a chip
#### Jiaye Wu 1, Marco Clementi 1, Edgars Nitiss1, Jianqi Hu 1, Christian Lafforgue 1 & Camille-Sophie Brès 1✉
Temporal Talbot effect, the intriguing phenomenon of the self-imaging of optical pulse tra... | Bright and dark Talbot pulse trains on a chip | Temporal Talbot effect, the intriguing phenomenon of the self-imaging of optical pulse trains, is extensively investigated using macroscopic components. However, the ability to manipulate pulse trains, either bright or dark, through the Talbot effect on integrated photonic chips to replace bulky instruments has rarely ... | 2023.0 | 2023-09-13 00:00:00 | https://www.semanticscholar.org/paper/0141e776d7e5a2b7699f1b5cebf8af033b0c3e25 | Communications Physics | True |
01456d7ead48b17af151463d73aee8611ad0f450 | UDK: 347.78:004.031.4(4 672EU)
# NFTs AND COPYRIGHT LAW
_Belma Mujević[1*], Mersad Mujević[2]_
[1The University of Szeged, Faculty of Law and Political Sciences, Hungary, e-mail: mujevic5@gmail.com](mailto:mujevic5%40gmail.com?subject=)
[[2]International University in Novi Pazar, Republic of Serbia, e-mail: mersadm... | NFTs AND COPYRIGHT LAW | NFT stands for “non-fungible token” and refers to a cryptographically protected asset that represents a unique object, work of art, real estate, ticket, or certificate. Like cryptocurrencies, each NFT contains ownership data to facilitate identification and transfer between token holders. By purchasing a token, the own... | 2023.0 | 2023-05-31 00:00:00 | https://www.semanticscholar.org/paper/01456d7ead48b17af151463d73aee8611ad0f450 | SCIENCE International Journal | True |
0148207de2efe9b34947ed00528c7d09f7af7249 | The 6th International Conference on Economic Management and Green Development (ICEMGD 2022)
DOI: 10.54254/2754-1169/4/2022910
# ***Is Bitcoin the 'Digit Gold'——A Potential Safe-haven Asset? ***
## **Shupeng Guan [1,] *, Han Jiang [2], Muyang Zhou [3], and Jianuo Liu [4]** *1 School of Mathamatics, University of Birmin... | Is Bitcoin the 'Digit Gold'A Potential Safe-haven Asset? | In this paper, we examine whether bitcoin has the potential to become safe-haven asset that can rival gold in the future. We observed, compared and analyzed and the performance of bitcoin and gold in face of a falling market and inflation pressure. We can see if investors can rely on bitcoin to reduce risk exposure sig... | 2023.0 | 2023-03-21 00:00:00 | https://www.semanticscholar.org/paper/0148207de2efe9b34947ed00528c7d09f7af7249 | Advances in Economics, Management and Political Sciences | True |
014981e1454105af6a6275bef4baf47afbeb7377 | ## AODV-Miner: Consensus-Based Routing Using Node Reputation
### Edward Staddon, Valeria Loscrì, Nathalie Mitton
To cite this version:
#### Edward Staddon, Valeria Loscrì, Nathalie Mitton. AODV-Miner: Consensus-Based Routing Using Node Reputation. WiMob 2022 - The 18th International Conference on Wireless and Mobil... | AODV-Miner: Consensus-Based Routing Using Node Reputation | With the increase of Internet of Things (IoT) applications, securing their communications is an important task. In multi-hop wireless networks, nodes must unconditionally trust their neighbours when performing routing activities. However, this is often their downfall as malicious nodes can infiltrate the network and ca... | 2022.0 | 2022-10-10 00:00:00 | https://www.semanticscholar.org/paper/014981e1454105af6a6275bef4baf47afbeb7377 | 2022 18th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) | True |
0149a1792d4ed2dfb4972b5a49c089d2f0bead9e | The Evaluation of Block Chain Technology within the Scope of Ripple and Banking Activities **153**
*UDK: 336.71:004*
*DOI: 10.2478/jcbtp-2021-0029*
*Journal of Central Banking Theory and Practice, 2021, 3, pp. 153-167*
*Received: 26 February 2020; accepted: 06 October 2020*
## ***Erdogan Kaygin [*], Yunus Zengin [*... | The Evaluation of Block Chain Technology within the Scope of Ripple and Banking Activities | Abstract Technological developments have always led to changes in all aspects of our lives. Crypto currency is one of those changes. As a result of those changes, thousands of currencies such as bitcoin, ripple, litecoin and ethereum have evolved and have found a use in business. The present study focuses upon Ripple a... | 2021.0 | 2021-09-01 00:00:00 | https://www.semanticscholar.org/paper/0149a1792d4ed2dfb4972b5a49c089d2f0bead9e | Journal of Central Banking Theory and Practice | True |
0149bc70d355eaf564fd6bf2a25587b73c634961 | **_ISSN: 2321-8169 Volume: 9 Issue: 9_**
**_DOI: https://doi.org/10.17762/ijritcc.v9i9.5489_**
**_Article Received: 20 June 2021 Revised: 23 July 2021 Accepted: 30 August 2021 Publication: 30 September 2021_**
______________________________________________________________________________________________________________... | A Comparative and Comprehensive Analysis of Smart Contract Enabled Blockchain Applications | Blockchain is a disruptive innovation that is already reshaping corporate, social, and political connections, as well as any other form of value exchange. Again, this isn't simply a shift; it's a fast-moving phenomenon that has already begun. Top financial institutions and a large number of businesses have begun to inv... | 2021.0 | 2021-09-30 00:00:00 | https://www.semanticscholar.org/paper/0149bc70d355eaf564fd6bf2a25587b73c634961 | International Journal on Recent and Innovation Trends in Computing and Communication | True |
014a35c538928a59935d1940bad737afa4159dfa | **Journal of Neuropathology and Experimental Neurology** Vol. 61, No. 1
Copyright � 2002 by the American Association of Neuropathologists January, 2002
pp. 33 45
# Morphological and Biochemical Correlations of Abnormal Tau Filaments in Progressive Supranuclear Palsy
MAKIO TAKAHASHI, MD, KAREN M. WEIDENHEIM, MD, DEN... | Morphological and Biochemical Correlations of Abnormal Tau Filaments in Progressive Supranuclear Palsy | 2002.0 | 2002-01-01 00:00:00 | https://www.semanticscholar.org/paper/014a35c538928a59935d1940bad737afa4159dfa | Journal of Neuropathology and Experimental Neurology | True | |
014ad6b5c003ecf7566570266d43154ac8683758 | ## Convolutional Transformer based Dual Discriminator Generative Adversarial Networks for Video Anomaly Detection
### Xinyang Feng
##### Columbia University New York, New York, USA xf2143@columbia.edu
### Dongjin Song[∗]
##### University of Connecticut Storrs, Connecticut, USA dongjin.song@uconn.edu
### Zhengzha... | Convolutional Transformer based Dual Discriminator Generative Adversarial Networks for Video Anomaly Detection | Detecting abnormal activities in real-world surveillance videos is an important yet challenging task as the prior knowledge about video anomalies is usually limited or unavailable. Despite that many approaches have been developed to resolve this problem, few of them can capture the normal spatio-temporal patterns effec... | 2021.0 | 2021-07-29 00:00:00 | https://www.semanticscholar.org/paper/014ad6b5c003ecf7566570266d43154ac8683758 | ACM Multimedia | True |
014be151dfab3a65e5da397810b0bd834b2aa06d | # A Survey of Local Differential Privacy and Its Variants
### Likun Qin, Nan Wang, Tianshuo Qiu Department of Electrical and Computer Engineering Shandong University, Jinan, China
Abstract—The introduction and advancements in Local Differential Privacy (LDP) variants have become a cornerstone in
addressing the priva... | A Survey of Local Differential Privacy and Its Variants | The introduction and advancements in Local Differential Privacy (LDP) variants have become a cornerstone in addressing the privacy concerns associated with the vast data produced by smart devices, which forms the foundation for data-driven decision-making in crowdsensing. While harnessing the power of these immense dat... | 2023.0 | 2023-09-02 00:00:00 | https://www.semanticscholar.org/paper/014be151dfab3a65e5da397810b0bd834b2aa06d | arXiv.org | True |
014d53aa1795a4e229037afe328ae014e5e2c18f | # AmbientDB: P2P Data Management Middleware for Ambient Intelligence
## Willem Fontijn Peter Boncz Philips Research CWI willem.fontijn@philips.com boncz@cwi.nl
Abstract system has to present to the user a unified and consistent
_The future generation of consumer electronics devices is_ view irrespective of the con... | AmbientDB: P2P data management middleware for ambient intelligence | 2004.0 | 2004-03-14 00:00:00 | https://www.semanticscholar.org/paper/014d53aa1795a4e229037afe328ae014e5e2c18f | IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second | True | |
014f27c5272292f84a182c49ca98f873fba06ae5 | ## Detection of Insider Attacks in Distributed Projected Subgradient Algorithms
#### Sissi Xiaoxiao Wu, Gangqiang Li, Shengli Zhang, and Xiaohui Lin
**_Abstract—The gossip-based distributed algorithms are widely_**
**used to solve decentralized optimization problems in various**
**multi-agent applications, while the... | Detection of Insider Attacks in Distributed Projected Subgradient Algorithms | The gossip-based distributed projected subgradient algorithms (DPS) are widely used to solve decentralized optimization problems in various multi-agent applications, while they are generally vulnerable to data injection attacks by internal malicious agents as each agent locally estimates its descent direction without a... | 2021.0 | 2021-01-18 00:00:00 | https://www.semanticscholar.org/paper/014f27c5272292f84a182c49ca98f873fba06ae5 | IEEE Transactions on Cognitive Communications and Networking | True |
014fdd56682f5f3e91789e83114aad81f5aa5670 | _Sensors_ **2010, 10, 4497-4520; doi:10.3390/s100504497**
_Article_
**OPEN ACCESS**
# sensors
**ISSN 1424-8220**
www.mdpi.com/journal/sensors
## Adaptive Square-Shaped Trajectory-Based Service Location Protocol in Wireless Sensor Networks
**Hwa-Jung Lim, Joa-Hyoung Lee and Heon-Guil Lee ***
Dept. of Computer S... | Adaptive Square-Shaped Trajectory-Based Service Location Protocol in Wireless Sensor Networks | In this paper we propose an adaptive square-shaped trajectory (ASST)-based service location method to ensure load scalability in wireless sensor networks. This first establishes a square-shaped trajectory over the nodes that surround a target point computed by the hash function and any user can access it, using the has... | 2010.0 | 2010-04-30 00:00:00 | https://www.semanticscholar.org/paper/014fdd56682f5f3e91789e83114aad81f5aa5670 | Italian National Conference on Sensors | True |
0153cde1ef613a5261c93354a43fb137d3bbf2a4 | # electronics
_Article_
## A Comparative Study of Consensus Mechanisms in Blockchain for IoT Networks
**Zachary Auhl** **[1,]*, Naveen Chilamkurti** **[1]** **, Rabei Alhadad** **[1]** **and Will Heyne** **[2]**
1 Cybersecurity Innovation Node, La Trobe University, Melbourne, VIC 3086, Australia
2 BAE Systems, Adela... | A Comparative Study of Consensus Mechanisms in Blockchain for IoT Networks | The consensus mechanism is a core component of Blockchain technology, allowing thousands of nodes to agree on a single and consistent view of the Blockchain. A carefully selected consensus mechanism can provide attributes such as fault tolerance and immutability to an application. The Internet of Things (IoT) is a use ... | 2022.0 | 2022-08-27 00:00:00 | https://www.semanticscholar.org/paper/0153cde1ef613a5261c93354a43fb137d3bbf2a4 | Electronics | True |
01540651818ded5880dbfa4a6aecf665efd8a00a | # Policies and Security Aspects For Distributed Scientific Laboratories
Nicoletta Dess´ı, Maria Grazia Fugini, R. A. Balachandar
**Abstract Web Services and the Grid allow distributed research teams to form dy-**
namic, multi-institutional virtual organizations sharing high performance computing
resources, large scal... | Policies and Security Aspects For Distributed Scientific Laboratories | 2008.0 | 2008-09-07 00:00:00 | https://www.semanticscholar.org/paper/01540651818ded5880dbfa4a6aecf665efd8a00a | IFIP International Information Security Conference | True | |
0154a7e5dfd13d425e75b44ccbbb87043c308356 | Proceedings of the 2023 International Conference on Software Engineering and Machine Learning
DOI: 10.54254/2755-2721/8/20230187
# Analysis of consensus mechanisms: PoW and PoS
**Jiang Wenxuan**
Ningbo Xiaoshi High School, Ningbo, Zhejiang, China, 315000
vincentjiang0207@163.com
**Abstract. Along with the trend o... | Analysis of Consensus Mechanisms: PoW and PoS | Along with the trend of Bitcoin blockchain, the concept behind all virtual currency has be-come popular in the study of the Internet. This essay mainly researches two kinds of common consensus mechanisms for the current blockchain network and looks forward to the future development of the technologys usage in daily lif... | 2023.0 | 2023-08-01 00:00:00 | https://www.semanticscholar.org/paper/0154a7e5dfd13d425e75b44ccbbb87043c308356 | Applied and Computational Engineering | True |
0155fe1751b05dda3dfde6e95745a5fc3e0c6e95 | # mathematics
_Article_
## Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption
**Cunqun Fan** **[1,2], Peiheng Jia** **[3], Manyun Lin** **[1,2], Lan Wei** **[1,2,][∗], Peng Guo** **[1,2], Xiangang Zhao** **[1,2]** **and Ximeng Liu** **[4]**
1 Key Laboratory of Radiometric Calibration ... | Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption | With the development of cloud computing and big data, secure multi-party computation, which can collaborate with multiple parties to deal with a large number of transactions, plays an important role in protecting privacy. Private set intersection (PSI), a form of multi-party secure computation, is a formidable cryptogr... | 2023.0 | 2023-04-08 00:00:00 | https://www.semanticscholar.org/paper/0155fe1751b05dda3dfde6e95745a5fc3e0c6e95 | Mathematics | True |
01595e97cdf2cb27afbab014d58eb69ab9ffe030 | # Low Complexity Approaches for End-to-End Latency Prediction
## Pierre Larrenie, Jean-François Bercher, Olivier Venard, Iyad Lahsen-Cherif
To cite this version:
#### Pierre Larrenie, Jean-François Bercher, Olivier Venard, Iyad Lahsen-Cherif. Low Complexity Ap- proaches for End-to-End Latency Prediction. 2022 13th ... | Low Complexity Approaches for End-to-End Latency Prediction | Software Defined Networks have opened the door to statistical and AI-based techniques to improve efficiency of networking. Especially to ensure a certain Quality of Service (QoS) for specific applications by routing packets with awareness on content nature (VoIP, video, files, etc.) and its needs (latency, bandwidth, e... | 2022.0 | 2022-10-03 00:00:00 | https://www.semanticscholar.org/paper/01595e97cdf2cb27afbab014d58eb69ab9ffe030 | International Conference on Computing Communication and Networking Technologies | True |
0159c5f17225c6e8aa183f7b39e74aaffa185a1e | # Building a Blockchain Application that Complies with the EU General Data Protection Regulation
### Complying with the EU General Data Protection Regulation (GDPR) poses significant challenges for blockchain projects, including establishing clear responsibilities for compliance, securing lawful bases for processing p... | Building a Blockchain Application thatComplies with the EU General DataProtection Regulation | 2019.0 | 2019-12-01 00:00:00 | https://www.semanticscholar.org/paper/0159c5f17225c6e8aa183f7b39e74aaffa185a1e | MIS Q. Executive | True | |
0159df66618cb667a54a529247fedac5640af2da | ###### Investigating Service Discovery, Management and Network Support for Next Generation Object Oriented Services
Bilhanan Silverajan, Joona Hartman, and Jani Laaksonen
_Dept. oflnformation Technology, Tampere University ofTechnology, P.O. Box 553,_ _FIN-3310J_
_Tampere, Finland_
_{bilhanan_ I hartmanj IJjlaakso}@... | Investigating Service Discovery, Management and Network Support for Next Generation Object Oriented Services | 2002.0 | 2002-04-08 00:00:00 | https://www.semanticscholar.org/paper/0159df66618cb667a54a529247fedac5640af2da | Intelligence in Networks | True | |
015d50faf4b17a5b7a910e87a7327d9a7896e62d | [GW Law Faculty Publications & Other Works](https://scholarship.law.gwu.edu/faculty_publications) [Faculty Scholarship](https://scholarship.law.gwu.edu/faculty_scholarship)
2021
# It's Time to Regulate Stablecoins as Deposits and Require Their It's Time to Regulate Stablecoins as Deposits and Require Their
Issuers t... | It's Time to Regulate Stablecoins as Deposits and Require Their Issuers to Be FDIC-Insured Banks | 2021.0 | NaT | https://www.semanticscholar.org/paper/015d50faf4b17a5b7a910e87a7327d9a7896e62d | Social Science Research Network | False | |
015ece3905050fcb19ea459d7aebfa88a6d015a3 | African Journal of Business Management Vol.6 (44), pp. 10799-10806, 7 November 2012
Available online at http://www.academicjournals.org/AJBM
DOI: 10.5897/AJBM12.992
ISSN 1993-8233 ©2012 Academic Journals
## Review
# The case for a technically safe environment to protect
the identities of anonymous whistle-blowers: A... | The case for a technically safe environment to protect the identities of anonymous whistle-blowers : a conceptual paper | Whistle-blowing is one of the most important aspects in the fight against corruption. In most cases, it is impossible to commit a corrupt deed without at least one other person being involved in, or, knowing about it. Many businesses and public entities have a ‘crime lines’ in place to facilitate whistle-blowing but th... | 2012.0 | 2012-11-07 00:00:00 | https://www.semanticscholar.org/paper/015ece3905050fcb19ea459d7aebfa88a6d015a3 | True | |
015ed213c9398c10a4fea0eb09a29b7bd9816d81 | Complex Systems Informatics and Modeling Quarterly (CSIMQ)
eISSN: 2255-9922
[Published online by RTU Press, https://csimq-journals.rtu.lv](https://csimq-journals.rtu.lv/)
Article 150, Issue 26, March/April 2021, Pages 46–54
https://doi.org/10.7250/csimq.2021-26.03
# An Introduction to Decentralized Finance (DeFi)
Joh... | An Introduction to Decentralized Finance (DeFi) | . Decentralized financial applications (DeFi) are a new breed of consumer-facing financial applications composed as smart contracts, deployed on permissionless blockchain technologies. In this article, we situate the DeFi concept in the theoretical context of permissionless blockchain technology and provide a taxonomic... | 2021.0 | 2021-04-30 00:00:00 | https://www.semanticscholar.org/paper/015ed213c9398c10a4fea0eb09a29b7bd9816d81 | Complex Systems Informatics and Modeling Quarterly | True |
01614001dfc81c1d899402168314ff0c3ef7ce1e | # Private and Efficient Set Intersection Protocol For RFID-Based Food Adequacy Check
## Zakaria Gheid[†], Yacine Challal[∗†], Lin Chen[‡]
_∗Centre de Recherche sur l’Information Scientifique et Technique, Algiers, Algeria_
_†Ecole nationale sup´erieure d’informatique, Laboratoire des M´ethodes de Conception des Syst`... | Private and efficient set intersection protocol for RFID-based food adequacy check | 2018.0 | 2018-04-15 00:00:00 | https://www.semanticscholar.org/paper/01614001dfc81c1d899402168314ff0c3ef7ce1e | IEEE Wireless Communications and Networking Conference | True | |
016143d542f7249ee1a1a2aafc45f11fc61a0bc0 | # BRAIN 2022: Third Workshop on Blockchain Theory and Applications - Welcome and Committees
Welcome Message
BRAIN 2022, the 3rd Workshop on Blockchain theoRy and ApplicatIoNs, aims to provide a venue for
researchers from both academy and industry to present and discuss important topics on blockchain
technology. In ... | Blockchain Theory and Applications - Welcome and Committees | 2022.0 | 2022-03-21 00:00:00 | https://www.semanticscholar.org/paper/016143d542f7249ee1a1a2aafc45f11fc61a0bc0 | 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) | True | |
016320200c600c00a351586477cfcf8f3df423d1 | # sensors
_Article_
## Decentralized Real-Time Anomaly Detection in Cyber-Physical Production Systems under Industry Constraints
**Christian Goetz *** **and Bernhard Humm**
Hochschule Darmstadt— Department of Computer Science, University of Applied Sciences,
64295 Darmstadt, Germany
*** Correspondence: christian.go... | Decentralized Real-Time Anomaly Detection in Cyber-Physical Production Systems under Industry Constraints | Anomaly detection is essential for realizing modern and secure cyber-physical production systems. By detecting anomalies, there is the possibility to recognize, react early, and in the best case, fix the anomaly to prevent the rise or the carryover of a failure throughout the entire manufacture. While current centraliz... | 2023.0 | 2023-04-23 00:00:00 | https://www.semanticscholar.org/paper/016320200c600c00a351586477cfcf8f3df423d1 | Italian National Conference on Sensors | True |
016337f0d33ffcc75d194f57abc788161eaec927 | Received February 4, 2020, accepted February 27, 2020, date of publication March 17, 2020, date of current version March 31, 2020.
_Digital Object Identifier 10.1109/ACCESS.2020.2981447_
# On the Convergence of Artificial Intelligence and Distributed Ledger Technology: A Scoping Review and Future Research Agenda
KON... | On the Convergence of Artificial Intelligence and Distributed Ledger Technology: A Scoping Review and Future Research Agenda | Developments in artificial intelligence (AI) and distributed ledger technology (DLT) currently lead to lively debates in academia and practice. AI processes data to perform tasks that were previously thought possible only for humans. DLT has the potential to create consensus over data among a group of participants in u... | 2020.0 | 2020-01-29 00:00:00 | https://www.semanticscholar.org/paper/016337f0d33ffcc75d194f57abc788161eaec927 | IEEE Access | True |
01633c22086abbdc8f180de4361585c1a731bc93 | # A Distributed Implementation of Steady-State Kalman Filter
### Jiaqi Yan, Xu Yang, Yilin Mo[∗], and Keyou You
**_Abstract—This paper studies the distributed state estimation_**
**in sensor network, where m sensors are deployed to infer the n-**
**dimensional state of a Linear Time-Invariant (LTI) Gaussian sys-**
*... | A Distributed Implementation of Steady-State Kalman Filter | This article studies the distributed state estimation in sensor network, where <inline-formula><tex-math notation="LaTeX">$m$</tex-math></inline-formula> sensors are deployed to infer the <inline-formula><tex-math notation="LaTeX">$n$</tex-math></inline-formula>-dimensional state of a linear time-invariant Gaussian sys... | 2021.0 | 2021-01-26 00:00:00 | https://www.semanticscholar.org/paper/01633c22086abbdc8f180de4361585c1a731bc93 | IEEE Transactions on Automatic Control | True |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.