paperId
stringlengths
40
40
text
stringlengths
51
184k
title
stringlengths
4
300
abstract
stringlengths
0
10k
year
stringclasses
49 values
publicationDate
stringlengths
0
19
url
stringlengths
78
78
venue
stringlengths
0
300
isOpenAccess
stringclasses
2 values
020122fcd3271980e2e32e33bf7f15599b812a32
## sustainability _Article_ # Building a Blockchain-Based Decentralized Crowdfunding Platform for Social and Educational Causes in the Context of Sustainable Development **Bogdan Tiganoaia** **[1,]*** **and George-Madalin Alexandru** **[2]** 1 Entrepreneurship and Management Department, National University of Scienc...
Building a Blockchain-Based Decentralized Crowdfunding Platform for Social and Educational Causes in the Context of Sustainable Development
Blockchain technology contributes to achieving the Sustainable Development Goals. Education for sustainable development (ESD) is UNESCO’s education sector response to the urgent and dramatic challenges the planet faces. The traditional way of donating money to charitable causes, such as education, has been through cent...
2023.0
2023-11-22 00:00:00
https://www.semanticscholar.org/paper/020122fcd3271980e2e32e33bf7f15599b812a32
Sustainability
True
020293b1e58f0d7aefdf0d5c72e95fa7fc01fc2e
### University of Southern Denmark Distributed Strategy for Optimal Dispatch of Unbalanced Three-Phase Islanded Microgrids Vergara Barrios, Pedro Pablo ; Rey-López, Juan Manuel; Shaker, Hamid Reza; Guerrero, Josep M.; Jørgensen, Bo Nørregaard; da Silva, Luiz Carlos Pereira Published in: IEEE Transactions on Smart ...
Distributed Strategy for Optimal Dispatch of Unbalanced Three-Phase Islanded Microgrids
This paper presents a distributed strategy for the optimal dispatch of islanded microgrids, modeled as unbalanced three-phase electrical distribution systems. To set the dispatch of the distributed generation (DG) units, an optimal generation problem is stated and solved distributively based on primal–dual constrained ...
2019.0
2019-05-01 00:00:00
https://www.semanticscholar.org/paper/020293b1e58f0d7aefdf0d5c72e95fa7fc01fc2e
IEEE Transactions on Smart Grid
True
02038327a403f44d76766bdb875612bc733fb499
# energies _Article_ ## A Novel Distributed Consensus-Based Approach to Solve the Economic Dispatch Problem Incorporating the Valve-Point Effect and Solar Energy Sources **Muhammad Moin** **[1], Waqas Ahmed** **[1], Muhammad Rehan** **[1,]*, Muhammad Iqbal** **[2], Nasim Ullah** **[3]** **,** **Kamran Zeb** **[4,]***...
A Novel Distributed Consensus-Based Approach to Solve the Economic Dispatch Problem Incorporating the Valve-Point Effect and Solar Energy Sources
This research focused on the design of a distributed approach using consensus theory to find an optimal solution of the economic dispatch problem (EDP) by considering the quadratic cost function along with the valve-point effect of generators and renewable energy systems (RESs). A distributed consensus approach is pres...
2022.0
2022-12-30 00:00:00
https://www.semanticscholar.org/paper/02038327a403f44d76766bdb875612bc733fb499
Energies
True
020558f09e952f682805891d6c1393b0d3b2be5c
IJE TRANSACTIONS B: Applications Vol. 36, No. 08, (August 2023) 1468-1477 # International Journal of Engineering J o u r n a l H o m e p a g e : w w w . i j e . i r ## An Incentive Mechanism for Energy Internet of Things Based on Blockchain and Stackelberg Game H. Zhou[a], J. Gong[*b], W. Bao[b], Q. Liu[b] _a D...
An Incentive Mechanism for Energy Internet of Things Based on Blockchain and Stackelberg Game
In the Internet of Everything era, the Energy Internet of Things (IoT), as a typical application of IoT technology, has been extensively studied. Meanwhile, blockchain technology and energy IoT can be coordinated and complementary. The energy IoT is diversified and has a high transaction demand. it is an issue worthy o...
2023.0
NaT
https://www.semanticscholar.org/paper/020558f09e952f682805891d6c1393b0d3b2be5c
International Journal of Engineering
True
0205b4b033b326a2bfc28ec21fccbd91df47ab2f
## sustainability _Article_ # Using Visualization to Build Transparency in a Healthcare Blockchain Application **Jesús Peral** **[1,]*, Eduardo Gallego** **[1,2], David Gil** **[2]** **, Mohan Tanniru** **[3]** **and Prashant Khambekar** **[4]** 1 Department of Software and Computing Systems, University of Alicante,...
Using Visualization to Build Transparency in a Healthcare Blockchain Application
With patients demanding services to control their own health conditions, hospitals are looking to build agility in delivering care by extending their reach into patient and partner ecosystems and sharing relevant patient data to support care continuity. However, sharing patient data with several external stakeholders o...
2020.0
2020-08-20 00:00:00
https://www.semanticscholar.org/paper/0205b4b033b326a2bfc28ec21fccbd91df47ab2f
Sustainability
True
02071107d0474cbd1f4077016d3014e1c2c9974e
## Trust but Verify: Cryptographic Data Privacy for Mobility Management ##### Matthew Tsao Stanford University ``` mwtsao@stanford.edu Stephen Zoepf Lacuna Technologies stephen.zoepf@lacuna.ai ``` ##### Kaidi Yang Stanford University ``` kaidi.yang@stanford.edu Marco Pavone Stanford University pavone@stanford...
Trust but Verify: Cryptographic Data Privacy for Mobility Management
The era of big data has brought with it a richer understanding of user behavior through massive datasets, which can help organizations optimize the quality of their services. In the context of transportation research, mobility data can provide municipal authorities (MAs) with insights on how to operate, regulate, or im...
2021.0
2021-04-15 00:00:00
https://www.semanticscholar.org/paper/02071107d0474cbd1f4077016d3014e1c2c9974e
IEEE Transactions on Control of Network Systems
True
02081d2aaf6c56a33e89743aa88faafa64171819
# energies _Article_ ## Distributed Energy Storage Control for Dynamic Load Impact Mitigation **Maximilian J. Zangs** **[†], Peter B. E. Adams** **[†], Timur Yunusov, William Holderbaum *** **and Ben A. Potter** School of Systems Engineering, University of Reading, Whiteknights Campus, Reading RG6 6AY, UK; m.j.zangs...
Distributed Energy Storage Control for Dynamic Load Impact Mitigation
The future uptake of electric vehicles (EV) in low-voltage distribution networks can cause increased voltage violations and thermal overloading of network assets, especially in networks with limited headroom at times of high or peak demand. To address this problem, this paper proposes a distributed battery energy stora...
2016.0
2016-08-17 00:00:00
https://www.semanticscholar.org/paper/02081d2aaf6c56a33e89743aa88faafa64171819
True
02086f491c51a3222da753b7d2b7100fffa01e0b
# Compact McEliece Keys from Goppa Codes Rafael Misoczki and Paulo S.L.M. Barreto[⋆] Departamento de Engenharia de Computação e Sistemas Digitais (PCS), Escola Politécnica, Universidade de São Paulo, Brazil {rmisoczki,pbarreto}@larc.usp.br **Abstract. The classical McEliece cryptosystem is built upon the class** o...
Compact McEliece Keys from Goppa Codes
2009.0
2009-11-04 00:00:00
https://www.semanticscholar.org/paper/02086f491c51a3222da753b7d2b7100fffa01e0b
IACR Cryptology ePrint Archive
True
020b47164f980cf8f1c447a85554fe0217c96be6
A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIPTICAL CURVE CRYPTOGAPHY FOR ENERGY-CONSTRAINED DEVICES Kin Choong Yow and Amol Dabholkar School of Computer Engineering, Nanyang Technological University, Singapore 639798, email: kcyow@ntu.edu.sg, amold@pmail.ntu.edu.sg **Abstract** Wirele...
A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIPTICAL CURVE CRYPTOGAPHY FOR ENERGY-CONSTRAINED DEVICES
2010.0
2010-04-25 00:00:00
https://www.semanticscholar.org/paper/020b47164f980cf8f1c447a85554fe0217c96be6
True
020b4eec8eb34b2752e7f0c4072f8eedc07d1fd2
**Volume 2 Issue 1 (2023) ISSN 2764-6068** **Research article** **JNL:** [https://ijlcw.emnuvens.com.br/revista](https://ijlcw.emnuvens.com.br/revista) **DOI:** [https://doi.org/10.54934/ijlcw.v2i1.48](https://doi.org/10.54934/ijlcw.v2i1.48) # TOOLS TO STIMULATE BLOCKCHAIN: APPLICATION OF REGULATORY SANDBOXES, SPECI...
TOOLS TO STIMULATE BLOCKCHAIN: APPLICATION OF REGULATORY SANDBOXES, SPECIAL ECONOMIC ZONES AND PUBLIC PRIVATE PARTNERSHIPS
The Blockchain technology has significant and almost limitless potential. However, today their use for implementation is associated with the problems of lack of high-quality legal regulation of this technology; technical standards for its application; investments required for its development. These problems and the sea...
2023.0
2023-06-15 00:00:00
https://www.semanticscholar.org/paper/020b4eec8eb34b2752e7f0c4072f8eedc07d1fd2
International Journal of Law in Changing World
True
020c3ce8434387e9f141198493a2f68c2e25ca2c
## We are IntechOpen, the world’s leading publisher of Open Access books Built by scientists, for scientists # 6,700 Open access books available # 180,000 195M International authors and editors Our authors are among the Downloads # 12.2% # 154 TOP 1% Countries delivered to most cited scientists Contribut...
An Adaptive Lightweight Security Framework Suited for IoT
Standard security systems are widely implemented in the industry. These systems con- sume considerable computational resources. Devices in the Internet of Things [IoT] are very limited with processing capacity, memory and storage. Therefore, existing security systems are not applicable for IoT. To cope with it, we prop...
2018.0
2018-08-01 00:00:00
https://www.semanticscholar.org/paper/020c3ce8434387e9f141198493a2f68c2e25ca2c
Internet of Things
True
02118711c1841d380df17c2537690bc0cedc4906
## A Double Auction for Charging Scheduling among Vehicles Using DAG-Blockchains #### Jianxiong Guo, Member, IEEE, Xingjian Ding, Weili Wu, Senior Member, IEEE, and Ding-Zhu Du **_Abstract—Electric Vehicles (EVs) are becoming more and_** **more popular in our daily life, which replaces traditional fuel** **vehicles ...
A Double Auction for Charging Scheduling among Vehicles Using DAG-Blockchains
Electric Vehicles (EVs) are becoming more and more popular in our daily life, which replaces traditional fuel vehicles to reduce carbon emissions and protect the environment. EVs need to be charged, but the number of charging piles in a Charging Station (CS) is limited, and charging is usually more time-consuming than ...
2020.0
2020-10-03 00:00:00
https://www.semanticscholar.org/paper/02118711c1841d380df17c2537690bc0cedc4906
ACM Trans. Sens. Networks
True
0213f41fa2b6958b9142cc43454cfa1974de97dd
Published Online April 2017 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2017.04.02 # Databases in Cloud Computing: A Literature Review ## Harrison John Bhatti School of Computing and Technology, Asia Pacific University of Technology and Innovation (APU), Technology Park Malaysia (TPM), Bukit Jalil, K...
Databases in Cloud Computing: A Literature Review
— Information Technology industry has been using the traditional relational databases for about 40 years. However, in the most recent years, there was a substantial conversion in the IT industry in terms of commercial applications. Stand-alone applications have been replaced with electronic applications, committed serv...
2017.0
2017-04-08 00:00:00
https://www.semanticscholar.org/paper/0213f41fa2b6958b9142cc43454cfa1974de97dd
True
02143a479ab76c1a8793d3669a25e72ead827869
# Symmetric-Key Based Proofs of Retrievability Supporting Public Verification Chaowen Guan[1(][B][)], Kui Ren[1], Fangguo Zhang[1][,][2][,][3], Florian Kerschbaum[4], and Jia Yu[1][,][5] 1 Department of Computer Science and Engineering, University at Buffalo, Buffalo, USA _{chaoweng,kuiren}@buffalo.edu, isszhfg@mail....
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification
2015.0
2015-09-21 00:00:00
https://www.semanticscholar.org/paper/02143a479ab76c1a8793d3669a25e72ead827869
European Symposium on Research in Computer Security
False
0217a17ab73d370bbdbf3ecb95639bd0810b5690
# applied sciences _Article_ ## Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation **Mariano Lemus** **[1,2], Mariana F. Ramos** **[3,4], Preeti Yadav** **[1,2], Nuno A. Silva** **[3,4]** **,** **Nelson J. Muga** **[3,4]** **, André Souto** **[2,5,6,]*** **, Nikola Paunkovi´c** *...
Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based on public-key cryptography is limited by the security and efficiency of the oblivious transfer implementation. We present a method to generate and distribute oblivious keys by exchangi...
2019.0
2019-09-25 00:00:00
https://www.semanticscholar.org/paper/0217a17ab73d370bbdbf3ecb95639bd0810b5690
Applied Sciences
True
0219fc1452e1fe4236f49bfc7838f03a19ec7fba
Received February 1, 2022, accepted February 23, 2022, date of publication February 25, 2022, date of current version March 9, 2022. _Digital Object Identifier 10.1109/ACCESS.2022.3154784_ # 5G-Compatible IF-Over-Fiber Transmission Using a Low-Cost SFP-Class Transceiver MARCO A. FERNANDES 1,2, (Member, IEEE), BRUNO ...
5G-Compatible IF-Over-Fiber Transmission Using a Low-Cost SFP-Class Transceiver
With the rise of 5G and beyond, the ever-increasing data-rates demanded by mobile access are severely challenging the capacity of optical fronthaul networks. Despite its high reliability and ease of deployment, legacy digital radio-over-fiber (RoF) technologies face an upcoming bandwidth bottleneck in the short term. T...
2022.0
NaT
https://www.semanticscholar.org/paper/0219fc1452e1fe4236f49bfc7838f03a19ec7fba
IEEE Access
True
021a44734d384688e277b852910ac80cb2ab8c34
SS 379 5980 (o e) DOI 10.5195/LEDGER.20XX.XXX RESEARCH ARTICLE # An Agent-Based Model Framework for Utility-Based Cryptoeconomies ### Kiran Karra, Tom Mellan, Maria Silva, Juan P. Madrigal-Cianci, Axel Cubero Cortes, Zixuan Zhang [∗] **Abstract. In this paper, we outline a framework for modeling utility-based blockc...
An Agent-Based Model Framework for Utility-Based Cryptoeconomies
In this paper, we outline a framework for modeling utility-based blockchain-enabled economic systems using Agent Based Modeling (ABM). Our approach is to model the supply dynamics based on metrics of the cryptoeconomy. We then build autonomous agents that make decisions based on those metrics. Those decisions, in turn,...
2023.0
2023-07-27 00:00:00
https://www.semanticscholar.org/paper/021a44734d384688e277b852910ac80cb2ab8c34
arXiv.org
True
021bb3f039ede8bfe80eb9749a32b3e9c8bc6b29
----- # Flexible Integration of Blockchain with Business Process Automation: A Federated Architecture Michael Adams[1], Suriadi Suriadi[1], Akhil Kumar[2], and Arthur H. M. ter Hofstede[1] 1 Queensland University of Technology, Brisbane, Australia _{mj.adams, s.suriadi, a.terhofstede}@qut.edu.au_ 2 Smeal College of ...
Flexible Integration of Blockchain with Business Process Automation: A Federated Architecture
2020.0
NaT
https://www.semanticscholar.org/paper/021bb3f039ede8bfe80eb9749a32b3e9c8bc6b29
CAiSE Forum
False
021c89fecb5deff33c4bd7ab7f22800ad64ad22d
# sensors _Article_ ## IoT Data Qualification for a Logistic Chain Traceability Smart Contract **Mohamed Ahmed** **[1,2,]*, Chantal Taconet** **[2,]*** **, Mohamed Ould** **[1], Sophie Chabridon** **[2]** **and Amel Bouzeghoub** **[2]** 1 ALIS International, 4 Rue du Meunier, 95724 Roissy-en-France, France; Mohamed....
IoT Data Qualification for a Logistic Chain Traceability Smart Contract
In the logistic chain domain, the traceability of shipments in their entire delivery process from the shipper to the consignee involves many stakeholders. From the traceability data, contractual decisions may be taken such as incident detection, validation of the delivery or billing. The stakeholders require transparen...
2021.0
2021-03-01 00:00:00
https://www.semanticscholar.org/paper/021c89fecb5deff33c4bd7ab7f22800ad64ad22d
Italian National Conference on Sensors
True
021d12b8bd39c09f273ee6e30fc70916bf3e52ca
## A Distributed Path Query Engine for Temporal Property Graphs * #### Shriram Ramesh, Animesh Baranawal and Yogesh Simmhan _Department of Computational and Data Sciences,_ _Indian Institute of Science, Bangalore 560012, India_ _Email: {shriramr, animeshb, simmhan}@iisc.ac.in_ **Abstract** Property graphs are a co...
A Distributed Path Query Engine for Temporal Property Graphs
Property graphs are a common form of linked data, with path queries used to traverse and explore them for enterprise transactions and mining. Temporal property graphs are a recent variant where time is a first-class entity to be queried over, and their properties and structure vary over time. These are seen in social, ...
2020.0
2020-02-09 00:00:00
https://www.semanticscholar.org/paper/021d12b8bd39c09f273ee6e30fc70916bf3e52ca
IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing
True
021d3d91a15cd3a247255a205d8e4228e04609a0
## sustainability _Article_ # Improving Collaborative Intrusion Detection System Using Blockchain and Pluggable Authentication Modules for Sustainable Smart City **Rajeev Kumar Gupta** **[1]** **, Vedant Chawla** **[2], Rajesh Kumar Pateriya** **[2], Piyush Kumar Shukla** **[3],** **Saoucene Mahfoudh** **[4]** **and ...
Improving Collaborative Intrusion Detection System Using Blockchain and Pluggable Authentication Modules for Sustainable Smart City
The threat of cyber-attacks is ever increasing in today’s society. There is a clear need for better and more effective defensive tools. Intrusion detection can be defined as the detection of anomalous behavior either in the host or in the network. An intrusion detection system can be used to identify the anomalous beha...
2023.0
2023-01-23 00:00:00
https://www.semanticscholar.org/paper/021d3d91a15cd3a247255a205d8e4228e04609a0
Sustainability
True
021ecd84d3d3c6ddb6874023f60808dc635bc2c2
**ISSN:** 2543-6821 (online) [Journal homepage: http://ceej.wne.uw.edu.pl](http://ceej.wne.uw.edu.pl) ## **Mateusz Skwarek** # **Is Bitcoin an emerging market? ** **A market efficiency perspective** **To cite this article** Skwarek, M. (2023). Is Bitcoin an emerging market? A market efficiency perspective. Central ...
Is Bitcoin an emerging market? A market efficiency perspective
Abstract Despite recent studies focused on comparing the dynamics of market efficiency between Bitcoin and other traditional assets, there is a lack of knowledge about whether Bitcoin and emerging markets efficiency behave similarly. This paper aims to compare the market efficiency dynamics between Bitcoin and the emer...
2023.0
2023-01-01 00:00:00
https://www.semanticscholar.org/paper/021ecd84d3d3c6ddb6874023f60808dc635bc2c2
Central European Economic Journal
True
0223db3a9042664f4529dc235ad9f7a662dc15af
Boston University Department of Physics ## Discussion of Qantum Consensus Algorithms #### Samuel Fulton, Lifu Zhang **Abstract Leader election is a crucial process in many areas such as cloud computing, distributed systems, task orchestra-** tion, and blockchain. Ofentimes, in a distributed system, the network need...
Discussion of Quantum Consensus Algorithms
Leader election is a crucial process in many areas such as cloud computing, distributed systems, task orchestration, and blockchain. Oftentimes, in a distributed system, the network needs to choose a leader, which would be responsible for synchronization between different processors, data storage, information distribut...
2022.0
2022-06-09 00:00:00
https://www.semanticscholar.org/paper/0223db3a9042664f4529dc235ad9f7a662dc15af
arXiv.org
True
0224fec689cae36bb85c4d63ae3c5a4b060abcd3
p g ## RESEARCH ARTICLE ## Open Access # Infection‑related hospitalization following ureteroscopic stone treatment: results from a surgical collaborative ### Adam Cole[1*], Jaya Telang[1], Tae‑Kyung Kim[1], Kavya Swarna[1], Ji Qi[1], Casey Dauw[1], Brian Seifman[2], Mazen Abdelhady[3], William Roberts[1], John H...
Infection-related hospitalization following ureteroscopic stone treatment: results from a surgical collaborative
Background Unplanned hospitalization following ureteroscopy (URS) for urinary stone disease is associated with patient morbidity and increased healthcare costs. To this effect, AUA guidelines recommend at least a urinalysis in patients prior to URS. We examined risk factors for infection-related hospitalization followi...
2020.0
2020-11-03 00:00:00
https://www.semanticscholar.org/paper/0224fec689cae36bb85c4d63ae3c5a4b060abcd3
BMC Urology
True
0227d8aca57de41a14d396350e12f28d4aabe480
## applied sciences _Systematic Review_ ### Towards Improving Privacy and Security of Identity Management Systems Using Blockchain Technology: A Systematic Review **Haifa Alanzi * and Mohammad Alkhatib *** Department of Computer Science, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic U...
Towards Improving Privacy and Security of Identity Management Systems Using Blockchain Technology: A Systematic Review
An identity management system (IDMS) manages and organizes identities and credentials information exchanged between users, identity providers (IDPs), and service providers (SPs) to ensure confidentiality and enhance privacy of users’ personal data. Traditional or centralized IDMS rely on a third party to store a user’s...
2022.0
2022-12-04 00:00:00
https://www.semanticscholar.org/paper/0227d8aca57de41a14d396350e12f28d4aabe480
Applied Sciences
True
02280183f81323acabd93adf831183a26abe12c0
## A variant of Wiener’s attack on RSA ### Andrej Dujella Abstract Wiener’s attack is a well-known polynomial-time attack on a RSA cryptosystem with small secret decryption exponent d, which works if d < n[0][.][25], where n = pq is the modulus of the cryptosystem. Namely, in that case, d is the denominator of som...
A variant of Wiener’s attack on RSA
Wiener’s attack is a well-known polynomial-time attack on a RSA cryptosystem with small secret decryption exponent d, which works if d < n0.25, where n = pq is the modulus of the cryptosystem. Namely, in that case, d is the denominator of some convergent pm/qm of the continued fraction expansion of e/n, and therefore d...
2008.0
2008-11-01 00:00:00
https://www.semanticscholar.org/paper/02280183f81323acabd93adf831183a26abe12c0
Computing
False
02292be913a5c03ba6177bc9b7e85eaed6c26cf7
## Time is Money: Strategic Timing Games in Proof-of-Stake Protocols Caspar Schwarz-Schilling[1], Fahad Saleh[2], Thomas Thiery[1], Jennifer Pan[3], Nihar Shah[3], and Barnabé Monnot[1] 1 Ethereum Foundation ``` {caspar.schwarz-schilling,thomas.thiery,barnabe.monnot}@ethereum.org ``` 2 Wake Forest University ``` ...
Time is Money: Strategic Timing Games in Proof-of-Stake Protocols
We propose a model suggesting that honest-but-rational consensus participants may play timing games, and strategically delay their block proposal to optimize MEV capture, while still ensuring the proposal's timely inclusion in the canonical chain. In this context, ensuring economic fairness among consensus participants...
2023.0
2023-05-15 00:00:00
https://www.semanticscholar.org/paper/02292be913a5c03ba6177bc9b7e85eaed6c26cf7
Conference on Advances in Financial Technologies
True
022ad80bb2cf8922a5d0b62cb56c4b7beb08450c
International Journal of **_[Environmental Research](https://www.mdpi.com/journal/ijerph)_** **_and Public Health_** _Article_ # Mitigation Planning and Policies Informed by COVID-19 Modeling: A Framework and Case Study of the State of Hawaii **Thomas H. Lee** **[1,2], Bobby Do** **[1], Levi Dantzinger** **[1], Joshu...
Mitigation Planning and Policies Informed by COVID-19 Modeling: A Framework and Case Study of the State of Hawaii
In the face of great uncertainty and a global crisis from COVID-19, mathematical and epidemiologic COVID-19 models proliferated during the pandemic. Yet, many models were not created with the explicit audience of policymakers, the intention of informing specific scenarios, or explicit communication of assumptions, limi...
2022.0
2022-05-01 00:00:00
https://www.semanticscholar.org/paper/022ad80bb2cf8922a5d0b62cb56c4b7beb08450c
International Journal of Environmental Research and Public Health
True
022baa2ab01c85223ced326773cfec28142ff784
The modern model of central bank communication suggests that central bankers prefer to err on the side of saying too much rather than too little. The reason is that most central bankers believe that clear and concise communication of monetary policy helps achieve their goals. For the Federal Reserve, this means to achi...
Gauging Market Responses to Monetary Policy Communication
The modern model of central bank communication suggests that central bankers prefer to err on the side of saying too much rather than too little. The reason is that most central bankers believe that clear and concise communication of monetary policy helps achieve their goals. For the Federal Reserve, this means to achi...
2019.0
NaT
https://www.semanticscholar.org/paper/022baa2ab01c85223ced326773cfec28142ff784
The Review
True
022f64f1cbb0b6dd859736f162cff1130501ec1b
_2022]_ _M. Kasatkina: Dispute Resolution Mechanism for Smart Contracts_ _143_ _DOI 10.5817/MUJLT2022-2-2_ # DISPUTE RESOLUTION MECHANISM FOR SMART CONTRACTS _by_ ## MARINA KASATKINA[*] _Disputes regarding smart contracts are inevitable, and parties will need means for_ _dealing with smart contract issues. This...
Dispute Resolution Mechanism for Smart Contracts
Disputes regarding smart contracts are inevitable, and parties will need means for dealing with smart contract issues. This article highlights the need for dispute resolution mechanisms for smart contracts. The author provides analysis of the possible mechanisms to solve disputes arising from smart contracts, namely di...
2022.0
2022-09-30 00:00:00
https://www.semanticscholar.org/paper/022f64f1cbb0b6dd859736f162cff1130501ec1b
Masaryk University Journal of Law and Technology
True
02306c29e74698aa4e2ac5e75c872514872ffbe5
p g ## RESEARCH ## Open Access # Genome‑wide analysis of genes encoding core components of the ubiquitin system during cerebral cortex development ### Alexandre Bouron[1,2*] and Marie‑Odile Fauvarque[1] **Abstract** Ubiquitination involves three types of enzymes (E1, E2, and E3) that sequentially attach ubiq...
Genome-wide analysis of genes encoding core components of the ubiquitin system during cerebral cortex development
Ubiquitination involves three types of enzymes (E1, E2, and E3) that sequentially attach ubiquitin (Ub) to target proteins. This posttranslational modification controls key cellular processes, such as the degradation, endocytosis, subcellular localization and activity of proteins. Ubiquitination, which can be reversed ...
2022.0
2022-08-16 00:00:00
https://www.semanticscholar.org/paper/02306c29e74698aa4e2ac5e75c872514872ffbe5
Molecular Brain
True
023095b6c75a66623876dbc6bca0dfe6b78291f3
# On the Composition of Authenticated Byzantine Agreement ## Yehuda Lindell� ### Dept. of Computer Science Weizmann Institute of Science Rehovot 76100, ISRAEL lindell@wisdom.weizmann.ac.il ## ABSTRACT � ## Anna Lysyanskaya ### MIT LCS 200 Technology Square Cambridge, MA 02139 USA anna@theory.lcs.mit.edu ## 1....
On the composition of authenticated byzantine agreement
2002.0
2002-05-19 00:00:00
https://www.semanticscholar.org/paper/023095b6c75a66623876dbc6bca0dfe6b78291f3
Symposium on the Theory of Computing
True
02318c72964c65db5dc32b3997968c673c3bef9a
been studied previously. Private-key cryptosystems `using` simpler codes have _, ###### PRIVATEKEY ALGEBRAIC-CODED ``` CRYFTOSYSTEMS * T. R. N. Rao Kil-Hyun Nam ** ``` The Center `for Advanced Computer Studies` National Defense College University of Southwestern Louisiana Seoul, Korea Lafayette, Louis...
Private-Key Algebraic-Coded Cryptosystems
1986.0
NaT
https://www.semanticscholar.org/paper/02318c72964c65db5dc32b3997968c673c3bef9a
Annual International Cryptology Conference
True
0231f3a936aa6807a7d215c8ef49bb96affd5f3f
RESEARCH ASSOCIATION for # **R A I S** INTERDISCIPLINARY DOI: 10.5281/zenodo.3267518 JUNE 2019 STUDIES ## **The Equity and Inclusion in Higher Education: ** **A Proposed Model for Open Data ** ### **Carla Hamida [1], Amanda Landi [2], Ziyi Liu [3]** *[1]* *Bard College at Simon’s Rock, Great Barrington, USA (Indonesia...
The Equity and Inclusion in Higher Education: A Proposed Model for Open Data
Recently, governmental institutions and private industries in power have been pushed to be more transparent so that more people can have ownership of their data. Another type of institution with a large amount of power over data are educational institutions. Colleges and Universities around the globe store a significan...
2019.0
2019-06-30 00:00:00
https://www.semanticscholar.org/paper/0231f3a936aa6807a7d215c8ef49bb96affd5f3f
Social Science Research Network
True
02323347b6dc92c516ef6bc456db5aa647627895
_Edited by:_ _Marta Poblet,_ _RMIT University, Australia_ _Reviewed by:_ _Vanessa Teague,_ _Australian National University,_ _Australia_ _Jake Goldenfein,_ _The University of Melbourne, Australia_ _*Correspondence:_ _Miranda Imperial_ _mci30@cam.ac.uk;_ _miranda.imperial@gmail.com_ _Specialty section:_ _This article...
The Democracy to Come? An Enquiry Into the Vision of Blockchain-Powered E-Voting Start-Ups
This research sets out to analyze the message promoted by start-up enterprises that apply blockchain technologies for the purpose of e-voting [blockchain-powered e-voting (BPE)], and their perceived effects of this technological solution on democratic outcomes. Employing Norman Fairclough’s critical discourse analysis ...
2021.0
2021-04-09 00:00:00
https://www.semanticscholar.org/paper/02323347b6dc92c516ef6bc456db5aa647627895
Frontiers in Blockchain
True
02324eda5842b7144859126bf152495e7c8a415d
BCP Business & Management **AFTEM 2022** Volume **32** (2022) # **International Capital Flows, Dynamic Changes in ** **Cryptocurrency and Noble Metal Markets ** ## Ruize Sun* School of Business, University of Leicester, Leicester, LE2 7RH, UK *Corresponding author: rs673@student.le.ac.uk **Abstract.** In 2022, with ...
International Capital Flows, Dynamic Changes in Cryptocurrency and Noble Metal Markets
In 2022, with the implementation of tightening monetary policies by FOMC, US dollar is experiencing a dramatic appreciation in a very short period. Though numerous studies have demonstrated the connection between the traditional currency market, cryptocurrency market, and precious metal market, rare studies are explori...
2022.0
2022-11-22 00:00:00
https://www.semanticscholar.org/paper/02324eda5842b7144859126bf152495e7c8a415d
BCP Business &amp; Management
True
023383352dccd15dc24113f894f33efd983da33c
## sustainability _Article_ # Empirical Research on the Fama-French Three-Factor Model and a Sentiment-Related Four-Factor Model in the Chinese Blockchain Industry **Ziyang Ji** **[1], Victor Chang** **[2]** **, Hao Lan** **[1]** **[, Ching-Hsien Robert Hsu](https://sciprofiles.com/profile/587004)** **[3,4,5,]* and R...
Empirical Research on the Fama-French Three-Factor Model and a Sentiment-Related Four-Factor Model in the Chinese Blockchain Industry
As one of the most significant components of financial technology (FinTech), blockchain technology arouses the interests of numerous investors in China, and the number of companies engaged in this field rises rapidly. The emotion of investors has an effect on stock returns, which is a hot topic in behavioral finance. B...
2020.0
2020-06-24 00:00:00
https://www.semanticscholar.org/paper/023383352dccd15dc24113f894f33efd983da33c
Sustainability
True
023de6262322bae283469df6b9c1c056759315c4
Received March 2, 2021, accepted April 2, 2021, date of publication April 12, 2021, date of current version April 19, 2021. _Digital Object Identifier 10.1109/ACCESS.2021.3072635_ # An Improved Genetic Algorithm for Safety and Availability Checking in Cyber-Physical Systems ZHENG WANG 1,2, YANAN JIN3, SHASHA YANG4, ...
An Improved Genetic Algorithm for Safety and Availability Checking in Cyber-Physical Systems
Cross-IoT infrastructure access frequently occurs when performing tasks in a distributed computing infrastructure of a cyber-physical system (CPS). The access control technology that ensure secure access cross-IoT infrastructure usually automatically establish relationships between user-attribute/role-permission. How t...
2021.0
NaT
https://www.semanticscholar.org/paper/023de6262322bae283469df6b9c1c056759315c4
IEEE Access
True
023e83b3dce4a29c18934916f08cc3d2d40d535a
# New Directions in Social Authentication ## Sakshi Jain sjain2@linkedin.com ## Juan Lang juanlang@google.com ## Neil Zhenqiang Gong neilz.gong@berkeley.edu ## Dawn Song dawnsong@cs.berkeley.edu ## Sreya Basuroy basuroy@princeton.edu ## Prateek Mittal pmittal@princeton.edu **_Abstract—Web services are increa...
New Directions in Social Authentication
2015.0
NaT
https://www.semanticscholar.org/paper/023e83b3dce4a29c18934916f08cc3d2d40d535a
True
023fb7dd8bdf0812ffbf351657c08c8920f7d512
Vol. 8, No. 1, August 2022 ISSN 2374-2410 E-ISSN 2374-2429 Published by Redfame Publishing URL: http://afa.redfame.com # Applicability of Blockchain Technology to The Normal Accounting Cycle Williams Kwasi Peprah[1], Reynaldo P. Abas Jr.[2] & Akwasi Ampofo[3] 1Valley View University, School of Business, Oyibi, A...
Applicability of Blockchain Technology to The Normal Accounting Cycle
Blockchain technologyis a distributed, unchangeable ledger that makes recording transactions and managing assets in a business network much easier and nowa type of accountingsoftwareconcernedwith the transfer of assetownership and the maintenanceof anaccuratefinancial ledger. Despitethenumerousbenefits ofblockchaintech...
2022.0
2022-02-22 00:00:00
https://www.semanticscholar.org/paper/023fb7dd8bdf0812ffbf351657c08c8920f7d512
Applied Finance and Accounting
True
0240a106144dbee52e5e527f8e2f0cd21fc3126b
# applied sciences _Article_ ## Publicly Verifiable Spatial and Temporal Aggregation Scheme Against Malicious Aggregator in Smart Grid **Lei Zhang** **[1]** **and Jing Zhang** **[2,1,]*** 1 College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China; lei_power@hrbeu.edu.cn 2 Scho...
Publicly Verifiable Spatial and Temporal Aggregation Scheme Against Malicious Aggregator in Smart Grid
We propose a privacy-preserving aggregation scheme under a malicious attacks model, in which the aggregator may forge householders’ billing, or a neighborhood aggregation data, or collude with compromised smart meters to reveal object householders’ fine-grained data. The scheme can generate spatially total consumption ...
2019.0
2019-01-31 00:00:00
https://www.semanticscholar.org/paper/0240a106144dbee52e5e527f8e2f0cd21fc3126b
Applied Sciences
True
0241483aa2623ab398de10982b958d01e6f5e453
_Article_ # Incentive-Driven Information Sharing in Leasing Based on a Consortium Blockchain and Evolutionary Game **Hanlei Cheng** **[1]** **, Jian Li** **[1,2]** **, Jing Lu** **[3,4], Sio-Long Lo** **[1,]* and Zhiyu Xiang** **[4]** 1 Faculty of Innovation Engineering, Macau University of Science and Technology, Ma...
Incentive-Driven Information Sharing in Leasing Based on a Consortium Blockchain and Evolutionary Game
Blockchain technology (BCT) provides a new way to mitigate the default risks of lease contracts resulting from the information asymmetry in leasing. The conceptual architecture of a consortium blockchain-based leasing platform (CBLP) is first proposed to facilitate information sharing between small and medium-sized ent...
2023.0
2023-01-29 00:00:00
https://www.semanticscholar.org/paper/0241483aa2623ab398de10982b958d01e6f5e453
Journal of Theoretical and Applied Electronic Commerce Research
True
024384b677b58c1f48697245b748ec291812b563
# Universal Re-encryption for Mixnets **Abstract. We introduce a new cryptographic technique that we call universal re-encryption. A** conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a player with knowledge of the public key corresponding to a given ciphertext. In contrast, univ...
Universal Re-encryption for Mixnets
2004.0
2004-02-23 00:00:00
https://www.semanticscholar.org/paper/024384b677b58c1f48697245b748ec291812b563
The Cryptographer's Track at RSA Conference
False
0244a3e459fe7b78debc2ee71bbf73514ca013bd
# Distributed Control and Energy Storage Requirements of Networked Dc Microgrids Wayne W. Weaver[a], Rush D. Robinett, III[a], Gordon G. Parker[a], David G. Wilson[b] _aMichigan Technological University, 1400 Townsend Dr., Houghton, Michigan, 49931,_ _USA_ _bSandia National Laboratories, P.O. Box 5800, Albuquerque, N...
Distributed control and energy storage requirements of networked Dc microgrids
2015.0
2015-11-01 00:00:00
https://www.semanticscholar.org/paper/0244a3e459fe7b78debc2ee71bbf73514ca013bd
True
0246366d638b26f74404861edb9f4071bee082bb
# Moving from 5G in Verticals to Sustainable 6G: Business, Regulatory and Technical Research Prospects Marja Matinmikko-Blue[1[0000-0002-0094-6344]], Seppo Yrjölä[2[0000-0003-2053-9700]], and Petri Ahokangas[3[0000-0002-2351-8473]] 1 Centre for Wireless Communications, University of Oulu, Finland 2 University of O...
Moving from 5G in Verticals to Sustainable 6G: Business, Regulatory and Technical Research Prospects
2020.0
NaT
https://www.semanticscholar.org/paper/0246366d638b26f74404861edb9f4071bee082bb
International Conference on Cognitive Radio Oriented Wireless Networks and Communications
False
0247616396cf94cb16350019864f3847dad97d32
**_Journal of Software Engineering and Applications, 2012, 5, 102-108_** http://dx.doi.org/10.4236/jsea.2012.52016 Published Online February 2012 (http://www.SciRP.org/journal/jsea) # Combining Public Key Encryption with Schnorr Digital Signature #### Laura Savu Department of Information Security, Faculty of Mathema...
Combining Public Key Encryption with Schnorr Digital Signature
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper als...
2012.0
2012-02-27 00:00:00
https://www.semanticscholar.org/paper/0247616396cf94cb16350019864f3847dad97d32
True
024aa4597ede5823b301593385cb892df14180da
Received June 2, 2021, accepted June 16, 2021, date of publication June 21, 2021, date of current version June 30, 2021. _Digital Object Identifier 10.1109/ACCESS.2021.3091317_ # Evaluating Countermeasures for Verifying the Integrity of Ethereum Smart Contract Applications SUHWAN JI 1, DOHYUNG KIM 1,2, AND HYEONSEUN...
Evaluating Countermeasures for Verifying the Integrity of Ethereum Smart Contract Applications
Blockchain technology, which provides digital security in a distributed manner, has evolved into a key technology that can build efficient and reliable decentralized applications (called DApps) beyond the function of cryptocurrency. The characteristics of blockchain such as immutability and openness, however, have made...
2021.0
NaT
https://www.semanticscholar.org/paper/024aa4597ede5823b301593385cb892df14180da
IEEE Access
True
024b9198a432d51f0a5245bd60072e147fa2f9e1
## Inverting Cryptographic Hash Functions via Cube-and-Conquer **Oleg Zaikin** zaikin.icc@gmail.com _ISDCT, Irkutsk, Russia_ ### Abstract MD4 and MD5 are seminal cryptographic hash functions proposed in early 1990s. MD4 consists of 48 steps and produces a 128-bit hash given a message of arbitrary finite size. MD5 ...
Inverting Cryptographic Hash Functions via Cube-and-Conquer
MD4 and MD5 are fundamental cryptographic hash functions proposed in the early 1990s. MD4 consists of 48 steps and produces a 128-bit hash given a message of arbitrary finite size. MD5 is a more secure 64-step extension of MD4. Both MD4 and MD5 are vulnerable to practical collision attacks, yet it is still not realisti...
2022.0
2022-12-05 00:00:00
https://www.semanticscholar.org/paper/024b9198a432d51f0a5245bd60072e147fa2f9e1
Journal of Artificial Intelligence Research
True
024c65380b37cfbcc1fc5a595dd16fa20a382507
**The performance of power and citizenship: David Cameron meets the people** Peter Lunt School of Media, Communication and Sociology University of Leicester, UK [Pl108@le.ac.uk](mailto:Pl108@le.ac.uk) **Abstract** How do citizens respond to and engage the performance of political power in the context of mainstre...
The performance of power and citizenship: David Cameron meets the people
How do citizens respond to and engage with the performance of political power in the context of mainstream media? Through an analysis of two television programmes aired during the UK Brexit referendum campaign of 2016, a picture emerges of citizenship as the performative disruption of the performance of power. In the p...
2019.0
2019-07-23 00:00:00
https://www.semanticscholar.org/paper/024c65380b37cfbcc1fc5a595dd16fa20a382507
International journal of cultural studies
True
024c9e9327edd1f6ed69eb9850cfaf5c2b266be9
# sensors ### Article ## Cloud Servers: Resource Optimization Using Different Energy Saving Techniques ### Mohammad Hijji [1,]*, Bilal Ahmad [2], Gulzar Alam [3], Ahmed Alwakeel [1], Mohammed Alwakeel [1], Lubna Abdulaziz Alharbi [1], Ahd Aljarf [4] and Muhammad Umair Khan [5,]* 1 Faculty of Computers & Information ...
Cloud Servers: Resource Optimization Using Different Energy Saving Techniques
Currently, researchers are working to contribute to the emerging fields of cloud computing, edge computing, and distributed systems. The major area of interest is to examine and understand their performance. The major globally leading companies, such as Google, Amazon, ONLIVE, Giaki, and eBay, are truly concerned about...
2022.0
2022-11-01 00:00:00
https://www.semanticscholar.org/paper/024c9e9327edd1f6ed69eb9850cfaf5c2b266be9
Italian National Conference on Sensors
True
024e06bc350d5bb5599bd58a89ee18c3fc3ed122
Received June 30, 2020, accepted July 18, 2020, date of publication July 23, 2020, date of current version August 5, 2020. _Digital Object Identifier 10.1109/ACCESS.2020.3011477_ # A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing YICHEN HOU 1, SAHIL GARG 2,3, (Member, IEEE), LIN HUI 1, DUSH...
A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
Mobile edge computing, with characteristics of position awareness, mobile support, low latency, decentralization, and distribution, has received widespread attention from industry and academia, and has been applied to application areas such as intelligent transportation, smart city, and real-time big data analysis. How...
2020.0
NaT
https://www.semanticscholar.org/paper/024e06bc350d5bb5599bd58a89ee18c3fc3ed122
IEEE Access
True
025150bc246547d7eabeae51326b6d24c154d4b3
Published Online June 2016 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.06.07 # Verifier-based Password Authenticated 3P-EKE Protocol using PCLA Keys ## Archana Raghuvamshi Adikavi Nannaya University /CSE Department, Rajahmundry, 533296, India E-mail: archana_anur@yahoo.in ## Premchand Parvatanen...
Verifier-based Password Authenticated 3P-EKE Protocol using PCLA Keys
This paper endeavors to present a novel framework for the generic structure of a verifier-based password authenticated Three-Party Encrypted Key Exchange (3P-EKE) protocol which yields more efficient protocol than the ones knew before. A previous framework presented by Archana and Premchand is more secured against all ...
2016.0
2016-06-08 00:00:00
https://www.semanticscholar.org/paper/025150bc246547d7eabeae51326b6d24c154d4b3
True
0254fed1ad7983ac9d834822d66a553845e0f7de
# Privacy-aware and highly-available OSN profiles Rammohan Narendula, Thanasis G. Papaioannou, and Karl Aberer School of Computer and Communication Sciences, EPFL, Switzerland Email: firstname.lastname@epfl.ch **_Abstract—The explosive growth of online social networks_** **(OSNs) and their wide popularity suggest th...
Privacy-Aware and Highly-Available OSN Profiles
2010.0
2010-06-28 00:00:00
https://www.semanticscholar.org/paper/0254fed1ad7983ac9d834822d66a553845e0f7de
2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises
True
02562dc2b524dceb6a535c2baddc1e8d88463ad9
# Practical Fully-Decentralized Secure Aggregation for Personal Data Management Systems ## Julien Mirval, Luc Bouganim, Iulian Sandu Popa To cite this version: #### Julien Mirval, Luc Bouganim, Iulian Sandu Popa. Practical Fully-Decentralized Secure Aggrega- tion for Personal Data Management Systems. 33rd Internati...
Practical Fully-Decentralized Secure Aggregation for Personal Data Management Systems
Personal Data Management Systems (PDMS) are flourishing, boosted by legal and technical means like smart disclosure, data portability and data altruism. A PDMS allows its owner to easily collect, store and manage data, directly generated by her devices, or resulting from her interactions with companies or administratio...
2021.0
2021-07-06 00:00:00
https://www.semanticscholar.org/paper/02562dc2b524dceb6a535c2baddc1e8d88463ad9
International Conference on Statistical and Scientific Database Management
True
025659bfc224e9420db7c3c50027478355a32fb2
## future internet _Article_ # An Improved Deep Learning Model for DDoS Detection Based on Hybrid Stacked Autoencoder and Checkpoint Network **Amthal K. Mousa * and Mohammed Najm Abdullah** Computer Engineering Department, University of Technology-Iraq, Baghdad P.O. Box 10071, Iraq; mohammed.n.abdullah@uotechnology....
An Improved Deep Learning Model for DDoS Detection Based on Hybrid Stacked Autoencoder and Checkpoint Network
The software defined network (SDN) collects network traffic data and proactively manages networks. SDN’s programmability makes it excellent for developing distributed applications, cybersecurity, and decentralized network control in multitenant data centers. This exceptional architecture is vulnerable to security conce...
2023.0
2023-08-19 00:00:00
https://www.semanticscholar.org/paper/025659bfc224e9420db7c3c50027478355a32fb2
Future Internet
True
025bde8270278a539aa25dfc08ee9e73b569f0d0
#, Authenticity Blockchain Solution Monther Aldwairi _College of Computer and Information_ _Technology_ _Jordan University of Science and_ _Technology_ Irbid, Jordan munzer@just.edu.jo Mohamad Badra _College of Technological Innovation_ _Zayed University_ Dubai, UAE mohamd.badra@zu.ac.ae Rouba Borghol _Science an...
DocCert: Nostrification, Document Verification and Authenticity Blockchain Solution
Many institutions and organizations require nostrification and verification of qualification as a prerequisite for hiring. The idea is to recognize the authenticity of a copy or digital document issued by an institution in a foreign country and detect forgeries. Certificates, financial records, health records, official...
2023.0
2023-10-13 00:00:00
https://www.semanticscholar.org/paper/025bde8270278a539aa25dfc08ee9e73b569f0d0
International Conference on Blockchain Computing and Applications
True
025db54d117d024615422b3cee16c1d9f46e15ce
_Journal of Central Banking Theory and Practice, 2023, 2, pp. 83-101_ _Received: 08 February 2022.; accepted: 13 June 2022_ ## Soraya BEN SOUISSI [*], Mahmoud Sami NABI[ **] # Could the Issuance of CBDC Reduce the Likelihood of Banking Panic?[1] **Abstract: This paper delves into the relationship between the issu-**...
Could the Issuance of CBDC Reduce the Likelihood of Banking Panic?1
Abstract This paper delves into the relationship between the issuance of Central Bank Digital Currencies (CBDC) and the likelihood of banking panic. The issuance of CBDC acts as a disturbing shock that incentivizes depositors to withdraw all/part of their deposits from the commercial banks, to swap it for CBDC which ar...
2023.0
2023-05-01 00:00:00
https://www.semanticscholar.org/paper/025db54d117d024615422b3cee16c1d9f46e15ce
Journal of Central Banking Theory and Practice
True
025e07ce9e6fd253b53c18e097d0ea6df186490f
_p_ _g y_ _(_ _)_ https://doi.org/10.1186/s13018-022-03068-7 ## RESEARCH ARTICLE ## Open Access # Knowledge structure and emerging trends on osteonecrosis of the femoral head: a bibliometric and visualized study ### Haiyang Wu[1*†], Kunming Cheng[2†], Linjian Tong[1], Yulin Wang[1], Weiguang Yang[1] and Zhiming ...
Knowledge structure and emerging trends on osteonecrosis of the femoral head: a bibliometric and visualized study
Background Osteonecrosis of the femoral head (ONFH) is a common disabling disease with considerable social and economic impacts. Although extensive studies related to ONFH have been conducted in recent years, a specific bibliometric analysis on this topic has not yet been performed. Our study attempted to summarize the...
2022.0
2022-03-28 00:00:00
https://www.semanticscholar.org/paper/025e07ce9e6fd253b53c18e097d0ea6df186490f
Journal of Orthopaedic Surgery and Research
True
0260f2fe0b329bbacd07ecaf3731bf48e7c8ebc3
**_https://dx.doi.org/10.22161/ijaers/3.10.11 ISSN: 2349-6495(P) | 2456-1908(O)_** # Secured Decentralized Confidential Data Distributed in the Disruption-Tolerant Military Network ## Aniruddha Singh Chauhan[1], Prof. Nikita Umare[2] 1ME 3rd Sem. WCC Student, Abha Gaikwad-Patil Co...
Secured Decentralized Confidential Data Distributed in the Disruption-Tolerant Military Network
2016.0
2016-10-01 00:00:00
https://www.semanticscholar.org/paper/0260f2fe0b329bbacd07ecaf3731bf48e7c8ebc3
True
02620aa4121370fb8727553bb72e8bab1b95450f
# Adaptive Restructuring of Merkle and Verkle Trees for Enhanced Blockchain Scalability Oleksandr Kuznetsov[ 1,2*], Dzianis Kanonik [1], Alex Rusnak [1], Anton Yezhov[ 1], Oleksandr Domin[1 ] 1 Proxima Labs, 1501 Larkin Street, suite 300, San Francisco, USA 2 Department of Political Sciences, Communication and Inte...
Adaptive Restructuring of Merkle and Verkle Trees for Enhanced Blockchain Scalability
2024.0
2024-03-01 00:00:00
https://www.semanticscholar.org/paper/02620aa4121370fb8727553bb72e8bab1b95450f
Internet of Things
True
0263cf4e40d6bc60fe421ed73763e4fbed70c0fd
# processes _Article_ ## Can Decentralization Drive Green Innovation? A Game Theoretical Analysis of Manufacturer Encroachment Selection with Consumer Green Awareness **Dan Cao** **[1], Jin Li** **[2], Gege Liu** **[2]** **and Ran Mei** **[3,]*** 1 School of Business Administration, Zhejiang Gongshang University, Ha...
Can Decentralization Drive Green Innovation? A Game Theoretical Analysis of Manufacturer Encroachment Selection with Consumer Green Awareness
With the increase of public environmental awareness and the growth of e-commerce, sustainable development promotes the manufacturer to increasingly participate in green innovation and make full use of the online sales channel to enhance competitiveness. Despite decentralized encroachment being widely adopted in busines...
2021.0
2021-06-03 00:00:00
https://www.semanticscholar.org/paper/0263cf4e40d6bc60fe421ed73763e4fbed70c0fd
True
0265955b9565abd870ab9d874305a84ef397c743
# Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors Michael Hutter and Erich Wenger Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010 Graz, Austria _{Michael.Hutter,Erich.Wenger}@iaik.tugraz.at_ ...
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors
2011.0
2011-09-28 00:00:00
https://www.semanticscholar.org/paper/0265955b9565abd870ab9d874305a84ef397c743
Journal of Cryptology
True
0266f264f35f3c0049ffe3b517170d081a1824e1
Received June 11, 2021, accepted July 1, 2021, date of publication July 5, 2021, date of current version July 13, 2021. _Digital Object Identifier 10.1109/ACCESS.2021.3094888_ # Leveraging User-Diversity in Energy-Efficient Edge-Facilitated Collaborative Fog Computing ANTOINE PARIS, (Member, IEEE), HAMED MIRGHASEMI,...
Leveraging User-Diversity in Energy-Efficient Edge-Facilitated Collaborative Fog Computing
With the increasing number of heterogeneous resource-constrained devices populating the current wireless ecosystem, enabling ubiquitous computing at the edge of the network requires moving part of the computing burden back to the edge to reduce user-side latency and relieve the backhaul network. Motivated by this chall...
2020.0
2020-03-31 00:00:00
https://www.semanticscholar.org/paper/0266f264f35f3c0049ffe3b517170d081a1824e1
IEEE Access
True
026730ead96211ee8e954e9df5c220191fa2d329
**Indonesian Journal of Electrical Engineering and Computer Science** Vol. 11, No. 3, September 2018, pp.1121~ 1128 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v11.i3.pp1121-1128  1121 # Comparative Performance of Machine Learning Algorithms for Cryptocurrency Forecasting **Nor Azizah Hitam, Amelia Ritahani Ismail** D...
Comparative Performance of Machine Learning Algorithms for Cryptocurrency Forecasting
Machine Learning is part of Artificial Intelligence that has the ability to make future forecastings based on the previous experience. Methods has been proposed to construct models including machine learning algorithms such as Neural Networks (NN), Support Vector Machines (SVM) and Deep Learning. This paper presents a ...
2018.0
2018-09-01 00:00:00
https://www.semanticscholar.org/paper/026730ead96211ee8e954e9df5c220191fa2d329
Indonesian Journal of Electrical Engineering and Computer Science
True
026a1ec02e15aacd176148eedb487bbc08edf905
``` Neural Computation (2001) v. 13 n. 2, pp. 411-452 # Binding and Normalization of Binary Sparse Distributed Representations by Context-Dependent Thinning ``` Dmitri A. Rachkovskij V. M. Glushkov Cybernetics Center Pr. Acad. Glushkova 40 Kiev 03680 Ukraine dar@infrm.kiev.ua (Preferable contact method) Ernst M....
Binding and Normalization of Binary Sparse Distributed Representations by Context-Dependent Thinning
2001.0
2001-02-01 00:00:00
https://www.semanticscholar.org/paper/026a1ec02e15aacd176148eedb487bbc08edf905
Neural Computation
True
026e0df72f523f1b772e9295344b7ba9877e1098
## ***proceedings*** *Proceedings* # **Incentives for Crypto-Collateralized Digital Assets [†]** **Philip N. Brown** Department of Computer Science at the University of Colorado, Colorado Springs, CO 80918, USA; philip.brown@uccs.edu - Presented at the 3rd annual Decentralized Conference, Athens, Greece, 30 Octobe...
Incentives for Crypto-Collateralized Digital Assets
Digital currencies such as Bitcoin frequently suffer from high price volatility, limiting their utility as a means of purchasing power. Hence, a popular topic among cryptocurrency researchers is a digital currency design which inherits the decentralization of Bitcoin while somehow mitigating its violent price swings. O...
2019.0
2019-10-21 00:00:00
https://www.semanticscholar.org/paper/026e0df72f523f1b772e9295344b7ba9877e1098
Proceedings
True
026f542ead119d0d53a6c7a35496d207b8b0b053
# DeFi Risk Transfer: Towards A Fully Decentralized Insurance Protocol ### Fabian Schär _Center for Innovative Finance (CIF)_ _University of Basel_ Basel, Switzerland f.schaer@unibas.ch ### Matthias Nadler _Center for Innovative Finance (CIF)_ _University of Basel_ Basel, Switzerland matthias.nadler@unibas.ch ###...
DeFi Risk Transfer: Towards A Fully Decentralized Insurance Protocol
In this paper, we propose a fully decentralized and smart contract-based insurance protocol. We identify various issues in the Decentralized Finance (DeFi) insurance context and propose a solution to overcome these shortcomings. We introduce an economic model that allows for risk transfer without any external dependenc...
2022.0
2022-12-20 00:00:00
https://www.semanticscholar.org/paper/026f542ead119d0d53a6c7a35496d207b8b0b053
International Conference on Blockchain
True
0272fb91bc0ca70d246268095be9d6138293babc
## MEDCO: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data #### Jean Louis Raisaro, Juan Ramón Troncoso-Pastoriza, Mickaël Misbach, João Sá Sousa, Sylvain Pradervand, Edoardo Missiaglia, Olivier Michielin, Bryan Ford and Jean-Pierre Hubaux **Abstract—The increasing number of...
MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data
The increasing number of health-data breaches is creating a complicated environment for medical-data sharing and, consequently, for medical progress. Therefore, the development of new solutions that can reassure clinical sites by enabling privacy-preserving sharing of sensitive medical data in compliance with stringent...
2019.0
2019-07-01 00:00:00
https://www.semanticscholar.org/paper/0272fb91bc0ca70d246268095be9d6138293babc
IEEE/ACM Transactions on Computational Biology & Bioinformatics
True
0273efebece84154e5d64f42df67e2139df992b6
|Col1|論文 / 著書情報 Article / Book Information| |---|---| |Title|A performance model for the communication in fast multipole methods on high-performance computing platforms| |Author|Huda Ibeid, Rio Yokota, David Keyes| |J ournal/Book name|International J ournal of High Performance Computing Applications, Vol. 30, No. 4, pp...
A performance model for the communication in fast multipole methods on high-performance computing platforms
2016.0
2016-11-01 00:00:00
https://www.semanticscholar.org/paper/0273efebece84154e5d64f42df67e2139df992b6
The international journal of high performance computing applications
True
0276e32e1440fee9e433f45192e8ccd7f31e3a56
# Platform for Efficient Switching between Multiple Devices in the Intensive Care Unit Femke De Backere[1], Thomas Vanhove[1], Emanuel Dejonghe[1], Matthias Feys[1], Tim Herinckx[1], Jeroen Vankelecom[1], Johan Decruyenaere[2] and Filip De Turck[1] 1 Information Technology Department (INTEC), Ghent University - iMi...
Platform for Efficient Switching between Multiple Devices in the Intensive Care Unit
2014.0
2014-06-06 00:00:00
https://www.semanticscholar.org/paper/0276e32e1440fee9e433f45192e8ccd7f31e3a56
Methods of Information in Medicine
True
0277681acf245005906e17d6996ed498421c5b68
## RESEARCH ## Open Access # Data‑aware optimization of bioinformatics workflows in hybrid clouds ### Athanassios M. Kintsakis[*], Fotis E. Psomopoulos and Pericles A. Mitkas *Correspondence: akintsakis@issel.ee.auth.gr Department of Electrical and Computer Engineering, Aristotle University of Thessaloniki, 5412...
Data-aware optimization of bioinformatics workflows in hybrid clouds
Life Sciences have been established and widely accepted as a foremost Big Data discipline; as such they are a constant source of the most computationally challenging problems. In order to provide efficient solutions, the community is turning towards scalable approaches such as the utilization of cloud resources in addi...
2016.0
2016-10-21 00:00:00
https://www.semanticscholar.org/paper/0277681acf245005906e17d6996ed498421c5b68
Journal of Big Data
True
027bd79f0d6c728825aaac3fa41f6178e8b30145
### Decentralized Blended Acquisition #### Guus Berkhout, Delft University of Technology **SUMMARY** The concept of blending and deblending is reviewed, making use of traditional and dispersed source arrays. The network concept of distributed blended acquisition is introduced. A million-trace robot system is propose...
Decentralized Blended Acquisition
2013.0
2013-01-10 00:00:00
https://www.semanticscholar.org/paper/027bd79f0d6c728825aaac3fa41f6178e8b30145
True
0287942a57191b829f0a68658bb43646c7d5160d
## Enforcing Security and Assurance Properties in Cloud Environment ### Aline Bousquet, Jérémy Briffaut, Eddy Caron, Eva María Dominguez, Javier Franco, Arnaud Lefray, Oscar López, Saioa Ros, Jonathan Rouzaud-Cornabas, Christian Toinard, et al. To cite this version: #### Aline Bousquet, Jérémy Briffaut, Eddy Ca...
Enforcing Security and Assurance Properties in Cloud Environment
Before deploying their infrastructure (resources, data, communications, ) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deploy...
2015.0
2015-12-01 00:00:00
https://www.semanticscholar.org/paper/0287942a57191b829f0a68658bb43646c7d5160d
International Conference on Utility and Cloud Computing
True
028821c2f74bce87b58d99cf63a204fe5cce94e9
# Optimal Content Placement for Peer-to-Peer Video-on-Demand Systems[1] #### Bo (Rambo) Tan Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Urbana, IL 61801, USA Email: botan2@illinois.edu #### Laurent Massouli´e Technicolor Paris Research Lab Issy-les-Moulineaux Cedex 9...
Optimal content placement for peer-to-peer video-on-demand systems
2010.0
2010-04-27 00:00:00
https://www.semanticscholar.org/paper/028821c2f74bce87b58d99cf63a204fe5cce94e9
2011 Proceedings IEEE INFOCOM
True
028a57e04bdebfd6e0de0b6b95c1070f6a0b1fd8
# sensors _Article_ ## Neural Network Ensembles for Sensor-Based Human Activity Recognition Within Smart Environments **Naomi Irvine** **[1,]*, Chris Nugent** **[1]** **, Shuai Zhang** **[1], Hui Wang** **[1]** **and Wing W. Y. NG** **[2]** 1 School of Computing, Ulster University, Co. Antrim, Northern Ireland BT37 ...
Neural Network Ensembles for Sensor-Based Human Activity Recognition Within Smart Environments
In this paper, we focus on data-driven approaches to human activity recognition (HAR). Data-driven approaches rely on good quality data during training, however, a shortage of high quality, large-scale, and accurately annotated HAR datasets exists for recognizing activities of daily living (ADLs) within smart environme...
2019.0
2019-12-30 00:00:00
https://www.semanticscholar.org/paper/028a57e04bdebfd6e0de0b6b95c1070f6a0b1fd8
Italian National Conference on Sensors
True
028b33b36dcefb6ae6139e06cefa758df632ffeb
# Journal of International Technology and Information Management Journal of International Technology and Information Management [Volume 22](https://scholarworks.lib.csusb.edu/jitim/vol22) [Issue 4](https://scholarworks.lib.csusb.edu/jitim/vol22/iss4) [Article 3](https://scholarworks.lib.csusb.edu/jitim/vol22/iss4/3) ...
Is Security Realistic in Cloud Computing?
INTRODUCTION Cloud computing today is benefiting from the technological advancements in communication, storage and computing. The basic idea in cloud computing is to take advantage of economies of scale if IT services could be provided on demand with a decentralized infrastructure. This idea is a natural evolution from...
2013.0
2013-04-01 00:00:00
https://www.semanticscholar.org/paper/028b33b36dcefb6ae6139e06cefa758df632ffeb
Journal of International Technology and Information Management
True
028f829fc1d47a64dd4ca5db564f8b50deba9ff5
# entropy _Review_ ## An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions **Onur Günlü *** **and Rafael F. Schaefer** Information Theory and Applications Chair, Technische Universität Berlin, 10623 Berlin, Germany; rafael.schaefer@tu-berlin.de *** Correspondence: guenlue@tu-berlin.de; Tel...
An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions
We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective to conduct authentication, message encryption/decryption, identification or secure and private computations by using a secret key. A physical unclonable function (PUF) provides local security...
2020.0
2020-11-05 00:00:00
https://www.semanticscholar.org/paper/028f829fc1d47a64dd4ca5db564f8b50deba9ff5
IACR Cryptology ePrint Archive
True
029062eca1fb9a279c20694127fcf1c8313966ff
Edited by: Laura V. Milko, University of North Carolina at Chapel Hill, United States Reviewed by: Milan Macek, Charles University, Czechia Jonathan Berg, University of North Carolina at Chapel Hill, United States *Correspondence: Vasiliki Rahimzadeh [vrahim@stanford.edu](mailto:vrahim@stanford.edu) Specialty sectio...
Exome/Genome-Wide Testing in Newborn Screening: A Proportionate Path Forward
Population-based newborn screening (NBS) is among the most effective public health programs ever launched, improving health outcomes for newborns who screen positive worldwide through early detection and clinical intervention for genetic disorders discovered in the earliest hours of life. Key to the success of newborn ...
2022.0
2022-07-04 00:00:00
https://www.semanticscholar.org/paper/029062eca1fb9a279c20694127fcf1c8313966ff
Frontiers in Genetics
True
0291665270a93c509ecde8b2c50642b3adcfe176
# Automated Abstraction by Incremental Refinement in Interpolant-based Model Checking ## G. Cabodi, P. Camurati, M. Murciano Dipartimento di Automatica ed Informatica Politecnico di Torino - Torino, Italy Email: gianpiero.cabodi, paolo.camurati, marco.murciano @polito.it _{_ _}_ **_Abstract—This paper addresses the ...
Automated abstraction by incremental refinement in interpolant-based model checking
2008.0
2008-11-10 00:00:00
https://www.semanticscholar.org/paper/0291665270a93c509ecde8b2c50642b3adcfe176
IEEE/ACM International Conference on Computer-Aided Design
True
0291fb253d7567a106da907b2fe867cec86be541
**Government retains lor itself, and others act-** **ing on its behalf, a paid-up, nonexclusive,** **irrevocable worldwide license in said article** **to reproduce, prepare derivative works, dis-** **tribute copies to the public, and perform pub-** **licly and display publicly, by or** **on behalf of** ###### A Directo...
A directory service for configuring high-performance distributed computations
1997.0
1997-08-05 00:00:00
https://www.semanticscholar.org/paper/0291fb253d7567a106da907b2fe867cec86be541
Proceedings. The Sixth IEEE International Symposium on High Performance Distributed Computing (Cat. No.97TB100183)
True
02920271ab40ff82676325adcb340f8a60a63eb2
# Improving Operational Efficiency through Quality 4.0 Tool: Blockchain Implementation and Subsequent Market Reaction ## DOI: 10.12776/QIP.V27I2.1877 Vladimíra Gimerská, Michal Šoltés, Rajmund Mirdala Received: 2023-06-21 Accepted: 2023-06-28 Published: 2023-07-31 ## ABSTRACT **Purpose: This article aims to obser...
Improving Operational Efficiency through Quality 4.0 Tool: Blockchain Implementation and Subsequent Market Reaction
Purpose: This article aims to observe and measure how modern and innovative blockchain technology improves the data quality and transparency and thus affect the stock prices of publicly traded companies after announcing its implementation in their operations. Additionally, the objective is to compare the results with c...
2023.0
2023-07-31 00:00:00
https://www.semanticscholar.org/paper/02920271ab40ff82676325adcb340f8a60a63eb2
Kvalita Inovácia Prosperita
True
0293ee9829d6cd3d9a774e7486b068205ca1179e
## Attack on the EDON-K Key Encapsulation Mechanism ##### Matthieu Lequesne Sorbonne Université, UPMC Univ Paris 06 Inria, Team SECRET, 2 rue Simone Iff, CS 42112, 75589 Paris Cedex 12, France Email: matthieu.lequesne@inria.fr Abstract—The key encapsulation mechanism EDON-K was proposed in response to the call for ...
Attack on the Edon-kKey Encapsulation Mechanism
The key encapsulation mechanism $\text{EDON}-\mathcal{K}$ was proposed in response to the call for post-quantum cryptography standardization issued by the National Institute of Standards and Technologies (NIST). This scheme is inspired by the McEliece scheme but uses another family of codes defined over $\mathbb{F}_{2^...
2018.0
2018-02-16 00:00:00
https://www.semanticscholar.org/paper/0293ee9829d6cd3d9a774e7486b068205ca1179e
International Symposium on Information Theory
True
0294a22ca84a83792d5deedf651d2ddfca7d3a79
# Optimized Information Discovery using Self-adapting Indices over Distributed Hash Tables ## Faraz Memon, Daniel Tiebler, Frank D¨urr, Kurt Rothermel IPVS – Distributed Systems Department, Universit¨at Stuttgart Universit¨atsstraße 38, 70569 Stuttgart, Germany Email: faraz.memon, tiebledl, frank.duerr, kurt.rothermel...
Optimized information discovery using self-adapting indices over Distributed Hash Tables
2010.0
2010-12-01 00:00:00
https://www.semanticscholar.org/paper/0294a22ca84a83792d5deedf651d2ddfca7d3a79
IEEE International Performance, Computing, and Communications Conference
True
02987c79896dfedd7d494deaead3e78eac241f65
Received December 30, 2020, accepted April 19, 2021, date of publication April 28, 2021, date of current version May 6, 2021. _Digital Object Identifier 10.1109/ACCESS.2021.3076205_ # Unlinkable Collaborative Learning Transactions: Privacy-Awareness in Decentralized Approaches SANDI RAHMADIKA 1 AND KYUNG-HYUNE RHEE ...
Unlinkable Collaborative Learning Transactions: Privacy-Awareness in Decentralized Approaches
Smart contracts (SCs) and collaborative learning (CL) are disclosed publicly, in which most transactions and activities that occur by the parties can be bared in real-time. Both are strengthened in a decentralized manner. CL allows numerous clients to collectively build deep learning models privately by aggregating the...
2021.0
NaT
https://www.semanticscholar.org/paper/02987c79896dfedd7d494deaead3e78eac241f65
IEEE Access
True
029a9046f114af95c0ec83e13e144704b7f77868
# A survey on parallel and distributed Multi-Agent Systems ## Alban Rousset, Bénédicte Herrmann, Christophe Lang, Laurent Philippe To cite this version: Alban Rousset, Bénédicte Herrmann, Christophe Lang, Laurent Philippe. A survey on parallel and distributed Multi-Agent Systems. Padabs 2014, 2nd Workshop on Parall...
A survey on parallel and distributed multi-agent systems for high performance computing simulations
2014.0
2014-08-25 00:00:00
https://www.semanticscholar.org/paper/029a9046f114af95c0ec83e13e144704b7f77868
Computer Science Review
True
029e0f6017a14e5059d2f130da4c6b7992414533
## This is a repository copy of An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/156053/ Version: Accepted Version Article: Gope, P. orcid.org/0000-0003-2786-0273 and Sikdar,...
An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication
The energy Internet (EI) represents a new electric grid infrastructure that uses computing and communication to transform legacy power grids into systems that support open innovation. EI provides bidirectional communication for analysis and improvement of energy usage between service providers and customers. To ensure ...
2019.0
2019-04-02 00:00:00
https://www.semanticscholar.org/paper/029e0f6017a14e5059d2f130da4c6b7992414533
IEEE Transactions on Smart Grid
True
02a06d4d6f9118145f72870c7e1a548707a44f04
# energies _Article_ ## Improved Virtual Synchronous Generator Principle for Better Economic Dispatch and Stability in Grid-Connected Microgrids with Low Noise **Shruti Singh and David Wenzhong Gao *** Department of Electrical and Computer Engineering, University of Denver, Denver, CO 80210, USA; shruti.singh@du.edu...
Improved Virtual Synchronous Generator Principle for Better Economic Dispatch and Stability in Grid-Connected Microgrids with Low Noise
The proper operation of microgrids depends on Economic Dispatch. It satisfies all requirements while lowering the microgrids’ overall operating and generation costs. Since distributed generators constitute a large portion of microgrids, seamless communication between generators is essential. While guaranteeing a reliab...
2023.0
2023-06-12 00:00:00
https://www.semanticscholar.org/paper/02a06d4d6f9118145f72870c7e1a548707a44f04
Energies
True
02a1e357408df84ddf78c6d1270caaa9b4f1013e
_Journal of Computer Science and Cybernetics, V.35, N.3 (2019), 233–249_ DOI 10.15625/1813-9663/35/3/13667 # A CIPHERTEXT-POLICY ATTRIBUTE-BASED SEARCHABLE ENCRYPTION SCHEME IN NON-INTERACTIVE MODEL VAN ANH TRINH[1], VIET CUONG TRINH[2][,][∗] 1Thanh Hoa University of Culture, Sports and Tourism 2Hong Duc University...
A CIPHERTEXT-POLICY ATTRIBUTE-BASED SEARCHABLE ENCRYPTION SCHEME IN NON-INTERACTIVE MODEL
We address the problem of searching on encrypted data with expressive searching predicate and multi-writer/multi-reader, a cryptographic primitive which has many concrete application scenarios such as cloud computing, email gateway application and so on. In this paper, we propose a public-key encryption with keyword se...
2019.0
2019-08-06 00:00:00
https://www.semanticscholar.org/paper/02a1e357408df84ddf78c6d1270caaa9b4f1013e
Journal of Computer Science and Cybernetics
True
02a29c5897b1fa71149d802ad7f082ae833fee5c
## ART : Sub-Logarithmic Decentralized Range Query Processing with Probabilistic Guarantees S. Sioutas[1], P. Triantafillou[2], G. Papaloukopoulos[2], E. Sakkopoulos[2], K. Tsichlas[3], and Y. Manolopoulos[3] 1 Ionian University, Department of Informatics, sioutas@ionio.gr 2 CTI and Dept. of Computer Engineering & I...
ART: sub-logarithmic decentralized range query processing with probabilistic guarantees
We focus on range query processing on large-scale, typically distributed infrastructures, such as clouds of thousands of nodes of shared-datacenters, of p2p distributed overlays, etc. In such distributed environments, efficient range query processing is the key for managing the distributed data sets per se, and for mon...
2010.0
2010-07-25 00:00:00
https://www.semanticscholar.org/paper/02a29c5897b1fa71149d802ad7f082ae833fee5c
Distributed and parallel databases
True
02a3f37b0735b61801d2b28babacf7aec3ff83b6
. **_ISSN 2281-3993_** **_www.richtmann.org_** **_March 2024_** **Research Article** © 2024 Marsela Thanasi Boçe and Julian Hoxha. This is an open access article licensed under the Creative Commons Attribution-NonCommercial 4.0 International License (https://creativecommons.org/licenses/by-nc/4.0/) Received: 1 De...
Blockchain Technology as a Catalyst for Sustainable Development: Exploring Economic, Social, and Environmental Synergies
This paper explores the transformative potential of blockchain technology (BT) as a catalyst for sustainable development, addressing the tri-fold aspects of environmental, economic, and social sustainability. Through a comprehensive review and theoretical framework, it delves into how BT can significantly contribute to...
2024.0
2024-03-05 00:00:00
https://www.semanticscholar.org/paper/02a3f37b0735b61801d2b28babacf7aec3ff83b6
Academic Journal of Interdisciplinary Studies
True
02aa857d4991ffc0fe8e1992c1f6e5b1b94d39b0
## LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network* Riaz Ahmed Shaikh, Sungyoung Lee, Mohammad A.U. Khan, and Young Jae Song Department of Computer Engineering, Kyung Hee University, Sochen-ri, Giheung-eup, Yongin-si, Gyeonggi-do, 449-701, South Korea {riaz, sylee, khan}@oslab.khu.ac.kr...
LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network
2006.0
2006-09-20 00:00:00
https://www.semanticscholar.org/paper/02aa857d4991ffc0fe8e1992c1f6e5b1b94d39b0
IFIP International Conference on Personal Wireless Communications
True
02acccd3a4dbea265de8c043807c2dbb4115130c
# Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem ## Weili Chen[1][,][2], Xiongfeng Guo [1][,][3], Zhiguang Chen [1][,][2], Zibin Zheng [1][,][3] and Yutong Lu [1][,][2] 1School of Data and Computer Science, Sun Yat-sen University 2National Supercomputer Center in Guangzhou, S...
Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem
In recent years, blockchain technology has created a new cryptocurrency world and has attracted a lot of attention. It also is rampant with various scams. For example, phishing scams have grabbed a lot of money and has become an important threat to users' financial security in the blockchain ecosystem. To help deal wit...
2020.0
2020-07-01 00:00:00
https://www.semanticscholar.org/paper/02acccd3a4dbea265de8c043807c2dbb4115130c
International Joint Conference on Artificial Intelligence
True
02af1e17cb68c7cace6f3d38c2e767e7b5fb1e66
**Journal of Computer and Communications, 2017, 5, 1-31** [http://www.scirp.org/journal/jcc](http://www.scirp.org/journal/jcc) ISSN Online: 2327-5227 ISSN Print: 2327-5219 # Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy ### Anirudh Paranjothi, Mohammad S. Khan, Mais Nij...
Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy
Mobile Cloud Computing (MCC) brings rich computational resource to mobile users, network operators, and cloud computing providers. It can be represented in many ways, and the ultimate goal of MCC is to enable execution of rich mobile application with rich user experience. Mobility is one of the main characteristics of ...
2017.0
2017-04-06 00:00:00
https://www.semanticscholar.org/paper/02af1e17cb68c7cace6f3d38c2e767e7b5fb1e66
True
02af7c7509c70c91d28cd2273002aff5e479c6ee
# MAESTRO-X: Distributed Orchestration of Rotary-Wing UAV-Relay Swarms ### Bharath Keshavamurthy[∗], Matthew A. Bliss[†], and Nicolò Michelusi[∗] **Abstract** This work details a scalable framework to orchestrate a swarm of rotary-wing UAVs serving as cellular relays to facilitate beyond line-of-sight connectiv...
MAESTRO-X: Distributed Orchestration of Rotary-Wing UAV-Relay Swarms
This work details a scalable framework to orchestrate a swarm of rotary-wing UAVs serving as cellular relays to facilitate beyond line-of-sight connectivity and traffic offloading for ground users. First, a Multiscale Adaptive Energy-conscious Scheduling and TRajectory Optimization (MAESTRO) framework is developed for ...
2020.0
2020-07-02 00:00:00
https://www.semanticscholar.org/paper/02af7c7509c70c91d28cd2273002aff5e479c6ee
IEEE Transactions on Cognitive Communications and Networking
True
02b1964d705661c5a16e0d87b152d14da1372dd8
# Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups Ronald Cramer and Serge Fehr BRICS[⋆], Department of Computer Science, Aarhus University, Denmark _{cramer,fehr}@brics.dk_ **Abstract. A black-box secret sharing scheme for the threshold access** structure Tt,n is one which works over any finite Abel...
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
A black-box secret sharing scheme for the threshold access structure Tt,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say, a given finite field) in that distribution matrix and reconstruction vectors are defined over Z and are d...
2002.0
2002-02-05 00:00:00
https://www.semanticscholar.org/paper/02b1964d705661c5a16e0d87b152d14da1372dd8
Annual International Cryptology Conference
True
02b2d773a7a2249e864f271b4964ef7bbd942499
# Emergence of oscillations in a mixed-mechanism phosphorylation system #### Carsten Conradi[∗], Maya Mincheva[†], and Anne Shiu[‡] #### January 28, 2019 Abstract This work investigates the emergence of oscillations in one of the simplest cellular signaling networks exhibiting oscillations, namely, the dual-site ...
Emergence of Oscillations in a Mixed-Mechanism Phosphorylation System
This work investigates the emergence of oscillations in one of the simplest cellular signaling networks exhibiting oscillations, namely the dual-site phosphorylation and dephosphorylation network (futile cycle), in which the mechanism for phosphorylation is processive, while the one for dephosphorylation is distributiv...
2018.0
2018-09-08 00:00:00
https://www.semanticscholar.org/paper/02b2d773a7a2249e864f271b4964ef7bbd942499
Bulletin of Mathematical Biology
True
02b398677c3144cbb12459c81f06a8c4b350e510
p g **ORIGINAL ARTICLE** ## Open data products‑A framework for creating valuable analysis ready data **Dani Arribas‑Bel[1] · Mark Green[1] · Francisco Rowe[1] · Alex Singleton[1]** Received: 17 October 2019 / Accepted: 29 June 2021 / Published online: 20 October 2021 © The Author(s) 2021 **Abstract** This paper de...
Open data products-A framework for creating valuable analysis ready data
This paper develops the notion of “open data product”. We define an open data product as the open result of the processes through which a variety of data (open and not) are turned into accessible information through a service, infrastructure, analytics or a combination of all of them, where each step of development is ...
2021.0
2021-10-01 00:00:00
https://www.semanticscholar.org/paper/02b398677c3144cbb12459c81f06a8c4b350e510
Journal of Geographical Systems
True
02b64b590630a0ebcbf2f75e045c1d933e3f2667
Received October 31, 2020, accepted November 11, 2020, date of publication November 17, 2020, date of current version November 30, 2020. _Digital Object Identifier 10.1109/ACCESS.2020.3038629_ # A Data-Driven Distributed Adaptive Control Approach for Nonlinear Multi-Agent Systems XIAN YU 1, SHANGTAI JIN 1, GENFENG L...
A Data-Driven Distributed Adaptive Control Approach for Nonlinear Multi-Agent Systems
In this paper the distributed leader-follower consensus tracking problem is investigated for unknown nonlinear non-affine discrete-time multi-agent systems. Via a dynamic linearization method both for the agent system and the local ideal distributed controller, a distributed adaptive control scheme is proposed in this ...
2020.0
NaT
https://www.semanticscholar.org/paper/02b64b590630a0ebcbf2f75e045c1d933e3f2667
IEEE Access
True
02b768bce3ec87af9443f2bb1d890ce09f1ca916
# Semi-Decentralized Federated Learning with Collaborative Relaying ### Michal Yemini Rajarshi Saha Emre Ozfatura Deniz G¨und¨uz Andrea J. Goldsmith Princeton University Stanford University Imperial College London Imperial College London Princeton University **_Abstract—We present a semi-decentralized federated lear...
Semi-Decentralized Federated Learning with Collaborative Relaying
We present a semi-decentralized federated learning algorithm wherein clients collaborate by relaying their neighbors’ local updates to a central parameter server (PS). At every communication round to the PS, each client computes a local consensus of the updates from its neighboring clients and eventually transmits a we...
2022.0
2022-05-23 00:00:00
https://www.semanticscholar.org/paper/02b768bce3ec87af9443f2bb1d890ce09f1ca916
International Symposium on Information Theory
True
02b7726c2e069342adbf3dd51abbeeb68dd32bda
# Anomaly Detection through Unsupervised Federated Learning ### Mirko Nardi _Scuola Normale Superiore_ Pisa, Italy mirko.nardi@sns.it ### Lorenzo Valerio _IIT-CNR_ Pisa, Italy lorenzo.valerio@iit.cnr.it ### Andrea Passarella _IIT-CNR_ Pisa, Italy andrea.passarella@iit.cnr.it **_Abstract—Federated learning (FL) ...
Anomaly Detection Through Unsupervised Federated Learning
Federated learning (FL) is proving to be one of the most promising paradigms for leveraging distributed resources, enabling a set of clients to collaboratively train a machine learning model while keeping the data decentralized. The explosive growth of interest in the topic has led to rapid advancements in several core...
2022.0
2022-09-09 00:00:00
https://www.semanticscholar.org/paper/02b7726c2e069342adbf3dd51abbeeb68dd32bda
International Conference on Mobile Ad-hoc and Sensor Networks
True