paperId stringlengths 40 40 | text stringlengths 51 184k | title stringlengths 4 300 | abstract stringlengths 0 10k | year stringclasses 49
values | publicationDate stringlengths 0 19 | url stringlengths 78 78 | venue stringlengths 0 300 | isOpenAccess stringclasses 2
values |
|---|---|---|---|---|---|---|---|---|
020122fcd3271980e2e32e33bf7f15599b812a32 | ## sustainability
_Article_
# Building a Blockchain-Based Decentralized Crowdfunding Platform for Social and Educational Causes in the Context of Sustainable Development
**Bogdan Tiganoaia** **[1,]*** **and George-Madalin Alexandru** **[2]**
1 Entrepreneurship and Management Department, National University of Scienc... | Building a Blockchain-Based Decentralized Crowdfunding Platform for Social and Educational Causes in the Context of Sustainable Development | Blockchain technology contributes to achieving the Sustainable Development Goals. Education for sustainable development (ESD) is UNESCO’s education sector response to the urgent and dramatic challenges the planet faces. The traditional way of donating money to charitable causes, such as education, has been through cent... | 2023.0 | 2023-11-22 00:00:00 | https://www.semanticscholar.org/paper/020122fcd3271980e2e32e33bf7f15599b812a32 | Sustainability | True |
020293b1e58f0d7aefdf0d5c72e95fa7fc01fc2e | ### University of Southern Denmark
Distributed Strategy for Optimal Dispatch of Unbalanced Three-Phase Islanded Microgrids
Vergara Barrios, Pedro Pablo ; Rey-López, Juan Manuel; Shaker, Hamid Reza; Guerrero, Josep M.; Jørgensen, Bo Nørregaard; da Silva, Luiz Carlos Pereira
Published in:
IEEE Transactions on Smart ... | Distributed Strategy for Optimal Dispatch of Unbalanced Three-Phase Islanded Microgrids | This paper presents a distributed strategy for the optimal dispatch of islanded microgrids, modeled as unbalanced three-phase electrical distribution systems. To set the dispatch of the distributed generation (DG) units, an optimal generation problem is stated and solved distributively based on primal–dual constrained ... | 2019.0 | 2019-05-01 00:00:00 | https://www.semanticscholar.org/paper/020293b1e58f0d7aefdf0d5c72e95fa7fc01fc2e | IEEE Transactions on Smart Grid | True |
02038327a403f44d76766bdb875612bc733fb499 | # energies
_Article_
## A Novel Distributed Consensus-Based Approach to Solve the Economic Dispatch Problem Incorporating the Valve-Point Effect and Solar Energy Sources
**Muhammad Moin** **[1], Waqas Ahmed** **[1], Muhammad Rehan** **[1,]*, Muhammad Iqbal** **[2], Nasim Ullah** **[3]** **,**
**Kamran Zeb** **[4,]***... | A Novel Distributed Consensus-Based Approach to Solve the Economic Dispatch Problem Incorporating the Valve-Point Effect and Solar Energy Sources | This research focused on the design of a distributed approach using consensus theory to find an optimal solution of the economic dispatch problem (EDP) by considering the quadratic cost function along with the valve-point effect of generators and renewable energy systems (RESs). A distributed consensus approach is pres... | 2022.0 | 2022-12-30 00:00:00 | https://www.semanticscholar.org/paper/02038327a403f44d76766bdb875612bc733fb499 | Energies | True |
020558f09e952f682805891d6c1393b0d3b2be5c | IJE TRANSACTIONS B: Applications Vol. 36, No. 08, (August 2023) 1468-1477
# International Journal of Engineering
J o u r n a l H o m e p a g e : w w w . i j e . i r
## An Incentive Mechanism for Energy Internet of Things Based on Blockchain and Stackelberg Game
H. Zhou[a], J. Gong[*b], W. Bao[b], Q. Liu[b]
_a D... | An Incentive Mechanism for Energy Internet of Things Based on Blockchain and Stackelberg Game | In the Internet of Everything era, the Energy Internet of Things (IoT), as a typical application of IoT technology, has been extensively studied. Meanwhile, blockchain technology and energy IoT can be coordinated and complementary. The energy IoT is diversified and has a high transaction demand. it is an issue worthy o... | 2023.0 | NaT | https://www.semanticscholar.org/paper/020558f09e952f682805891d6c1393b0d3b2be5c | International Journal of Engineering | True |
0205b4b033b326a2bfc28ec21fccbd91df47ab2f | ## sustainability
_Article_
# Using Visualization to Build Transparency in a Healthcare Blockchain Application
**Jesús Peral** **[1,]*, Eduardo Gallego** **[1,2], David Gil** **[2]** **, Mohan Tanniru** **[3]** **and Prashant Khambekar** **[4]**
1 Department of Software and Computing Systems, University of Alicante,... | Using Visualization to Build Transparency in a Healthcare Blockchain Application | With patients demanding services to control their own health conditions, hospitals are looking to build agility in delivering care by extending their reach into patient and partner ecosystems and sharing relevant patient data to support care continuity. However, sharing patient data with several external stakeholders o... | 2020.0 | 2020-08-20 00:00:00 | https://www.semanticscholar.org/paper/0205b4b033b326a2bfc28ec21fccbd91df47ab2f | Sustainability | True |
02071107d0474cbd1f4077016d3014e1c2c9974e | ## Trust but Verify: Cryptographic Data Privacy for Mobility Management
##### Matthew Tsao Stanford University
```
mwtsao@stanford.edu
Stephen Zoepf Lacuna Technologies
stephen.zoepf@lacuna.ai
```
##### Kaidi Yang Stanford University
```
kaidi.yang@stanford.edu
Marco Pavone Stanford University
pavone@stanford... | Trust but Verify: Cryptographic Data Privacy for Mobility Management | The era of big data has brought with it a richer understanding of user behavior through massive datasets, which can help organizations optimize the quality of their services. In the context of transportation research, mobility data can provide municipal authorities (MAs) with insights on how to operate, regulate, or im... | 2021.0 | 2021-04-15 00:00:00 | https://www.semanticscholar.org/paper/02071107d0474cbd1f4077016d3014e1c2c9974e | IEEE Transactions on Control of Network Systems | True |
02081d2aaf6c56a33e89743aa88faafa64171819 | # energies
_Article_
## Distributed Energy Storage Control for Dynamic Load Impact Mitigation
**Maximilian J. Zangs** **[†], Peter B. E. Adams** **[†], Timur Yunusov, William Holderbaum ***
**and Ben A. Potter**
School of Systems Engineering, University of Reading, Whiteknights Campus, Reading RG6 6AY, UK;
m.j.zangs... | Distributed Energy Storage Control for Dynamic Load Impact Mitigation | The future uptake of electric vehicles (EV) in low-voltage distribution networks can cause increased voltage violations and thermal overloading of network assets, especially in networks with limited headroom at times of high or peak demand. To address this problem, this paper proposes a distributed battery energy stora... | 2016.0 | 2016-08-17 00:00:00 | https://www.semanticscholar.org/paper/02081d2aaf6c56a33e89743aa88faafa64171819 | True | |
02086f491c51a3222da753b7d2b7100fffa01e0b | # Compact McEliece Keys from Goppa Codes
Rafael Misoczki and Paulo S.L.M. Barreto[⋆]
Departamento de Engenharia de Computação e Sistemas Digitais (PCS),
Escola Politécnica, Universidade de São Paulo, Brazil
{rmisoczki,pbarreto}@larc.usp.br
**Abstract. The classical McEliece cryptosystem is built upon the class**
o... | Compact McEliece Keys from Goppa Codes | 2009.0 | 2009-11-04 00:00:00 | https://www.semanticscholar.org/paper/02086f491c51a3222da753b7d2b7100fffa01e0b | IACR Cryptology ePrint Archive | True | |
020b47164f980cf8f1c447a85554fe0217c96be6 | A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED
ON ELLIPTICAL CURVE CRYPTOGAPHY FOR ENERGY-CONSTRAINED DEVICES
Kin Choong Yow and Amol Dabholkar
School of Computer Engineering,
Nanyang Technological University,
Singapore 639798,
email: kcyow@ntu.edu.sg, amold@pmail.ntu.edu.sg
**Abstract**
Wirele... | A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIPTICAL CURVE CRYPTOGAPHY FOR ENERGY-CONSTRAINED DEVICES | 2010.0 | 2010-04-25 00:00:00 | https://www.semanticscholar.org/paper/020b47164f980cf8f1c447a85554fe0217c96be6 | True | ||
020b4eec8eb34b2752e7f0c4072f8eedc07d1fd2 | **Volume 2 Issue 1 (2023) ISSN 2764-6068**
**Research article**
**JNL:** [https://ijlcw.emnuvens.com.br/revista](https://ijlcw.emnuvens.com.br/revista)
**DOI:** [https://doi.org/10.54934/ijlcw.v2i1.48](https://doi.org/10.54934/ijlcw.v2i1.48)
# TOOLS TO STIMULATE BLOCKCHAIN: APPLICATION OF REGULATORY
SANDBOXES, SPECI... | TOOLS TO STIMULATE BLOCKCHAIN: APPLICATION OF REGULATORY SANDBOXES, SPECIAL ECONOMIC ZONES AND PUBLIC PRIVATE PARTNERSHIPS | The Blockchain technology has significant and almost limitless potential. However, today their use for implementation is associated with the problems of lack of high-quality legal regulation of this technology; technical standards for its application; investments required for its development. These problems and the sea... | 2023.0 | 2023-06-15 00:00:00 | https://www.semanticscholar.org/paper/020b4eec8eb34b2752e7f0c4072f8eedc07d1fd2 | International Journal of Law in Changing World | True |
020c3ce8434387e9f141198493a2f68c2e25ca2c | ## We are IntechOpen, the world’s leading publisher of Open Access books Built by scientists, for scientists
# 6,700
Open access books available
# 180,000 195M
International authors and editors
Our authors are among the
Downloads
# 12.2%
# 154 TOP 1%
Countries delivered to most cited scientists Contribut... | An Adaptive Lightweight Security Framework Suited for IoT | Standard security systems are widely implemented in the industry. These systems con- sume considerable computational resources. Devices in the Internet of Things [IoT] are very limited with processing capacity, memory and storage. Therefore, existing security systems are not applicable for IoT. To cope with it, we prop... | 2018.0 | 2018-08-01 00:00:00 | https://www.semanticscholar.org/paper/020c3ce8434387e9f141198493a2f68c2e25ca2c | Internet of Things | True |
02118711c1841d380df17c2537690bc0cedc4906 | ## A Double Auction for Charging Scheduling among Vehicles Using DAG-Blockchains
#### Jianxiong Guo, Member, IEEE, Xingjian Ding, Weili Wu, Senior Member, IEEE, and Ding-Zhu Du
**_Abstract—Electric Vehicles (EVs) are becoming more and_**
**more popular in our daily life, which replaces traditional fuel**
**vehicles ... | A Double Auction for Charging Scheduling among Vehicles Using DAG-Blockchains | Electric Vehicles (EVs) are becoming more and more popular in our daily life, which replaces traditional fuel vehicles to reduce carbon emissions and protect the environment. EVs need to be charged, but the number of charging piles in a Charging Station (CS) is limited, and charging is usually more time-consuming than ... | 2020.0 | 2020-10-03 00:00:00 | https://www.semanticscholar.org/paper/02118711c1841d380df17c2537690bc0cedc4906 | ACM Trans. Sens. Networks | True |
0213f41fa2b6958b9142cc43454cfa1974de97dd | Published Online April 2017 in MECS (http://www.mecs-press.org/)
DOI: 10.5815/ijitcs.2017.04.02
# Databases in Cloud Computing:
A Literature Review
## Harrison John Bhatti
School of Computing and Technology, Asia Pacific University of Technology and Innovation (APU), Technology Park
Malaysia (TPM), Bukit Jalil, K... | Databases in Cloud Computing: A Literature Review | — Information Technology industry has been using the traditional relational databases for about 40 years. However, in the most recent years, there was a substantial conversion in the IT industry in terms of commercial applications. Stand-alone applications have been replaced with electronic applications, committed serv... | 2017.0 | 2017-04-08 00:00:00 | https://www.semanticscholar.org/paper/0213f41fa2b6958b9142cc43454cfa1974de97dd | True | |
02143a479ab76c1a8793d3669a25e72ead827869 | # Symmetric-Key Based Proofs of Retrievability Supporting Public Verification
Chaowen Guan[1(][B][)], Kui Ren[1], Fangguo Zhang[1][,][2][,][3], Florian Kerschbaum[4],
and Jia Yu[1][,][5]
1 Department of Computer Science and Engineering,
University at Buffalo, Buffalo, USA
_{chaoweng,kuiren}@buffalo.edu, isszhfg@mail.... | Symmetric-Key Based Proofs of Retrievability Supporting Public Verification | 2015.0 | 2015-09-21 00:00:00 | https://www.semanticscholar.org/paper/02143a479ab76c1a8793d3669a25e72ead827869 | European Symposium on Research in Computer Security | False | |
0217a17ab73d370bbdbf3ecb95639bd0810b5690 | # applied sciences
_Article_
## Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation
**Mariano Lemus** **[1,2], Mariana F. Ramos** **[3,4], Preeti Yadav** **[1,2], Nuno A. Silva** **[3,4]** **,**
**Nelson J. Muga** **[3,4]** **, André Souto** **[2,5,6,]*** **, Nikola Paunkovi´c** *... | Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation | The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based on public-key cryptography is limited by the security and efficiency of the oblivious transfer implementation. We present a method to generate and distribute oblivious keys by exchangi... | 2019.0 | 2019-09-25 00:00:00 | https://www.semanticscholar.org/paper/0217a17ab73d370bbdbf3ecb95639bd0810b5690 | Applied Sciences | True |
0219fc1452e1fe4236f49bfc7838f03a19ec7fba | Received February 1, 2022, accepted February 23, 2022, date of publication February 25, 2022, date of current version March 9, 2022.
_Digital Object Identifier 10.1109/ACCESS.2022.3154784_
# 5G-Compatible IF-Over-Fiber Transmission Using a Low-Cost SFP-Class Transceiver
MARCO A. FERNANDES 1,2, (Member, IEEE), BRUNO ... | 5G-Compatible IF-Over-Fiber Transmission Using a Low-Cost SFP-Class Transceiver | With the rise of 5G and beyond, the ever-increasing data-rates demanded by mobile access are severely challenging the capacity of optical fronthaul networks. Despite its high reliability and ease of deployment, legacy digital radio-over-fiber (RoF) technologies face an upcoming bandwidth bottleneck in the short term. T... | 2022.0 | NaT | https://www.semanticscholar.org/paper/0219fc1452e1fe4236f49bfc7838f03a19ec7fba | IEEE Access | True |
021a44734d384688e277b852910ac80cb2ab8c34 | SS 379 5980 (o e)
DOI 10.5195/LEDGER.20XX.XXX
RESEARCH ARTICLE
# An Agent-Based Model Framework for Utility-Based Cryptoeconomies
### Kiran Karra, Tom Mellan, Maria Silva, Juan P. Madrigal-Cianci, Axel Cubero Cortes, Zixuan Zhang [∗]
**Abstract. In this paper, we outline a framework for modeling utility-based blockc... | An Agent-Based Model Framework for Utility-Based Cryptoeconomies | In this paper, we outline a framework for modeling utility-based blockchain-enabled economic systems using Agent Based Modeling (ABM). Our approach is to model the supply dynamics based on metrics of the cryptoeconomy. We then build autonomous agents that make decisions based on those metrics. Those decisions, in turn,... | 2023.0 | 2023-07-27 00:00:00 | https://www.semanticscholar.org/paper/021a44734d384688e277b852910ac80cb2ab8c34 | arXiv.org | True |
021bb3f039ede8bfe80eb9749a32b3e9c8bc6b29 | -----
# Flexible Integration of Blockchain with Business Process Automation: A Federated Architecture
Michael Adams[1], Suriadi Suriadi[1], Akhil Kumar[2], and
Arthur H. M. ter Hofstede[1]
1 Queensland University of Technology, Brisbane, Australia
_{mj.adams, s.suriadi, a.terhofstede}@qut.edu.au_
2 Smeal College of ... | Flexible Integration of Blockchain with Business Process Automation: A Federated Architecture | 2020.0 | NaT | https://www.semanticscholar.org/paper/021bb3f039ede8bfe80eb9749a32b3e9c8bc6b29 | CAiSE Forum | False | |
021c89fecb5deff33c4bd7ab7f22800ad64ad22d | # sensors
_Article_
## IoT Data Qualification for a Logistic Chain Traceability Smart Contract
**Mohamed Ahmed** **[1,2,]*, Chantal Taconet** **[2,]*** **, Mohamed Ould** **[1], Sophie Chabridon** **[2]** **and Amel Bouzeghoub** **[2]**
1 ALIS International, 4 Rue du Meunier, 95724 Roissy-en-France, France; Mohamed.... | IoT Data Qualification for a Logistic Chain Traceability Smart Contract | In the logistic chain domain, the traceability of shipments in their entire delivery process from the shipper to the consignee involves many stakeholders. From the traceability data, contractual decisions may be taken such as incident detection, validation of the delivery or billing. The stakeholders require transparen... | 2021.0 | 2021-03-01 00:00:00 | https://www.semanticscholar.org/paper/021c89fecb5deff33c4bd7ab7f22800ad64ad22d | Italian National Conference on Sensors | True |
021d12b8bd39c09f273ee6e30fc70916bf3e52ca | ## A Distributed Path Query Engine for Temporal Property Graphs *
#### Shriram Ramesh, Animesh Baranawal and Yogesh Simmhan
_Department of Computational and Data Sciences,_
_Indian Institute of Science, Bangalore 560012, India_
_Email: {shriramr, animeshb, simmhan}@iisc.ac.in_
**Abstract**
Property graphs are a co... | A Distributed Path Query Engine for Temporal Property Graphs | Property graphs are a common form of linked data, with path queries used to traverse and explore them for enterprise transactions and mining. Temporal property graphs are a recent variant where time is a first-class entity to be queried over, and their properties and structure vary over time. These are seen in social, ... | 2020.0 | 2020-02-09 00:00:00 | https://www.semanticscholar.org/paper/021d12b8bd39c09f273ee6e30fc70916bf3e52ca | IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing | True |
021d3d91a15cd3a247255a205d8e4228e04609a0 | ## sustainability
_Article_
# Improving Collaborative Intrusion Detection System Using Blockchain and Pluggable Authentication Modules for Sustainable Smart City
**Rajeev Kumar Gupta** **[1]** **, Vedant Chawla** **[2], Rajesh Kumar Pateriya** **[2], Piyush Kumar Shukla** **[3],**
**Saoucene Mahfoudh** **[4]** **and ... | Improving Collaborative Intrusion Detection System Using Blockchain and Pluggable Authentication Modules for Sustainable Smart City | The threat of cyber-attacks is ever increasing in today’s society. There is a clear need for better and more effective defensive tools. Intrusion detection can be defined as the detection of anomalous behavior either in the host or in the network. An intrusion detection system can be used to identify the anomalous beha... | 2023.0 | 2023-01-23 00:00:00 | https://www.semanticscholar.org/paper/021d3d91a15cd3a247255a205d8e4228e04609a0 | Sustainability | True |
021ecd84d3d3c6ddb6874023f60808dc635bc2c2 | **ISSN:** 2543-6821 (online)
[Journal homepage: http://ceej.wne.uw.edu.pl](http://ceej.wne.uw.edu.pl)
## **Mateusz Skwarek**
# **Is Bitcoin an emerging market?
** **A market efficiency perspective**
**To cite this article**
Skwarek, M. (2023). Is Bitcoin an emerging market? A market efficiency
perspective. Central ... | Is Bitcoin an emerging market? A market efficiency perspective | Abstract Despite recent studies focused on comparing the dynamics of market efficiency between Bitcoin and other traditional assets, there is a lack of knowledge about whether Bitcoin and emerging markets efficiency behave similarly. This paper aims to compare the market efficiency dynamics between Bitcoin and the emer... | 2023.0 | 2023-01-01 00:00:00 | https://www.semanticscholar.org/paper/021ecd84d3d3c6ddb6874023f60808dc635bc2c2 | Central European Economic Journal | True |
0223db3a9042664f4529dc235ad9f7a662dc15af | Boston University Department of Physics
## Discussion of Qantum Consensus Algorithms
#### Samuel Fulton, Lifu Zhang
**Abstract Leader election is a crucial process in many areas such as cloud computing, distributed systems, task orchestra-**
tion, and blockchain. Ofentimes, in a distributed system, the network need... | Discussion of Quantum Consensus Algorithms | Leader election is a crucial process in many areas such as cloud computing, distributed systems, task orchestration, and blockchain. Oftentimes, in a distributed system, the network needs to choose a leader, which would be responsible for synchronization between different processors, data storage, information distribut... | 2022.0 | 2022-06-09 00:00:00 | https://www.semanticscholar.org/paper/0223db3a9042664f4529dc235ad9f7a662dc15af | arXiv.org | True |
0224fec689cae36bb85c4d63ae3c5a4b060abcd3 | p g
## RESEARCH ARTICLE
## Open Access
# Infection‑related hospitalization following ureteroscopic stone treatment: results from a surgical collaborative
### Adam Cole[1*], Jaya Telang[1], Tae‑Kyung Kim[1], Kavya Swarna[1], Ji Qi[1], Casey Dauw[1], Brian Seifman[2], Mazen Abdelhady[3], William Roberts[1], John H... | Infection-related hospitalization following ureteroscopic stone treatment: results from a surgical collaborative | Background Unplanned hospitalization following ureteroscopy (URS) for urinary stone disease is associated with patient morbidity and increased healthcare costs. To this effect, AUA guidelines recommend at least a urinalysis in patients prior to URS. We examined risk factors for infection-related hospitalization followi... | 2020.0 | 2020-11-03 00:00:00 | https://www.semanticscholar.org/paper/0224fec689cae36bb85c4d63ae3c5a4b060abcd3 | BMC Urology | True |
0227d8aca57de41a14d396350e12f28d4aabe480 | ## applied sciences
_Systematic Review_
### Towards Improving Privacy and Security of Identity Management Systems Using Blockchain Technology: A Systematic Review
**Haifa Alanzi * and Mohammad Alkhatib ***
Department of Computer Science, College of Computer and Information Sciences, Imam Mohammad Ibn Saud
Islamic U... | Towards Improving Privacy and Security of Identity Management Systems Using Blockchain Technology: A Systematic Review | An identity management system (IDMS) manages and organizes identities and credentials information exchanged between users, identity providers (IDPs), and service providers (SPs) to ensure confidentiality and enhance privacy of users’ personal data. Traditional or centralized IDMS rely on a third party to store a user’s... | 2022.0 | 2022-12-04 00:00:00 | https://www.semanticscholar.org/paper/0227d8aca57de41a14d396350e12f28d4aabe480 | Applied Sciences | True |
02280183f81323acabd93adf831183a26abe12c0 | ## A variant of Wiener’s attack on RSA
### Andrej Dujella
Abstract
Wiener’s attack is a well-known polynomial-time attack on a RSA
cryptosystem with small secret decryption exponent d, which works if
d < n[0][.][25], where n = pq is the modulus of the cryptosystem. Namely,
in that case, d is the denominator of som... | A variant of Wiener’s attack on RSA | Wiener’s attack is a well-known polynomial-time attack on a RSA cryptosystem with small secret decryption exponent d, which works if d < n0.25, where n = pq is the modulus of the cryptosystem. Namely, in that case, d is the denominator of some convergent pm/qm of the continued fraction expansion of e/n, and therefore d... | 2008.0 | 2008-11-01 00:00:00 | https://www.semanticscholar.org/paper/02280183f81323acabd93adf831183a26abe12c0 | Computing | False |
02292be913a5c03ba6177bc9b7e85eaed6c26cf7 | ## Time is Money: Strategic Timing Games in Proof-of-Stake Protocols
Caspar Schwarz-Schilling[1], Fahad Saleh[2], Thomas Thiery[1],
Jennifer Pan[3], Nihar Shah[3], and Barnabé Monnot[1]
1 Ethereum Foundation
```
{caspar.schwarz-schilling,thomas.thiery,barnabe.monnot}@ethereum.org
```
2 Wake Forest University
```
... | Time is Money: Strategic Timing Games in Proof-of-Stake Protocols | We propose a model suggesting that honest-but-rational consensus participants may play timing games, and strategically delay their block proposal to optimize MEV capture, while still ensuring the proposal's timely inclusion in the canonical chain. In this context, ensuring economic fairness among consensus participants... | 2023.0 | 2023-05-15 00:00:00 | https://www.semanticscholar.org/paper/02292be913a5c03ba6177bc9b7e85eaed6c26cf7 | Conference on Advances in Financial Technologies | True |
022ad80bb2cf8922a5d0b62cb56c4b7beb08450c | International Journal of
**_[Environmental Research](https://www.mdpi.com/journal/ijerph)_**
**_and Public Health_**
_Article_
# Mitigation Planning and Policies Informed by COVID-19 Modeling: A Framework and Case Study of the State of Hawaii
**Thomas H. Lee** **[1,2], Bobby Do** **[1], Levi Dantzinger** **[1], Joshu... | Mitigation Planning and Policies Informed by COVID-19 Modeling: A Framework and Case Study of the State of Hawaii | In the face of great uncertainty and a global crisis from COVID-19, mathematical and epidemiologic COVID-19 models proliferated during the pandemic. Yet, many models were not created with the explicit audience of policymakers, the intention of informing specific scenarios, or explicit communication of assumptions, limi... | 2022.0 | 2022-05-01 00:00:00 | https://www.semanticscholar.org/paper/022ad80bb2cf8922a5d0b62cb56c4b7beb08450c | International Journal of Environmental Research and Public Health | True |
022baa2ab01c85223ced326773cfec28142ff784 | The modern model of central bank communication suggests that central bankers prefer to err on
the side of saying too much rather than too little. The reason is that most central bankers believe
that clear and concise communication of monetary policy helps achieve their goals. For the Federal
Reserve, this means to achi... | Gauging Market Responses to Monetary Policy Communication | The modern model of central bank communication suggests that central bankers prefer to err on the side of saying too much rather than too little. The reason is that most central bankers believe that clear and concise communication of monetary policy helps achieve their goals. For the Federal Reserve, this means to achi... | 2019.0 | NaT | https://www.semanticscholar.org/paper/022baa2ab01c85223ced326773cfec28142ff784 | The Review | True |
022f64f1cbb0b6dd859736f162cff1130501ec1b | _2022]_ _M. Kasatkina: Dispute Resolution Mechanism for Smart Contracts_ _143_
_DOI 10.5817/MUJLT2022-2-2_
# DISPUTE RESOLUTION
MECHANISM FOR SMART CONTRACTS
_by_
## MARINA KASATKINA[*]
_Disputes regarding smart contracts are inevitable, and parties will need means for_
_dealing with smart contract issues. This... | Dispute Resolution Mechanism for Smart Contracts | Disputes regarding smart contracts are inevitable, and parties will need means for dealing with smart contract issues. This article highlights the need for dispute resolution mechanisms for smart contracts. The author provides analysis of the possible mechanisms to solve disputes arising from smart contracts, namely di... | 2022.0 | 2022-09-30 00:00:00 | https://www.semanticscholar.org/paper/022f64f1cbb0b6dd859736f162cff1130501ec1b | Masaryk University Journal of Law and Technology | True |
02306c29e74698aa4e2ac5e75c872514872ffbe5 | p g
## RESEARCH
## Open Access
# Genome‑wide analysis of genes encoding core components of the ubiquitin system during cerebral cortex development
### Alexandre Bouron[1,2*] and Marie‑Odile Fauvarque[1]
**Abstract**
Ubiquitination involves three types of enzymes (E1, E2, and E3) that sequentially attach ubiq... | Genome-wide analysis of genes encoding core components of the ubiquitin system during cerebral cortex development | Ubiquitination involves three types of enzymes (E1, E2, and E3) that sequentially attach ubiquitin (Ub) to target proteins. This posttranslational modification controls key cellular processes, such as the degradation, endocytosis, subcellular localization and activity of proteins. Ubiquitination, which can be reversed ... | 2022.0 | 2022-08-16 00:00:00 | https://www.semanticscholar.org/paper/02306c29e74698aa4e2ac5e75c872514872ffbe5 | Molecular Brain | True |
023095b6c75a66623876dbc6bca0dfe6b78291f3 | # On the Composition of Authenticated Byzantine Agreement
## Yehuda Lindell�
### Dept. of Computer Science Weizmann Institute of Science Rehovot 76100, ISRAEL lindell@wisdom.weizmann.ac.il
## ABSTRACT
�
## Anna Lysyanskaya
### MIT LCS 200 Technology Square Cambridge, MA 02139 USA anna@theory.lcs.mit.edu
## 1.... | On the composition of authenticated byzantine agreement | 2002.0 | 2002-05-19 00:00:00 | https://www.semanticscholar.org/paper/023095b6c75a66623876dbc6bca0dfe6b78291f3 | Symposium on the Theory of Computing | True | |
02318c72964c65db5dc32b3997968c673c3bef9a | been studied previously. Private-key cryptosystems `using` simpler codes have _,
###### PRIVATEKEY
ALGEBRAIC-CODED
```
CRYFTOSYSTEMS *
T. R. N. Rao Kil-Hyun Nam **
```
The Center `for Advanced Computer Studies` National Defense College
University of Southwestern Louisiana Seoul, Korea
Lafayette, Louis... | Private-Key Algebraic-Coded Cryptosystems | 1986.0 | NaT | https://www.semanticscholar.org/paper/02318c72964c65db5dc32b3997968c673c3bef9a | Annual International Cryptology Conference | True | |
0231f3a936aa6807a7d215c8ef49bb96affd5f3f | RESEARCH
ASSOCIATION for
# **R A I S**
INTERDISCIPLINARY DOI: 10.5281/zenodo.3267518
JUNE 2019 STUDIES
## **The Equity and Inclusion in Higher Education: ** **A Proposed Model for Open Data **
### **Carla Hamida [1], Amanda Landi [2], Ziyi Liu [3]**
*[1]* *Bard College at Simon’s Rock, Great Barrington, USA (Indonesia... | The Equity and Inclusion in Higher Education: A Proposed Model for Open Data | Recently, governmental institutions and private industries in power have been pushed to be more transparent so that more people can have ownership of their data. Another type of institution with a large amount of power over data are educational institutions. Colleges and Universities around the globe store a significan... | 2019.0 | 2019-06-30 00:00:00 | https://www.semanticscholar.org/paper/0231f3a936aa6807a7d215c8ef49bb96affd5f3f | Social Science Research Network | True |
02323347b6dc92c516ef6bc456db5aa647627895 | _Edited by:_
_Marta Poblet,_
_RMIT University, Australia_
_Reviewed by:_
_Vanessa Teague,_
_Australian National University,_
_Australia_
_Jake Goldenfein,_
_The University of Melbourne, Australia_
_*Correspondence:_
_Miranda Imperial_
_mci30@cam.ac.uk;_
_miranda.imperial@gmail.com_
_Specialty section:_
_This article... | The Democracy to Come? An Enquiry Into the Vision of Blockchain-Powered E-Voting Start-Ups | This research sets out to analyze the message promoted by start-up enterprises that apply blockchain technologies for the purpose of e-voting [blockchain-powered e-voting (BPE)], and their perceived effects of this technological solution on democratic outcomes. Employing Norman Fairclough’s critical discourse analysis ... | 2021.0 | 2021-04-09 00:00:00 | https://www.semanticscholar.org/paper/02323347b6dc92c516ef6bc456db5aa647627895 | Frontiers in Blockchain | True |
02324eda5842b7144859126bf152495e7c8a415d | BCP Business & Management **AFTEM 2022**
Volume **32** (2022)
# **International Capital Flows, Dynamic Changes in ** **Cryptocurrency and Noble Metal Markets **
## Ruize Sun*
School of Business, University of Leicester, Leicester, LE2 7RH, UK
*Corresponding author: rs673@student.le.ac.uk
**Abstract.** In 2022, with ... | International Capital Flows, Dynamic Changes in Cryptocurrency and Noble Metal Markets | In 2022, with the implementation of tightening monetary policies by FOMC, US dollar is experiencing a dramatic appreciation in a very short period. Though numerous studies have demonstrated the connection between the traditional currency market, cryptocurrency market, and precious metal market, rare studies are explori... | 2022.0 | 2022-11-22 00:00:00 | https://www.semanticscholar.org/paper/02324eda5842b7144859126bf152495e7c8a415d | BCP Business & Management | True |
023383352dccd15dc24113f894f33efd983da33c | ## sustainability
_Article_
# Empirical Research on the Fama-French Three-Factor Model and a Sentiment-Related Four-Factor Model in the Chinese Blockchain Industry
**Ziyang Ji** **[1], Victor Chang** **[2]** **, Hao Lan** **[1]** **[, Ching-Hsien Robert Hsu](https://sciprofiles.com/profile/587004)** **[3,4,5,]* and R... | Empirical Research on the Fama-French Three-Factor Model and a Sentiment-Related Four-Factor Model in the Chinese Blockchain Industry | As one of the most significant components of financial technology (FinTech), blockchain technology arouses the interests of numerous investors in China, and the number of companies engaged in this field rises rapidly. The emotion of investors has an effect on stock returns, which is a hot topic in behavioral finance. B... | 2020.0 | 2020-06-24 00:00:00 | https://www.semanticscholar.org/paper/023383352dccd15dc24113f894f33efd983da33c | Sustainability | True |
023de6262322bae283469df6b9c1c056759315c4 | Received March 2, 2021, accepted April 2, 2021, date of publication April 12, 2021, date of current version April 19, 2021.
_Digital Object Identifier 10.1109/ACCESS.2021.3072635_
# An Improved Genetic Algorithm for Safety and Availability Checking in Cyber-Physical Systems
ZHENG WANG 1,2, YANAN JIN3, SHASHA YANG4, ... | An Improved Genetic Algorithm for Safety and Availability Checking in Cyber-Physical Systems | Cross-IoT infrastructure access frequently occurs when performing tasks in a distributed computing infrastructure of a cyber-physical system (CPS). The access control technology that ensure secure access cross-IoT infrastructure usually automatically establish relationships between user-attribute/role-permission. How t... | 2021.0 | NaT | https://www.semanticscholar.org/paper/023de6262322bae283469df6b9c1c056759315c4 | IEEE Access | True |
023e83b3dce4a29c18934916f08cc3d2d40d535a | # New Directions in Social Authentication
## Sakshi Jain
sjain2@linkedin.com
## Juan Lang
juanlang@google.com
## Neil Zhenqiang Gong
neilz.gong@berkeley.edu
## Dawn Song
dawnsong@cs.berkeley.edu
## Sreya Basuroy
basuroy@princeton.edu
## Prateek Mittal
pmittal@princeton.edu
**_Abstract—Web services are increa... | New Directions in Social Authentication | 2015.0 | NaT | https://www.semanticscholar.org/paper/023e83b3dce4a29c18934916f08cc3d2d40d535a | True | ||
023fb7dd8bdf0812ffbf351657c08c8920f7d512 | Vol. 8, No. 1, August 2022
ISSN 2374-2410 E-ISSN 2374-2429
Published by Redfame Publishing
URL: http://afa.redfame.com
# Applicability of Blockchain Technology to The Normal Accounting Cycle
Williams Kwasi Peprah[1], Reynaldo P. Abas Jr.[2] & Akwasi Ampofo[3]
1Valley View University, School of Business, Oyibi, A... | Applicability of Blockchain Technology to The Normal Accounting Cycle | Blockchain technologyis a distributed, unchangeable ledger that makes recording transactions and managing assets in a business network much easier and nowa type of accountingsoftwareconcernedwith the transfer of assetownership and the maintenanceof anaccuratefinancial ledger. Despitethenumerousbenefits ofblockchaintech... | 2022.0 | 2022-02-22 00:00:00 | https://www.semanticscholar.org/paper/023fb7dd8bdf0812ffbf351657c08c8920f7d512 | Applied Finance and Accounting | True |
0240a106144dbee52e5e527f8e2f0cd21fc3126b | # applied sciences
_Article_
## Publicly Verifiable Spatial and Temporal Aggregation Scheme Against Malicious Aggregator in Smart Grid
**Lei Zhang** **[1]** **and Jing Zhang** **[2,1,]***
1 College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China;
lei_power@hrbeu.edu.cn
2 Scho... | Publicly Verifiable Spatial and Temporal Aggregation Scheme Against Malicious Aggregator in Smart Grid | We propose a privacy-preserving aggregation scheme under a malicious attacks model, in which the aggregator may forge householders’ billing, or a neighborhood aggregation data, or collude with compromised smart meters to reveal object householders’ fine-grained data. The scheme can generate spatially total consumption ... | 2019.0 | 2019-01-31 00:00:00 | https://www.semanticscholar.org/paper/0240a106144dbee52e5e527f8e2f0cd21fc3126b | Applied Sciences | True |
0241483aa2623ab398de10982b958d01e6f5e453 | _Article_
# Incentive-Driven Information Sharing in Leasing Based on a Consortium Blockchain and Evolutionary Game
**Hanlei Cheng** **[1]** **, Jian Li** **[1,2]** **, Jing Lu** **[3,4], Sio-Long Lo** **[1,]* and Zhiyu Xiang** **[4]**
1 Faculty of Innovation Engineering, Macau University of Science and Technology, Ma... | Incentive-Driven Information Sharing in Leasing Based on a Consortium Blockchain and Evolutionary Game | Blockchain technology (BCT) provides a new way to mitigate the default risks of lease contracts resulting from the information asymmetry in leasing. The conceptual architecture of a consortium blockchain-based leasing platform (CBLP) is first proposed to facilitate information sharing between small and medium-sized ent... | 2023.0 | 2023-01-29 00:00:00 | https://www.semanticscholar.org/paper/0241483aa2623ab398de10982b958d01e6f5e453 | Journal of Theoretical and Applied Electronic Commerce Research | True |
024384b677b58c1f48697245b748ec291812b563 | # Universal Re-encryption for Mixnets
**Abstract. We introduce a new cryptographic technique that we call universal re-encryption. A**
conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a player
with knowledge of the public key corresponding to a given ciphertext. In contrast, univ... | Universal Re-encryption for Mixnets | 2004.0 | 2004-02-23 00:00:00 | https://www.semanticscholar.org/paper/024384b677b58c1f48697245b748ec291812b563 | The Cryptographer's Track at RSA Conference | False | |
0244a3e459fe7b78debc2ee71bbf73514ca013bd | # Distributed Control and Energy Storage Requirements of Networked Dc Microgrids
Wayne W. Weaver[a], Rush D. Robinett, III[a], Gordon G. Parker[a], David G.
Wilson[b]
_aMichigan Technological University, 1400 Townsend Dr., Houghton, Michigan, 49931,_
_USA_
_bSandia National Laboratories, P.O. Box 5800, Albuquerque, N... | Distributed control and energy storage requirements of networked Dc microgrids | 2015.0 | 2015-11-01 00:00:00 | https://www.semanticscholar.org/paper/0244a3e459fe7b78debc2ee71bbf73514ca013bd | True | ||
0246366d638b26f74404861edb9f4071bee082bb | # Moving from 5G in Verticals to Sustainable 6G: Business,
Regulatory and Technical Research Prospects
Marja Matinmikko-Blue[1[0000-0002-0094-6344]], Seppo Yrjölä[2[0000-0003-2053-9700]], and Petri
Ahokangas[3[0000-0002-2351-8473]]
1 Centre for Wireless Communications, University of Oulu, Finland
2 University of O... | Moving from 5G in Verticals to Sustainable 6G: Business, Regulatory and Technical Research Prospects | 2020.0 | NaT | https://www.semanticscholar.org/paper/0246366d638b26f74404861edb9f4071bee082bb | International Conference on Cognitive Radio Oriented Wireless Networks and Communications | False | |
0247616396cf94cb16350019864f3847dad97d32 | **_Journal of Software Engineering and Applications, 2012, 5, 102-108_**
http://dx.doi.org/10.4236/jsea.2012.52016 Published Online February 2012 (http://www.SciRP.org/journal/jsea)
# Combining Public Key Encryption with Schnorr Digital Signature
#### Laura Savu
Department of Information Security, Faculty of Mathema... | Combining Public Key Encryption with Schnorr Digital Signature | This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper als... | 2012.0 | 2012-02-27 00:00:00 | https://www.semanticscholar.org/paper/0247616396cf94cb16350019864f3847dad97d32 | True | |
024aa4597ede5823b301593385cb892df14180da | Received June 2, 2021, accepted June 16, 2021, date of publication June 21, 2021, date of current version June 30, 2021.
_Digital Object Identifier 10.1109/ACCESS.2021.3091317_
# Evaluating Countermeasures for Verifying the Integrity of Ethereum Smart Contract Applications
SUHWAN JI 1, DOHYUNG KIM 1,2, AND HYEONSEUN... | Evaluating Countermeasures for Verifying the Integrity of Ethereum Smart Contract Applications | Blockchain technology, which provides digital security in a distributed manner, has evolved into a key technology that can build efficient and reliable decentralized applications (called DApps) beyond the function of cryptocurrency. The characteristics of blockchain such as immutability and openness, however, have made... | 2021.0 | NaT | https://www.semanticscholar.org/paper/024aa4597ede5823b301593385cb892df14180da | IEEE Access | True |
024b9198a432d51f0a5245bd60072e147fa2f9e1 | ## Inverting Cryptographic Hash Functions via Cube-and-Conquer
**Oleg Zaikin** zaikin.icc@gmail.com
_ISDCT, Irkutsk, Russia_
### Abstract
MD4 and MD5 are seminal cryptographic hash functions proposed in early 1990s. MD4
consists of 48 steps and produces a 128-bit hash given a message of arbitrary finite size.
MD5 ... | Inverting Cryptographic Hash Functions via Cube-and-Conquer | MD4 and MD5 are fundamental cryptographic hash functions proposed in the early 1990s. MD4 consists of 48 steps and produces a 128-bit hash given a message of arbitrary finite size. MD5 is a more secure 64-step extension of MD4. Both MD4 and MD5 are vulnerable to practical collision attacks, yet it is still not realisti... | 2022.0 | 2022-12-05 00:00:00 | https://www.semanticscholar.org/paper/024b9198a432d51f0a5245bd60072e147fa2f9e1 | Journal of Artificial Intelligence Research | True |
024c65380b37cfbcc1fc5a595dd16fa20a382507 | **The performance of power and citizenship: David Cameron meets the people**
Peter Lunt
School of Media, Communication and Sociology
University of Leicester, UK
[Pl108@le.ac.uk](mailto:Pl108@le.ac.uk)
**Abstract**
How do citizens respond to and engage the performance of political power in the context of
mainstre... | The performance of power and citizenship: David Cameron meets the people | How do citizens respond to and engage with the performance of political power in the context of mainstream media? Through an analysis of two television programmes aired during the UK Brexit referendum campaign of 2016, a picture emerges of citizenship as the performative disruption of the performance of power. In the p... | 2019.0 | 2019-07-23 00:00:00 | https://www.semanticscholar.org/paper/024c65380b37cfbcc1fc5a595dd16fa20a382507 | International journal of cultural studies | True |
024c9e9327edd1f6ed69eb9850cfaf5c2b266be9 | # sensors
### Article
## Cloud Servers: Resource Optimization Using Different Energy Saving Techniques
### Mohammad Hijji [1,]*, Bilal Ahmad [2], Gulzar Alam [3], Ahmed Alwakeel [1], Mohammed Alwakeel [1], Lubna Abdulaziz Alharbi [1], Ahd Aljarf [4] and Muhammad Umair Khan [5,]*
1 Faculty of Computers & Information ... | Cloud Servers: Resource Optimization Using Different Energy Saving Techniques | Currently, researchers are working to contribute to the emerging fields of cloud computing, edge computing, and distributed systems. The major area of interest is to examine and understand their performance. The major globally leading companies, such as Google, Amazon, ONLIVE, Giaki, and eBay, are truly concerned about... | 2022.0 | 2022-11-01 00:00:00 | https://www.semanticscholar.org/paper/024c9e9327edd1f6ed69eb9850cfaf5c2b266be9 | Italian National Conference on Sensors | True |
024e06bc350d5bb5599bd58a89ee18c3fc3ed122 | Received June 30, 2020, accepted July 18, 2020, date of publication July 23, 2020, date of current version August 5, 2020.
_Digital Object Identifier 10.1109/ACCESS.2020.3011477_
# A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
YICHEN HOU 1, SAHIL GARG 2,3, (Member, IEEE), LIN HUI 1,
DUSH... | A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing | Mobile edge computing, with characteristics of position awareness, mobile support, low latency, decentralization, and distribution, has received widespread attention from industry and academia, and has been applied to application areas such as intelligent transportation, smart city, and real-time big data analysis. How... | 2020.0 | NaT | https://www.semanticscholar.org/paper/024e06bc350d5bb5599bd58a89ee18c3fc3ed122 | IEEE Access | True |
025150bc246547d7eabeae51326b6d24c154d4b3 | Published Online June 2016 in MECS (http://www.mecs-press.org/)
DOI: 10.5815/ijcnis.2016.06.07
# Verifier-based Password Authenticated 3P-EKE
Protocol using PCLA Keys
## Archana Raghuvamshi
Adikavi Nannaya University /CSE Department, Rajahmundry, 533296, India
E-mail: archana_anur@yahoo.in
## Premchand Parvatanen... | Verifier-based Password Authenticated 3P-EKE Protocol using PCLA Keys | This paper endeavors to present a novel framework for the generic structure of a verifier-based password authenticated Three-Party Encrypted Key Exchange (3P-EKE) protocol which yields more efficient protocol than the ones knew before. A previous framework presented by Archana and Premchand is more secured against all ... | 2016.0 | 2016-06-08 00:00:00 | https://www.semanticscholar.org/paper/025150bc246547d7eabeae51326b6d24c154d4b3 | True | |
0254fed1ad7983ac9d834822d66a553845e0f7de | # Privacy-aware and highly-available OSN profiles
Rammohan Narendula, Thanasis G. Papaioannou, and Karl Aberer
School of Computer and Communication Sciences, EPFL, Switzerland
Email: firstname.lastname@epfl.ch
**_Abstract—The explosive growth of online social networks_**
**(OSNs) and their wide popularity suggest th... | Privacy-Aware and Highly-Available OSN Profiles | 2010.0 | 2010-06-28 00:00:00 | https://www.semanticscholar.org/paper/0254fed1ad7983ac9d834822d66a553845e0f7de | 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises | True | |
02562dc2b524dceb6a535c2baddc1e8d88463ad9 | # Practical Fully-Decentralized Secure Aggregation for Personal Data Management Systems
## Julien Mirval, Luc Bouganim, Iulian Sandu Popa
To cite this version:
#### Julien Mirval, Luc Bouganim, Iulian Sandu Popa. Practical Fully-Decentralized Secure Aggrega- tion for Personal Data Management Systems. 33rd Internati... | Practical Fully-Decentralized Secure Aggregation for Personal Data Management Systems | Personal Data Management Systems (PDMS) are flourishing, boosted by legal and technical means like smart disclosure, data portability and data altruism. A PDMS allows its owner to easily collect, store and manage data, directly generated by her devices, or resulting from her interactions with companies or administratio... | 2021.0 | 2021-07-06 00:00:00 | https://www.semanticscholar.org/paper/02562dc2b524dceb6a535c2baddc1e8d88463ad9 | International Conference on Statistical and Scientific Database Management | True |
025659bfc224e9420db7c3c50027478355a32fb2 | ## future internet
_Article_
# An Improved Deep Learning Model for DDoS Detection Based on Hybrid Stacked Autoencoder and Checkpoint Network
**Amthal K. Mousa * and Mohammed Najm Abdullah**
Computer Engineering Department, University of Technology-Iraq, Baghdad P.O. Box 10071, Iraq;
mohammed.n.abdullah@uotechnology.... | An Improved Deep Learning Model for DDoS Detection Based on Hybrid Stacked Autoencoder and Checkpoint Network | The software defined network (SDN) collects network traffic data and proactively manages networks. SDN’s programmability makes it excellent for developing distributed applications, cybersecurity, and decentralized network control in multitenant data centers. This exceptional architecture is vulnerable to security conce... | 2023.0 | 2023-08-19 00:00:00 | https://www.semanticscholar.org/paper/025659bfc224e9420db7c3c50027478355a32fb2 | Future Internet | True |
025bde8270278a539aa25dfc08ee9e73b569f0d0 | #, Authenticity Blockchain Solution
Monther Aldwairi
_College of Computer and Information_
_Technology_
_Jordan University of Science and_
_Technology_
Irbid, Jordan
munzer@just.edu.jo
Mohamad Badra
_College of Technological Innovation_
_Zayed University_
Dubai, UAE
mohamd.badra@zu.ac.ae
Rouba Borghol
_Science an... | DocCert: Nostrification, Document Verification and Authenticity Blockchain Solution | Many institutions and organizations require nostrification and verification of qualification as a prerequisite for hiring. The idea is to recognize the authenticity of a copy or digital document issued by an institution in a foreign country and detect forgeries. Certificates, financial records, health records, official... | 2023.0 | 2023-10-13 00:00:00 | https://www.semanticscholar.org/paper/025bde8270278a539aa25dfc08ee9e73b569f0d0 | International Conference on Blockchain Computing and Applications | True |
025db54d117d024615422b3cee16c1d9f46e15ce | _Journal of Central Banking Theory and Practice, 2023, 2, pp. 83-101_
_Received: 08 February 2022.; accepted: 13 June 2022_
## Soraya BEN SOUISSI [*], Mahmoud Sami NABI[ **]
# Could the Issuance of CBDC Reduce the Likelihood of Banking Panic?[1]
**Abstract: This paper delves into the relationship between the issu-**... | Could the Issuance of CBDC Reduce the Likelihood of Banking Panic?1 | Abstract This paper delves into the relationship between the issuance of Central Bank Digital Currencies (CBDC) and the likelihood of banking panic. The issuance of CBDC acts as a disturbing shock that incentivizes depositors to withdraw all/part of their deposits from the commercial banks, to swap it for CBDC which ar... | 2023.0 | 2023-05-01 00:00:00 | https://www.semanticscholar.org/paper/025db54d117d024615422b3cee16c1d9f46e15ce | Journal of Central Banking Theory and Practice | True |
025e07ce9e6fd253b53c18e097d0ea6df186490f | _p_ _g y_ _(_ _)_
https://doi.org/10.1186/s13018-022-03068-7
## RESEARCH ARTICLE
## Open Access
# Knowledge structure and emerging trends on osteonecrosis of the femoral head: a bibliometric and visualized study
### Haiyang Wu[1*†], Kunming Cheng[2†], Linjian Tong[1], Yulin Wang[1], Weiguang Yang[1] and Zhiming ... | Knowledge structure and emerging trends on osteonecrosis of the femoral head: a bibliometric and visualized study | Background Osteonecrosis of the femoral head (ONFH) is a common disabling disease with considerable social and economic impacts. Although extensive studies related to ONFH have been conducted in recent years, a specific bibliometric analysis on this topic has not yet been performed. Our study attempted to summarize the... | 2022.0 | 2022-03-28 00:00:00 | https://www.semanticscholar.org/paper/025e07ce9e6fd253b53c18e097d0ea6df186490f | Journal of Orthopaedic Surgery and Research | True |
0260f2fe0b329bbacd07ecaf3731bf48e7c8ebc3 | **_https://dx.doi.org/10.22161/ijaers/3.10.11 ISSN: 2349-6495(P) | 2456-1908(O)_**
# Secured Decentralized Confidential Data Distributed in the Disruption-Tolerant Military Network
## Aniruddha Singh Chauhan[1], Prof. Nikita Umare[2]
1ME 3rd Sem. WCC Student, Abha Gaikwad-Patil Co... | Secured Decentralized Confidential Data Distributed in the Disruption-Tolerant Military Network | 2016.0 | 2016-10-01 00:00:00 | https://www.semanticscholar.org/paper/0260f2fe0b329bbacd07ecaf3731bf48e7c8ebc3 | True | ||
02620aa4121370fb8727553bb72e8bab1b95450f | # Adaptive Restructuring of Merkle and Verkle Trees
for Enhanced Blockchain Scalability
Oleksandr Kuznetsov[ 1,2*], Dzianis Kanonik [1], Alex Rusnak [1], Anton Yezhov[ 1], Oleksandr Domin[1 ]
1 Proxima Labs, 1501 Larkin Street, suite 300, San Francisco, USA
2 Department of Political Sciences, Communication and Inte... | Adaptive Restructuring of Merkle and Verkle Trees for Enhanced Blockchain Scalability | 2024.0 | 2024-03-01 00:00:00 | https://www.semanticscholar.org/paper/02620aa4121370fb8727553bb72e8bab1b95450f | Internet of Things | True | |
0263cf4e40d6bc60fe421ed73763e4fbed70c0fd | # processes
_Article_
## Can Decentralization Drive Green Innovation? A Game Theoretical Analysis of Manufacturer Encroachment Selection with Consumer Green Awareness
**Dan Cao** **[1], Jin Li** **[2], Gege Liu** **[2]** **and Ran Mei** **[3,]***
1 School of Business Administration, Zhejiang Gongshang University, Ha... | Can Decentralization Drive Green Innovation? A Game Theoretical Analysis of Manufacturer Encroachment Selection with Consumer Green Awareness | With the increase of public environmental awareness and the growth of e-commerce, sustainable development promotes the manufacturer to increasingly participate in green innovation and make full use of the online sales channel to enhance competitiveness. Despite decentralized encroachment being widely adopted in busines... | 2021.0 | 2021-06-03 00:00:00 | https://www.semanticscholar.org/paper/0263cf4e40d6bc60fe421ed73763e4fbed70c0fd | True | |
0265955b9565abd870ab9d874305a84ef397c743 | # Fast Multi-precision Multiplication for
Public-Key Cryptography on Embedded
Microprocessors
Michael Hutter and Erich Wenger
Institute for Applied Information Processing and Communications (IAIK),
Graz University of Technology, Inffeldgasse 16a, 8010 Graz, Austria
_{Michael.Hutter,Erich.Wenger}@iaik.tugraz.at_
... | Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors | 2011.0 | 2011-09-28 00:00:00 | https://www.semanticscholar.org/paper/0265955b9565abd870ab9d874305a84ef397c743 | Journal of Cryptology | True | |
0266f264f35f3c0049ffe3b517170d081a1824e1 | Received June 11, 2021, accepted July 1, 2021, date of publication July 5, 2021, date of current version July 13, 2021.
_Digital Object Identifier 10.1109/ACCESS.2021.3094888_
# Leveraging User-Diversity in Energy-Efficient Edge-Facilitated Collaborative Fog Computing
ANTOINE PARIS, (Member, IEEE), HAMED MIRGHASEMI,... | Leveraging User-Diversity in Energy-Efficient Edge-Facilitated Collaborative Fog Computing | With the increasing number of heterogeneous resource-constrained devices populating the current wireless ecosystem, enabling ubiquitous computing at the edge of the network requires moving part of the computing burden back to the edge to reduce user-side latency and relieve the backhaul network. Motivated by this chall... | 2020.0 | 2020-03-31 00:00:00 | https://www.semanticscholar.org/paper/0266f264f35f3c0049ffe3b517170d081a1824e1 | IEEE Access | True |
026730ead96211ee8e954e9df5c220191fa2d329 | **Indonesian Journal of Electrical Engineering and Computer Science**
Vol. 11, No. 3, September 2018, pp.1121~ 1128
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v11.i3.pp1121-1128 1121
# Comparative Performance of Machine Learning Algorithms for
Cryptocurrency Forecasting
**Nor Azizah Hitam, Amelia Ritahani Ismail**
D... | Comparative Performance of Machine Learning Algorithms for Cryptocurrency Forecasting | Machine Learning is part of Artificial Intelligence that has the ability to make future forecastings based on the previous experience. Methods has been proposed to construct models including machine learning algorithms such as Neural Networks (NN), Support Vector Machines (SVM) and Deep Learning. This paper presents a ... | 2018.0 | 2018-09-01 00:00:00 | https://www.semanticscholar.org/paper/026730ead96211ee8e954e9df5c220191fa2d329 | Indonesian Journal of Electrical Engineering and Computer Science | True |
026a1ec02e15aacd176148eedb487bbc08edf905 | ```
Neural Computation (2001) v. 13 n. 2, pp. 411-452
# Binding and Normalization of Binary Sparse Distributed Representations by Context-Dependent Thinning
```
Dmitri A. Rachkovskij
V. M. Glushkov Cybernetics Center
Pr. Acad. Glushkova 40
Kiev 03680
Ukraine
dar@infrm.kiev.ua
(Preferable contact method)
Ernst M.... | Binding and Normalization of Binary Sparse Distributed Representations by Context-Dependent Thinning | 2001.0 | 2001-02-01 00:00:00 | https://www.semanticscholar.org/paper/026a1ec02e15aacd176148eedb487bbc08edf905 | Neural Computation | True | |
026e0df72f523f1b772e9295344b7ba9877e1098 | ## ***proceedings***
*Proceedings*
# **Incentives for Crypto-Collateralized Digital Assets [†]**
**Philip N. Brown**
Department of Computer Science at the University of Colorado, Colorado Springs, CO 80918, USA;
philip.brown@uccs.edu
- Presented at the 3rd annual Decentralized Conference, Athens, Greece, 30 Octobe... | Incentives for Crypto-Collateralized Digital Assets | Digital currencies such as Bitcoin frequently suffer from high price volatility, limiting their utility as a means of purchasing power. Hence, a popular topic among cryptocurrency researchers is a digital currency design which inherits the decentralization of Bitcoin while somehow mitigating its violent price swings. O... | 2019.0 | 2019-10-21 00:00:00 | https://www.semanticscholar.org/paper/026e0df72f523f1b772e9295344b7ba9877e1098 | Proceedings | True |
026f542ead119d0d53a6c7a35496d207b8b0b053 | # DeFi Risk Transfer: Towards A Fully Decentralized Insurance Protocol
### Fabian Schär
_Center for Innovative Finance (CIF)_
_University of Basel_
Basel, Switzerland
f.schaer@unibas.ch
### Matthias Nadler
_Center for Innovative Finance (CIF)_
_University of Basel_
Basel, Switzerland
matthias.nadler@unibas.ch
###... | DeFi Risk Transfer: Towards A Fully Decentralized Insurance Protocol | In this paper, we propose a fully decentralized and smart contract-based insurance protocol. We identify various issues in the Decentralized Finance (DeFi) insurance context and propose a solution to overcome these shortcomings. We introduce an economic model that allows for risk transfer without any external dependenc... | 2022.0 | 2022-12-20 00:00:00 | https://www.semanticscholar.org/paper/026f542ead119d0d53a6c7a35496d207b8b0b053 | International Conference on Blockchain | True |
0272fb91bc0ca70d246268095be9d6138293babc | ## MEDCO: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data
#### Jean Louis Raisaro, Juan Ramón Troncoso-Pastoriza, Mickaël Misbach, João Sá Sousa, Sylvain Pradervand, Edoardo Missiaglia, Olivier Michielin, Bryan Ford and Jean-Pierre Hubaux
**Abstract—The increasing number of... | MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data | The increasing number of health-data breaches is creating a complicated environment for medical-data sharing and, consequently, for medical progress. Therefore, the development of new solutions that can reassure clinical sites by enabling privacy-preserving sharing of sensitive medical data in compliance with stringent... | 2019.0 | 2019-07-01 00:00:00 | https://www.semanticscholar.org/paper/0272fb91bc0ca70d246268095be9d6138293babc | IEEE/ACM Transactions on Computational Biology & Bioinformatics | True |
0273efebece84154e5d64f42df67e2139df992b6 | |Col1|論文 / 著書情報 Article / Book Information|
|---|---|
|Title|A performance model for the communication in fast multipole methods on high-performance computing platforms|
|Author|Huda Ibeid, Rio Yokota, David Keyes|
|J ournal/Book name|International J ournal of High Performance Computing Applications, Vol. 30, No. 4, pp... | A performance model for the communication in fast multipole methods on high-performance computing platforms | 2016.0 | 2016-11-01 00:00:00 | https://www.semanticscholar.org/paper/0273efebece84154e5d64f42df67e2139df992b6 | The international journal of high performance computing applications | True | |
0276e32e1440fee9e433f45192e8ccd7f31e3a56 | # Platform for Efficient Switching between Multiple Devices in the
Intensive Care Unit
Femke De Backere[1], Thomas Vanhove[1], Emanuel Dejonghe[1], Matthias Feys[1], Tim Herinckx[1],
Jeroen Vankelecom[1], Johan Decruyenaere[2] and Filip De Turck[1]
1 Information Technology Department (INTEC), Ghent University - iMi... | Platform for Efficient Switching between Multiple Devices in the Intensive Care Unit | 2014.0 | 2014-06-06 00:00:00 | https://www.semanticscholar.org/paper/0276e32e1440fee9e433f45192e8ccd7f31e3a56 | Methods of Information in Medicine | True | |
0277681acf245005906e17d6996ed498421c5b68 | ## RESEARCH
## Open Access
# Data‑aware optimization of bioinformatics workflows in hybrid clouds
### Athanassios M. Kintsakis[*], Fotis E. Psomopoulos and Pericles A. Mitkas
*Correspondence:
akintsakis@issel.ee.auth.gr
Department of Electrical
and Computer
Engineering, Aristotle
University of Thessaloniki,
5412... | Data-aware optimization of bioinformatics workflows in hybrid clouds | Life Sciences have been established and widely accepted as a foremost Big Data discipline; as such they are a constant source of the most computationally challenging problems. In order to provide efficient solutions, the community is turning towards scalable approaches such as the utilization of cloud resources in addi... | 2016.0 | 2016-10-21 00:00:00 | https://www.semanticscholar.org/paper/0277681acf245005906e17d6996ed498421c5b68 | Journal of Big Data | True |
027bd79f0d6c728825aaac3fa41f6178e8b30145 | ### Decentralized Blended Acquisition
#### Guus Berkhout, Delft University of Technology
**SUMMARY**
The concept of blending and deblending is reviewed, making
use of traditional and dispersed source arrays. The network
concept of distributed blended acquisition is introduced. A
million-trace robot system is propose... | Decentralized Blended Acquisition | 2013.0 | 2013-01-10 00:00:00 | https://www.semanticscholar.org/paper/027bd79f0d6c728825aaac3fa41f6178e8b30145 | True | ||
0287942a57191b829f0a68658bb43646c7d5160d | ## Enforcing Security and Assurance Properties in Cloud Environment
### Aline Bousquet, Jérémy Briffaut, Eddy Caron, Eva María Dominguez, Javier
Franco, Arnaud Lefray, Oscar López, Saioa Ros, Jonathan Rouzaud-Cornabas,
Christian Toinard, et al.
To cite this version:
#### Aline Bousquet, Jérémy Briffaut, Eddy Ca... | Enforcing Security and Assurance Properties in Cloud Environment | Before deploying their infrastructure (resources, data, communications, ) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deploy... | 2015.0 | 2015-12-01 00:00:00 | https://www.semanticscholar.org/paper/0287942a57191b829f0a68658bb43646c7d5160d | International Conference on Utility and Cloud Computing | True |
028821c2f74bce87b58d99cf63a204fe5cce94e9 | # Optimal Content Placement for Peer-to-Peer Video-on-Demand Systems[1]
#### Bo (Rambo) Tan
Department of Electrical and Computer Engineering
University of Illinois at Urbana-Champaign
Urbana, IL 61801, USA
Email: botan2@illinois.edu
#### Laurent Massouli´e
Technicolor Paris Research Lab
Issy-les-Moulineaux Cedex 9... | Optimal content placement for peer-to-peer video-on-demand systems | 2010.0 | 2010-04-27 00:00:00 | https://www.semanticscholar.org/paper/028821c2f74bce87b58d99cf63a204fe5cce94e9 | 2011 Proceedings IEEE INFOCOM | True | |
028a57e04bdebfd6e0de0b6b95c1070f6a0b1fd8 | # sensors
_Article_
## Neural Network Ensembles for Sensor-Based Human Activity Recognition Within Smart Environments
**Naomi Irvine** **[1,]*, Chris Nugent** **[1]** **, Shuai Zhang** **[1], Hui Wang** **[1]** **and Wing W. Y. NG** **[2]**
1 School of Computing, Ulster University, Co. Antrim, Northern Ireland BT37 ... | Neural Network Ensembles for Sensor-Based Human Activity Recognition Within Smart Environments | In this paper, we focus on data-driven approaches to human activity recognition (HAR). Data-driven approaches rely on good quality data during training, however, a shortage of high quality, large-scale, and accurately annotated HAR datasets exists for recognizing activities of daily living (ADLs) within smart environme... | 2019.0 | 2019-12-30 00:00:00 | https://www.semanticscholar.org/paper/028a57e04bdebfd6e0de0b6b95c1070f6a0b1fd8 | Italian National Conference on Sensors | True |
028b33b36dcefb6ae6139e06cefa758df632ffeb | # Journal of International Technology and Information Management Journal of International Technology and Information Management
[Volume 22](https://scholarworks.lib.csusb.edu/jitim/vol22) [Issue 4](https://scholarworks.lib.csusb.edu/jitim/vol22/iss4) [Article 3](https://scholarworks.lib.csusb.edu/jitim/vol22/iss4/3)
... | Is Security Realistic in Cloud Computing? | INTRODUCTION Cloud computing today is benefiting from the technological advancements in communication, storage and computing. The basic idea in cloud computing is to take advantage of economies of scale if IT services could be provided on demand with a decentralized infrastructure. This idea is a natural evolution from... | 2013.0 | 2013-04-01 00:00:00 | https://www.semanticscholar.org/paper/028b33b36dcefb6ae6139e06cefa758df632ffeb | Journal of International Technology and Information Management | True |
028f829fc1d47a64dd4ca5db564f8b50deba9ff5 | # entropy
_Review_
## An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions
**Onur Günlü *** **and Rafael F. Schaefer**
Information Theory and Applications Chair, Technische Universität Berlin, 10623 Berlin, Germany;
rafael.schaefer@tu-berlin.de
*** Correspondence: guenlue@tu-berlin.de; Tel... | An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions | We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective to conduct authentication, message encryption/decryption, identification or secure and private computations by using a secret key. A physical unclonable function (PUF) provides local security... | 2020.0 | 2020-11-05 00:00:00 | https://www.semanticscholar.org/paper/028f829fc1d47a64dd4ca5db564f8b50deba9ff5 | IACR Cryptology ePrint Archive | True |
029062eca1fb9a279c20694127fcf1c8313966ff | Edited by:
Laura V. Milko,
University of North Carolina at Chapel
Hill, United States
Reviewed by:
Milan Macek,
Charles University, Czechia
Jonathan Berg,
University of North Carolina at Chapel
Hill, United States
*Correspondence:
Vasiliki Rahimzadeh
[vrahim@stanford.edu](mailto:vrahim@stanford.edu)
Specialty sectio... | Exome/Genome-Wide Testing in Newborn Screening: A Proportionate Path Forward | Population-based newborn screening (NBS) is among the most effective public health programs ever launched, improving health outcomes for newborns who screen positive worldwide through early detection and clinical intervention for genetic disorders discovered in the earliest hours of life. Key to the success of newborn ... | 2022.0 | 2022-07-04 00:00:00 | https://www.semanticscholar.org/paper/029062eca1fb9a279c20694127fcf1c8313966ff | Frontiers in Genetics | True |
0291665270a93c509ecde8b2c50642b3adcfe176 | # Automated Abstraction by Incremental Refinement in Interpolant-based Model Checking
## G. Cabodi, P. Camurati, M. Murciano
Dipartimento di Automatica ed Informatica
Politecnico di Torino - Torino, Italy
Email: gianpiero.cabodi, paolo.camurati, marco.murciano @polito.it
_{_ _}_
**_Abstract—This paper addresses the ... | Automated abstraction by incremental refinement in interpolant-based model checking | 2008.0 | 2008-11-10 00:00:00 | https://www.semanticscholar.org/paper/0291665270a93c509ecde8b2c50642b3adcfe176 | IEEE/ACM International Conference on Computer-Aided Design | True | |
0291fb253d7567a106da907b2fe867cec86be541 | **Government retains lor itself, and others act-**
**ing on its behalf, a paid-up, nonexclusive,**
**irrevocable worldwide license in said article**
**to reproduce, prepare derivative works, dis-**
**tribute copies to the public, and perform pub-**
**licly and display publicly, by or** **on behalf of**
###### A Directo... | A directory service for configuring high-performance distributed computations | 1997.0 | 1997-08-05 00:00:00 | https://www.semanticscholar.org/paper/0291fb253d7567a106da907b2fe867cec86be541 | Proceedings. The Sixth IEEE International Symposium on High Performance Distributed Computing (Cat. No.97TB100183) | True | |
02920271ab40ff82676325adcb340f8a60a63eb2 | # Improving Operational Efficiency through Quality 4.0 Tool: Blockchain Implementation and Subsequent Market Reaction
## DOI: 10.12776/QIP.V27I2.1877
Vladimíra Gimerská, Michal Šoltés, Rajmund Mirdala
Received: 2023-06-21 Accepted: 2023-06-28 Published: 2023-07-31
## ABSTRACT
**Purpose: This article aims to obser... | Improving Operational Efficiency through Quality 4.0 Tool: Blockchain Implementation and Subsequent Market Reaction | Purpose: This article aims to observe and measure how modern and innovative blockchain technology improves the data quality and transparency and thus affect the stock prices of publicly traded companies after announcing its implementation in their operations. Additionally, the objective is to compare the results with c... | 2023.0 | 2023-07-31 00:00:00 | https://www.semanticscholar.org/paper/02920271ab40ff82676325adcb340f8a60a63eb2 | Kvalita Inovácia Prosperita | True |
0293ee9829d6cd3d9a774e7486b068205ca1179e | ## Attack on the EDON-K Key Encapsulation Mechanism
##### Matthieu Lequesne
Sorbonne Université, UPMC Univ Paris 06
Inria, Team SECRET,
2 rue Simone Iff, CS 42112,
75589 Paris Cedex 12, France
Email: matthieu.lequesne@inria.fr
Abstract—The key encapsulation mechanism EDON-K was
proposed in response to the call for ... | Attack on the Edon-kKey Encapsulation Mechanism | The key encapsulation mechanism $\text{EDON}-\mathcal{K}$ was proposed in response to the call for post-quantum cryptography standardization issued by the National Institute of Standards and Technologies (NIST). This scheme is inspired by the McEliece scheme but uses another family of codes defined over $\mathbb{F}_{2^... | 2018.0 | 2018-02-16 00:00:00 | https://www.semanticscholar.org/paper/0293ee9829d6cd3d9a774e7486b068205ca1179e | International Symposium on Information Theory | True |
0294a22ca84a83792d5deedf651d2ddfca7d3a79 | # Optimized Information Discovery using Self-adapting Indices over Distributed Hash Tables
## Faraz Memon, Daniel Tiebler, Frank D¨urr, Kurt Rothermel IPVS – Distributed Systems Department, Universit¨at Stuttgart Universit¨atsstraße 38, 70569 Stuttgart, Germany Email: faraz.memon, tiebledl, frank.duerr, kurt.rothermel... | Optimized information discovery using self-adapting indices over Distributed Hash Tables | 2010.0 | 2010-12-01 00:00:00 | https://www.semanticscholar.org/paper/0294a22ca84a83792d5deedf651d2ddfca7d3a79 | IEEE International Performance, Computing, and Communications Conference | True | |
02987c79896dfedd7d494deaead3e78eac241f65 | Received December 30, 2020, accepted April 19, 2021, date of publication April 28, 2021, date of current version May 6, 2021.
_Digital Object Identifier 10.1109/ACCESS.2021.3076205_
# Unlinkable Collaborative Learning Transactions: Privacy-Awareness in Decentralized Approaches
SANDI RAHMADIKA 1 AND KYUNG-HYUNE RHEE ... | Unlinkable Collaborative Learning Transactions: Privacy-Awareness in Decentralized Approaches | Smart contracts (SCs) and collaborative learning (CL) are disclosed publicly, in which most transactions and activities that occur by the parties can be bared in real-time. Both are strengthened in a decentralized manner. CL allows numerous clients to collectively build deep learning models privately by aggregating the... | 2021.0 | NaT | https://www.semanticscholar.org/paper/02987c79896dfedd7d494deaead3e78eac241f65 | IEEE Access | True |
029a9046f114af95c0ec83e13e144704b7f77868 | # A survey on parallel and distributed Multi-Agent Systems
## Alban Rousset, Bénédicte Herrmann, Christophe Lang, Laurent Philippe
To cite this version:
Alban Rousset, Bénédicte Herrmann, Christophe Lang, Laurent Philippe. A survey on parallel and
distributed Multi-Agent Systems. Padabs 2014, 2nd Workshop on Parall... | A survey on parallel and distributed multi-agent systems for high performance computing simulations | 2014.0 | 2014-08-25 00:00:00 | https://www.semanticscholar.org/paper/029a9046f114af95c0ec83e13e144704b7f77868 | Computer Science Review | True | |
029e0f6017a14e5059d2f130da4c6b7992414533 | ## This is a repository copy of An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication.
White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/156053/
Version: Accepted Version
Article: Gope, P. orcid.org/0000-0003-2786-0273 and Sikdar,... | An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication | The energy Internet (EI) represents a new electric grid infrastructure that uses computing and communication to transform legacy power grids into systems that support open innovation. EI provides bidirectional communication for analysis and improvement of energy usage between service providers and customers. To ensure ... | 2019.0 | 2019-04-02 00:00:00 | https://www.semanticscholar.org/paper/029e0f6017a14e5059d2f130da4c6b7992414533 | IEEE Transactions on Smart Grid | True |
02a06d4d6f9118145f72870c7e1a548707a44f04 | # energies
_Article_
## Improved Virtual Synchronous Generator Principle for Better Economic Dispatch and Stability in Grid-Connected Microgrids with Low Noise
**Shruti Singh and David Wenzhong Gao ***
Department of Electrical and Computer Engineering, University of Denver, Denver, CO 80210, USA;
shruti.singh@du.edu... | Improved Virtual Synchronous Generator Principle for Better Economic Dispatch and Stability in Grid-Connected Microgrids with Low Noise | The proper operation of microgrids depends on Economic Dispatch. It satisfies all requirements while lowering the microgrids’ overall operating and generation costs. Since distributed generators constitute a large portion of microgrids, seamless communication between generators is essential. While guaranteeing a reliab... | 2023.0 | 2023-06-12 00:00:00 | https://www.semanticscholar.org/paper/02a06d4d6f9118145f72870c7e1a548707a44f04 | Energies | True |
02a1e357408df84ddf78c6d1270caaa9b4f1013e | _Journal of Computer Science and Cybernetics, V.35, N.3 (2019), 233–249_
DOI 10.15625/1813-9663/35/3/13667
# A CIPHERTEXT-POLICY ATTRIBUTE-BASED SEARCHABLE ENCRYPTION SCHEME IN NON-INTERACTIVE MODEL
VAN ANH TRINH[1], VIET CUONG TRINH[2][,][∗]
1Thanh Hoa University of Culture, Sports and Tourism
2Hong Duc University... | A CIPHERTEXT-POLICY ATTRIBUTE-BASED SEARCHABLE ENCRYPTION SCHEME IN NON-INTERACTIVE MODEL | We address the problem of searching on encrypted data with expressive searching predicate and multi-writer/multi-reader, a cryptographic primitive which has many concrete application scenarios such as cloud computing, email gateway application and so on. In this paper, we propose a public-key encryption with keyword se... | 2019.0 | 2019-08-06 00:00:00 | https://www.semanticscholar.org/paper/02a1e357408df84ddf78c6d1270caaa9b4f1013e | Journal of Computer Science and Cybernetics | True |
02a29c5897b1fa71149d802ad7f082ae833fee5c | ## ART : Sub-Logarithmic Decentralized Range Query Processing with Probabilistic Guarantees
S. Sioutas[1], P. Triantafillou[2], G. Papaloukopoulos[2],
E. Sakkopoulos[2], K. Tsichlas[3], and Y. Manolopoulos[3]
1 Ionian University, Department of Informatics, sioutas@ionio.gr
2 CTI and Dept. of Computer Engineering & I... | ART: sub-logarithmic decentralized range query processing with probabilistic guarantees | We focus on range query processing on large-scale, typically distributed infrastructures, such as clouds of thousands of nodes of shared-datacenters, of p2p distributed overlays, etc. In such distributed environments, efficient range query processing is the key for managing the distributed data sets per se, and for mon... | 2010.0 | 2010-07-25 00:00:00 | https://www.semanticscholar.org/paper/02a29c5897b1fa71149d802ad7f082ae833fee5c | Distributed and parallel databases | True |
02a3f37b0735b61801d2b28babacf7aec3ff83b6 | .
**_ISSN 2281-3993_** **_www.richtmann.org_** **_March 2024_**
**Research Article**
© 2024 Marsela Thanasi Boçe and Julian Hoxha.
This is an open access article licensed under the Creative Commons
Attribution-NonCommercial 4.0 International License
(https://creativecommons.org/licenses/by-nc/4.0/)
Received: 1 De... | Blockchain Technology as a Catalyst for Sustainable Development: Exploring Economic, Social, and Environmental Synergies | This paper explores the transformative potential of blockchain technology (BT) as a catalyst for sustainable development, addressing the tri-fold aspects of environmental, economic, and social sustainability. Through a comprehensive review and theoretical framework, it delves into how BT can significantly contribute to... | 2024.0 | 2024-03-05 00:00:00 | https://www.semanticscholar.org/paper/02a3f37b0735b61801d2b28babacf7aec3ff83b6 | Academic Journal of Interdisciplinary Studies | True |
02aa857d4991ffc0fe8e1992c1f6e5b1b94d39b0 | ## LSec: Lightweight Security Protocol for Distributed
Wireless Sensor Network*
Riaz Ahmed Shaikh, Sungyoung Lee, Mohammad A.U. Khan, and Young Jae Song
Department of Computer Engineering, Kyung Hee University,
Sochen-ri, Giheung-eup, Yongin-si, Gyeonggi-do, 449-701, South Korea
{riaz, sylee, khan}@oslab.khu.ac.kr... | LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network | 2006.0 | 2006-09-20 00:00:00 | https://www.semanticscholar.org/paper/02aa857d4991ffc0fe8e1992c1f6e5b1b94d39b0 | IFIP International Conference on Personal Wireless Communications | True | |
02acccd3a4dbea265de8c043807c2dbb4115130c | # Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem
## Weili Chen[1][,][2], Xiongfeng Guo [1][,][3], Zhiguang Chen [1][,][2], Zibin Zheng [1][,][3] and Yutong Lu [1][,][2]
1School of Data and Computer Science, Sun Yat-sen University
2National Supercomputer Center in Guangzhou, S... | Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem | In recent years, blockchain technology has created a new cryptocurrency world and has attracted a lot of attention. It also is rampant with various scams. For example, phishing scams have grabbed a lot of money and has become an important threat to users' financial security in the blockchain ecosystem. To help deal wit... | 2020.0 | 2020-07-01 00:00:00 | https://www.semanticscholar.org/paper/02acccd3a4dbea265de8c043807c2dbb4115130c | International Joint Conference on Artificial Intelligence | True |
02af1e17cb68c7cace6f3d38c2e767e7b5fb1e66 | **Journal of Computer and Communications, 2017, 5, 1-31**
[http://www.scirp.org/journal/jcc](http://www.scirp.org/journal/jcc)
ISSN Online: 2327-5227
ISSN Print: 2327-5219
# Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy
### Anirudh Paranjothi, Mohammad S. Khan, Mais Nij... | Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy | Mobile Cloud Computing (MCC) brings rich computational resource to mobile users, network operators, and cloud computing providers. It can be represented in many ways, and the ultimate goal of MCC is to enable execution of rich mobile application with rich user experience. Mobility is one of the main characteristics of ... | 2017.0 | 2017-04-06 00:00:00 | https://www.semanticscholar.org/paper/02af1e17cb68c7cace6f3d38c2e767e7b5fb1e66 | True | |
02af7c7509c70c91d28cd2273002aff5e479c6ee | # MAESTRO-X: Distributed Orchestration of
Rotary-Wing UAV-Relay Swarms
### Bharath Keshavamurthy[∗], Matthew A. Bliss[†], and Nicolò Michelusi[∗]
**Abstract**
This work details a scalable framework to orchestrate a swarm of rotary-wing UAVs serving as
cellular relays to facilitate beyond line-of-sight connectiv... | MAESTRO-X: Distributed Orchestration of Rotary-Wing UAV-Relay Swarms | This work details a scalable framework to orchestrate a swarm of rotary-wing UAVs serving as cellular relays to facilitate beyond line-of-sight connectivity and traffic offloading for ground users. First, a Multiscale Adaptive Energy-conscious Scheduling and TRajectory Optimization (MAESTRO) framework is developed for ... | 2020.0 | 2020-07-02 00:00:00 | https://www.semanticscholar.org/paper/02af7c7509c70c91d28cd2273002aff5e479c6ee | IEEE Transactions on Cognitive Communications and Networking | True |
02b1964d705661c5a16e0d87b152d14da1372dd8 | # Optimal Black-Box Secret Sharing
over Arbitrary Abelian Groups
Ronald Cramer and Serge Fehr
BRICS[⋆], Department of Computer Science, Aarhus University, Denmark
_{cramer,fehr}@brics.dk_
**Abstract. A black-box secret sharing scheme for the threshold access**
structure Tt,n is one which works over any finite Abel... | Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups | A black-box secret sharing scheme for the threshold access structure Tt,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say, a given finite field) in that distribution matrix and reconstruction vectors are defined over Z and are d... | 2002.0 | 2002-02-05 00:00:00 | https://www.semanticscholar.org/paper/02b1964d705661c5a16e0d87b152d14da1372dd8 | Annual International Cryptology Conference | True |
02b2d773a7a2249e864f271b4964ef7bbd942499 | # Emergence of oscillations in a mixed-mechanism phosphorylation system
#### Carsten Conradi[∗], Maya Mincheva[†], and Anne Shiu[‡]
#### January 28, 2019
Abstract
This work investigates the emergence of oscillations in one of the simplest cellular
signaling networks exhibiting oscillations, namely, the dual-site ... | Emergence of Oscillations in a Mixed-Mechanism Phosphorylation System | This work investigates the emergence of oscillations in one of the simplest cellular signaling networks exhibiting oscillations, namely the dual-site phosphorylation and dephosphorylation network (futile cycle), in which the mechanism for phosphorylation is processive, while the one for dephosphorylation is distributiv... | 2018.0 | 2018-09-08 00:00:00 | https://www.semanticscholar.org/paper/02b2d773a7a2249e864f271b4964ef7bbd942499 | Bulletin of Mathematical Biology | True |
02b398677c3144cbb12459c81f06a8c4b350e510 | p g
**ORIGINAL ARTICLE**
## Open data products‑A framework for creating valuable analysis ready data
**Dani Arribas‑Bel[1] · Mark Green[1] · Francisco Rowe[1] · Alex Singleton[1]**
Received: 17 October 2019 / Accepted: 29 June 2021 / Published online: 20 October 2021
© The Author(s) 2021
**Abstract**
This paper de... | Open data products-A framework for creating valuable analysis ready data | This paper develops the notion of “open data product”. We define an open data product as the open result of the processes through which a variety of data (open and not) are turned into accessible information through a service, infrastructure, analytics or a combination of all of them, where each step of development is ... | 2021.0 | 2021-10-01 00:00:00 | https://www.semanticscholar.org/paper/02b398677c3144cbb12459c81f06a8c4b350e510 | Journal of Geographical Systems | True |
02b64b590630a0ebcbf2f75e045c1d933e3f2667 | Received October 31, 2020, accepted November 11, 2020, date of publication November 17, 2020,
date of current version November 30, 2020.
_Digital Object Identifier 10.1109/ACCESS.2020.3038629_
# A Data-Driven Distributed Adaptive Control Approach for Nonlinear Multi-Agent Systems
XIAN YU 1, SHANGTAI JIN 1, GENFENG L... | A Data-Driven Distributed Adaptive Control Approach for Nonlinear Multi-Agent Systems | In this paper the distributed leader-follower consensus tracking problem is investigated for unknown nonlinear non-affine discrete-time multi-agent systems. Via a dynamic linearization method both for the agent system and the local ideal distributed controller, a distributed adaptive control scheme is proposed in this ... | 2020.0 | NaT | https://www.semanticscholar.org/paper/02b64b590630a0ebcbf2f75e045c1d933e3f2667 | IEEE Access | True |
02b768bce3ec87af9443f2bb1d890ce09f1ca916 | # Semi-Decentralized Federated Learning with Collaborative Relaying
### Michal Yemini Rajarshi Saha Emre Ozfatura Deniz G¨und¨uz Andrea J. Goldsmith
Princeton University Stanford University Imperial College London Imperial College London Princeton University
**_Abstract—We present a semi-decentralized federated lear... | Semi-Decentralized Federated Learning with Collaborative Relaying | We present a semi-decentralized federated learning algorithm wherein clients collaborate by relaying their neighbors’ local updates to a central parameter server (PS). At every communication round to the PS, each client computes a local consensus of the updates from its neighboring clients and eventually transmits a we... | 2022.0 | 2022-05-23 00:00:00 | https://www.semanticscholar.org/paper/02b768bce3ec87af9443f2bb1d890ce09f1ca916 | International Symposium on Information Theory | True |
02b7726c2e069342adbf3dd51abbeeb68dd32bda | # Anomaly Detection through Unsupervised Federated Learning
### Mirko Nardi
_Scuola Normale Superiore_
Pisa, Italy
mirko.nardi@sns.it
### Lorenzo Valerio
_IIT-CNR_
Pisa, Italy
lorenzo.valerio@iit.cnr.it
### Andrea Passarella
_IIT-CNR_
Pisa, Italy
andrea.passarella@iit.cnr.it
**_Abstract—Federated learning (FL) ... | Anomaly Detection Through Unsupervised Federated Learning | Federated learning (FL) is proving to be one of the most promising paradigms for leveraging distributed resources, enabling a set of clients to collaboratively train a machine learning model while keeping the data decentralized. The explosive growth of interest in the topic has led to rapid advancements in several core... | 2022.0 | 2022-09-09 00:00:00 | https://www.semanticscholar.org/paper/02b7726c2e069342adbf3dd51abbeeb68dd32bda | International Conference on Mobile Ad-hoc and Sensor Networks | True |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.