01450nam 2200373 n 450 99639680900331620221108083536.0(CKB)4330000000347628(EEBO)2248507056(UnM)99859129(EXLCZ)99433000000034762819850319d1648 uy |engurbn||||a|bb|Self-surrender unto God[electronic resource] opened and applyed, in a sermon preached before the Honourable House of Commons, at Margarets, Westminster, at their late solemn fast, February 23. 1647. /By Simeon Ashe, preacher of Gods Word at Michael Bassingshaw, LondonLondon Printed for E. Brewster, and are to be sold at her shop on Ludgate-hill at the signe of the Bible neare Fleet-bridge[1648][4], 26, [2] pPublication date from Wing.The last leaf bears the order to print.Reproduction of the original in the British Library.eebo-0018GodWorship and loveSermonsEarly works to 1800Fast-day sermons17th centuryGodWorship and loveFast-day sermonsAshe Simeond. 1662.1002261Cu-RivESCu-RivESCStRLINWaOLNBOOK996396809003316Self-surrender unto God2316717UNISA04887nam 22007575 450 991098303240332120251225183614.09789819614110981961411210.1007/978-981-96-1411-0(CKB)37391294100041(MiAaPQ)EBC31892458(Au-PeEL)EBL31892458(DE-He213)978-981-96-1411-0(EXLCZ)993739129410004120250127d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierBlockchain, Metaverse and Trustworthy Systems 6th International Conference, BlockSys 2024, Hangzhou, China, July 12–14, 2024, Revised Selected Papers, Part I /edited by Debiao He, Jiajing Wu, Chen Wang, Huawei Huang1st ed. 2025.Singapore :Springer Nature Singapore :Imprint: Springer,2025.1 online resource (330 pages)Communications in Computer and Information Science,1865-0937 ;22649789819614103 9819614104 -- Blockchain and Data Mining. -- Intrusion Anomaly Detection with Multi-Transformer. -- A Federated Learning Method Based on Linear Probing and Fine-Tuning. -- Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection. -- A Secure Hierarchical Federated Learning Framework based on FISCO Group Mechanism. -- Research on Network Traffic Anomaly Detection Method Based on Deep Learning. -- Hyper-parameter Optimization and Proxy Re-encryption for Federated Learning. -- Data Security and Anomaly Detection. -- Exploring Embedded Content in the Ethereum Blockchain: Data Restoration and Analysis. -- Task Allocation and Process Optimization of Data, Information, Knowledge, and Wisdom (DIKW)-based Workflow Engine. -- Location Data Sharing Method Based on Blockchain and Attribute-Based Encryption. -- Implicit White-Box Implementations of Efficient Double-Block-Length MAC. -- A Survey on Blockchain Scalability. -- Supply Chain Financing Model Embedded with “Full-Process” Blockchain. -- Blockchain Performance Optimization. -- ReCon: Faster Smart Contract Vulnerability Detection by Reusable Symbolic Execution Tree. -- SVD-SESDG: Smart Contract Vulnerability Detection Technology via Symbol Execution and State Variable Dependency Graph. -- Dual-view Aware Smart Contract Vulnerability Detection for Ethereum. -- Blockchain Layered Sharding Algorithm Based on Transaction Characteristics. -- An Empirical Study on the Performance of EVMs and Wasm VMs for Smart Contract Execution. -- Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph.This two-volume set CCIS 2264 and CCIS 2265 constitutes the refereed proceedings of the 6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024, held in Hangzhou, China, during July 12–14, 2024. The 34 full papers presented in these two volumes were carefully reviewed and selected from 74 submissions. The papers are organized in the following topical sections: Part I: Blockchain and Data Mining; Data Security and Anomaly Detection; Blockchain Performance Optimization. Part II: Frontier Technology Integration; Trustworthy System and Cryptocurrencies; Blockchain Applications.Communications in Computer and Information Science,1865-0937 ;2264Data protectionLaw and legislationArtificial intelligenceData structures (Computer science)Information theoryOperating systems (Computers)Computers, Special purposePrivacyArtificial IntelligenceData Structures and Information TheoryOperating SystemsSpecial Purpose and Application-Based SystemsData protectionLaw and legislation.Artificial intelligence.Data structures (Computer science)Information theory.Operating systems (Computers)Computers, Special purpose.Privacy.Artificial Intelligence.Data Structures and Information Theory.Operating Systems.Special Purpose and Application-Based Systems.005.8323.448He Debiao1784772Wu Jiajing1784773Wang Chen501623Huang Huawei1373685MiAaPQMiAaPQMiAaPQBOOK9910983032403321Blockchain, Metaverse and Trustworthy Systems4316332UNINA