top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Distributed Computing and Intelligent Technology : 20th International Conference, ICDCIT 2024, Bhubaneswar, India, January 17–20, 2024, Proceedings / / edited by Stéphane Devismes, Partha Sarathi Mandal, V. Vijaya Saradhi, Bhanu Prasad, Anisur Rahaman Molla, Gokarna Sharma
Distributed Computing and Intelligent Technology : 20th International Conference, ICDCIT 2024, Bhubaneswar, India, January 17–20, 2024, Proceedings / / edited by Stéphane Devismes, Partha Sarathi Mandal, V. Vijaya Saradhi, Bhanu Prasad, Anisur Rahaman Molla, Gokarna Sharma
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (XXXI, 372 p. 127 illus., 85 illus. in color.)
Disciplina 004.6
Collana Lecture Notes in Computer Science
Soggetto topico Computer Networks
Computer vision
Image processing
Computer engineering
Computer networks
Computers, Special purpose
Computer Vision
Image Processing
Computer Engineering and Networks
Special Purpose and Application-Based Systems
Computer Communication Networks
ISBN 3-031-50583-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed Computing -- Utility driven joint time-and-power allocation in Energy-Harvesting Cognitive Radio Relay Networks -- An Improved and Efficient Distributed Computing Framework with Intelligent Task Scheduling -- Scheduling of Containerized Resources for Microservices in Cloud -- ELITE: Energy and Latency-Optimized Task Offloading forDVFS-Enabled Resource-Constrained Devices in MEC -- Parking Problem by Oblivious Mobile Robots in Infinite Grids -- The Computational Landscape of Autonomous Mobile Robots: The Visibility Perspective -- Coverage Criteria based Testing of IoT Applications -- An Online Algorithm for Cost Minimization of Amazon EC2 Burstable Resources -- A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage -- Intelligent Technology -- Prediction of Failure in Scania Truck due to Air Pressure System Failure -- A Multi-Class Classification for Detection of IoT Network attacks using machine learning models -- Optimizing Sentiment Analysis on Twitter: Leveraging Hybrid Deep Learning Models for Enhanced Efficiency -- Identification of onset and progression of Alzheimer’s disease using Topological Data Analysis -- Enhancing Mario Gaming Using Optimized Reinforcement Learning -- Deep Learning in Industry 4.0: Transforming Manufacturing through Data-Driven Innovation -- SASE: Sentiment Analysis with aspect Specific Evaluation using deep learning with hybrid contextual embedding -- A Genetic Algorithm-Based Heuristic for Rumour Minimization in Social Networks -- A Machine Learning driven Approach For Parkinson’s Prediction using Temporal Data -- Prediction of High-resolution Soil Moisture using Multi-source Data and Machine Learning -- Evaluating Deep CNNs and Vision Transformers for Plant Leaf Disease Classification -- Intelligent Ensemble-Based Road CrackDetection: A Holistic View -- Online Payment Fraud Detection for Big Data -- Bursty Event Detection Model for Twitter -- A General Variable Neighborhood Search Approach for the Clustered Traveling Salesman Problem with d-Relaxed Priority Rule.
Record Nr. UNINA-9910799222403321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Stabilization, safety, and security of distributed systems : 24th International Symposium, SSS 2022, Clermond Ferrand, France, November 15-17, 2022, proceedings / / edited by Stéphane Devismes, [and four others]
Stabilization, safety, and security of distributed systems : 24th International Symposium, SSS 2022, Clermond Ferrand, France, November 15-17, 2022, proceedings / / edited by Stéphane Devismes, [and four others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (378 pages)
Disciplina 929.605
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
ISBN 3-031-21017-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Invited Papers -- Invited Paper: Simple, Strict, Proper, Happy: A Study of Reachability in Temporal Graphs -- 1 Introduction -- 2 Temporal Graphs -- 2.1 Strictness/Properness/Simpleness -- 2.2 Does It Really Matter? (Example of Spanners) -- 2.3 Happy Temporal Graphs -- 3 Expressivity in Terms of Reachability -- 3.1 Separations -- 3.2 Transformations -- 3.3 Summary and Discussions -- 4 More Facts About Happy Temporal Graphs -- 5 Concluding Remarks and Open Questions -- References -- Invited Paper: One Bit Agent Memory is Enough for Snap-Stabilizing Perpetual Exploration of Cactus Graphs with Distinguishable Cycles -- 1 Introduction -- 2 Preliminaries -- 2.1 Cactus Graph -- 2.2 Mobile Agent and Graph Exploration -- 3 Snap-Stabilizing Perpetual Exploration -- 3.1 Port Traversal Graph -- 3.2 Algorithm for a Single Agent with One-Bit Agent Memory -- 4 Exploration by an Oblivious Agent -- References -- Invited Paper: Towards Practical Atomic Distributed Shared Memory: An Experimental Evaluation -- 1 Introduction -- 2 Algorithms Overview -- 2.1 ARES -- 2.2 Cassandra -- 2.3 Redis -- 3 Experimental Evaluation -- 3.1 Experimentation Setup -- 3.2 Scenarios -- 3.3 Experimental Results -- 4 Conclusions -- References -- Invited Paper: Cross-Chain State Machine Replication -- 1 Introduction -- 2 Model of Computation -- 3 State Machines -- 3.1 Example: Simple Swap -- 3.2 Example: Decentralized Autonomous Organization (DAO) -- 4 State Machine Replication Protocol -- 4.1 Path Signatures -- 4.2 Reliable Delivery -- 4.3 Initialization, Moves, and Settlement -- 4.4 Dynamic Funding -- 5 Remarks -- 6 Related Work -- References -- Regular Papers -- Plateau: A Secure and Scalable Overlay Network for Large Distributed Trust Applications -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Works.
2 Model and Preliminaries -- 3 The Plateau Network Design and Statement of Results -- 4 Concluding Remarks and Future Work -- References -- The Limits of Helping in Non-volatile Memory Data Structures -- 1 Introduction -- 1.1 Contributions -- 1.2 Related Work -- 2 Characterization of the Crash-Recovery Model -- 3 Process Helping -- 4 Strict-Linearizability vs. Linearization-Helping -- 4.1 Sticky-Bit Object -- 4.2 An Equivalence Between Linearizability and Strict-Linearizability -- 5 Strict-Linearizability vs. Universal-Helping -- 5.1 Equivalence Between Strict-Linearizability and Universal-Help Freedom -- References -- Treasure Hunt in Graph Using Pebbles -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Model and Problem Definition -- 1.3 Contribution -- 1.4 Related Work -- 2 Treasure Hunt Algorithm When k< -- D -- 2.1 D2k < -- D -- 2.2 k< -- D2 -- 3 Treasure Hunt Algorithm When kD -- 3.1 Idea of Treasure Hunt in Tree for k=cD Pebbles -- 3.2 Extending the Idea for General Graphs -- 4 Lower Bound -- 5 Conclusion -- References -- Blockchain in Dynamic Networks -- 1 Introduction -- 2 Notation, Definitions and Problem Statement -- 3 Decisive Computations -- 4 Impossibility -- 5 Solutions -- 6 Extensions and Optimizations -- 7 Performance Evaluation -- 8 Conclusion -- References -- Improving the Efficiency of Report and Trace Ring Signatures -- 1 Introduction -- 2 Preliminaries -- 3 Syntax and Security Model -- 3.1 Security Model -- 4 An Efficient Instantiation of Fraser and Quaglia's Protocol -- 4.1 A Pairing-Based ElGamal Variant -- 4.2 Discussion -- 5 A New RTR Signature Construction -- 5.1 Description of Our Protocol -- 5.2 Security Analysis -- 6 Concluding Remarks -- References -- Flexible Scheduling of Transactional Memory on Trees -- 1 Introduction -- 2 Technical Preliminaries -- 3 A Single Object -- 4 Multiple Objects -- References.
Perpetual Torus Exploration by Myopic Luminous Robots -- 1 Introduction -- 2 Related Work -- 3 Model -- 4 Impossibility Results -- 5 Visibility Range One: A32 -- 6 Visibility Range Two: A41 -- 7 Conclusion -- References -- Optimal Algorithms for Synchronous Byzantine k-Set Agreement -- 1 Introduction -- 2 k-Set Agreement for n=3t, k=2 and t> -- 1 -- 2.1 Algorithm: Local Data Structures -- 2.2 Algorithm: Code of pi -- 2.3 Properties of a Matrix Mi -- 2.4 Basic Patterns: Squares and Regions -- 2.5 Proof of Correctness of Algorithm 1 -- 2.6 Finding Regions { R: =1,...,k} -- 2.7 Proof of Correctness of the Algorithm -- 3 Optimality -- 4 Conclusion -- References -- Reaching Consensus in the Presence of Contention-Related Crash Failures -- 1 Introduction -- 2 Computing Model -- 3 Base Algorithm (k=1): Consensus from Read/Write Registers -- 3.1 Presentation of the Algorithm -- 3.2 Proof of Algorithm 1 -- 4 General Algorithms (k1): Consensus from Objects whose Consensus Number is k -- 4.1 Presentation of Algorithm 2 -- 4.2 Further Explanations -- 4.3 Proof of Algorithm 2 -- 4.4 When k Divides n: Tolerating k-1 Classical Any-Time Failures -- 4.5 When k Divides n: Tolerating 2k-1 Contention-Related Crash Failures -- 5 Impossibility Results -- 6 Conclusion -- References -- Self-stabilizing Byzantine Fault-Tolerant Repeated Reliable Broadcast -- 1 Introduction -- 2 System Settings for BAMPn,t[FC,t < -- n/3] -- 3 The Non-Self-Stabilizing BT Algorithm -- 4 Self-stabilizing Byzantine-Tolerant Single-Instance BRB -- 5 Self-stabilizing Recycling in Node-Failure-Free Systems -- 6 SSBFT BRB Recycling via Muteness Detection -- 7 Discussion -- References -- Capacity Planning for Dependable Services -- 1 Introduction -- 2 System Design -- 3 Implementation -- 4 Evaluation -- 4.1 Experimental Measurements -- 4.2 Dependability Evaluation -- 5 Conclusion -- References.
Lower Bound for Constant-Size Local Certification -- 1 Introduction -- 1.1 Three Typical Regimes for the Certificate Sizes -- 1.2 Motivation for Studying the Constant-Size Regime -- 1.3 Our Results and Techniques -- 2 Models and Definitions -- 3 k-colorability Does Not Have a Binary Certification -- 3.1 Indistinguishability Setting -- 3.2 Notion of Score -- 3.3 Our Graph Construction and Its Properties -- 3.4 Anonymous Case -- 3.5 Extension to Identifiers -- 4 Going Below "4264306 logk "5265307 -- 5 Challenges and Open Questions -- References -- Collaborative Dispersion by Silent Robots -- 1 Introduction -- 1.1 Background -- 1.2 Motivation and Problem Definition -- 1.3 The Model -- 1.4 Our Contribution -- 1.5 Related Works -- 2 Dispersion on Graphs -- 2.1 The Algorithm -- 2.2 Correctness and Analysis -- 3 Conclusion -- References -- Time Optimal Gathering of Myopic Robots on an Infinite Triangular Grid -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Earlier Works -- 1.3 Our Contribution -- 2 Models and Definitions -- 2.1 Model -- 2.2 Notations and Definitions -- 2.3 Problem Definition -- 3 Impossibility Result -- 4 Gathering Algorithm -- 4.1 Correctness Results: -- 4.2 Complexity Analysis -- 5 Conclusion -- References -- Card-Based ZKP Protocol for Nurimisaki -- 1 Introduction -- 2 Preliminaries -- 2.1 Pile-Shifting Shuffle ch19ShinagawaIEICE2017,ch19NishimuraIEICE18 -- 2.2 Input-Preserving Five-Card Trick ch19MiyaharaFUN2020 -- 2.3 Mizuki-Sone Copy Protocol ch19MizukiFAW09 -- 2.4 How to Form a White Polyomino ch19RobertNGCO2022 -- 2.5 Sum in Z ch19RuangwisesTCS2021 -- 3 ZKP Protocol for Nurimisaki -- 3.1 Setup Phase -- 3.2 Connectivity Phase -- 3.3 Verification Phase -- 4 Security Proofs -- 5 Conclusion -- References -- Consensus on Demand -- 1 Introduction -- 2 Model -- 3 Problem Statement -- 4 Related Work -- 5 A Simple Payment System.
6 Consensus on Demand -- 7 Discussion -- 8 Implementation -- References -- Better Incentives for Proof-of-Work -- 1 Introduction -- 1.1 Blockchain Game -- 1.2 Our Contribution -- 1.3 Intuitive Overview -- 2 Model and Preliminaries -- 2.1 Rounds -- 2.2 Players -- 2.3 Blocks -- 2.4 DAG -- 2.5 Mining -- 2.6 Action Space -- 3 The Block DAG -- 3.1 Block Order -- 4 Reward Schemes -- 4.1 Stale Blocks -- 4.2 Discussion of Flat Rewards -- 4.3 Penalizing Deviations -- 4.4 Nash Equilibria -- 4.5 Hurting Other Players -- 5 Related Work -- 5.1 Selfish Mining -- 5.2 DAG -- 5.3 Fruitchains -- 5.4 Bribery -- 6 Conclusions -- References -- Brief Announcements -- Brief Announcement: Self Masking for Hardening Inversions -- 1 Introduction -- 1.1 Preliminaries -- 1.2 Previous Work -- 1.3 Contribution -- References -- Brief Announcement: Dynamic Graph Models for the Bitcoin P2P Network: Simulation Analysis for Expansion and Flooding Time -- 1 Introduction -- 2 Edge-Dynamic RAES (E-RAES) -- 3 Vertex-Dynamic RAES (V-RAES) -- References -- Brief Announcement: Fully Lattice Linear Algorithms -- 1 Introduction -- 2 Preliminaries and Background -- 3 Lattice Linear Algorithms: Minimal Dominating Set -- 4 Convergence Time in Traversing a Lattice of States -- 5 Related Work -- 6 Conclusion -- References -- Brief Announcement: Distributed Reconfiguration of Spanning Trees -- 1 Introduction -- 1.1 Related Work -- 2 Distributed Spanning Tree Reconfiguration -- 2.1 1-Simultaneous Add and Delete Requires (n) Rounds -- 2.2 2-Simultaneous Add and Delete in O(logN) Rounds -- References -- Brief Announcement: Mutually-Visible Uniform Circle Formation by Asynchronous Mobile Robots on Grid Plane -- 1 Introduction -- 2 Model and Problem Definition -- 3 Uniform Circle Formation -- 4 Uniform Circle Formation with Complete Visibility -- References.
Brief Announcement: Self-stabilizing Total-Order Broadcast.
Record Nr. UNISA-996500065303316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Stabilization, safety, and security of distributed systems : 24th International Symposium, SSS 2022, Clermond Ferrand, France, November 15-17, 2022, proceedings / / edited by Stéphane Devismes, [and four others]
Stabilization, safety, and security of distributed systems : 24th International Symposium, SSS 2022, Clermond Ferrand, France, November 15-17, 2022, proceedings / / edited by Stéphane Devismes, [and four others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (378 pages)
Disciplina 929.605
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
ISBN 3-031-21017-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Invited Papers -- Invited Paper: Simple, Strict, Proper, Happy: A Study of Reachability in Temporal Graphs -- 1 Introduction -- 2 Temporal Graphs -- 2.1 Strictness/Properness/Simpleness -- 2.2 Does It Really Matter? (Example of Spanners) -- 2.3 Happy Temporal Graphs -- 3 Expressivity in Terms of Reachability -- 3.1 Separations -- 3.2 Transformations -- 3.3 Summary and Discussions -- 4 More Facts About Happy Temporal Graphs -- 5 Concluding Remarks and Open Questions -- References -- Invited Paper: One Bit Agent Memory is Enough for Snap-Stabilizing Perpetual Exploration of Cactus Graphs with Distinguishable Cycles -- 1 Introduction -- 2 Preliminaries -- 2.1 Cactus Graph -- 2.2 Mobile Agent and Graph Exploration -- 3 Snap-Stabilizing Perpetual Exploration -- 3.1 Port Traversal Graph -- 3.2 Algorithm for a Single Agent with One-Bit Agent Memory -- 4 Exploration by an Oblivious Agent -- References -- Invited Paper: Towards Practical Atomic Distributed Shared Memory: An Experimental Evaluation -- 1 Introduction -- 2 Algorithms Overview -- 2.1 ARES -- 2.2 Cassandra -- 2.3 Redis -- 3 Experimental Evaluation -- 3.1 Experimentation Setup -- 3.2 Scenarios -- 3.3 Experimental Results -- 4 Conclusions -- References -- Invited Paper: Cross-Chain State Machine Replication -- 1 Introduction -- 2 Model of Computation -- 3 State Machines -- 3.1 Example: Simple Swap -- 3.2 Example: Decentralized Autonomous Organization (DAO) -- 4 State Machine Replication Protocol -- 4.1 Path Signatures -- 4.2 Reliable Delivery -- 4.3 Initialization, Moves, and Settlement -- 4.4 Dynamic Funding -- 5 Remarks -- 6 Related Work -- References -- Regular Papers -- Plateau: A Secure and Scalable Overlay Network for Large Distributed Trust Applications -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Works.
2 Model and Preliminaries -- 3 The Plateau Network Design and Statement of Results -- 4 Concluding Remarks and Future Work -- References -- The Limits of Helping in Non-volatile Memory Data Structures -- 1 Introduction -- 1.1 Contributions -- 1.2 Related Work -- 2 Characterization of the Crash-Recovery Model -- 3 Process Helping -- 4 Strict-Linearizability vs. Linearization-Helping -- 4.1 Sticky-Bit Object -- 4.2 An Equivalence Between Linearizability and Strict-Linearizability -- 5 Strict-Linearizability vs. Universal-Helping -- 5.1 Equivalence Between Strict-Linearizability and Universal-Help Freedom -- References -- Treasure Hunt in Graph Using Pebbles -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Model and Problem Definition -- 1.3 Contribution -- 1.4 Related Work -- 2 Treasure Hunt Algorithm When k< -- D -- 2.1 D2k < -- D -- 2.2 k< -- D2 -- 3 Treasure Hunt Algorithm When kD -- 3.1 Idea of Treasure Hunt in Tree for k=cD Pebbles -- 3.2 Extending the Idea for General Graphs -- 4 Lower Bound -- 5 Conclusion -- References -- Blockchain in Dynamic Networks -- 1 Introduction -- 2 Notation, Definitions and Problem Statement -- 3 Decisive Computations -- 4 Impossibility -- 5 Solutions -- 6 Extensions and Optimizations -- 7 Performance Evaluation -- 8 Conclusion -- References -- Improving the Efficiency of Report and Trace Ring Signatures -- 1 Introduction -- 2 Preliminaries -- 3 Syntax and Security Model -- 3.1 Security Model -- 4 An Efficient Instantiation of Fraser and Quaglia's Protocol -- 4.1 A Pairing-Based ElGamal Variant -- 4.2 Discussion -- 5 A New RTR Signature Construction -- 5.1 Description of Our Protocol -- 5.2 Security Analysis -- 6 Concluding Remarks -- References -- Flexible Scheduling of Transactional Memory on Trees -- 1 Introduction -- 2 Technical Preliminaries -- 3 A Single Object -- 4 Multiple Objects -- References.
Perpetual Torus Exploration by Myopic Luminous Robots -- 1 Introduction -- 2 Related Work -- 3 Model -- 4 Impossibility Results -- 5 Visibility Range One: A32 -- 6 Visibility Range Two: A41 -- 7 Conclusion -- References -- Optimal Algorithms for Synchronous Byzantine k-Set Agreement -- 1 Introduction -- 2 k-Set Agreement for n=3t, k=2 and t> -- 1 -- 2.1 Algorithm: Local Data Structures -- 2.2 Algorithm: Code of pi -- 2.3 Properties of a Matrix Mi -- 2.4 Basic Patterns: Squares and Regions -- 2.5 Proof of Correctness of Algorithm 1 -- 2.6 Finding Regions { R: =1,...,k} -- 2.7 Proof of Correctness of the Algorithm -- 3 Optimality -- 4 Conclusion -- References -- Reaching Consensus in the Presence of Contention-Related Crash Failures -- 1 Introduction -- 2 Computing Model -- 3 Base Algorithm (k=1): Consensus from Read/Write Registers -- 3.1 Presentation of the Algorithm -- 3.2 Proof of Algorithm 1 -- 4 General Algorithms (k1): Consensus from Objects whose Consensus Number is k -- 4.1 Presentation of Algorithm 2 -- 4.2 Further Explanations -- 4.3 Proof of Algorithm 2 -- 4.4 When k Divides n: Tolerating k-1 Classical Any-Time Failures -- 4.5 When k Divides n: Tolerating 2k-1 Contention-Related Crash Failures -- 5 Impossibility Results -- 6 Conclusion -- References -- Self-stabilizing Byzantine Fault-Tolerant Repeated Reliable Broadcast -- 1 Introduction -- 2 System Settings for BAMPn,t[FC,t < -- n/3] -- 3 The Non-Self-Stabilizing BT Algorithm -- 4 Self-stabilizing Byzantine-Tolerant Single-Instance BRB -- 5 Self-stabilizing Recycling in Node-Failure-Free Systems -- 6 SSBFT BRB Recycling via Muteness Detection -- 7 Discussion -- References -- Capacity Planning for Dependable Services -- 1 Introduction -- 2 System Design -- 3 Implementation -- 4 Evaluation -- 4.1 Experimental Measurements -- 4.2 Dependability Evaluation -- 5 Conclusion -- References.
Lower Bound for Constant-Size Local Certification -- 1 Introduction -- 1.1 Three Typical Regimes for the Certificate Sizes -- 1.2 Motivation for Studying the Constant-Size Regime -- 1.3 Our Results and Techniques -- 2 Models and Definitions -- 3 k-colorability Does Not Have a Binary Certification -- 3.1 Indistinguishability Setting -- 3.2 Notion of Score -- 3.3 Our Graph Construction and Its Properties -- 3.4 Anonymous Case -- 3.5 Extension to Identifiers -- 4 Going Below "4264306 logk "5265307 -- 5 Challenges and Open Questions -- References -- Collaborative Dispersion by Silent Robots -- 1 Introduction -- 1.1 Background -- 1.2 Motivation and Problem Definition -- 1.3 The Model -- 1.4 Our Contribution -- 1.5 Related Works -- 2 Dispersion on Graphs -- 2.1 The Algorithm -- 2.2 Correctness and Analysis -- 3 Conclusion -- References -- Time Optimal Gathering of Myopic Robots on an Infinite Triangular Grid -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Earlier Works -- 1.3 Our Contribution -- 2 Models and Definitions -- 2.1 Model -- 2.2 Notations and Definitions -- 2.3 Problem Definition -- 3 Impossibility Result -- 4 Gathering Algorithm -- 4.1 Correctness Results: -- 4.2 Complexity Analysis -- 5 Conclusion -- References -- Card-Based ZKP Protocol for Nurimisaki -- 1 Introduction -- 2 Preliminaries -- 2.1 Pile-Shifting Shuffle ch19ShinagawaIEICE2017,ch19NishimuraIEICE18 -- 2.2 Input-Preserving Five-Card Trick ch19MiyaharaFUN2020 -- 2.3 Mizuki-Sone Copy Protocol ch19MizukiFAW09 -- 2.4 How to Form a White Polyomino ch19RobertNGCO2022 -- 2.5 Sum in Z ch19RuangwisesTCS2021 -- 3 ZKP Protocol for Nurimisaki -- 3.1 Setup Phase -- 3.2 Connectivity Phase -- 3.3 Verification Phase -- 4 Security Proofs -- 5 Conclusion -- References -- Consensus on Demand -- 1 Introduction -- 2 Model -- 3 Problem Statement -- 4 Related Work -- 5 A Simple Payment System.
6 Consensus on Demand -- 7 Discussion -- 8 Implementation -- References -- Better Incentives for Proof-of-Work -- 1 Introduction -- 1.1 Blockchain Game -- 1.2 Our Contribution -- 1.3 Intuitive Overview -- 2 Model and Preliminaries -- 2.1 Rounds -- 2.2 Players -- 2.3 Blocks -- 2.4 DAG -- 2.5 Mining -- 2.6 Action Space -- 3 The Block DAG -- 3.1 Block Order -- 4 Reward Schemes -- 4.1 Stale Blocks -- 4.2 Discussion of Flat Rewards -- 4.3 Penalizing Deviations -- 4.4 Nash Equilibria -- 4.5 Hurting Other Players -- 5 Related Work -- 5.1 Selfish Mining -- 5.2 DAG -- 5.3 Fruitchains -- 5.4 Bribery -- 6 Conclusions -- References -- Brief Announcements -- Brief Announcement: Self Masking for Hardening Inversions -- 1 Introduction -- 1.1 Preliminaries -- 1.2 Previous Work -- 1.3 Contribution -- References -- Brief Announcement: Dynamic Graph Models for the Bitcoin P2P Network: Simulation Analysis for Expansion and Flooding Time -- 1 Introduction -- 2 Edge-Dynamic RAES (E-RAES) -- 3 Vertex-Dynamic RAES (V-RAES) -- References -- Brief Announcement: Fully Lattice Linear Algorithms -- 1 Introduction -- 2 Preliminaries and Background -- 3 Lattice Linear Algorithms: Minimal Dominating Set -- 4 Convergence Time in Traversing a Lattice of States -- 5 Related Work -- 6 Conclusion -- References -- Brief Announcement: Distributed Reconfiguration of Spanning Trees -- 1 Introduction -- 1.1 Related Work -- 2 Distributed Spanning Tree Reconfiguration -- 2.1 1-Simultaneous Add and Delete Requires (n) Rounds -- 2.2 2-Simultaneous Add and Delete in O(logN) Rounds -- References -- Brief Announcement: Mutually-Visible Uniform Circle Formation by Asynchronous Mobile Robots on Grid Plane -- 1 Introduction -- 2 Model and Problem Definition -- 3 Uniform Circle Formation -- 4 Uniform Circle Formation with Complete Visibility -- References.
Brief Announcement: Self-stabilizing Total-Order Broadcast.
Record Nr. UNINA-9910629277003321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui