نتایج جستجو برای: cryptocurrency
تعداد نتایج: 2254 فیلتر نتایج به سال:
Cryptocurrency is a blockchain-based technology that often used as digital currency. Digital money different from conventional money, this type of does not have physical form but only block data bound by hash validation. The spread to every cryptocurrency user who in the environment. So when makes transaction, mining will be carried out. Cryptocurrencies several advantages also disadvantages cu...
We discuss several uses of blockchain (and, more generally, distributed ledger) technologies outside of cryptocurrencies with a pragmatic view. We mostly focus on three areas: the role of coin economies for what we refer to as data malls (specialized data marketplaces); data provenance (a historical record of data and its origins); and what we term keyless payments (made without having to know ...
In recent years, hype surrounding the proliferation of blockchain-based technology has been significant. Apart from the creation of bitcoin and other cryptocurrencies, it has been difficult to determine what practical utility might lie in the adoption of blockchain, mainly because there are so few in existence at present. Even so, interest in the technology has increased tremendously. This pape...
Human languages contain very little unconditioned variation. In contexts where language learners are exposed to input that contains inconsistencies, they tend to regularise it, either by eliminating competing variants, or conditioning variant use on the context. In the present study we compare regularisation behaviour across linguistic levels, looking at how adult learners respond to variabilit...
We develop cryptographically secure techniques to guarantee unconditional privacy for respondents to polls. Our constructions are efficient and practical, and are shown not to allow cheating respondents to affect the “tally” by more than their own vote — which will be given the exact same weight as that of other respondents. We demonstrate solutions to this problem based on both traditional cry...
This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties that may facilitate cryptanalysis. We show how this might be done and how such sneaky use of optimisation may be detected.
The fringe field effects on the transient characteristics of nano-electromechanical (NEM) memory cells have been discussed by using an analytical model. The influence of fringe field becomes stronger as the size of a cell decreases. By using the proposed model, the dependency of NEM memory transient characteristics on cell parameters has been evaluated.
In recent years, there has been a lot of hype and interest around Bitcoin and cryptocurrencies. Following the invention of Bitcoin in 2008, blockchain, the public ledger that supports Bitcoin transaction, has also emerged as a hot topic. Blockchain has attracted attention from many parties around the world including academic scholars, practitioners in many industries, and policymakers in many T...
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners. Conventional wisdom asserts that the protocol is incentive-compatible and secure against colluding minority groups, i.e., it incentivizes miners to follow the protocol as prescribed....
Variation in natural language is constrained: languages tend to lose competing variants over time, and where variation persists, its use tends to be conditioned on grammatical or sociolinguistic context. We had adult participants learn and communicate with artificial languages exhibiting unpredictable variation in plural marking. Using an iterated learning procedure, the languages produced by p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید