Filters








3,920 Hits in 3.4 sec

A Memo on the Proof-of-Stake Mechanism [article]

George Gui, Ali Hortacsu, Jose Tudon
2018 arXiv   pre-print
Compared with proof-of-work, proof-of-stake has a different cost structure for attackers. In Budish (2018), three equations characterize the limits of Bitcoin, which has a proof-of-work mechanism.  ...  We analyze the economic incentives generated by the proof-of-stake mechanism discussed in the Ethereum Casper upgrade proposal.  ...  Introduction Under proof-of-stake (PoS), networks achieve distributed consensus on a blockchain by randomly choosing the creator of the next block as function of their stake.  ... 
arXiv:1807.09626v1 fatcat:ybdllclz7vet5lqvosumgnc3ci

Teaching Mohamedou Ould Slahi's Guantánamo Diary in the Human Rights and Literature Classroom

Alexandra Schultheis Moore
2016 Radical Teacher  
And, it offers a rebuttal to those ideologies through a critical analysis of the distribution of legal personhood and literary subjectivity in the context of Guantánamo.  ...  This essay provides a case study of Slahi's Guantanamo Diary in order to demonstrate how a literary approach to contribute to the study of human rights by both demonstrating the necessity of human rights  ...  He turns for evidence of the stakes of responsible reading to the Torture Memos generated within the George W.  ... 
doi:10.5195/rt.2016.263 fatcat:2zkhbbmixvb3jby3w2i4kkhpxe

EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection [article]

Yuhe Huang, Bo Jiang, W.K. Chan
2020 arXiv   pre-print
EOSIO is one typical public blockchain platform. It is scalable in terms of transaction speeds and has a growing ecosystem supporting smart contracts and decentralized applications.  ...  However, the vulnerabilities within the EOSIO smart contracts have led to serious attacks, which caused serious financial loss to its end users.  ...  The EOSIO platform adopts the Delegated Proof of Stake (DPoS) protocol for making consensus, which is much more scalable than the Proof of Work (PoW) consensus protocol used by other platforms such as  ... 
arXiv:2007.14903v3 fatcat:6naghoujsbf4xjqrpl75krm62e

XBlock-EOS: Extracting and Exploring Blockchain Data From EOSIO [article]

Weilin Zheng, Zibin Zheng, Hong-Ning Dai, Xu Chen, Peilin Zheng
2020 arXiv   pre-print
It is challenging to process and analyze a high volume of raw EOSIO data and establish the mapping from original raw data to the well-grained datasets since it requires substantial efforts in extracting  ...  To fill this gap, we collect and process the up-to-date on-chain data from EOSIO.  ...  ACKNOWLEDGMENTS The work described in this paper was supported by the National Key  ... 
arXiv:2003.11967v3 fatcat:bocawu4f7ncbvkp2oryxk4775i

Fracture mechanics in cost-effective pressure vessel design

L. RAYMOND, R. J. USELL
1969 Journal of Spacecraft and Rockets  
., “On the Magnification Factors of Deep Surface Flaws, Structural Development,’ Memo 16, Dec. 1965, The Boeing Co., Seattle. ’ Tiffany, C. F. and Lorenz, P.  ...  design PR requirement, it is important to understand how the concepts of fracture mechanics are brought to bear on the problem consistent with the low-cost goal, including minimization of proof testing  ... 
doi:10.2514/3.29649 fatcat:r27q2qbkwbeohjqos5mlihkpm4

Seek Justice, Not Just Deportation: How to Improve Prosecutorial Discretion in Immigration Law

Erin B. Corcoran
2014 Social Science Research Network  
offenses and limited the authority of judges to alleviate the harsh consequence of deportation. 1  ...  The landscape of federal immigration law has changed dramatically over the last 90 years.  ...  Counsel on INS Use of Prosecutorial Discretion to the Comm'r (2000). [hereinafter Memo from Bo Cooper] 97 See Memo from Bo Cooper, supra note ___. 98 Id. 99 Id.  ... 
doi:10.2139/ssrn.2414031 fatcat:m3xclerkzvcvdgcjz676c5zq7m

Organizational Secrecy and the FBI's COINTELPRO–Black Nationalist Hate Groups Program, 1967-1971

Kristen Hoerl, Erin Ortiz
2015 Management Communication Quarterly  
Memos exchanged between the FBI Director and field offices reveal how the organization strategized to conceal its identity as the source of anonymous communication.  ...  The Bureau's techniques suggest that organizational secrecy involves a high degree of coordination between members, but it may also endanger the organization's longevity and the public welfare.  ...  Throughout our analysis, citations from "the Director" reflect the language of the memos.  ... 
doi:10.1177/0893318915597302 fatcat:6lqalvxzkjdelp2xgole2usxam

Practical I-Voting on Stellar Blockchain

Stanisław Barański, Julian Szymański, Andrzej Sobecki, David Gil, Higinio Mora
2020 Applied Sciences  
The main contribution to the field is a method based on a blind signature used to construct reliable voting protocol.  ...  In this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app10217606 fatcat:yypdqzftibddlolnn5qvuc4etu

Adopting the Cascade Model in Ad Auctions: Efficiency Bounds and Truthful Algorithmic Mechanisms

Gabriele Farina, Nicola Gatti
2017 The Journal of Artificial Intelligence Research  
Sponsored Search Auctions (SSAs) are one of the most successful applications of microeconomic mechanisms, with a revenue of about $72 billion in the US alone in 2016.  ...  In our work, we argue in favor of adopting the VCG mechanism based on the cascade model with ad/position externalities (APDC-VCG).  ...  The present paper extends the preliminary version by including all missing proofs, providing additional inefficiency results, reporting a theoretical analysis of the approximation guarantees of the sorted-ads  ... 
doi:10.1613/jair.5438 fatcat:s3eoniifznd7pmpfqjrqbyn7kq

Page 243 of None Vol. 3, Issue 4 [page]

1849 None  
Another valuable work on a portion of our Territory, which just now is the most interesting in the world.  ...  Revere is a good observer and a clear writer, and his book is a highly instructive one, but if his friend, under whose supervision it has been published, had erased about one-quarter of the volume it*would  ... 

Abu Ghraib and the War on Terror—a case against Donald Rumsfeld?

Alette Smeulers, Sander van Niekerk
2008 Crime, law and social change  
at Abu Ghraib was an inevitable outcome of the War on Terror as launched by the U.S. administration in a reaction to the terrorist attack launched against it.  ...  The pictures of the inhuman and abusive treatment of Iraqi prisoners at the Abu Ghraib prison shocked the world.  ...  The lack of clarity on rules, regulations and the chain of command in combination with these features of the military rendered the ordinary mechanisms of control inoperable.  ... 
doi:10.1007/s10611-008-9160-2 fatcat:m6ynbqxvmbay7j7le3eaemnqqe

Blockchains: a Systematic Multivocal Literature Review [article]

Bert-Jan Butijn, Damian A. Tamburri, Willem-Jan Van Den Heuvel
2019 arXiv   pre-print
The goal of this article is to develop a coherent overview of the state of the art in blockchain technology, using a systematic(i.e.  ...  We derive a systematic definition of blockchain technology, based on a formal concept analysis. Further on, we flesh out an overview of blockchain technology elaborated by means of Grounded-Theory.  ...  Furthermore, some of the authors' work is supported by the EU H2020 framework programme, grant "ANITA" under Grant No.: 787061 and grant "PRoTECT" under Grant No.: 815356.  ... 
arXiv:1911.11770v1 fatcat:id3mvregirdx7ay27mahicek2i

Deterring Torture: The Preventive Power of Criminal Law and its Promise for Inhibiting State Abuses

Francesca Laguardia
2017 Human Rights Quarterly  
The use of torture in the War on Terror reinvigorated a longstanding debate about how to prevent such human rights violations, and whether they should be criminalized.  ...  , and would have been successfully deterred if not for the lack of prior prosecutions.  ...  Yoo and Koester began working on the memo on 11 April 2002. 92 Koester wrote four drafts of the memo, each time responding to comments Yoo made. 93 In all, Yoo spent four months working on the memos,  ... 
doi:10.1353/hrq.2017.0007 fatcat:xhhxd2p4ivcglec7amm2wbusmi

A history of toxicant ejectors in coyote control

Guy Connolly
2002 Proceedings of the Vertebrate Pest Conference  
, and evaluations of them compared to the CG; human injuries from CG accidents, leading to development and adoption of the safer M-44 ejector; the 1972 ban on sodium cyanide (NaCN) and other predacides  ...  The invention and technical evolution of CG and M-44 devices is described chronologically, with emphasis on the development, manufacture, and use of these devices in Federal/cooperative animal damage control  ...  Blom for the many obscure but important documents he has unearthed in PSD files and for his advice and help in the preparation of this history. Significant information also has been provided by L.  ... 
doi:10.5070/v420110301 fatcat:uzbugtql65a6hoqcmzzy32lj3e

How Glaciers are Studied

Charles Wiles
1906 Scientific American  
Other stakes or base marks are made on the bank ' at the side of the glacier.  ...  The later memo rials are heavier slabs with more ornamentation, and most of them lie on the turf or are raised slightly above it.  ... 
doi:10.1038/scientificamerican06301906-534 fatcat:ghvmdhtmhngtxmctmjslydhn4e
« Previous Showing results 1 — 15 out of 3,920 results