Filters








91 Hits in 6.2 sec

Metamorphic IOTA [article]

Gewu Bu
2019 arXiv   pre-print
First, we propose a parameterized algorithm, E-IOTA, for tip selection which targets to reduce the number of random walks executed in previous versions (IOTA and G-IOTA) while maintaining the same security  ...  Interestingly, to the best of our knowledge this is the first formal analysis of the security guaranties of IOTA and its derivatives.  ...  This makes the TSA and the tangle unpredictable for attackers.  ... 
arXiv:1907.03628v1 fatcat:mcyabwahpnhz7eqogzfo35ctbe

How to Break IOTA Heart by Replaying?

Gerard De Roode, Ikram Ullah, Paul J. M. Havinga
2018 2018 IEEE Globecom Workshops (GC Wkshps)  
Attack methodology and proof of concept for the replay attack is presented. Our proposed exploitation methodology is based upon address reuse, while IOTA in default mode does not reuse addresses.  ...  Distrust, and privation of balance can be some of the severe impacts of this vulnerability. Index Terms-IOTA, Blockchain, cryptocurrency, security exploitation, and replay attack.  ...  As mentioned earlier, IoT has overwhelming applications in logistics that can enhance efficiency and quality of service for the transport and logistics industry.  ... 
doi:10.1109/glocomw.2018.8644437 dblp:conf/globecom/RoodeUH18 fatcat:dnfc7ij6l5auvptcj3jefbxlvq

Blockchain-Based Power Trading Process

2019 Journal of system and management sciences  
This paper designs a blockchain-based power transaction process in which individuals (producers) can produce and use power themselves or sell the remaining power to others, rather than transmitting and  ...  In particular, in terms of energy demand management, there will be regional-centric self-reliant decentralization, and the activation of distributed energy resources (DERs), including renewable energy,  ...  This eliminates the need for participants to store all status information for the Tangle network.  ... 
doi:10.33168/jsms.2019.0305 fatcat:cnmau4wz35denlir3rqjgzxysi

Computing Resource Allocation Scheme for DAG-Based IOTA Nodes

Houssein Hellani, Layth Sliman, Abed Ellatif Samhat, Ernesto Exposito
2021 Sensors  
In this paper, we introduce an efficient mechanism to distribute the tasks fairly among full nodes and hence achieve load balancing.  ...  The light nodes are nodes with low computing resources which seek full nodes' help to validate and attach its transaction to the Tangle.  ...  Conflicts of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/s21144703 fatcat:xfobw4vwincvzlm2345hnajjma

SoK: Diving into DAG-based Blockchain Systems [article]

Qin Wang, Jiangshan Yu, Shiping Chen, Yang Xiang
2020 arXiv   pre-print
We further identify open challenges to highlight the potentiality of DAG-based solutions and indicate their promising directions for future research.  ...  security.  ...  -Is there a blockchain design that simultaneously scales throughput, storage efficiency, and security [11] ?  ... 
arXiv:2012.06128v2 fatcat:ntxxixxeevhhhj6tng5umornve

An HDAC6-dependent surveillance mechanism suppresses tau-mediated neurodegeneration and cognitive decline

Hanna Trzeciakiewicz, Deepa Ajit, Jui-Heng Tseng, Youjun Chen, Aditi Ajit, Zarin Tabassum, Rebecca Lobrovich, Claire Peterson, Natallia V. Riddick, Michelle S. Itano, Ashutosh Tripathy, Sheryl S. Moy (+4 others)
2020 Nature Communications  
Using mass spectrometry, we identify a novel HDAC6-regulated tau acetylation site as a disease specific marker for 3R/4R and 3R tauopathies, supporting uniquely modified tau species in different neurodegenerative  ...  We propose that a HDAC6-dependent surveillance mechanism suppresses toxic tau accumulation, which may protect against the progression of AD and related tauopathies.  ...  Jonathan Schisler for providing Hsp70 and Hsp90 plasmids, and Dr. Tso-Pang Yao (Duke University) for providing HDAC6 KO mice, HDAC6 expression plasmids, and anti-mouse HDAC6 and HDAC10 antibodies.  ... 
doi:10.1038/s41467-020-19317-4 pmid:33139698 pmcid:PMC7606452 fatcat:246wwsrm6vc55jnu3kek46j65u

Geographical notes

1907 Scottish Geographical Magazine  
During this drifting continuous meteorological observations were made and many soundings and samples of water were secured, and the biologist had his dredge or "tangle" out daily and collected many specimens  ...  In conclusion, the author pays a high compliment to the efficiency and economy of the administration of ]~ritish West Africa. ~EI'~SONAL. Mr. Robert C.  ... 
doi:10.1080/14702540708554817 fatcat:4wjellurxbdatm3xr5mig7qhue

The Transparent Traveler: The Performance and Culture of Airport SecurityThe Transparent Traveler: The Performance and Culture of Airport Security. By Rachel Hall. Durham, NC: Duke University Press, 2015; 240 pp.; illustrations; $84.95 cloth, $23.95 paper, e-book available

Justine Shih Pearson
2017 TDR: The Drama Review  
practical, thought-provoking resource for critically and creatively engaging with this growing field.  ...  A richly annotated review of the field's literature, this chapter could stand alone as an invaluable resource for students, teachers, and scholars of intermedial performance.  ...  and cooperative during security screening to avoid annoying other travelers) and TSA workers (how to deliver better customer service so travelers aren't so annoyed during security screening) -is that  ... 
doi:10.1162/dram_r_00660 fatcat:ag435gs4hbepvcoe5mgjophba4

Induced Pluripotent Stem Cells: Hope in the Treatment of Diseases, including Muscular Dystrophies

Daniela Gois Beghini, Samuel Iwao Horita, Cynthia Machado Cascabulho, Luiz Anastácio Alves, Andrea Henriques-Pons
2020 International Journal of Molecular Sciences  
However, with the clinical trials and extensive basic research studying the biology of these cells, a promising future for human cell-based therapies using iPS cells seems to be increasingly clear and  ...  Induced pluripotent stem (iPS) cells are laboratory-produced cells that combine the biological advantages of somatic adult and stem cells for cell-based therapy.  ...  security and expression control.  ... 
doi:10.3390/ijms21155467 pmid:32751747 fatcat:dn2trfxy7zg2tllyqwt4th73gm

Assemblages of desire

Rebecca Uliasz
2019 A Peer-Reviewed Journal About  
It is argued that affective technologies enter into power arrangements with political and corporate interests, altering an acting bodies' affect — in the Spinozan definition, the "capacity to affect and  ...  The following concludes with an engagement with Deleuze and Guattari's "assemblages of desire" to suggest that affective technologies might produce other micropolitical arrangements that increase user  ...  Eckman proceeded to develop tools using the FACS for clients as broad as the TSA, FBI, CIA, health care providers, the Dalai Lama, and the makers of Pixar's Inside Out.  ... 
doi:10.7146/aprja.v8i1.115417 fatcat:jd43dvxmgzd7hcm6gts4baxi6a

Leg Prosthesis With Somatosensory Feedback Reduces Phantom Limb Pain and Increases Functionality

Caroline Dietrich, Sandra Nehrdich, Sandra Seifert, Kathrin R. Blume, Wolfgang H. R. Miltner, Gunther O. Hofmann, Thomas Weiss
2018 Frontiers in Neurology  
Changes in the peripheral and central nervous system (CNS) are hypothesized to contribute to PLP.  ...  Based on ideas to modify neural reorganization within the CNS, the aim of the study was to test, whether prostheses with somatosensory feedback might help to reduce PLP, and increase the functionality  ...  Everyday goals for nearly all patients comprised secure ambulation on soft and bumpy grounds, such as grass, off-road, cobbled streets, gravel, and slippery ground.  ... 
doi:10.3389/fneur.2018.00270 pmid:29755399 pmcid:PMC5932153 fatcat:uvjicjraxzff5k6asf63se6wbi

The Future of Privacy Online

Huey Et al.
2012 Surveillance & Society  
Full Text of the debate section on the future of online privacy featuring Laura Huey, Micheal Vonn, Reg Whitaker, Paul Rosenzweig, danah boyd, Steve T. Margulis, and Gary T. Marx, and Judith Rauhofer  ...  U.S. called for in the Perimeter Security Agreement.  ...  Department of Homeland Security's Global Entry/TSA Pre-Check program; and 4) Involuntary dataveillance of limited data set (name, DOB and gender) as a condition of airplane boarding, as with TSA's Secure  ... 
doi:10.24908/ss.v10i3/4.4551 fatcat:ksvtyzpc3bdrzotjz3um463tiu

Hidden Stories/Human Lives: Proceedings of the Textile Society of America 17th Biennial Symposium, October 15-17, 2020.--Full Program with Abstracts & Bios

2021 Textile Society of America Symposium Proceedings  
From a long line of Haida weavers, including her mother Delores Churchill and grandmother Selina Peratrovich, Evelyn Vanderhoop studied with Cheryl Samuel and continues to teach and weave both the Raven's  ...  Vanderhoop, Evelyn Artist Saturday Film Raven's Tail Journey of Evelyn Vanderhoop (with Bernadette Jarrard and Jennifer Swope) Evelyn Vanderhoop is a Pacific Northwest Coast weaver from the Haida  ...  Authors are responsible for securing permission for illustration usage in a digital production and all pertinent fees.  ... 
doi:10.32873/unl.dc.tsasp.0071 fatcat:by5gfge42jchfdrpn4tnhvjlqy

Armaments decision-making: Are European states really different?

Jocelyn Mawdsley
2018 Comparative Strategy  
Already the poorest country in the Western Hemisphere, Haiti has extremely low employment figures the transatlantic relationship and eu-u.s. cooperation in security | 209  ...  While the EU also has guidelines and processes for requesting and coordinating the use of military assets in international crises and disasters, some member states are reluctant to employ these assets,  ...  United States Coast Guard (USCG), and the Transportation Security Administration (TSA).  ... 
doi:10.1080/01495933.2018.1497319 fatcat:x7w5k2z7nrfwbb4dzk2ds7y52i

Analysis and Design of Open Decentralized Serverless Computing Platforms

Sara Ghaemi
2021
For the DLTs to be effectively used in practice, it is crucial to assess their performance in different use cases and scenarios.  ...  networks and use the data and information available on them. iii Preface  ...  security and efficiency of the Tangle.  ... 
doi:10.7939/r3-28re-v088 fatcat:b5545e3or5f4bneuo5inbhdr6e
« Previous Showing results 1 — 15 out of 91 results