Filters








369 Hits in 8.5 sec

SoK: Diving into DAG-based Blockchain Systems [article]

Qin Wang, Jiangshan Yu, Shiping Chen, Yang Xiang
2020 arXiv   pre-print
We further identify open challenges to highlight the potentiality of DAG-based solutions and indicate their promising directions for future research.  ...  To bridge the gap, this Systematization of Knowledge (SoK) provides a comprehensive analysis of DAG-based blockchain systems.  ...  -Enough power for balanced subgraphs -No instant finality Probabilistic consensus IOTA Large Weight Attack Adversaries creates a conflicting transaction with high confidence to invalidate a recently  ... 
arXiv:2012.06128v2 fatcat:ntxxixxeevhhhj6tng5umornve

Cell Segmentation in Cervical Smear Images using Polar Coordinates GVF Snake with Radiating Edge Map

Xu Chuanyun, Zhang Yang, Wang Sen
2013 Journal of Multimedia  
The watermark information is embedded in a halftone process for image screening with phase modulation method. The watermark is extracted by a template, which is optimized using the PSO algorithm.  ...  The experimental results show the halftone watermarking algorithm optimized using PSO has better performance, it is robust under smearing attack and cropping attack, and has good resistance to print-and-scan  ...  We also thank the anonymous reviewers for their suggestions and feedback that helped us to improve the quality of this paper.  ... 
doi:10.4304/jmm.8.3.213-219 fatcat:fb5tm3tguvgmxblj3eygm7pqmu

A 3D Simplification Method based on Dual Point Sampling

Juan Cao, Yitian Zhao, Ran Song, Yingchun Zhang
2013 Journal of Multimedia  
The watermark information is embedded in a halftone process for image screening with phase modulation method. The watermark is extracted by a template, which is optimized using the PSO algorithm.  ...  The experimental results show the halftone watermarking algorithm optimized using PSO has better performance, it is robust under smearing attack and cropping attack, and has good resistance to print-and-scan  ...  We also thank the anonymous reviewers for their suggestions and feedback that helped us to improve the quality of this paper.  ... 
doi:10.4304/jmm.8.3.191-197 fatcat:z5gmzeiwqfadlakggntajifdru

Combinatorial and robust optimisation models and algorithms for railway applications

Laura Galli
2010 4OR  
Acknowledgments Acknowledgment This work was partially supported by the Future and Emerging Technologies Unit of EC (IST priority -6th FP), under contract no. FP6-021235-2 (project ARRIVAL).  ...  The problem is then to assign a platform (color) to each train (circular interval) so that overlapping intervals are assigned distinct colors and the number of used colors is minimised.  ...  What we get is a general method to buffer networks. In the exact model the actions of planer, adversary, and recovery are intertwined.  ... 
doi:10.1007/s10288-010-0138-4 fatcat:eqkw422ydjb23eqwkurfe22as4

Essential Traffic Parameters for Shared Memory Switch Performance [chapter]

Patrick Eugster, Alex Kesselman, Kirill Kogan, Sergey Nikolenko, Alexander Sirotkin
2015 Lecture Notes in Computer Science  
We show that the model with values has a different nature as a generalization from the single-queue case (where both models have optimal online algorithms) to the shared memory switch, and it is not enough  ...  packet per time slot, i.e., 2 packets per 2 time slots, while OPT is free to accept the packets evenly and get 2 + 2/2 + . . . + 2/2 packets per 2 time slots, getting the bound as n+1 2 .  ... 
doi:10.1007/978-3-319-25258-2_5 fatcat:mmxc4o7ysbgbpor4vars7gxesy

Hints and Principles for Computer System Design [article]

Butler Lampson
2021 arXiv   pre-print
It also gives some principles for system design that are more than just hints, and many examples of how to apply the ideas.  ...  This new long version of my 1983 paper suggests the goals you might have for your system -- Simple, Timely, Efficient, Adaptable, Dependable, Yummy (STEADY) -- and techniques for achieving them -- Approximate  ...  Related ideas are to strengthen a loop invariant to get a strong enough precondition for the loop body, or to weaken a spec in order to make the code's job easier.  ... 
arXiv:2011.02455v3 fatcat:jolyz5lknjdbpjpxjcrx5rh6fa

The State of AI Ethics Report (June 2020) [article]

Abhishek Gupta
2020 arXiv   pre-print
Artificial intelligence has become the byword for technological progress and is being used in everything from helping us combat the COVID-19 pandemic to nudging our attention in different directions as  ...  we all spend increasingly larger amounts of time online.  ...  intervals.  ... 
arXiv:2006.14662v1 fatcat:q76dnqzh4ja5pofurjmpmyeyey

Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies

Florian Tschorsch, Bjorn Scheuermann
2016 IEEE Communications Surveys and Tutorials  
From there we continue to explore the design space by discussing existing contributions and results.  ...  In the process, we deduce the fundamental structures and insights at the core of the Bitcoin protocol and its applications.  ...  The authors would like to thank Daniel Cagara for the discussions on this topic and for sharing his practical experience.  ... 
doi:10.1109/comst.2016.2535718 fatcat:xmdaafdgsvc6tam2kzmaeyorta

Parameters Summer 2022

USAWC Press
2022 Parameters  
Western support has allowed them to compensate for their deficiencies in armaments and munitions.  ...  As the conflict has unfolded, heavy losses have imposed a strain on available Russian manpower.  ...  disputes in the Arctic Ocean well enough to prevent major conflict in the region.  ... 
doi:10.55540/0031-1723.3147 fatcat:qbyam2jbwjbe7lwo2eteqmwwqy

PROMISE UNFULFILLED: A Brief History of Educational Wargaming in the Marine Corps

Sebastian J. Bae, Ian T. Brown
2021 MCU Journal  
The tradition of leveraging wargames for educational and training purposes is deeply rooted in the Marine Corps.  ...  From humble beginnings at the Naval War College to Service-wide wargaming initiatives like TACWAR, the Marine Corps has always sought to develop the intellectual edge of its Marines through wargames.  ...  The actions of Russian-backed hackers are carefully measured and planned to not only avoid formal responsibility for the Russian state but also cause just enough damage to disrupt and harm Russia's adversaries  ... 
doi:10.21140/mcuj.20211202002 fatcat:ky5pgd2z5nb77fsytqkngolqdq

Reinforcement Learning [chapter]

Ke-Lin Du, M. N. S. Swamy
2013 Neural Networks and Statistical Learning  
The theory of POMDPs has been extensively studied for the case of complete knowledge of the dynamics of the POMDP.  ...  For example, one approach is based on the theory of partially-observable MDPs (POMDPs).  ...  Just as with the n -step TD methods, the updating can be either online or offline.  ... 
doi:10.1007/978-1-4471-5571-3_18 fatcat:l3xi3uyhtff35gai7qvvvedwbq

Reinforcement Learning [chapter]

Andrew G. Barto
1997 Neural Systems for Control  
The theory of POMDPs has been extensively studied for the case of complete knowledge of the dynamics of the POMDP.  ...  For example, one approach is based on the theory of partially-observable MDPs (POMDPs).  ...  Just as with the n -step TD methods, the updating can be either online or offline.  ... 
doi:10.1016/b978-012526430-3/50003-9 fatcat:nwyl3dsnrbc75csknm6u34nyty

Deep Latent-Variable Models for Text Generation [article]

Xiaoyu Shen
2022 arXiv   pre-print
Given enough training data, it is able to achieve state-of-the-art performance yet avoiding the need of language/domain-dependent knowledge.  ...  Text generation aims to produce human-like natural language output for down-stream tasks.  ...  Now suppose the discriminator reaches its optimum for θ 0 , let Q θ (x) = q(x)+p θ (x) which is the same as the gradient we just derived.Therefore, if we assume D(x) is optimal for any fixed θ 0 , optimizing  ... 
arXiv:2203.02055v1 fatcat:sq3upxl7xvfnhigoc7apszomwu

Relaxing Opacity in Pessimistic Transactional Memory

Konrad Siek, Pawel T. Wojciechowski
2014 International Symposium on Distributed Computing  
Replacement is similar to the round change in Paxos. A replacement request, specifying an old replica and its replacements, is propagated to all replicas, which  ...  This bound is obtained with a greedy coloring of a weighted conflict graph of transactions.  ...  For this, it is enough if the new replica stores any possibly accepted value.  ... 
dblp:conf/wdag/SiekW14 fatcat:mdkbhvoobncgdfzobachr3cohy

Citizens Versus the Internet: Confronting Digital Challenges With Cognitive Tools

Anastasia Kozyreva, Stephan Lewandowsky, Ralph Hertwig
2020 Psychological Science in the Public Interest  
This online landscape holds multiple negative consequences for society, such as a decline in human autonomy, rising incivility in online conversation, the facilitation of political extremism, and the spread  ...  These cognitive tools are designed to foster the civility of online discourse and protect reason and human autonomy against manipulative choice architectures, attention-grabbing techniques, and the spread  ...  We also thank Deb Ain and Rodney Atkins for editing the manuscript. Notes  ... 
doi:10.1177/1529100620946707 pmid:33325331 pmcid:PMC7745618 fatcat:ur4yjvucgvc7be2yy4h3idxusq
« Previous Showing results 1 — 15 out of 369 results