派博傳思國(guó)際中心

標(biāo)題: Titlebook: Blockchain and Applications; 3rd International Co Javier Prieto,Alberto Partida,António Pinto Conference proceedings 2022 The Editor(s) (if [打印本頁(yè)]

作者: 浮淺    時(shí)間: 2025-3-21 19:51
書目名稱Blockchain and Applications影響因子(影響力)




書目名稱Blockchain and Applications影響因子(影響力)學(xué)科排名




書目名稱Blockchain and Applications網(wǎng)絡(luò)公開度




書目名稱Blockchain and Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Blockchain and Applications被引頻次




書目名稱Blockchain and Applications被引頻次學(xué)科排名




書目名稱Blockchain and Applications年度引用




書目名稱Blockchain and Applications年度引用學(xué)科排名




書目名稱Blockchain and Applications讀者反饋




書目名稱Blockchain and Applications讀者反饋學(xué)科排名





作者: 鑒賞家    時(shí)間: 2025-3-21 22:09

作者: TSH582    時(shí)間: 2025-3-22 03:02

作者: Calibrate    時(shí)間: 2025-3-22 07:31
Hoe heeft het zover kunnen komen?,ct Creator and to conduct an empirical evaluation, which on the one hand, measures the semantic understandability of a visual representation of a Smart Contract created with our tool and compares it to its textual representation in Ride programming language. On the other hand, we evaluate the user a
作者: 喃喃訴苦    時(shí)間: 2025-3-22 09:02

作者: 錯(cuò)    時(shí)間: 2025-3-22 14:12

作者: 入伍儀式    時(shí)間: 2025-3-22 20:27
A Blockchain-Enabled Fog Computing Model for Peer-To-Peer Energy Trading in Smart Gridckchain-Enabled Fog Computing Model (BFCM) for P2P energy trading in Smart Grid. The proposed BSET algorithm provides a fully trusted minimum latency communication network that enables the prosumers to trade energy within their local premises. The algorithm was implemented using iFogSim, Truffle, AT
作者: exclusice    時(shí)間: 2025-3-23 01:06

作者: 協(xié)議    時(shí)間: 2025-3-23 01:58

作者: Flustered    時(shí)間: 2025-3-23 07:00
Implementation and Evaluation of a Visual Programming Language in the Context of Blockchainct Creator and to conduct an empirical evaluation, which on the one hand, measures the semantic understandability of a visual representation of a Smart Contract created with our tool and compares it to its textual representation in Ride programming language. On the other hand, we evaluate the user a
作者: 捏造    時(shí)間: 2025-3-23 09:45
Towards Informational Self-determination: Data Portability Requests Based on GDPR by Providing Publi claim the personal data processed by them and request their transfer in accordance with the GDPR by defining a respective novel process and supporting technical architecture. The proposed system is validated using a prototype implementation. In addition to demonstrating the feasibility of the syste
作者: 動(dòng)機(jī)    時(shí)間: 2025-3-23 14:28

作者: VAN    時(shí)間: 2025-3-23 18:59
2367-3370 al intelligence and on their application domains, exploring innovative ideas, guidelines, theories, models, technologies, and tools and identifying critical issues and challenges that researchers and practitioners must deal with in future research. .978-3-030-86161-2978-3-030-86162-9Series ISSN 2367-3370 Series E-ISSN 2367-3389
作者: 顛簸地移動(dòng)    時(shí)間: 2025-3-23 22:43
Formal Analysis of Smart Contracts: Model Impact Factor on Criminality technology. However, the intended level of automation might cause cascading effects that have to be checked by formal methods of algorithmic proof. Our smart contract formal model analysis framework uses the Finite State Machine (FSM) theory which is a model of behavior composed of states, transiti
作者: 高腳酒杯    時(shí)間: 2025-3-24 05:33

作者: DRAFT    時(shí)間: 2025-3-24 08:33

作者: 悠然    時(shí)間: 2025-3-24 11:53
Protection Against Online Fraud Using Blockchainlication presented is intended to prevent the user from landing on websites that have recently been the target of various attacks. Installed as a browser plugin it should alert the user upon visiting such a website. Alerts are triggered once a generated hash of the website no longer matches a hash t
作者: 公共汽車    時(shí)間: 2025-3-24 15:20

作者: ELUDE    時(shí)間: 2025-3-24 21:01
Parameter Identification for Malicious Transaction Detection in Blockchain Protocolsrious purposes will also become more common. In order to combat these actors, robust mechanisms to detect and address illicit activities must be developed. Many of the current approaches to detecting abnormal activity in blockchain-based platforms are platform specific. In this paper we provide some
作者: 無底    時(shí)間: 2025-3-25 02:19

作者: Arthritis    時(shí)間: 2025-3-25 03:20

作者: FACET    時(shí)間: 2025-3-25 10:46
Implementation and Evaluation of a Visual Query Language in the Context of Blockchainical program modules. The use of visual techniques is connected with the hope, among other things, to be able to create and understand programs more easily and better than before, which would open up access to software development for non-programmers. This could lead to a reduction of the enormous a
作者: CRP743    時(shí)間: 2025-3-25 12:30

作者: 壓艙物    時(shí)間: 2025-3-25 18:59
Towards Informational Self-determination: Data Portability Requests Based on GDPR by Providing Publidecade’s digital platform progress has been legally widely unframed and untamed. Therefore, both collection and commercial use of personal data has become a widespread and profitable business model in which individuals currently practically have very little power. European Union’s General Data Prote
作者: Adenocarcinoma    時(shí)間: 2025-3-25 22:13
Blockchain and the Riemann Zeta Functionnt on doing the PoW and nothing else. In this paper we propose an adaption of hash based PoW’s. This adaption consists in two aspects, firstly by embedding the space of the hash’s, ., in the space of complex numbers ., more concretely in the subset ., . and secondly in designing a new cryptographic
作者: endoscopy    時(shí)間: 2025-3-26 03:53
Case Study: The Automation of an over the Counter Financial Derivatives Transaction Using the CORDA Corda permissioned blockchain technology; this kind of transaction is currently performed manually by specialized clerks in most private banking organizations. The proposed solution design is an innovative certified sequence of the workflow states of the transaction, based on the asynchronized inter
作者: 和音    時(shí)間: 2025-3-26 06:15

作者: QUAIL    時(shí)間: 2025-3-26 12:12

作者: Iniquitous    時(shí)間: 2025-3-26 16:07
A Preliminary Review on Complementary Applications of Databases and Blockchain Technologymmutability feature, blockchain is now also used for a variety of applications. Nevertheless, blockchain is facing several challenges. On the other hand, databases have been on the market for decades, offering a wide range of affordable solutions. In this paper, we explore the possibility of combini
作者: Dignant    時(shí)間: 2025-3-26 20:36

作者: Living-Will    時(shí)間: 2025-3-26 21:59

作者: 束縛    時(shí)間: 2025-3-27 01:33

作者: PANT    時(shí)間: 2025-3-27 08:37
https://doi.org/10.1007/978-90-313-9636-8action among two parties through a smart contract coordinated and validated by the notary node. We show the business logic model of the application and the flow diagrams compatible with the current Corda R3 distribution.
作者: 闡釋    時(shí)間: 2025-3-27 13:28

作者: 隨意    時(shí)間: 2025-3-27 15:54

作者: Scintigraphy    時(shí)間: 2025-3-27 19:46

作者: 滴注    時(shí)間: 2025-3-28 01:38

作者: 惡名聲    時(shí)間: 2025-3-28 03:34
Parameter Identification for Malicious Transaction Detection in Blockchain Protocols generic parameters that should be valid for most permissionless blockchain platforms, particularly permissionless blockchain platforms that can be used for malicious transaction detection. We then analyze those parameters in the Ethereum cryptocurrency platform. These parameters include volumetric transaction rate and unique address activity.
作者: critique    時(shí)間: 2025-3-28 09:35
Case Study: The Automation of an over the Counter Financial Derivatives Transaction Using the CORDA action among two parties through a smart contract coordinated and validated by the notary node. We show the business logic model of the application and the flow diagrams compatible with the current Corda R3 distribution.
作者: 要塞    時(shí)間: 2025-3-28 14:05

作者: 小卷發(fā)    時(shí)間: 2025-3-28 15:55
Welke behandelingen bestaan er?,ggregator that verifies power trades and evaluate convergence across iterative steps. The proposed scheme has been implemented within Ethereum blockchain and its benefits are compared simulating different scenarios.
作者: 到婚嫁年齡    時(shí)間: 2025-3-28 19:42

作者: 獨(dú)輪車    時(shí)間: 2025-3-29 00:53

作者: 討人喜歡    時(shí)間: 2025-3-29 07:06
Blockchain Platform Selection for Security Token Offering (STO) Using Multi-criteria Decision Modelalization of the STO. We did a simulation for selecting the most suitable blockchain platform for the STO process using the Multi-Criteria Decision Model simulator to cover this issue. The simulation result shows the relation between the selected features, software quality, and the most suitable solution for STO.
作者: Retrieval    時(shí)間: 2025-3-29 07:59
Conference proceedings 2022cted from over 44 submissions. They contain the latest advances on blockchain and artificial intelligence and on their application domains, exploring innovative ideas, guidelines, theories, models, technologies, and tools and identifying critical issues and challenges that researchers and practitioners must deal with in future research. .
作者: CRUE    時(shí)間: 2025-3-29 13:06

作者: ENNUI    時(shí)間: 2025-3-29 19:14
Hoe kan ik de draad weer oppakken?,an provide the same security as transaction registers in distributed databases, but allows for load balancing as it is a decentralised system, thus facilitating fast and efficient operations, and provides Blockchain mechanisms to maintain the integrity of the validation register.
作者: bibliophile    時(shí)間: 2025-3-29 20:55
1 Wat is er met me aan de hand?,one of the most important open mathematical questions. The permanence of the problem is due to the mysterious behavior of the RZF in the region .. This region will be by translation the search region used in the new cryptographic puzzle. The PoW will thus be able to contribute to a better understanding of the behaviour of the RZF in the region ..
作者: 排他    時(shí)間: 2025-3-30 02:26

作者: 空中    時(shí)間: 2025-3-30 07:53

作者: DEBT    時(shí)間: 2025-3-30 10:42
Formal Analysis of Smart Contracts: Model Impact Factor on Criminalityions are properties that are checked during program execution. This formal analysis framework allows us to define a set of invariants on Finite State Machine behavior model and to propose an anomaly detection system based on the invariants of the smart contract.
作者: 厚臉皮    時(shí)間: 2025-3-30 12:33

作者: Emmenagogue    時(shí)間: 2025-3-30 16:57
Blockchain and the Riemann Zeta Functionone of the most important open mathematical questions. The permanence of the problem is due to the mysterious behavior of the RZF in the region .. This region will be by translation the search region used in the new cryptographic puzzle. The PoW will thus be able to contribute to a better understanding of the behaviour of the RZF in the region ..
作者: acrobat    時(shí)間: 2025-3-30 23:10

作者: insurrection    時(shí)間: 2025-3-31 02:05

作者: 聽寫    時(shí)間: 2025-3-31 06:20
Conference proceedings 2022a, Spain, in October 2021. Among the scientific community, blockchain and artificial intelligence are a promising combination that will transform the production and manufacturing industry, media, finance, insurance, e-government, etc. Nevertheless, there is no consensus with schemes or best practice
作者: 說笑    時(shí)間: 2025-3-31 12:08

作者: Longitude    時(shí)間: 2025-3-31 15:57
978-3-030-86161-2The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
作者: 同時(shí)發(fā)生    時(shí)間: 2025-3-31 19:32

作者: beta-cells    時(shí)間: 2025-3-31 23:48

作者: DEFER    時(shí)間: 2025-4-1 05:18
https://doi.org/10.1007/978-90-313-9687-0es (DERs). Within this trend, electricity grid generation and intermediary elements (e.g. batteries) are distributed, promoting a new business model where the consumers have become prosumers. That is to say, they can both generate and consume energy. The distributed energy generation is based on ren
作者: fixed-joint    時(shí)間: 2025-4-1 07:41
Hoe heeft het zover kunnen komen?,lication presented is intended to prevent the user from landing on websites that have recently been the target of various attacks. Installed as a browser plugin it should alert the user upon visiting such a website. Alerts are triggered once a generated hash of the website no longer matches a hash t
作者: 假裝是你    時(shí)間: 2025-4-1 11:35
Hoe heeft het zover kunnen komen?,een developed, decentralized multiplayer games have still been a challenge. This research work is therefore based on the question: . This question is answered by the successful development of a decentralized online multiplayer game based on a blockchain.
作者: 滲透    時(shí)間: 2025-4-1 14:42
Welke behandelingen bestaan er?,rious purposes will also become more common. In order to combat these actors, robust mechanisms to detect and address illicit activities must be developed. Many of the current approaches to detecting abnormal activity in blockchain-based platforms are platform specific. In this paper we provide some
作者: Bph773    時(shí)間: 2025-4-1 21:12

作者: 委托    時(shí)間: 2025-4-2 00:26
Hoe heeft het zover kunnen komen?,nd distract attention from the actual algorithms and logic that need to be understood. With the help of visual programming, syntax errors can be avoided as much as possible by using predefined graphical boxes, which, due to their shape, can only be connected correctly to form a program. Moreover, Sm




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
甘孜县| 昌平区| 平湖市| 呈贡县| 永兴县| 麦盖提县| 安陆市| 道孚县| 富顺县| 托里县| 台中县| 洪泽县| 博湖县| 康平县| 建昌县| 顺义区| 西畴县| 蓝山县| 东丰县| 达尔| 海淀区| 营山县| 文水县| 莎车县| 昌宁县| 建阳市| 闻喜县| 万宁市| 内黄县| 文安县| 襄樊市| 合阳县| 镶黄旗| 郴州市| 荥经县| 班戈县| 大荔县| 新竹县| 沭阳县| 杨浦区| 黄石市|