標題: Titlebook: Distributed Ledger Technology; 7th International Sy Naipeng Dong,Babu Pillai,Mark Utting Conference proceedings 2024 The Editor(s) (if appl [打印本頁] 作者: irritants 時間: 2025-3-21 19:43
書目名稱Distributed Ledger Technology影響因子(影響力)
書目名稱Distributed Ledger Technology影響因子(影響力)學科排名
書目名稱Distributed Ledger Technology網(wǎng)絡公開度
書目名稱Distributed Ledger Technology網(wǎng)絡公開度學科排名
書目名稱Distributed Ledger Technology被引頻次
書目名稱Distributed Ledger Technology被引頻次學科排名
書目名稱Distributed Ledger Technology年度引用
書目名稱Distributed Ledger Technology年度引用學科排名
書目名稱Distributed Ledger Technology讀者反饋
書目名稱Distributed Ledger Technology讀者反饋學科排名
作者: Cacophonous 時間: 2025-3-21 22:38 作者: Efflorescent 時間: 2025-3-22 01:09 作者: 流眼淚 時間: 2025-3-22 05:05
1865-0929 ocuses on current systems and new solutions to create a scientific background for a solid development of innovative Distributed Ledger Technology application. .978-981-97-0005-9978-981-97-0006-6Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 社團 時間: 2025-3-22 10:22 作者: 黃油沒有 時間: 2025-3-22 15:12
https://doi.org/10.1057/9780230252943ound. By tuning network delays in our controlled environment we were able to reproduce performance trends obtained in geo-distributed settings, hence demonstrating the relevance of bare metal evaluations to better understand blockchain performance.作者: 黃油沒有 時間: 2025-3-22 20:39 作者: Affirm 時間: 2025-3-23 00:39 作者: Obstruction 時間: 2025-3-23 02:57 作者: Gratulate 時間: 2025-3-23 06:55
,EVM-Vale: Formal Verification of?EVM Bytecode Using Vale,truction set to Vale allows opportunity for refinement of the instructions, which we did ensuring safety properties of overflow protection, invalid memory access protection, and functional correctness. We demonstrate our contributions through two case study smart contracts, a simple casino, and a subcurrency coin.作者: ORBIT 時間: 2025-3-23 13:44 作者: 占卜者 時間: 2025-3-23 15:55
https://doi.org/10.1057/9780230252943s a benchmark, our algorithm 1) improves the account update time from . to . and 2) reduces the batch update cost by half using a one-pass traversal. Empirical analysis of real-world block data shows that our algorithm outperforms the benchmark by at most 14%.作者: 異端邪說2 時間: 2025-3-23 19:44
https://doi.org/10.1057/9780230270800privacy-enhancing methods for NFTs. We collected transaction data from a blockchain-based game called Planet IX that was built on the Polygon blockchain and used graph visualisation to provide examples for constructed connections.作者: handle 時間: 2025-3-24 00:41
The British Commonwealth and Empire potential legal and regulatory considerations. By shedding light on the intersection of NFTs and music copyright, this research aims to contribute to the ongoing discourse surrounding the transformative potential of blockchain technology in the music industry and its implications for creators, copyright holders, and music enthusiasts alike.作者: 廚房里面 時間: 2025-3-24 04:40
https://doi.org/10.1057/9780230270800e payment system utilising the NPP platform, the paper also examines the reasons for the limited adoption of real-time payments despite their clear advantages over traditional digital payment methods.作者: 大炮 時間: 2025-3-24 06:45 作者: Allege 時間: 2025-3-24 14:32
,Linking NFT Transaction Events to?Identify Privacy Risks,privacy-enhancing methods for NFTs. We collected transaction data from a blockchain-based game called Planet IX that was built on the Polygon blockchain and used graph visualisation to provide examples for constructed connections.作者: 彎彎曲曲 時間: 2025-3-24 17:55
,The Benefits of?Non-Fungible Token (NFT) Technology in?Music Copyright, potential legal and regulatory considerations. By shedding light on the intersection of NFTs and music copyright, this research aims to contribute to the ongoing discourse surrounding the transformative potential of blockchain technology in the music industry and its implications for creators, copyright holders, and music enthusiasts alike.作者: Nerve-Block 時間: 2025-3-24 22:43 作者: 善于騙人 時間: 2025-3-24 23:15
Detecting Malicious Blockchain Transactions Using Graph Neural Networks,ifying patterns. This is the first work that considers a generalised graph representation for the Bitcoin and Ethereum networks and analyses their behaviour using a combination of heterogeneous GNN framework’s GraphSAGE and Graph Attention Network (GAT). The classification results reveal that the pr作者: Lymphocyte 時間: 2025-3-25 04:35
https://doi.org/10.1057/9780230252943ifying patterns. This is the first work that considers a generalised graph representation for the Bitcoin and Ethereum networks and analyses their behaviour using a combination of heterogeneous GNN framework’s GraphSAGE and Graph Attention Network (GAT). The classification results reveal that the pr作者: 輕率的你 時間: 2025-3-25 09:03 作者: colloquial 時間: 2025-3-25 15:07
https://doi.org/10.1057/9780230252943mbership and non-membership proofs. It has been widely used as an authenticated data structure in various applications, such as layer-2 rollups for blockchains. zkSync Lite, a popular Ethereum layer-2 rollup solution, uses a sparse Merkle tree to represent the state of the layer-2 blockchain. The ac作者: 披肩 時間: 2025-3-25 17:25
https://doi.org/10.1057/9780230252943s evaluation was conducted with the recent Diablo benchmark suite?[.], a framework to evaluate the performance of different blockchains on the same ground. By tuning network delays in our controlled environment we were able to reproduce performance trends obtained in geo-distributed settings, hence 作者: 訓誡 時間: 2025-3-25 21:37
https://doi.org/10.1057/9780230252943rding smart contract developers higher-level language and reasoning features. We encode EVM-R (a subset of EVM semantics and instruction set) into F*, and raise the EVM-R into Vale design-by-contract components in an intermediate language supporting conditional logic. The specifications of Vale proc作者: OFF 時間: 2025-3-26 02:21 作者: 攀登 時間: 2025-3-26 04:19 作者: 憤怒事實 時間: 2025-3-26 11:30 作者: 制造 時間: 2025-3-26 16:08 作者: Costume 時間: 2025-3-26 20:01
The British Commonwealth and Empirelia. The paper analyses the different design choices, governance structures, and technological challenges of CBDC development in each country. The paper also compares the progress and impact of CBDC on financial stability, privacy, and centralised control. The paper concludes that CBDCs have the pot作者: vibrant 時間: 2025-3-26 21:35 作者: headlong 時間: 2025-3-27 04:47
Conference proceedings 2024, 2023..The 8 full papers and the short paper included in this volume were carefully reviewed and selected from 32 submissions. The volume focuses on current systems and new solutions to create a scientific background for a solid development of innovative Distributed Ledger Technology application. .作者: angina-pectoris 時間: 2025-3-27 08:54 作者: MAPLE 時間: 2025-3-27 12:32
https://doi.org/10.1007/978-981-97-0006-6blockchain; distributed ledger; smart contract; nft; web3; cryptocurrency; consensus; privacy; formal method作者: Corroborate 時間: 2025-3-27 15:18 作者: 手勢 時間: 2025-3-27 20:47
,One-Phase Batch Update on?Sparse Merkle Trees for?Rollups,mbership and non-membership proofs. It has been widely used as an authenticated data structure in various applications, such as layer-2 rollups for blockchains. zkSync Lite, a popular Ethereum layer-2 rollup solution, uses a sparse Merkle tree to represent the state of the layer-2 blockchain. The ac作者: 搜集 時間: 2025-3-28 01:40
,On the?Relevance of?Blockchain Evaluations on?Bare Metal,s evaluation was conducted with the recent Diablo benchmark suite?[.], a framework to evaluate the performance of different blockchains on the same ground. By tuning network delays in our controlled environment we were able to reproduce performance trends obtained in geo-distributed settings, hence 作者: ARBOR 時間: 2025-3-28 05:09
,EVM-Vale: Formal Verification of?EVM Bytecode Using Vale,rding smart contract developers higher-level language and reasoning features. We encode EVM-R (a subset of EVM semantics and instruction set) into F*, and raise the EVM-R into Vale design-by-contract components in an intermediate language supporting conditional logic. The specifications of Vale proc作者: 動物 時間: 2025-3-28 07:16
Detecting Malicious Blockchain Transactions Using Graph Neural Networks, its misuse, primarily through the exploitation of its pseudo-anonymous characteristic. Encouraging blockchain adoption and improving security in the decentralised environment require techniques to detect wallets and/or smart contracts owned by malicious entities. Illegal activities such as dark mar作者: infantile 時間: 2025-3-28 11:01
Data Sharing Using Verifiable Credentials in the Agriculture Sector,hange is driving more regulation and data compliance requirements. There are new global standards of data verification requiring agriculture to confirm to these standards for international export. This paper describes the technical implementation details of a Decentralized Agricultural Ecosystem aim